pred_label
stringclasses 2
values | pred_label_prob
float64 0.5
1
| wiki_prob
float64 0.25
1
| text
stringlengths 113
974k
| source
stringlengths 39
45
|
|---|---|---|---|---|
__label__wiki
| 0.797761
| 0.797761
|
Let's Cut the Hype: Facebook's Email Service Won't be a "Gmail Killer"
Facebook is launching an email service on Monday. While that’s only a rumor for now, I think it’s a well substantiated one and there is little doubt in my mind that Facebook mail is exactly what we are going to get at Monday’s event in San Francisco. Sadly, though, the meme that this could really be a “Gmail killer,” as the project is apparently internally known at Facebook, is already making its rounds in the tech blogosphere and won’t let up until Monday.
My guess is that the reality of Facebook mail will be far more banal. Facebook will give every user an @facebook.com address and a basic email service that will kill Gmail as much as Gmail killed Yahoo! Mail and Hotmail/Windows Live Mail.
So let’s get away from the whole “Gmail killer” idea (the tech blogosphere has always been obsessed with “xyz killers”). What matters is that this email service – if it really launches on Monday – shows how Facebook doesn’t just want to own our social network but how it also wants to be our messaging service. Groups were a step in this direction, Facebook chat was a step in this direction, as is bringing Facebook chat to Windows Live Messenger. Adding email to this is just the logical next step, but just as tagging a social network on to email didn’t make Google Buzz a Facebook killer, adding email to Facebook won’t kill Gmail.
It’s even hard to think how Facebook could actually make email better. Sure, this service will nicely integrate with the rest of the Facebook platform, but the great thing about email is that you can use it no matter what platform and server you and the people you write to are on.
Maybe Facebook could build a better Priority Inbox, but somehow I doubt that. It will surely also make it easy to email photos (Facebook is already the biggest photo service on the Internet). But it won’t get a lot of people to turn away from Gmail or the even more popular Yahoo and Windows Live email services. Email is extremely sticky. Most people never switch. It’s just too hard and almost never worth the effort. Professionals definitely won’t use it.
We should remember, though, that for some people, the idea of an @facebook.com email address actually sounds like a good idea. Those are not the people who leave critical comments on stories about Facebook mail today, though. Those are the people who will be surprised to hear about it on Monday and will leave barely readable comments on the Facebook blog, asking where to find new tips and trick for playing Farmville and how to write on their wall. That won’t make it a Gmail killer either, though.
Bonus: I got an email this morning from this blogger who discovered Facebook’s mail.facebook.com page. At first, I thought this would make for a nice scoop, but after actually looking at the site for 10 seconds, it quickly became clear that this was Facebook’s internal email. The site runs Microsoft Exchange and there is no way that Facebook would want to use Exchange for powering 500 million email accounts even if Microsoft is going to partner with Facebook and integrate its Office web apps into the new service. Of course, this story still found its way into the tech blogosphere in the form of a Friday afternoon linkbait post on TechCrunch that some actually took at face value. Sigh…
Facebook ‘Gmail Killer’ Due Monday (newser.com)
Facebook to launch “Gmail killer” webmail on Monday (venturebeat.com)
Facebook to Launch “Gmail Killer” Webmail on Monday (nytimes.com)
Facebook May Be Preparing ‘Gmail Killer’ (informationweek.com)
Facebook’s Project Titan: The Gmail killer? (salon.com)
|
cc/2020-05/en_middle_0032.json.gz/line8218
|
__label__wiki
| 0.777926
| 0.777926
|
1/4盎司2017年皇家铸币厂女王之兽|爱德华三世之狮鹫金币
使用账单付款、支票、银行汇款、比特币、邮政汇票和Interac在线可享有信用卡价格4%的折扣。下列批量定价已体现折扣。
信用卡或PayPal适用完全价目表价格。考虑使用左侧的付款方式,可享有4%的折扣。
已添加 1/4 oz 2017 Royal Mint Queen's Beasts | Griffin of Edward III Gold Coin
继续购买
查看购物车 结算
Order the spectacular 1/4 oz 2017 Griffin gold coin at the lowest price online, second in the Queen's Beasts series issued by Britain's Royal Mint. The coin features a griffin, which Edward III had engraved on his private seal.
Queen Elizabeth II's coronation in 1953 was watched over by 10 heraldic beasts, created to represent the various branches of royal genealogy over the centuries. The griffin is thought to be a symbol of strength, guardianship and vigilance, and is holding the shield of Edward III. The shield displays the Round Tower of Windsor Castle, where Edward was born. The shield is surrounded by oak branches with the royal crown above.
Unusually, both sides were executed by Jody Clark, an engraver at the Royal Mint. His effigy of the Queen is the only fifth to have graced British coins since 1953.
In multiples of 25 this coin ships in an original mint tube
国家 GB
制造商 皇家铸币厂
状况 炫酷未流通
纯度 9999
正面 Effigy of Queen Elizabeth II and the words "Elizabeth II D.G. Regina Reg Fid 25 Pounds"
反面 Stylized image of a Griffin with its wings spread holding the shield of Edward the III and the words "Griffin of Edward III 1/4 oz Fine Gold 9999 2017"
平均厚度(mm) 1.6
法定货币 GBP 25
设计者 Jody Clark (正面)
皇家铸币厂
炫酷未流通
Effigy of Queen Elizabeth II and the words "Elizabeth II D.G. Regina Reg Fid 25 Pounds"
Stylized image of a Griffin with its wings spread holding the shield of Edward the III and the words "Griffin of Edward III 1/4 oz Fine Gold 9999 2017"
GBP 25
Jody Clark (正面)
1/4 oz 2017 Royal Mint Queen's Beasts | Griffin of Edward III Gold Coin Order the spectacular 1/4 oz 2017 Griffin gold coin at the lowest price online, second in the Queen's Beasts series issued by Britain's Royal Mint. The coin features a griffin, which Edward III had engraved on his private seal. Queen Elizabeth II's coronation in 1953 was watched over by 10 heraldic beasts, created to represent the various branches of royal genealogy over the centuries. The griffin is thought to be a symbol of strength, guardianship and vigilance, and is holding the shield of Edward III. The shield displays the Round Tower of Windsor Castle, where Edward was born. The shield is surrounded by oak branches with the royal crown above. Unusually, both sides were executed by Jody Clark, an engraver at the Royal Mint. His effigy of the Queen is the only fifth to have graced British coins since 1953.
|
cc/2020-05/en_middle_0032.json.gz/line8219
|
__label__cc
| 0.719718
| 0.280282
|
Camming with Kelley Cabbana
Misconceptions of Camming
What It’s Like To Be A Porn Star
How Popular Is Cosplay In Porn?
How Belle Delphine Broke The Internet
Kelley Cabbana
I really really enjoy sex. When I think about sex I think about all the different things I enjoy most. I do like the intimacy you share with a partner during sex and how you can share fantasies. I am a very open-minded person so I enjoy pleasing my partner as much as I like to be pleased. I think fantasies and role-playing adds a whole new element to any relationship. I have always said if everyone had sex or masturbated daily there would be less hate in the world. Sex is an amazing stress reliever but also makes you so happy and satisfied too.
How I Get Ready Before Camming
Knowing I’m getting ready to get on cam is a turn-on for me. I really enjoy the excitement of watching the cam of the person I am interacting with. I like to watch and see how the other person is turned on by me. It’s fun to share their fantasies and play them out as it does make me very horny. Before I get on cam I always make sure my outfits are ready and my dildos are set up and ready too. If I’m online longer than 4 hours I always like to change up the outfits to keep it fun.
I have everything very organized so my shows go smoothly. My room is my domain so it’s a reflection of my personality and things that I love. My make-up and hair is so important as I always want to look my best for my fans. So I spend a lot of time doing my make-up and hair. I prepare not only mentally (as I think about sex) but also physically so my fans have the best experience.
My Camming Specialties
I really enjoy all types of role-playing. The “Sexy Teacher” and “Naughty Nurse” are two of my favorites. I like when my fans want to see me do a sloppy blow-job because I’m so good at spitting and gagging. I really enjoying teasing and sucking the dildo so my clients will really get to see how I love to give them oral sex. I also love to ride a dildo for them too as they really like to see my big boobs going up and down – it’s a real turn on. I’m always open to new fantasies and role-playing that my clients want to see. I like it when they share what really turns them on during our show. I feel like I’m a very good listener and I want them to have an awesome experience so that they want to be frequent guests in my room over and over and over.
Differences Between Masturbating On & Off Camera
When I’m on cam, it truly is my desire to really make sure that the person who is on the show with me really has an awesome mind-blowing experience. I want to make sure if it’s role-playing, that I really put a lot of attention into every detail of that fantasy for them. I want them at the end of the show to give the highest rating possible but also feel like they received what they were paying me for too. I want it to be personal and very on point no matter what desires or fantasies they have. That makes me feel amazing when they let me know how awesome the show was.
In my personal life, I might tend to be a little more selfish. If I’m with a partner, well I want them to have a great time with me but I also want to make sure that I too am receiving what I want as well. I am very verbal about my wants and desires. I will let you know exactly how I like you to eat my pussy and how I want my tits sucked. I love to masturbate on and off cam. I enjoy the orgasm so much that I get from the toys that my mission for my sexual pleasure really is the same on and off cam. I want to cum and enjoy that regardless of being in front of the camera or not. I really don’t fake my orgasms, my experience are always real on cam and off.
Memorable Camming Experiences I’ve Had
I have many fun memories. I think that’s what I love so much about this job. It’s the best job ever. I get to live out so many of my own fantasies too! One is when I was on a Ferris wheel and shot a flashing tit video – it was so much fun and the guy operating the ride just couldn’t get enough. It was awesome!
The other one is when I went for a ride in my car and I took my camera guy along, while driving, I flashed my tits and played with my pussy. I even had a few guys driving past who followed me to watch and took videos themselves. I really enjoy public displays and pussy play just about anywhere!
My Personal Sex Toy Collection
I have so many toys. My dildo collection numbers 75 and it continues to grow as some fans buy me new ones weekly. It’s great I have nearly every size and color available. Some of them I named after fans. I have to retire some when they are used too much. I know that’s so funny but I am hooked with playing with myself so they get used a lot on and off cam. I love vibrators the most, the sensation is the best. I have a favorite purple one that is nicknamed Whitehat Junior. It’s from a very loyal fan that was in my show when I broke the top right off my hitachi wand.
It was absolutely hilarious that I had destroyed this Hitachi wand. So he mailed me this updated awesome purple vibrator which I now use daily. I even like to use the dildo along with a vibrator. This combination makes for an amazing orgasm. You should stop by my room and check it out. I always have lots of toys and I’m always ready to have fun with them while you watch me.
Kelley Cabbana – Blonde bombshell Kelley Cabbana has become one of the fascinating webcam models in the adult industry. The Florida native has been scorching up video streams since launching her naughty career in 2011. Kelley has gone on to attain multiple AVN Award nominations for her online work and cultivated a worldwide legion of fans. While standing only 5′ 3″, the larger than life beauty turns heads with her incredibly toned body, her DDD cup breasts, and scrumptious backside. Kelley’s outgoing and positive personality make men fall in love with her.
But before Kelley began sizzling webstreams, she had a lengthy career as a model that began at an early age. Working in the mainstream for clothing companies as a hobby led to a continuous stream of opportunities. Kelley traveled across the country as more doors opened for her. She received an incredible amount of attention as a glamour model for WWFU.net and Harley Davidson. Showing off her fantastic body encouraged the sexy stunner to make the leap into camming with the launch of her website KelleyCabbana.com in 2011. Her site has exclusive member content and access to private cam shows.
Since 2015, Kelley can be seen camming on her weekly show on Vette Nation Live. Members of her personal website get to view her webcam show on the VNA network for free. In 2017, Kelley’s been awarded 1st place as VNALive.com’s Most Popular Cam Show for the month of May 2017 and August 2017.
Follow Kelley Cabbana on:
www.starfactorypr.com/kelley-cabbana
www.starfactorypr.com/kelley-cabbana-bio.html
www.kelleycabbana.com
www.kelleycabbana.cammodels.com
www.sextpanther.com/KelleyCabbana
www.snapcentro.com/kelleycabbana
www.onlyfans.com/kelleycabbana
www.twitter.com/kelleycabbana
www.instagram.com/kelleycabbanaxxx
www.facebook.com/kelleycabbanaofficial
www.kelleycabbana.tumblr.com
Spoil her: Kelley Cabbana Amazon Wishlist
Kelley Cabbana Talking Points:
Nominated for AVN Favorite Cam Girl 2015 & 2016
Launched her website http://kelleycabbana.com in 2011
Nominated 2017 NightMoves® Best Live Cam Model of the Year
Weekly Cam show of which members of Kelley’s personal website get to watch her webcam on Vette Nation Live network for free
Awarded 1st place as VNALive.com’s Most Popular Cam Show for the month of May 2017 and August 2017
Glamour Model turned Webcam Girl
Playboy TV hostess 2010-2011, Miami-based show, Foursome.
Images courtesy of Kelley Cabbana and Star Factory PR
Related Topics:Adult actress, Camming, Kelley Cabbana, pornstar, SimplySxy
Blonde bombshell Kelley Cabbana has become one of the fascinating webcam models in the adult industry. The Florida native has been scorching up video streams since launching her naughty career in 2011. Kelley has gone on to attain multiple AVN Award nominations for her online work and cultivated a worldwide legion of fans. While standing only 5' 3", the larger than life beauty turns heads with her incredibly toned body, her DDD cup breasts, and scrumptious backside. Kelley's outgoing and positive personality make men fall in love with her. But before Kelley began sizzling webstreams, she had a lengthy career as a model that began at an early age. Working in the mainstream for clothing companies as a hobby led to a continuous stream of opportunities. Kelley traveled across the country as more doors opened for her. She received an incredible amount of attention as a glamour model for WWFU.net and Harley Davidson. Showing off her fantastic body encouraged the sexy stunner to make the leap into camming with the launch of her website KelleyCabbana.com in 2011. Her site has exclusive member content and access to private cam shows. Since 2015, Kelley can be seen camming on her weekly show on Vette Nation Live. Members of her personal website get to view her webcam show on the VNA network for free. In 2017, Kelley’s been awarded 1st place as VNALive.com’s Most Popular Cam Show for the month of May 2017 and August 2017.
More in Sex Ed
There is no getting around the fact that the relationship game has completely changed from what...
By Madison James January 18, 2020
Video courtesy of Madison James. Photo by Shvets Anna from Pexels Like to be featured on SimplySxy? Drop us...
By Mila Pixie Rose January 16, 2020
I believe that sex work can be the most feminist thing you can do. I own...
By Arazatah January 14, 2020
The kinky GFE is the most sensual and sweet twist of BDSM, it is the quintessential...
By Winnie Elle January 12, 2020
Salutations! My name is Winnie Elle. I’m a full service Sex Worker based in the United...
Why Should Everyone Try Sensual Exploration
By Aviva Anders January 10, 2020
At times, sex can be a metaphor for the human condition. There are moments of levity...
Misconceptions About Sex Work
By Seductive Storm January 8, 2020
My general views towards sex…Are that women and girls get “morally bullied” into a set of...
Masturbation With Sex Toys
By Crystal Cooper January 5, 2020
Masturbation is a wonderful experience! It allows any woman or man to get more familiar with...
For Men! 9 Steps To Give Your Woman A Mind Blowing Full Body Orgasm
By Madison James January 4, 2020
You may have heard about the full body Tantric orgasm in the past and you may...
By Madison Winter January 2, 2020
I believe traveling and going on extended dates is gaining in popularity. In my opinion, it...
Kissing Tips For Men
What Is It Like To Engage Mature Escorts?
|
cc/2020-05/en_middle_0032.json.gz/line8225
|
__label__cc
| 0.661474
| 0.338526
|
Exploring an American Indian Participatory Medical Model
by Michelle Marie Jacob | May 30, 2015 | 0 comments
American Indians suffer disproportional disease burden from chronic conditions such as Type 2 diabetes (hereinafter “diabetes”). In response to this health crisis, the United States Congress implemented the Special Diabetes Program for Indians (SDPI), a community-based demonstration project to help patients prevent diabetes and reduce risk for cardiovascular disease. This paper describes how intervention case managers at one SDPI site, the Yakama Healthy Heart Program (YHHP), conceptualized culturally responsive intervention strategies, and patient, system, and cultural factors that impact participation in the SDPI intervention.
Methods: Thematic analyses of qualitative data derived from focus groups comprised of three categories: retained participants, non-retained participants, and intervention case managers.
Findings: Recommendations to inform an American Indian participatory medical model include: 1) reciprocity of individuals and systems must be implemented throughout all levels and for the duration of the intervention; 2) community champions need to serve as intervention leaders; and 3) institutional structures must promote relationship building between providers and patients within a community and cultural context. Our findings indicate that the unique structural qualities and community-engaged retention strategies of YHHP are critical to ensuring strong case manager-patient relationships, recruitment, and retention.
Keywords: American Indian, diabetes, cardiovascular disease, relationship building, Special Diabetes Program for Indians.
Citation: Jacob MM, Poole MJ, Gonzales K, Jim H, Duncan GE, Manson S. Exploring an American Indian participatory medical model. J Participat Med. 2015 May 27; 7:e8.
Disparities, Mistrust, and the Need for Culturally Responsive Care
American Indians (AIs) experience striking disparities in the incidence and prevalence of diabetes compared to any racial-ethnic group in the United States. [1][2][3][4] Mitigating these disparities requires health care systems that combine both evidence-based practices of Western medicine and cultural norms regarding health and healing. There are many contradictions and seeming incompatibilities between the delivery of Western medicine and the cultural norms of AIs. These contradictions and incompatibilities are challenging, but also present opportunities to consider modifications of program structure and delivery. The parameters of participatory medicine, defined as a model of cooperative care that engages patients as “co-pilots” in the health care team, provides a promising framework for understanding barriers and solutions to improving health care processes, overcoming medical mistrust, and addressing health problems facing AIs. [5]
Medical mistrust, namely attitudes about the medical establishment, including trust in one’s provider and health care organizations, is an important health care barrier acknowledged by diverse populations. For example, Guadagnolo and colleagues found that more medical mistrust was reported among AIs compared to whites, and that race was the only factor correlated with greater mistrust and less satisfaction with health care. [6] Addressing medical mistrust is important in the context of participatory medicine because it likely influences patient engagement, participation, and adherence to provider recommendations. Buchwald and colleagues found that among a sample of 319 American Indians and Alaska Natives (AI/ANs), the odds of participation in health research increased if led by researchers of indigenous descent or staff whom the participants trusted. [7] In contrast, AI/ANs were less likely to participate if they believed confidentiality would be compromised, or if the study was led by the federal government. Indigenous peoples’ mistrust towards the federal government reflects a culturally-based, critical understanding of history and colonization. Inadequate medical care is a frequent aspect of colonization, including substandard health care resulting from chronic under-funding. [8][9]
American Indian health remains closely tied to the federal government, which is responsible for providing health care for members of federally recognized AI tribes. This was established by treaties between sovereign Indian nations and the US government. While critics have argued that this historical legacy has had a lasting impact on contemporary indigenous peoples’ health and use of health care, no study has explored what an AI participatory medical model might look like. [10][11] If we hope to encourage participatory medicine in the AI population, we must begin to understand the factors that empower AI patients and processes that facilitate bi-directional engagement between patients and providers. In this paper we seek to promote AI participation and empowerment by identifying these factors within their health care system.
Setting: The Yakama Healthy Heart Program
This study was conducted in the Yakama Healthy Heart Program (YHHP), located at the Yakama Indian Health Service Clinic on the Yakama Reservation in rural, south-central Washington State. The Yakama Reservation is located on the ancestral homeland of the 14 Confederated Tribes and Bands of the Yakama Nation. Tribal members retain the treaty rights to fish, hunt, gather, and access spiritually significant places in the surrounding Yakama homeland areas that were ceded in the Treaty of 1855. The Yakama people have strong cultural connections to the land and rivers, with salmon, deer, berries, and roots as sacred traditional foods that remain important to the Yakama culture and peoples.
The YHHP is part of the Special Diabetes Program for Indians Healthy Heart (SDPI-HH) demonstration project, a competitive grant program funded by the US Congress and administered by the Indian Health Service. The background of the SDPI is described elsewhere. [12] Briefly, the SDPI-HH seeks to reduce cardiovascular risk among AI/ANs with Type 2 diabetes. The SDPI-HH is delivered through 30 health care facilities that serve AI/ANs. Each SDPI-HH program administers the intervention within its respective health care facility. All 30 of these programs provide a suite of standardized health care services for cardiovascular risk reduction. Case managers are central to this intervention; they provide and coordinate intensive case management to help participants monitor and control their diabetes through monthly visits to the intervention site and engagement with intervention activities; assessment of blood sugar and blood pressure; patient education regarding exercise and nutrition. Beyond these standard services, the programs have the flexibility to culturally tailor the delivery of these services to best serve their respective populations. The YHHP provides a community-based component comprised of physical activity events that welcome family and community participation and occur across the tribal reservation. Examples include walking and running events, family track meets, tai chi, ballroom dance classes, and powwow dance classes. See Figure 1 for an example of a community events outreach poster. Figure 2 shows one of the clinic staff running in the mile race at a family track meet.
Figure 1. Community outreach poster to promote family-friendly events for patients and families to socialize with clinic staff in a community setting.
Figure 2. Yakama Healthy Heart Program Family Track Meet mile running race for clinic staff and patients.
.YHHP Structure.
The YHHP is embedded within the Yakama Indian Health Service Clinic. YHHP staff is comprised of pharmacist-case managers, whose role is to assist patients with accessing prescriptions, contact patients to arrange monthly diabetes-related appointments, and provide patients with followup and support to maximize their adherence to provider recommendations related to diabetes management and cardiovascular risk reduction. Case managers serve as an important point of contact for YHHP patients that are under diabetes care within the clinic.
Enrollment within the YHHP began in 2006 and is ongoing. Participants typically are recruited during primary care visits and are referred by their physicians. Upon initial enrollment and over the first 12 months of the intervention, participants meet monthly with their case manager. After 12 months, if YHHP participants meet treatment goals, the frequency of their visits may be reduced to once quarterly. If participants miss an appointment at any point during the intervention, the case manager immediately attempts to reschedule, and continues to reschedule up to one month after the missed appointment. YHHP participants are retained for as long as they are willing to continue meeting with their case manager, with no official “end date.” YHHP patients who fail to continue meeting with their case manager beyond one month of staff efforts to reschedule, or who are otherwise lost to follow up, are designated as “dropouts” in YHHP records and classified as non-retained for the purposes of this study.
Eligible Participants, Sample Selection, Survey Administration, and Incentive
Our study’s data were obtained from YHHP-participants and case managers through a self-administered survey and focus groups. We report focus group findings in this manuscript; we discuss some trends found in the survey data, but our small sample size did not yield statistically significant survey data. In regard to the YHHP-participants, a random sample of patients who were retained in the YHHP program (n=30) and non-retained enrollees (n=5) enrollees were recruited to participate in focus groups. All YHHP-participants were American Indian, 80% of whom were enrolled members of the Yakama Nation. A focus group comprised of 10 YHHP Case Managers also was conducted. All YHHP case managers self-identified as non-Indian. Over half (58%) of YHHP-participants and YHHP-Diabetes Cases Managers were women, and ranged from 32 years old to 84 years old, with the average age of 59 years. Total enrollment for YHHP is 367 participants, 51% of which were female. According to YHHP records, at the time of enrollment, 8% of patients were 18-40 years old, 18% were 40-49 years old, 33% were 50-59 years old, and 41% were 60 years or older. Fifty-three participants dropped out less than 12 months after enrolling in the program; 23 dropouts have subsequently died, moved away from the service area, or been institutionalized, while 30 dropouts still live in the area and have working phone numbers on file with YHH staff. Research design, data collection instruments, and human subjects protocols used in this particular study were approved by the Yakama Nation Health, Education, and Welfare Committee; Yakama Nation Tribal Council; as well as the Institutional Review Boards of the Indian Health Service, the University of Colorado-Denver, and University of San Diego. Study findings were presented and approved for publication at the Yakama Healthy Heart Program and Yakama Nation Tribal Council.
Focus group questions examined the following domains: Satisfaction with Health Care Interaction, Medical Mistrust, and Access Barriers. Our work was guided by the following conceptual model (see Figure 3).
Figure 3.Predicted factors related to patient success in YHHP.
Through focus groups, we were particularly interested in learning about factors within YHHP that served to empower the AI participants, the processes that facilitate bi-directional engagement between patients and providers, and how these attributes create a more effective indigenous-focused participatory medical model. We sought to identify the parameters of participatory medicine which were particularly helpful in fostering patient success in YHHP (see Table 1).
Recruitment for the focus groups involved a mailed information packet containing a letter explaining the study, a consent form, a demographic survey, an optional form to enroll in a focus group, and a stamped pre-addressed envelope in which to return the items. Beginning 2 weeks after mailing these items, the research staff contacted each person by telephone, up to three times during the following 9 months. Upon receipt of the signed consent and completed survey, each participant was mailed a $15 grocery store gift card. Participants who volunteered to participate in a focus group were contacted and scheduled into a group.
Three separate focus groups were conducted: one for retained YHHP participants, one for non-retained YHHP participants, and one for YHHP case managers. All ten case managers were recruited via a brief presentation given by the lead author at a regularly scheduled staff meeting.
All focus group members discussed questions about their participation in YHHP. Large poster paper with one question written at the top of each page was used during the focus group sessions to stimulate sharing. After reading the question, participants were encouraged to share thoughts and experiences in the YHHP. These data were then summarized on the poster paper, which was taped on walls around the room, and used for participants’ review and further comment. This process continued until all questions were answered. The focus groups were completed by asking each participant to vote for the most important factors related to retention in the YHHP program. Each participant was given five stickers to indicate their votes by placing stickers next to the top influences on patient retention or drop out from their personal perspective. Participants were told they may place stickers next to any item on the posters, including placing multiple stickers by a single item. After they completed their votes, participants discussed their voting patterns and these narratives were audio recorded and transcribed. YHHP participants and case managers also completed a brief demographic questionnaire. Poster responses and the transcript were manually coded for themes and analyzed using a grounded theory approach. [13] This process was used for all focus groups. (See Tables 1 and 2 for results from participant and case manager focus groups, respectively).
Table 1. Questions and key themes for YHHP participant focus groups (retained and non-retained).
Table 2. Questions and key themes for YHHP staff focus group.
In this section we discuss our study’s findings in terms of the relevant Parameters of Participatory Medicine in order to explore what an AI Indigenous-participatory medical model might look like. Our findings described in Table 3 highlight three of the Parameters of Participatory Medicine (PPM).
Table 3. Parameters that inform the features of American Indian participatory medical model in YHHP.
Our findings suggest that the structure of the Case Management System at the YHHP site provides (PPM I) opportunities for participants and staff members to interact effectively, invoking better communication that increase patient access to important information and help; (PPM II) professionals that monitor medication reconciliation and rapid identification of complications with appropriate referral mechanisms; and (PPM III) the institutional support of strategies that are educational, respectful of culture, that encourage community and family, and address access barriers to ensure open participation for all community members.
The relationship-building components of the YHHP provide opportunities for participants and staff members to interact effectively through better communication. All patients discussed the importance of their case manager for learning new information about both diabetes and healthy lifestyles for themselves. Patients also shared this health information with their family members, which reduced mistrust between the broader community and health care staff. Staff confirmed the importance of creating a medical home, where participants knew how to access information and care. Staff discussed the use of phone calls for outreach and follow-up as a way to increase patient adherence and also to build relationships with their patients. Monthly appointments and community events also increased participation. In short, individualized and frequent communication opens the door for sharing valuable information between patient and provider, patient and family, and family and provider. Overall, communication is facilitated by the highly structured case management system of close, monthly follow-up and frequent phone calls.
Case managers closely monitor participants, which appears to be a strong factor in participant satisfaction. Due to increased regular contact, case managers can rapidly identify complications and provide referrals and medication reconciliation. This system increases the effectiveness of diabetes management and provides a more satisfactory experience for patients. The case management system provides close monthly monitoring that includes a medication reconciliation and management program that facilitates acquisition and interaction between pharmacists as case managers. This structure along with monthly appointments, phone calls, and paying close attention to key diabetic signs and symptoms (eg, evaluation of the feet and eyes) provides patients with better health outcomes and a more pleasant experience at the clinic. One patient explained:
He [provider] calls me and he encourages me and provides me with information. And I participate in Healthy Heart because it helps me control my sugar levels. I do my toe checkups and my eye checkups and my teeth and dental, and all these are pertinent to our health because if we have bad teeth it could affect our hearts. And I like the Healthy Heart staff because they are thorough and knowledgeable and I’m really glad to be a participant of Healthy Heart.
Monthly appointments with (case managers who are well-trained in evaluating diabetic complications provide close monitoring and rapid identification of problems with fast referrals for intervention. The benefits of this structure are reflected in this excerpt from a patient, who credited his provider with encouraging him to maintain a healthy weight and also with restoring his eyesight:
[YHHP] keeps your interests up and your diets, your weight. And then the constant checkups for teeth and so forth. I lost my eyesight for a period but then that was mostly cured because they caught it early enough.
A final parameter relates to the institutional support of strategies that are educational, respectful of culture, encourage community and family, and address access barriers to ensure that participation is open for all community members. Our pilot project’s findings revealed that communication strategies open the door for sharing valuable information between participant and staff, and participant and family. Communication and interactions occurred through participation in community and cultural events and activities. The lead case manager, identified by all staff members as a community champion, included key tribal members and elders who had cultural skill and knowledge in traditional practices to serve as advisors and leaders in the program planning process. This was possible due to excellent paths of communication and a case management system that includes not only activities in the health care setting but also culturally specific events and activities within the community. The staff emphasized that a key element to community building was the presence of a community champion, someone who was respectful to community dynamics, cultural traditions and values. Without a community champion, the best intentions could have had little or no impact. A community champion is critical for creating and maintaining a culturally responsive program. Clinics who serve AI communities need to prioritize the hiring and retention of community champions on their staff. A community champion has knowledge of local cultural traditions and a strong network of elders and advisors who will help guide the program so that it best serves the AI community. Clinic leadership must prioritize the skills and knowledge that a community champion brings to a program.
Racial and ethnic identity are critical considerations in health interventions. The relationship between ethnic identity and medical mistrust leads to poor adherence and poor outcomes, including low level of patient satisfaction. Findings from retained members and staff indicate that respect for ethnic identity and culture may positively impact patient engagement. The findings suggest that this sensitivity helps to alleviate medical mistrust and increases satisfaction and is a key contribution to the success of YHHP. Through culturally responsible programming (such as incorporating traditional indigenous foods into activities and discussions of healthy lifestyles) patients’ identities affirmed. And providers are able to learn about and appreciate the land, culture, and community in which they practice. Also, by featuring programming that focuses on local indigenous traditions, elders and community members are respected as teachers who have valuable knowledge to share. Taken together, the culturally responsive components of YHHP continue to help us to explore the meaning and importance of an American Indian participatory medical model.
While these findings focus on the perspectives of providers and retained patients, we also sought further insight from non-retained patients. YHHP is located in a rural and socioeconomically poor setting. Providers understood how using incentives could help patients overcome access barriers and could also promote retention within the program. Access barriers were higher among non-retained members for all seven of the access barriers we asked about on the surveys: transportation, getting an appointment when needed, clinic hours of operation, work or family obligations, childcare, preferred doctor availability, and preferred case manager availability. However, even for retained enrollees, several access barriers are important: 21% report transportation is a barrier, 17% report getting an appointment when needed is a barrier, and 38% report work or family obligations are a barrier. Respondents did not name traditional cultural activities (eg, being away from the clinic area for fishing, hunting, or gathering) as barriers. However, given the seasonal nature of these activities and the realities of limited budgets it is possible that participants may choose to drive to the traditional fishing areas instead of putting gas money towards a trip to the clinic. Incentives were discussed by non-retained participants and the case management staff as a way to provide the “extra push” for participation, adherence, and retention. Non-retained members discussed the following incentives specifically: gas vouchers and food vouchers. Additionally, non-retained participants provided suggestions for program improvement. These included recognition for achieving milestones and goals (eg, banquet, some type of material reward for reaching a goal). They also suggested a newsletter with information, and creation of family activities and events in which to participate. These insights suggest that YHHP staff are on the right track for meeting the needs of the patient population. Incentives assist patients in overcoming barriers, many of which are quite challenging and persistent. Non-retained participants stated that additional incentives would be helpful for increasing their participation and retention within the program.
Acton KJ, Burrows NR, Moore K, Querec L, Geiss LS, Engelgau MM. Trends in diabetes prevalence among American Indian and Alaska native children, adolescents, and young adults. Am J Public Health. 2002;92:1485-1490. ↩
. Diabetes prevalence among American Indians and Alaska Natives and the overall population–United States, 1994-2002. MMWR. 2003;52(30):702-704. ↩
. Diagnosed diabetes among American Indians and Alaska Natives aged <35 years--United States, 1994-2004. MMWR. 2006;55(44):1201-1203. ↩
CDC. National Diabetes Fact Sheet 2011. Available at: http://www.cdc.gov/diabetes/pubs/pdf/ndfs_2011.pdf. Accessed May 27, 2015. ↩
Graedon J, Graedon T. Putting Patients on the Health Care Team. J Participat Med. 2013;5(e34). ↩
Guadagnolo BA, Cina K, Helbig P, Molloy K, Reiner M, Cook EF, Petereit DG. Medical mistrust and less satisfaction with health care among Native Americans presenting for cancer treatment. J Health Care Poor Underserved. Feb 2009;20(1):210-226. ↩
D, Mendoza-Jenkins V, Croy C, McGough H, Bezdek M, Spicer P. Attitudes of urban American Indians and Alaska Natives regarding participation in research. J Gen Intern Med. Jun 2006;21(6):648-651. ↩
Lawrence J. The Indian Health Service and the sterilization of Native American women. Am Indian Q. 2000;24(3):400-419. ↩
Roubideaux Y. Statement of the Indian Health Service. September 28, 2010. Available at: http://www.indian.senate.gov/sites/default/files/upload/files/YvetteRoubideauxtestimony0000.pdf. Accessed May 27, 2015. ↩
LB, Adams GW, Hoyt DR, Chen X. Conceptualizing and measuring historical trauma among American Indian people. Am J Community Psychol. Jun 2004;33(3-4):119-130. ↩
Whitbeck LB, Walls ML, Johnson KD, Morrisseau AD, McDougall CM. Depressed affect and historical loss among North American Indigenous adolescents. Am Indian Alsk Native Ment Health Res. 2009;16(3):16-41. ↩
Manson SM, Jiang L, Zhang L, Beals J, Acton KJ, Roubideaux Y. Special diabetes program for Indians: Retention in cardiovascular risk reduction. The Gerontologist. Jun 2011;51 Suppl 1:S21-32. ↩
Strauss A, Corbin J. Basics of qualitative research: Grounded theory procedures and techniques. Newbury Park, CA: Sage Publications; 1990. ↩
Copyright: © 2015 Michelle Marie Jacob, Mary Jo Poole, Kelly Gonzales, Haver Jim, Glen E. Duncan, and Spero Manson. Published here under license by The Journal of Participatory Medicine. Copyright for this article is retained by the author, with first publication rights granted to the Journal of Participatory Medicine. All journal content, except where otherwise noted, is licensed under a Creative Commons Attribution 3.0 License. By virtue of their appearance in this open-access journal, articles are free to use, with proper attribution, in educational and other non-commercial settings.
|
cc/2020-05/en_middle_0032.json.gz/line8226
|
__label__cc
| 0.663198
| 0.336802
|
JP2012228165A - Electric vehicle charge control system - Google Patents
Electric vehicle charge control system Download PDF
remaining power
Masanori Hayashi
Koichiro Takemasa
Taisuke Tsuruya
正規 林
幸一郎 武政
泰介 鶴谷
本田技研工業株式会社
2011-04-07 Priority to JP2011085801 priority Critical
2011-04-07 Priority to JP2011085801 priority
2012-03-15 Application filed by Honda Motor Co Ltd, 本田技研工業株式会社 filed Critical Honda Motor Co Ltd
2012-03-15 Priority to JP2012058916A priority patent/JP2012228165A/en
238000007600 charging Methods 0 abstract 2
230000003405 preventing Effects 0 abstract 1
230000002829 reduced Effects 0 abstract 1
B60L11/1816—
B60L—PROPULSION OF ELECTRICALLY-PROPELLED VEHICLES; SUPPLYING ELECTRIC POWER FOR AUXILIARY EQUIPMENT OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRODYNAMIC BRAKE SYSTEMS FOR VEHICLES IN GENERAL; MAGNETIC SUSPENSION OR LEVITATION FOR VEHICLES; MONITORING OPERATING VARIABLES OF ELECTRICALLY-PROPELLED VEHICLES; ELECTRIC SAFETY DEVICES FOR ELECTRICALLY-PROPELLED VEHICLES
B60L3/00—Electric devices on electrically-propelled vehicles for safety purposes; Monitoring operating variables, e.g. speed, deceleration or energy consumption
B60L3/12—Recording operating variables ; Monitoring of operating variables
B60L53/00—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles
B60L53/10—Methods of charging batteries, specially adapted for electric vehicles; Charging stations or on-board charging equipment therefor; Exchange of energy storage elements in electric vehicles characterised by the energy transfer between the charging station and the vehicle
B60L53/14—Conductive energy transfer
H02J7/00036—
H02J—CIRCUIT ARRANGEMENTS OR SYSTEMS FOR SUPPLYING OR DISTRIBUTING ELECTRIC POWER; SYSTEMS FOR STORING ELECTRIC ENERGY
H02J7/00—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries
H02J7/0003—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries with provision for charging different types of batteries
H02J7/0004—Circuit arrangements for charging or depolarising batteries or for supplying loads from batteries with provision for charging different types of batteries with data exchange between battery and charger
H02J7/0071—
H02J7/007—Regulation of charging current or voltage
H02J7/0072—Regulation of charging current or voltage using semiconductor devices only
H02J7/0073—Regulation of charging current or voltage using semiconductor devices only with a programmable charge schedule
Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
Y02T—CLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO TRANSPORTATION
Y02T10/00—Road transport of goods or passengers
Y02T10/60—Other road transportation technologies with climate change mitigation effect
Y02T10/70—Energy storage for electromobility
Y02T10/7005—Batteries
Y02T10/7072—Electromobility specific charging systems or methods for batteries, ultracapacitors, supercapacitors or double-layer capacitors
Y02T10/7088—Charging stations
Y02T90/00—Enabling technologies or technologies with a potential or indirect contribution to GHG emissions mitigation
Y02T90/10—Technologies related to electric vehicle charging
Y02T90/12—Electric charging stations
Y02T90/121—Electric charging stations by conductive energy transmission
Y02T90/14—Plug-in electric vehicles
Charge control is performed to increase battery life while avoiding battery exhaustion during normal running of an electric vehicle.
A usage history of each day of the electric vehicle is recorded, and a usage pattern of the electric vehicle of each day related to the power consumption of a battery is extracted from the usage history over a predetermined period. When the electric vehicle 10 finishes running on the day and returns to the home and is connected to the charging device 18, the charging determination unit 30 predicts the usage pattern of the next day and uses the remaining power of the battery 13. Check if there is any obstacle to driving the next day. When it is determined that the battery 13 needs to be charged, the battery 13 is charged to the remaining power amount based on the predicted power consumption amount while minimizing the number of future charges while avoiding full charging.
[Selection] Figure 1
The present invention relates to an electric vehicle charging control system that controls charging of a battery mounted on an electric vehicle.
An electric vehicle is equipped with a battery that supplies power to the electric motor. The current battery does not have a sufficiently large amount of charge, and the electric vehicle can travel a short distance for one charge of the battery. Therefore, a general user of an electric vehicle tends to charge the battery relatively frequently at a charging stand, home, etc., and to fully charge each charge.
Patent Document 1 discloses a small electric vehicle that travels by driving an electric motor supplied with power from a mounted battery. In the small electric vehicle, when the vehicle travels directly from the current location to the registration point (eg, home), the remaining power amount upon arrival at the registration point is calculated from the current remaining power amount and the power consumption required for traveling to the registration point. If it is determined that the amount of remaining power at the time of arrival at the registration point is lower than a predetermined value, it is urged to return home or charge (see FIG. 7 of Patent Document 1 and its explanatory text).
JP 2009-89756 A
In the small electric vehicle of Patent Document 1, the driver is notified of the return to the registration point before the battery runs out, thereby preventing the battery from running out during traveling.
On the other hand, from the viewpoint of extending the life of the battery, it is not preferable to fully charge the battery, and it is advantageous to reduce the number of times of charging as much as possible while keeping only partial charging that does not reach full charging.
An object of the present invention is to provide an electric vehicle charging control system that increases battery life while preventing the battery from running out.
An electric vehicle charging control system according to a first aspect of the present invention is a history recording unit that records a usage status related to power consumption of an electric vehicle for each period as a usage history by period, and a future consumption of the electric vehicle based on the usage history by period Predicting the amount of power, determining whether the battery needs to be charged based on the predicted amount of consumed power and the current remaining amount of battery power, and calculating the target remaining power amount as an attainment level when charging the battery A charge determination unit that performs charge of the battery based on a determination result of whether or not the battery needs to be charged by the charge determination unit and a calculation result of the target remaining power amount. .
According to the first aspect of the present invention, the future electric vehicle power consumption is predicted based on the period-by-period usage history, and the determination of whether or not the battery needs to be charged and the target remaining power based on the predicted power consumption and the remaining battery power. Since the battery is charged based on the result of the determination and the calculation result of the target remaining power amount, the number of times the battery is charged is reduced and the remaining power amount at the end of charging is reduced from the full charge. It can be lowered. In this way, the battery life can be extended while avoiding running out of the battery while the electric vehicle is running.
The electric vehicle charging control system according to a second aspect is the electric vehicle charging control system according to the first aspect, wherein the history recording unit records a daily usage history as the period-specific usage history, and the charging determination unit The daily pattern related to the power consumption of the electric vehicle is determined based on the different usage history, the future day is applied to the daily pattern, the future power consumption is predicted, the predicted power consumption and the current battery current Based on the amount of remaining power, it is determined whether or not the battery needs to be charged, and calculation of the amount of charge of the battery when charging is required.
The general user uses the electric vehicle in common usage by day, such as by day of the week or by holiday or weekday. Therefore, the history recording unit records the usage history by period as the daily usage history, and calculates the daily pattern related to the power consumption of the electric vehicle based on the daily usage history. The charge determination unit calculates the daily pattern related to the power consumption of the electric vehicle based on the daily usage history, assigns the future day to the daily pattern, predicts the future power consumption, and the predicted power consumption Determination of whether or not the battery needs to be charged and calculation of the target remaining power amount based on the current remaining power amount of the battery and the calculation of the target remaining power amount can be improved. .
An electric vehicle charging control system according to a third aspect is the electric vehicle charging control system according to the second aspect, wherein the history recording unit records a daily usage history including driver information indicating who was the driver of the electric vehicle. The charging determination unit calculates a daily pattern including the driver information based on the daily usage history including the driver information, and predicts the next day driver from the daily pattern including the driver information, The target remaining power amount is calculated for each driver on the next day.
According to the third invention, the driver of the next day is predicted, the target remaining power amount is calculated based on the predicted driver, and the battery is charged based on the target remaining power amount. Even if there is a difference in the amount of power consumed when using the battery, it is possible to balance the amount of remaining power at the end of use of the electric vehicle the next day, preventing the next battery from being charged early or It is possible to prevent charging to near full charge as necessary.
An electric vehicle charging control system according to a fourth aspect of the invention is the electric vehicle charging control system according to the third aspect of the invention, wherein the charge determination unit sets a different standard target remaining power amount for each next day driver, and the target remaining power amount. Is the standard target remaining power amount set for the driver of the next day, and if the lower target remaining power amount is a predetermined amount lower than the standard target remaining power amount set for the driver of the next day If the next scheduled charging date predicted based on the daily pattern is not advanced, the current target remaining power amount is set as the lower target remaining power amount, and the standard target set for the driver of the next day If the upper target remaining power amount is increased by a predetermined amount from the remaining power amount, and if the next scheduled charging date predicted based on the daily pattern is extended by one day or more, the current target remaining power amount is set to the upper target remaining power amount. Characterized by the amount of electric power That.
According to the fourth aspect of the present invention, the target remaining power amount is changed to the upper target remaining power amount that is slightly increased from the standard target remaining power amount, instead of setting the target remaining power amount to the standard target remaining power amount on the next expected charging date. Then, when it extends for more than one day, the number of times of battery charging as a whole can be reduced by changing the target remaining power amount to the upper target remaining power amount, thereby extending the life of the battery. .
According to the fourth aspect of the invention, the next expected charging date when the target remaining power amount is set to the standard target remaining power amount, and the lower target remaining power amount obtained by slightly reducing the target remaining power amount from the standard target remaining power amount. When the next expected charging date is the same, the target remaining power amount can be reduced without increasing the total number of charging times by changing the target remaining power amount to the lower target remaining power amount. It can be reduced sufficiently for full charge, thereby extending the life of the battery.
An electric vehicle charging control system according to a fifth aspect of the present invention is the electric vehicle charging control system according to the fourth aspect of the invention, further comprising a notification unit, wherein the charging determination unit is configured so that the actual usage pattern of the actual driver on the driving day is When it is determined that the predicted usage pattern of the predicted driver on the day of driving is different from the predicted usage pattern, the notification unit is activated, and the notification unit notifies the possibility of the battery running out of power.
According to the fifth aspect of the present invention, it is assumed from the actual usage situation of the electric vehicle that power exceeding the power consumption predicted by the charge determination unit applied to the daily pattern for the future day is used. At this time, as a result of notifying the fact by the notification unit, the user can know in advance that the battery has run out, and can appropriately deal with the battery running out, such as a path change or charging.
The block diagram of the electric vehicle charge control system by which a charge control system is mounted in the navigation apparatus of an electric vehicle. The flowchart of charge control. Explanatory drawing of charge control. The flowchart of another charge control. Explanatory drawing about another charge control. The block diagram of the electric vehicle charge control system by which a charge control system is mounted in the management server on the internet. The block diagram of a navigation apparatus.
In FIG. 1, an electric vehicle 10 includes a navigation device 11 in which a charging control system 12 is mounted, and a battery 13 that supplies power to an electric motor (not shown) that drives a tire of the electric vehicle 10. In the electric vehicle 10, the charging control system 12 is mounted on the navigation device 11, but may be provided separately from the navigation device 11. Details of the configuration of the navigation device 11 will be described later in FIG. 7 together with the connection relationship with the communication control unit 35.
The charging device 18 is disposed at the home or office of the owner of the electric vehicle 10, or in the future at a charging stand along a public road, etc., and the charging device main body 20 and the tip of a cord 21 extending from the charging device main body 20. And a plug 22 provided in the housing. A general user, after having finished using the electric vehicle 10 for one day and returning home, connects the plug 22 to a corresponding connector of the electric vehicle 10 and charges the battery 13 at night.
Note that just because the electric vehicle 10 is connected to the charging device 18 does not necessarily mean that the battery 13 is being charged. Charging control system 12 determines charging and non-charging of battery 13, and charging control system 12 stops or stops charging battery 13 even when electric vehicle 10 is connected to charging device 18. There is.
The charging control system 12 includes a history recording unit 29, a charging determination unit 30, a charging execution unit 31, and a notification unit 32, and controls charging of the battery 13 when the plug 22 is connected to the electric vehicle 10. The notification unit 32 notifies the user of various types of information on the battery 13 such as the possibility of running out of the battery via the display unit 59 and the audio output unit 61 (FIG. 7).
FIG. 2 is a flowchart of a charge control method implemented by a program that causes the charge control system 12 to function as the history recording unit 29, the charge determination unit 30, and the charge execution unit 31. Prior to the description of FIG. 2, the usage history table of FIG. 3 that is referred to as appropriate in each STEP of FIG. 2 will be outlined. FIG. 5 is an explanatory table related to the flowchart of FIG. 4, and includes common items with the explanatory table of FIG. 3, so the common items will be described together with FIG. 3.
In the description of FIGS. 2 and 4, “use history” is used as a concept including “travel history”. In the usage history, in addition to the history related to the travel of the electric vehicle 10, the usage history of the air conditioner that affects the power consumption of the electric vehicle 10, the history of the load weight, etc. that affect the power consumption of the battery 13. Usage history can be included.
3 and 5, the items “driver”, “day of the week”, “route”, and “SOC (state of charge)” in the range illustrated on the left side indicate usage history. “Charging”, “Charger setting when A is used”, “Charger setting when B is used” and “Notification of charging request” in the ranges shown on the right side are the elements of the charging control system 12 that are electrically connected. This process is performed based on the usage history of the automobile 10. The unit of the numerical value of the SOC is expressed as a percentage where the fully charged state of the battery 13 is 100%.
In FIG. 3, the upper Wo range indicates the usage history and charging status for one week (Monday to Sunday) when the charging control of the battery 13 by the charging control system 12 is not performed. The lower Wn range shows the usage history and the charging status for the period including the same week as that of Wo when the charging control of the battery 13 is performed by the charging control system 12. FIG. 5 shows a use history and a charging state when another charging control of the battery 13 is performed by the charging control system 12.
3 and 5, each operation of the electric vehicle 10 is shown from top to bottom in order of time. ○ means that the battery 13 was charged prior to the operation of the electric vehicle 10 on the day of the week on which it was entered. Prior to the operation of the electric vehicle 10, the battery 13 to be charged is specifically, for example, from the end of the previous day operation to the start of the current day operation. -Means that the battery 13 was not charged prior to the operation of the electric vehicle 10 on the day of the week on which it was entered. For example, Po on Wednesday “◯” indicates that the battery 13 was charged during the period from the end of operation on Tuesday to the start of operation on Wednesday.
Charging of Po in the Wo range in FIG. 3 is manual charging, that is, charging by a user, and Pn in the Wn range in FIG. 3 and charging in ○ in FIG. 5 is automatic charging by the charging control system 12. In the charging (Po) of the battery 13 by the user, charging tends to be performed until the SOC reaches 100%, and charging is performed early even though it is in time even after the next day. As a result, The number of times of charging increases. This causes the life of the battery 13 to be shortened.
The range of Wn in FIG. 3, that is, the charging control of the battery 13 by the charging control system 12 will be described. In addition, the user connects the charging device 18 to the electric vehicle 10 separately from the automatic charging by the charging control system 12, and connects the battery 13 to the charging control system 12 from his mobile phone 50 (FIG. 6) or the navigation device 11. Can be instructed to be charged. Then, the charging instruction by the user is prioritized over the determination that charging is not required by the charging control system 12, and when the user instructs charging, the charging control system 12 may determine that charging is unnecessary. Carry out charging. The user can make not only an instruction to start charging immediately from his / her mobile phone 50 or the navigation device 11 but also a reservation for a future charge by specifying a desired date and time. Charging can also be prioritized over the determination that charging is not required by the charging control system 12.
When the navigation apparatus 11 receives a command for issuing a charge request notification of the battery 13 to a predetermined user of the electric vehicle 10 from the charge control system 12, the navigation apparatus 11 notifies the user of the charge request by telephone or e-mail. (FIG. 3: P2, P6, P9). Specific users to be notified will be described later. The user who has received the notification connects the plug 22 of the charging device 18 to the corresponding connector of the electric vehicle 10 after the day-end use of the electric vehicle 10. The charging control system 12 starts charging the battery 13 in time for the start of operation on the next day of the electric vehicle 10. Note that when the charging control system 12 determines that charging is necessary, the charging control system 12 automatically starts charging the battery 13 regardless of whether a charging request notification is issued to the user via the navigation device 11. However, when it is determined that charging is not necessary, even if the plug 22 of the charging device 18 is connected to the electric vehicle 10 by the user, charging is not performed unless there is a forced charging instruction from the user.
The route for each day of the week can be detected from, for example, a route setting associated with the destination setting in the navigation device 11 or a change in the current location measured. The SOC is detected from, for example, the electrode voltage of the battery 13, or calculated by subtracting the integrated amount of the actual measured value of power consumption from the amount of charge at the time of the last charge.
Returning to FIG. 2, in STEP 10, the history recording unit 29 records the SOC at the start and end of each group as the usage history of the electric vehicle 10, with the driver, the day of the week, and the route as a pair (FIG. 3 and FIG. 3). (See the left range in FIG. 5).
It is possible to detect who is the current driver of the electric vehicle 10 from, for example, a self-report that causes a driver to touch a predetermined button on the touch panel of the navigation device 11 at the start of driving. Or each driver | operator changes the front-back direction position of a driver's seat, and the angle of a side mirror or a room mirror prior to a driving | operation start, but a driver | operator can also be identified by detecting those positions and angles. Furthermore, a weight sensor may be provided in the driver's seat, and the driver may be identified from a weight different for each driver.
Although the table in FIG. 3 only shows the usage history for about one week for the electric vehicle 10 for the sake of simplicity of illustration, the history recording unit 29 actually corresponds to the past several weeks in STEP 10. The usage history is recorded and stored in a nonvolatile memory such as a hard disk.
Based on the usage history accumulated in the history recording unit 29, the charging determination unit 30 determines characteristics (trend, similarity, or identity) for the route and power consumption for each day of the week, weekday, and holiday. Determine usage patterns by day of the week. A specific indexing method will be described later as STEP11.
Each usage pattern is associated with one day of power consumption of the onboard battery 13, the driver of each day, and / or the driving route of each day. When the usage pattern is associated with only the power consumption for one day of the on-board battery 13, for example, the maximum number having the same characteristics for the route, the power consumption, and the driver from the usage history for each day of the past several weeks. The usage history is extracted, and the average value or median value of the power consumption in the extracted usage history is associated with the usage pattern. Furthermore, even if the day of the week differs from the usage pattern for each day of the week, there may be no significant difference in the power consumption for one day of the mounted battery 13 associated therewith, that is, the usage pattern for each day of the week. In some cases, the difference between the power consumption amount and the reference power consumption amount is within a predetermined value. In such a case, the same usage pattern can be assigned to different days of the week.
Thus, the number of usage patterns obtained by associating the usage pattern with only the power consumption amount of each day of the on-board battery 13 is 7 or less. However, when the user uses the electric vehicle 10 in units of two weeks instead of one week, or when the user has different characteristics at the end of the month and other times, a plurality of usage patterns are determined on the same day of the week.
Regarding the use of the electric vehicle 10, the history recording unit 29 takes a usage history for each day of the week for drivers, days of the week, routes, and / or SOC (SOC corresponds to power consumption). The unit of the numerical value of the SOC is expressed as a percentage where the fully charged state of the battery 13 is 100%. The next usage pattern is determined from the usage history of FIG. 3 and 5, the driver A is assumed to be a home owner, and the driver B is assumed to be a home wife. When the usage pattern is determined by the driver and the route, the following (a) to (d) are obtained.
(A) On weekdays from Monday to Friday (except Wednesday), driver A uses it only for commuting, and the power consumption of each day is about 20%. Hereinafter, this usage pattern is appropriately referred to as “A commuting pattern”.
(B) On Saturday, the driver B uses only for shopping, and the power consumption of the day is about 20%. Hereinafter, this usage pattern will be referred to as a “B shopping pattern” as appropriate.
(C) On Wednesday, the driver B uses it for meals, and the power consumption of the day is 40% in a round trip. Whether or not the meal on Wednesday is a general usage pattern on every Wednesday or a usage pattern only on Wednesday within the range shown in FIG. 3 can not be determined unless the usage history on other Wednesdays is examined. Assuming that the form is a general running form on every Wednesday, this usage pattern is hereinafter referred to as “B meal pattern” as appropriate.
(D) On Sunday, the electric vehicle 10 is unused. Unused on Sunday is a general driving mode for every day of the week or whether it is a driving mode for only Sunday within the range shown in FIG. Assuming that usage is a general usage pattern for every day of the week, this usage pattern will be referred to as an “unused pattern” where appropriate.
Thus, the calculated commuting pattern A commuting pattern, B shopping pattern, B meal pattern and unused pattern are associated with the day of the week and the driver, and the power consumption is 20%, 20%, 40%, Registered in association with 0%.
As another method of extracting usage patterns, there is one that focuses only on the power consumption of each day. In that case, even if the driver and the route are different, they can be integrated into one usage pattern. For example, since weekdays (Monday to Friday) and Saturday, excluding Wednesday, are both 20% regarding the power consumption of the battery 13, they can be integrated as a “20% pattern”. However, as will be described later, it is determined whether or not the actual usage pattern of the electric vehicle 10 on the driving day is a predicted one, and if the determination is negative, the battery 13 is informed of the possibility of running out of power. When implementing, it is more accurate to categorize the usage patterns for each driver and route than to integrate the usage patterns for each driver and route based on the power consumption of the battery 13. It can be carried out.
Returning to FIG. 2, in STEP 11, the charge determination unit 30 determines one or more usage patterns (A commuting pattern, B shopping pattern, B restaurant pattern, and unused pattern) for one week based on the past usage history.
In STEP 12, the charging determination unit 30 determines whether or not the charging device 18 is connected to the electric vehicle 10. If it is determined that the charging device 18 is connected, the process proceeds to STEP 13. In STEP 13, the charging determination unit 30 predicts the next day's usage pattern based on the day of the next day, and in STEP 14 determines whether or not the battery 13 needs to be charged based on the prediction and the current SOC of the battery 13. If it is determined in STEP14 that charging is necessary, the charging determination unit 30 proceeds to STEP15. In STEP15, the current charging amount is calculated, and the SOC after charging (= target SOC) is set. Note that target SOC = SOC before charging + current charging amount.
The determination of whether or not charging is necessary is to ensure that the battery 13 lasts for a long time after the amount of charge of the battery 13 that does not hinder the next day's travel of the electric vehicle 10, that is, to avoid full charging of the battery 13 as much as possible. The charging is performed in consideration of reducing the number of times of charging the battery 13 as much as possible while setting the charging at a low level. Specifically, for example, as follows, a plurality of standards are named as first to third standards in order of priority, and if the higher priority standard is satisfied, the next priority standard is satisfied. Thus, the necessity of charging and the SOC after charging (= target SOC) in the case of charging are determined.
First standard: In the operation of the electric vehicle 10 on the next day, an SOC that does not cause a battery exhaustion (battery exhaustion is defined as SOC≈0 or SOC <predetermined value) is secured. The reason for avoiding running out of battery in the next day's operation is that in the embodiment of FIGS. 3 and 5, charging is restricted to once or less per day. If the charging is restricted to not more than once in a plurality of days, the SOC after charging is calculated so that the battery does not run out for the operation for the plurality of days.
Second standard: If the current charging is performed, the SOC after the current charging is determined so that the next expected charging date is delayed even by one day.
Third standard: The SOC after the current charging avoids a full charge and keeps it as low as possible.
In the case of FIG. 3, the necessity determination of charging performed in STEP 14 by the charging determination unit 30 and the amount of charge calculated in STEP 15 when it is determined that charging is necessary will be specifically described.
In FIG. 3, on each day, after the operation of the electric vehicle 10 is finished, it is determined whether charging is necessary. If the next day use pattern is A commuting pattern or B shopping pattern, the next day's expected power consumption is small (below 20%), so if the SOC is 30% or less, it is determined that charging is necessary. (Example: SOC after operation on the previous day for A on P7) If the SOC is greater than 30%, it is determined that charging is unnecessary. When the next day's usage pattern is the B meal pattern, the expected power consumption of the next day is large (because it is about 40%), so if the SOC is 40% or less, it is determined that charging is required (P3, P10). If the SOC is greater than 40%, it is determined that charging is not necessary.
If the next day's usage pattern is an unused pattern, the day on which the electric vehicle 10 is first operated after the next day (in the example of FIG. 3, the next day's Sunday's unused pattern is the next day of Monday). It is determined whether to use 30% or 40% based on the expected power consumption in the usage pattern. In addition, when the usage pattern of the next day is an unused pattern, the charge implementation date to the electric vehicle 10 can be delayed until the day before the day when the electric vehicle 10 is first operated after the next day.
The SOC of the battery 13 after being charged (= target SOC = SOC before charging + charge amount due to current charging) is calculated by the driver associated with the next day's usage pattern from the past history. If it is A that is determined to be operating with low consumption (P7), the target SOC is determined to be 70% (P5), and operation with high daily power consumption is performed from the past history. If it is B that is determined to be (P3, P10), the target SOC is determined to be 90% (P1, P12). Thus, the battery 13 is charged to the determined target SOC (P4, P8, P11).
Returning to FIG. 2, in STEP 16, the charging determination unit 30 notifies the user and the navigation device 11 to request charging. The charging request notification to the navigation device 11 is made regardless of the driver of the next day, and a display indicating that charging is necessary is performed on the display of the navigation device 11. On the other hand, the charging request notification to the user is made to the driver who is expected to drive the next day when charging is required for the operation after the next day (FIG. 3: P2, P6). P9). That is, in FIG. 3, for charging after the end of the operation on Tuesday, which must be performed prior to the start of operation on Wednesday, a charge request notification is made to B on Tuesday (P2), and before the start of operation on Friday Regarding the charging after the operation on Thursday that needs to be performed, a charging request notification is made to A on Thursday (P6). Note that the navigation device 11 may perform guidance guidance to the charging station after displaying the charging request notification.
When the charging execution unit 31 receives the charging instruction from the charging determination unit 30 in STEP 17, the charging execution unit 31 starts charging by supplying current from the charging device 18 to the battery 13 in STEP 18, and the current SOC detected for the battery 13 in STEP 19. As soon as the target SOC is reached, charging of the current battery 13 is terminated in STEP 20. The SOC of the battery 13 can be detected from, for example, the voltage at the positive pole of the battery 13.
Further, prior to the charging instruction to the charging execution unit 31 in STEP 17, the charging determination unit 30 checks whether or not the plug 22 of the charging device 18 is connected to the electric vehicle 10, and charging is performed in STEP 17 only during the connection period. An instruction to execute charging can be issued to the execution unit 31. Alternatively, the charging determination unit 30 instructs the charging execution unit 31 on the charging instruction and the amount of charge at that time at an appropriate time such as when the electric vehicle 10 returns, and the charging execution unit 31 If it is determined that the plug 22 is connected to the electric vehicle 10, the battery 13 can be charged.
The role of the alerting | reporting part 32 (FIG. 1) in the charge control system 12 is explained in full detail. Since the usage situation of the electric vehicle 10 is variable, the charge determination unit 30 may deviate from the driver and the usage pattern predicted for the usage situation of the electric vehicle 10 and the actual driver and the actual usage pattern. In that case, there is a possibility that the power consumption based on the predicted usage pattern of the predicted driver may exceed the power consumption based on the actual usage pattern of the actual driver, but usually the power consumption based on the predicted usage pattern of the predicted driver. However, the power consumption is lower than the actual usage pattern of the actual driver. For example, when driver A uses electric vehicle 10 for commuting to work on weekdays, driver A takes paid leave and uses electric vehicle 10 for outings other than commuting on weekdays. It is.
In order to cope with such a situation in the charging control system 12 with the notification unit, the charging determination unit 30 determines that the actual usage pattern of the actual driver is different from the predicted usage pattern of the predicted driver for the day of driving by the charging determination unit 30. When it is determined that the battery is present, the notification unit 32 is activated, and the notification unit 32 notifies the driver of the possibility of running out of the battery. Specifically, the notification unit 32 notifies the possibility of running out of the battery from a display unit 59 (FIG. 7) or a voice output unit 61 (FIG. 7) by visual display or sound such as text and images. As a result, the driver can appropriately cope with the arrival of a dead battery such as a route change or charging.
Note that the charging determination unit 30 determines that the predicted usage pattern on the driving day for the electric vehicle 10 is different from the actual usage pattern, even though the usage time of the electric vehicle 10 (eg, the usage time during commuting is morning and evening). On the other hand, the actual usage time is determined during the daytime) and the travel route (eg, the travel route for commuting is home-company, whereas the actual travel route is different from the home-company route) can do.
FIG. 4 is a flowchart of another charge control method. The other charge control method is implemented by a program that causes the charge control system 12 to function as the history recording unit 29, the charge determination unit 30, and the charge execution unit 31, as in the charge control method of FIG. The flowchart of FIG. 4 differs from the flowchart of FIG. 2 in that STEP 31 to STEP 34 are inserted between STEP 15 and STEP 16.
In FIG. 2, the target SOC for the battery 13 is determined in accordance with the driver associated with the next day's usage pattern (STEP 15; hereinafter, the target SOC set in STEP 15 is appropriately set to “standard target SOC”. 4), in the other charge control method of FIG. 4, even if the driver is the same as the driver used in the next day's usage pattern, the target SOC is set to the expected execution date of the next charge after the current charge. The number is appropriately increased or decreased based on (STEP 31 to STEP 34).
Specifically, in the example of FIG. 5, even if the driver associated with the next day's usage pattern is the same, the target SOC is increased within a predetermined range with respect to the standard target SOC (70% or 90%). If the value is within the upper limit (upper target SOC), the target SOC is set to the upper target SOC (STEP 32) if the expected execution date of the next charge after the current charge is one day later (STEP 31). Even if the driver associated with the next day's usage pattern is the same, the target SOC is set to a value within a predetermined range (lower target SOC) on the decrease side with respect to the standard target SOC (STEP 33). If the expected execution date of the next charge after the current charge is not advanced and is the same, the target SOC is set to the lower target SOC (STEP 34).
In the example of FIG. 5, for B, the lower target SOC (80%) is set with respect to the standard target SOC (90%) (P32). Suppose that the current time is after a service on Tuesday, for example. Since the current SOC is 40% or less and the driver associated with the usage pattern on the next Wednesday is B, it is determined that charging is necessary. In standard charging, the SOC after charging is assumed to be 90%, but even if the SOC after charging is set to 80%, the next expected charging date is expected to be after the operation on the same Thursday as in the case of standard charging. . As described above, in the case of FIG. 5 as well, as in the case of FIG. 3, when the driver of the next day is A, the current SOC is 30% or less and the driver of the next day is determined. Is B, the current SOC is set to 40% or less.
The subsequent change of the SOC when the SOC after charging is set to 90% of the standard target SOC when charging is carried out after the operation on Tuesday is indicated by a value outside () of P31, and when it is set to 80% Subsequent changes in SOC are indicated by the numbers in parentheses on P31.
Following the change in the SOC after the target SOC of 80% on the charging after the operation on Tuesday, the SOC after the commuting trip on the first half of Thursday is the driver's A corresponding to the usage pattern on Friday. Although it becomes 30% or less of the charging required standard, the time is an intermediate time on Thursday, not after the operation on Thursday, and charging is not performed at that time. Then, at the time of SOC = 20% after the commuting return operation on the second half of Thursday, it is determined whether or not charging is necessary, and charging is performed. It is the same day as when the target SOC is 90% of the standard target SOC. Therefore, in the charge control system 12, the target SOC in the charge after the operation on Tuesday is reduced to 80% to extend the life of the battery 13.
In the electric vehicle charging control system of FIG. 6, the electric vehicle 10 is equipped with a communication control unit 35, and the communication control unit 35 is connected to the Internet 38 via wireless communication and exchanges data with the management server 41 via the Internet 38. To do. Before describing FIG. 6 in detail, the navigation device 11 and the communication control unit 35 will be described with reference to FIG.
In FIG. 7, the navigation device 11 includes a control device 58, a display unit 59 that exchanges various signals including control signals between the control device 58, an operation unit 60, an audio output unit 61, an information storage unit 62, a vehicle A signal I / F 63, a wireless I / F 64, and a GPS receiver 65 are provided.
The display unit 59 displays a map, a current location, and a recommended route from the current location to the destination based on data from the control device 58. The operation unit 60 is operated by the user when the user issues various instructions to the navigation device 11. In addition, you may use the touchscreen type display which put together the display part 59 and the operation part 60 into one. The voice output unit 61 outputs voice related to route guidance and various information notifications. The information storage unit 62 stores data such as map data. The vehicle signal I / F 63 contributes to signal transmission / reception between the control device 58 and a sensor (not shown) such as a vehicle speed sensor that detects information related to the current position measurement.
The wireless I / F 64 contributes to signal exchange between the control device 58 and the communication control unit 35. The communication control unit 35 transmits and receives radio waves via the antenna 67 and communicates with the Internet 38 (FIG. 6). The GPS receiver 65 captures a GPS radio wave from a positioning satellite at the antenna 68, and positions the current location based on the GPS radio wave.
Returning to FIG. 6, the management server 41 collects various information from the plurality of electric vehicles 10 via the Internet 38 and accumulates the information in the database 42. The collected information of the management server 41 can include not only the usage history of each electric vehicle 10 but also the traceability of parts of the electric vehicle 10. The management server 41 uses the traceability information, for example, for notification of the replacement time of the battery 13 and for providing various customer services (for example, estimation of a trade-in price considering the remaining life of the battery 13).
When the battery 13 of the electric vehicle 10 needs to be charged, the management server 41 notifies the mobile phone 50 of the owner of the electric vehicle 10 via the Internet 38 to that effect. In this case, for example, a text “Please charge the car” is displayed on the display unit of the mobile phone 50. In the charge control system 12 of FIG. 1, when the battery 13 needs to be charged, it can be notified to the mobile phone 50 from the communication control unit 35 via the Internet 38. When the navigation device 11 is equipped with a mobile phone function, the notification from the navigation device 11 to the mobile phone 50 can be performed using the telephone line of the telephone company without going through the Internet 38. it can.
The history recording unit 45 and the charging determination unit 46 are mounted on the management server 41 connected to the Internet 38, and the charging execution unit 47 is mounted on the navigation device 11. The history recording unit 45 and the charge determination unit 46 have the same configuration and operation as the history recording unit 29 and the charge determination unit 30 of FIG. The history recording unit 45 and the charge determination unit 46 are involved in charge control of the plurality of electric vehicles 10, while being involved in charge control of only the electric vehicle 10 equipped with the vehicle. The configuration and operation of the portion in which the history recording unit 45 and the charge determination unit 46 are individually involved in the battery 13 of each electric vehicle 10 are the same as the operation of the history recording unit 29 and the charge determination unit 30 in FIG. .
That is, the history recording unit 45 collects usage histories of each electric vehicle 10 from the plurality of electric vehicles 10 via the Internet 38 and accumulates them in the management server 41 for each electric vehicle 10. The charge determination unit 46 determines the daily usage pattern for each electric vehicle 10, determines whether or not the battery 13 needs to be charged for each electric vehicle 10 based on this, and calculates the charge amount of the battery 13 when charging is necessary. . Information on the amount of charge of the battery 13 calculated when the charge determination unit 46 determines that the battery 13 is determined for each electric vehicle 10 and the necessity for charging is sent to the charge execution unit 47 of each electric vehicle 10 via the Internet 38. Sent.
The charging execution unit 47 has a configuration and an action similar to those of the charging execution unit 31 of FIG. 1, and the difference is that the charging execution unit 31 is different from the in-vehicle charging determination unit 30 without the communication control unit 35. The charging execution unit 47 receives instructions from the charging determination unit 46 of the management server 41 outside the vehicle via the communication control unit 35 while receiving an instruction about the charging timing and the charging amount at that time. Is to receive instructions. When the charging execution unit 47 receives an instruction to charge the battery 13 from the charging determination unit 46 via the Internet 38, the charging execution unit 47 charges the battery 13 to the amount of charge (target SOC) instructed from the charging determination unit 46.
As mentioned above, although embodiment of this invention was explained in full detail, this invention can perform a various design change in the range which does not deviate from the summary.
For example, in FIG. 3, whether or not the battery 13 needs to be charged and the amount of charge when charging is necessary are determined and calculated based on the predicted power consumption associated with the usage pattern for the next day and the SOC of the battery 13. The determination and calculation can also be made based on the predicted power consumption associated with the usage pattern of the predetermined number of days after the next day and the SOC of the battery 13.
In addition, the usage pattern associated with power consumption is a usage pattern in units of one day, but when the usage cycle of the electric vehicle 10 is half a day or two days, the usage pattern depends on the usage cycle. A half day or two days can be set as a unit.
10: Electric vehicle, 11: Navigation device, 12: Charging control system, 13: Battery, 18: Charging device, 29: History recording unit, 30: Charging determination unit, 31: Charging execution unit, 32: Notification unit, 35: Communication control unit, 41: management server, 45: history recording unit, 46: charge determination unit, 47: charge execution unit.
A history recording unit that records the usage status of electric vehicles for each period as usage history by period,
A future power consumption amount of the electric vehicle is predicted based on the period-by-period usage history, and the battery is determined to be charged based on the predicted power consumption amount and the current remaining power amount of the battery, and the battery is charged. A charge determination unit that performs calculation of a target remaining power amount as an achievement level in the case,
An electric vehicle charging control system comprising: a charging execution unit configured to charge the battery based on a determination result of whether or not the battery needs to be charged by the charging determination unit and a calculation result of the target remaining power amount.
In the electric vehicle charging control system according to claim 1,
The history recording unit records a daily usage history as the usage history by period,
The charge determination unit calculates a daily pattern related to power consumption of the electric vehicle based on each daily usage history, applies a future date to the daily pattern, predicts future power consumption, and predicts An electric vehicle charging control system that performs determination of necessity of charging of the battery and calculation of the target remaining power amount based on a power consumption amount and a current remaining power amount of the battery.
The history recording unit records daily usage history including driver information of who was the driver of the electric vehicle,
The charging determination unit calculates a daily pattern including driver information based on a daily usage history including the driver information, predicts a driver of the next day from the daily pattern including the driver information, and An electric vehicle charging control system, wherein the target remaining power amount is calculated for each driver of the next day.
The electric vehicle charging control system according to claim 3,
The charge determination unit sets a different standard target remaining power amount for each driver on the next day, and sets the target remaining power amount as a standard target remaining power amount set for the driver on the next day. Even if the lower target remaining power amount is lower than the standard target remaining power amount set for the driver the next day by a predetermined amount, if the next scheduled charging date expected based on the daily pattern does not advance, If the target remaining power amount is the lower target remaining power amount, and if the upper target remaining power amount is a predetermined amount higher than the standard target remaining power amount set for the driver on the next day, then based on the daily pattern An electric vehicle charging control system characterized in that if the expected next scheduled charging date extends for one day or more, the current target remaining power amount is set as the upper target remaining power amount.
Equipped with a notification unit,
When the charging determination unit determines that the actual usage pattern of the actual driver on the driving day is different from the predicted usage pattern of the predicted driver on the driving day for the electric vehicle, the charging unit is operated,
The electric vehicle charging control system, wherein the notification unit notifies the possibility of power outage of the battery.
JP2012058916A 2011-04-07 2012-03-15 Electric vehicle charge control system Pending JP2012228165A (en)
JP2011085801 2011-04-07
JP2012058916A JP2012228165A (en) 2011-04-07 2012-03-15 Electric vehicle charge control system
US13/437,231 US8981717B2 (en) 2011-04-07 2012-04-02 Electric vehicle charge control system
JP2012058916A Pending JP2012228165A (en) 2011-04-07 2012-03-15 Electric vehicle charge control system
JP2014150618A (en) * 2013-01-31 2014-08-21 Toyota Motor East Japan Inc Charge/discharge control system for guide vehicle
JP2014182520A (en) * 2013-03-18 2014-09-29 Fujitsu Ltd Information processing program, information processing method and information processing device
JP2014241694A (en) * 2013-06-12 2014-12-25 東芝テック株式会社 Charging management device and charging management program
JP2015505369A (en) * 2012-01-09 2015-02-19 エアビクティ インコーポレイテッド Electric vehicle charging network service
JP2015129753A (en) * 2014-01-06 2015-07-16 ハーマン インターナショナル インダストリーズ インコーポレイテッド In-vehicle notification presentation scheduling
WO2015146034A1 (en) * 2014-03-28 2015-10-01 株式会社Gsユアサ Power storage system, operating state estimation method, and device for estimating operating state of power storage element
JP2016059196A (en) * 2014-09-11 2016-04-21 Necプラットフォームズ株式会社 Battery type electronic device and method of charging secondary battery
US9123035B2 (en) 2011-04-22 2015-09-01 Angel A. Penilla Electric vehicle (EV) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
US9285944B1 (en) 2011-04-22 2016-03-15 Angel A. Penilla Methods and systems for defining custom vehicle user interface configurations and cloud services for managing applications for the user interface and learned setting functions
EP2737593A4 (en) 2011-07-26 2015-05-27 Gogoro Inc Apparatus, method and article for authentication, security and control of power storage devices, such as batteries
WO2013016562A2 (en) 2011-07-26 2013-01-31 Gogoro, Inc. Apparatus, method and article for providing information regarding availability of power storage devices at a power storage device collection, charging and distribution machine
EP2737598A4 (en) 2011-07-26 2015-09-02 Apparatus, method and article for reserving power storage devices at reserving power storage device collection, charging and distribution machines
JP6058665B2 (en) 2011-07-26 2017-01-11 ゴゴロ インク Apparatus, method and article for collecting, charging and distributing power storage devices such as batteries
TWI618020B (en) 2011-07-26 2018-03-11 睿能創意公司 Method,system and computer-readable medium for providing locations of power storage device collection,charging and distribution machines
US10186094B2 (en) 2011-07-26 2019-01-22 Gogoro Inc. Apparatus, method and article for providing locations of power storage device collection, charging and distribution machines
EP2737594B1 (en) 2011-07-26 2019-02-13 Gogoro Inc. Apparatus, method and article for a power storage device compartment
CN109649171A (en) 2011-07-26 2019-04-19 睿能创意公司 For subscribing device, the method and article of electrical energy storage at the collection, charging and dispenser for subscribing electrical energy storage
EP2736760A4 (en) 2011-07-26 2015-11-04 Gogoro Inc Dynamically limiting vehicle operation for best effort economy
EP2737599B1 (en) 2011-07-26 2018-10-10 Gogoro Inc. Apparatus, method and article for authentication, security and control of power storage devices, such as batteries, based on user profiles
EP2737600B1 (en) 2011-07-26 2018-10-03 Gogoro Inc. Apparatus, method and article for redistributing power storage devices, such as batteries, between collection, charging and distribution machines
CN103918155B (en) 2011-07-26 2017-04-12 睿能创意公司 Apparatus, method and article for physical security of power storage devices in vehicles
US20140188367A1 (en) * 2012-09-04 2014-07-03 Recargo, Inc. Displaying information associated with an electric vehicle
JP2015534927A (en) 2012-11-16 2015-12-07 ゴゴロ インク Apparatus, method and article for a vehicle direction indicator
KR20140109568A (en) * 2013-03-05 2014-09-16 주식회사 케이티 Method of Reservation service for Elctric Vehicles charging
US9854438B2 (en) 2013-03-06 2017-12-26 Gogoro Inc. Apparatus, method and article for authentication, security and control of portable charging devices and power storage devices, such as batteries
US8798852B1 (en) 2013-03-14 2014-08-05 Gogoro, Inc. Apparatus, system, and method for authentication of vehicular components
US9415697B2 (en) * 2013-04-12 2016-08-16 Nissan Motor Co., Ltd. Contactless power supply system
US20150032660A1 (en) * 2013-07-26 2015-01-29 Recargo, Inc. Scoring charging events at electric vehicles
CN105829160B (en) 2013-08-06 2017-10-24 睿能创意公司 The use of single or multiple battery units is the system and method that electric car is powered
CN103441558B (en) * 2013-08-06 2016-03-16 奇瑞汽车股份有限公司 Charge control method and electric automobile car-mounted terminal
TWI644194B (en) 2013-08-06 2018-12-11 睿能創意公司 Electrical energy storage device thermal profile adjustment controller, method and electric vehicle system thereof
US9124085B2 (en) 2013-11-04 2015-09-01 Gogoro Inc. Apparatus, method and article for power storage device failure safety
WO2015070057A1 (en) 2013-11-08 2015-05-14 Gogoro Inc. Apparatus, method and article for providing vehicle event data
TWI645646B (en) 2014-01-23 2018-12-21 英屬開曼群島商睿能創意公司 Systems and methods for utilizing an array of power storage devices, such as batteries
JP2015154593A (en) * 2014-02-14 2015-08-24 ソニー株式会社 Charge/discharge control device, battery pack, electronic apparatus, electric motor vehicle and charge/discharge control method
WO2016025392A1 (en) 2014-08-11 2016-02-18 Gogoro Inc. Multidirectional electrical connector, plug and system
USD789883S1 (en) 2014-09-04 2017-06-20 Gogoro Inc. Collection, charging and distribution device for portable electrical energy storage devices
US9541409B2 (en) 2014-12-18 2017-01-10 Nissan North America, Inc. Marker aided autonomous vehicle localization
US9448559B2 (en) 2015-01-15 2016-09-20 Nissan North America, Inc. Autonomous vehicle routing and navigation using passenger docking locations
US9625906B2 (en) 2015-01-15 2017-04-18 Nissan North America, Inc. Passenger docking location selection
US9519290B2 (en) 2015-01-15 2016-12-13 Nissan North America, Inc. Associating passenger docking locations with destinations
US9568335B2 (en) 2015-01-30 2017-02-14 Nissan North America, Inc. Associating parking areas with destinations based on automatically identified associations between vehicle operating information and non-vehicle operating information
US9697730B2 (en) 2015-01-30 2017-07-04 Nissan North America, Inc. Spatial clustering of vehicle probe data
US9778658B2 (en) * 2015-03-13 2017-10-03 Nissan North America, Inc. Pattern detection using probe data
JP2018524961A (en) 2015-06-05 2018-08-30 ゴゴロ インク Vehicle and method for determining a specific type of load on an electric vehicle
US10507738B1 (en) * 2019-01-24 2019-12-17 The Florida International University Board Of Trustees Systems and methods for electric vehicle charging decision support system
JP3264123B2 (en) 1995-03-06 2002-03-11 三菱自動車工業株式会社 Navigation system for hybrid electric vehicles
JP3582479B2 (en) * 2000-11-21 2004-10-27 日産自動車株式会社 Vehicle battery charge control device
JP3900993B2 (en) 2002-04-02 2007-04-04 日産自動車株式会社 Electric vehicle navigation system
JP3839382B2 (en) * 2002-09-13 2006-11-01 本田技研工業株式会社 Control device for in-vehicle power storage device
US7190171B2 (en) * 2002-10-11 2007-03-13 Canon Kabushiki Kaisha Detecting method and detecting apparatus for detecting internal of rechargeable battery, rechargeable battery pack having said detecting apparatus therein, apparatus having said detecting apparatus therein, program in which said detecting method is incorporated, and medium in which said program is stored
US7693609B2 (en) * 2007-09-05 2010-04-06 Consolidated Edison Company Of New York, Inc. Hybrid vehicle recharging system and method of operation
JP5113473B2 (en) 2007-10-04 2013-01-09 本田技研工業株式会社 Electric wheelchair
JP2015191859A (en) * 2014-03-28 2015-11-02 株式会社Gsユアサ Device and method for estimating operational state of power storage element, and power storage system
JP2018063954A (en) * 2014-03-28 2018-04-19 株式会社Gsユアサ System for estimating operation state of power storage element, and device and method for estimating operation state
US8054038B2 (en) 2011-11-08 System for optimizing battery pack cut-off voltage
CN104105946B (en) 2017-08-25 Method and apparatus for providing electronic schedule table for the vehicles
CN101779099B (en) 2013-10-23 Navigation system for displaying charge information and vehicle including system
US10161759B2 (en) 2018-12-25 Electric vehicle charging network services
JP2011038845A (en) 2011-02-24 Electric storage information output apparatus and electric storage information output system
JP2010110173A (en) 2010-05-13 Electric power supplying control device
US8996213B2 (en) 2015-03-31 Charge control system for electric motor vehicle
US20120109519A1 (en) 2012-05-03 System and method for routing bev to charging station
US9126493B2 (en) 2015-09-08 Power supply control device and information provision device
JP5943514B2 (en) 2016-07-05 A system to support users of electrically powered vehicles
US20100094496A1 (en) 2010-04-15 System and Method for Operating an Electric Vehicle
TWI424381B (en) 2014-01-21 Driving assistant method and system for electric vehicle
US8798830B2 (en) 2014-08-05 Charge controller and navigation device for plug-in vehicle
DE112010005920T5 (en) 2013-07-25 Charge control device
CN102564426B (en) 2015-11-25 Information provider unit and server, vehicle assistance system, guider
US9568329B2 (en) 2017-02-14 Energy replenishment quantity control system
JP5120204B2 (en) 2013-01-16 Travel guidance device, travel guidance method, and computer program
JP5349243B2 (en) 2013-11-20 Electric vehicle charging system and electric vehicle charging method
TWI583577B (en) 2017-05-21 Battery exchange system for electric vehicles
EP2645062B1 (en) 2017-03-15 Route search system and method for electric automobile
KR20120014007A (en) 2012-02-15 Battery charge amount increase facility information provision device and method
JP2003262525A (en) 2003-09-19 Charging stand information-supplying apparatus
JP5044524B2 (en) 2012-10-10 Point registration device
JP2003021522A (en) 2003-01-24 Information indicator
JP5858260B2 (en) 2016-02-10 Vehicle remote control system, server, and remote control terminal
|
cc/2020-05/en_middle_0032.json.gz/line8227
|
__label__cc
| 0.670409
| 0.329591
|
US20040255017A1 - Method for operating and observing field devices - Google Patents
Method for operating and observing field devices Download PDF
field device
Andreas Jurisch
Michael Schwenke
Stefan Walz
2001-10-15 Priority to DE10151115.9 priority Critical
2001-10-15 Priority to DE2001151115 priority patent/DE10151115A1/en
2002-09-26 Application filed by Siemens AG filed Critical Siemens AG
2002-09-26 Priority to PCT/DE2002/003711 priority patent/WO2003038535A1/en
2004-04-14 Assigned to SIEMENS AKTIENGESELLSCHAFT reassignment SIEMENS AKTIENGESELLSCHAFT ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: JURISCH, ANDREAS, SCHWENKE, MICHAEL, WALZ, STEFAN
230000003068 static Effects 0 abstract claims description 19
230000004044 response Effects 0 description 26
230000001131 transforming Effects 0 description 11
229920000265 Polyparaphenylene Polymers 0 description 8
108060006379 POP3 family Proteins 0 description 5
230000001960 triggered Effects 0 description 4
230000032258 transport Effects 0 description 3
102100019191 POPDC3 Human genes 0 description 2
102100007006 PYDC5 Human genes 0 description 2
230000001105 regulatory Effects 0 description 2
230000002269 spontaneous Effects 0 description 2
210000001072 Colon Anatomy 0 description 1
101700006428 EIF3A family Proteins 0 description 1
101700054510 STEA2 family Proteins 0 description 1
102100006461 STEAP2 Human genes 0 description 1
238000009776 industrial production Methods 0 description 1
239000010813 municipal solid waste Substances 0 description 1
238000000926 separation method Methods 0 description 1
230000011664 signaling Effects 0 description 1
230000001429 stepping Effects 0 description 1
239000011135 tin Substances 0 description 1
G05B23/00—Testing or monitoring of control systems or parts thereof
G05B23/02—Electric testing or monitoring
G05B23/0205—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults
G05B23/0259—Electric testing or monitoring by means of a monitoring system capable of detecting and responding to faults characterized by the response to fault detection
G05B23/0267—Fault communication, e.g. human machine interface [HMI]
G05B23/027—Alarm generation, e.g. communication protocol; Forms of alarm
G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
G05B19/042—Programme control other than numerical control, i.e. in sequence controllers or logic controllers using digital processors
G05B2219/00—Program-control systems
G05B2219/20—Pc systems
G05B2219/25—Pc structure of the system
G05B2219/25217—Configure communication protocol, select between several
G05B2219/25428—Field device
G05B2219/30—Nc systems
G05B2219/33—Director till display
G05B2219/33158—Remote procedure call to each other
G05B2219/34—Director, elements to supervisory
G05B2219/34038—Web, http, ftp, internet, intranet server
The invention relates to a method for operating a proxy server device (1) connected to a field device (FG1-FGN), in addition to a proxy server device. The proxy server device can be connected to the field device and a user device (N1-NN) in order to respectively exchange electronic data in order to monitor and/or operate the field device. The electronic data consists of static data which is transmitted according to a first protocol standard and dynamic data which is transmitted according to a second protocol standard.
CLAIM FOR PRIORITY
This application claims priority to International Application No. PCT/DE02/03711, which was published in the German language on May 8, 2003, which claims the benefit of priority to German Application No. 101 51 115.9 which was filed in the German language on Oct. 15, 2001. [0001]
TECHNICAL FIELD OF THE INVENTION
The invention relates to the field of remote-controlled operation of field devices, and in particular for observing and operating field devices, for example in power plants. [0002]
Field devices are used as part of the automation of various industrial processes, for example for monitoring a production or manufacturing process or a processing process. The field devices may be the production plants themselves or devices for monitoring, preferably for controlling and/or regulating on the basis of detected field data, the industrial production means or plants used. [0003]
When operating the field devices in use, it is fundamentally possible to distinguish between two kinds of operation. First, the field devices can be actuated in situ by actuating the control elements provided. In this case, the operator needs to be with the field device or to travel to the plant in question. Secondly, remote operation of field devices from monitoring and maintenance centers is part of the known prior art. [0004]
Standard terminal programs used for operating the field devices in this context provide the operator with only very little convenience and generally permit only simple control actions. Particularly information in graphically processed form, for example measurement data, cannot be displayed to the operator. [0005]
Complex control programs have therefore been developed for remotely operating the field devices. Such complex control programs need to be installed on the respective field device and thus take up memory areas which are no longer available for the device application. In addition, every operator needs the control program required for the respective field device. In the case of field devices from different manufacturers or field devices from the same manufacturer with different releases, a large number of programs or program versions can become necessary relatively quickly. [0006]
Within the context of the remote operation and observation, it is firstly necessary to transfer data which need to be provided only once between the field devices and the apparatuses used by the operator. In addition, the field devices need to transfer electronic data to the apparatuses used by the operator which are no longer current after a short time and therefore need to be continually updated. These are, in particular, the measurement data detected in the field devices which need to be transmitted to the user apparatuses for evaluation and/or output. [0007]
In known control systems, the functions available to the operator are limited. Thus, in a network comprising a plurality of field devices and a plurality of apparatuses used by various operators for remote operation and observation, it is quite possible for a plurality of operators at one time to be using their control apparatuses to access just one and the same field device (cf. “Mini-Sternkoppler” [ministar coupler], Siemens AG, Order No. G34924-K2106-U1-A2, for example). It is an object of the invention to provide an improved way of operating and observing when remotely operating field devices, which is able to be used flexibly for various types of field device. [0008]
One embodiment of the invention relates to the provision of a proxy server facility between field devices and user devices. This allows a plurality of users at one time to use a respective user facility, particularly a personal computer, to access different field devices for the purpose of operation and/or observation. This improves operating convenience and extends the application options for operating and observation systems, since it is possible to access various field devices simultaneously. [0009]
In another embodiment of the invention, providing the proxy server facility makes it possible to split the data which are to be interchanged between the field devices and the user facility (facilities) into dynamic and static data which can be transferred using the proxy facility on the basis of respectively suitable protocols. Providing a proxy server facility between the field devices and a field device or a network comprising a plurality of field devices and their operators in line with the novel method makes it possible to reduce the time and technical involvement for transferring the electronic data, which means that electronic line capacities can be used in an improved manner. [0010]
In one aspect of the invention, the first protocol standard is the HTTP protocol, as a result of which it is possible to use a standard protocol, which is widespread in connection with data transfer. [0011]
In one advantageous embodiment of the invention, the second protocol standard is used in order to use a connectionless protocol. Connectionless protocols allow resource-saving, rapid data interchange with the field device. In this context, it is necessary for the application on the field device to undertake connection protection for the connectionless protocol. [0012]
In one preferred embodiment of the invention, provision can be made for the static data to be transferred from the field device to the proxy server facility, and to be stored in a memory facility in the proxy server facility, when they are first called by the user facility, which means that the static data are available in the proxy server facility for fresh retrieval by the user facility. This avoids repeated retrieval of the static data from the field devices, which means that line capacity is saved and can be used for other data transfers. [0013]
To ensure that data which vary over time and are output in the user facility for the operator are up-to-date, one expedient development of the invention provides for the dynamic data to be transferred from the field device to the proxy server facility and from the proxy server facility to the user facility whenever they are called by the user facility. [0014]
The method can advantageously be used for monitoring/operating power plants, which are frequently arranged at scattered locations. [0015]
The method and/or the apparatus can advantageously be used for monitoring power plants. [0016]
The invention is explained in detail below using exemplary embodiments with reference to a drawings, in which: [0017]
FIG. 1 shows a device network and a company intranet which are connected by a proxy server. [0018]
FIG. 2 shows an interface design for a browser facility for graphical representations of a plurality of field devices. [0019]
FIG. 3 shows another interface design for the browser facility with a graphical representation of a front view of a field device. [0020]
FIG. 4 shows an on the field device and of a user personal computer. [0021]
FIG. 5 shows a flowchart for downloading HTML pages within the context of an observation and operating system. [0022]
FIG. 6 shows a block diagram to explain an RPC call. [0023]
FIG. 7 shows the device network and the company intranet shown in FIG. 1, where individual elements of the proxy server are shown schematically. [0024]
FIG. 8 shows a schematic block diagram of the proxy server. [0025]
FIG. 9 shows a client/server interaction. [0026]
FIG. 10 shows a device identification in a master/slave arrangement. [0027]
FIG. 11 shows a Nassi-Sneider diagram. [0028]
FIG. 12 shows a schematic tree representation of a method for device identification. [0029]
FIG. 13 shows a master/slave arrangement to explain a configuration polling operation. [0030]
FIG. 14 shows a block diagram of device management in the proxy server. [0031]
FIG. 15 shows a block diagram to explain the functional incorporation of an XSL parser in the proxy server (XSL—“EXtended Stylesheet Language”). [0032]
FIG. 16 shows a block diagram to explain an XSLT processor (XSLT—“EXtended Stylesheet Language Transformations”).[0033]
DETAILED DESCRIPTION OF THE INVENTION
The text below describes an “observation and operating system” (O&O system) which can be used in connection with field devices. [0034]
FIG. 1 shows a schematic architecture for two networks, a device network having a plurality of field devices FG[0035] 1 . . . FGN and a company intranet having a plurality of user facilities N1 . . . NN, preferably personal computers (PC). The device network and the company intranet are connected by means of a proxy server 1. The proxy server 1 is part of the observation and operating system and serves as a gateway between the device network and the company intranet. The O&O system is used firstly to detect information, for example measurement and/or state data, from the field devices FG1 . . . FGN and to transmit it to the user facilities N1 . . . NN, in order to inform a user of the user facilities N1 . . . NN about the operating state of the field devices FG1 . . . FGN. Secondly, the O&O system is used to detect operating or control inputs from the user with the aid of the user facilities N1 . . . NN and to implement the inputs from the user in the field devices FG1 . . . FGN. The field devices FG1 . . . FGN can be any devices for observing, measuring, controlling and/or regulating a wide variety of physical variables in different industrial processes, for example for monitoring and/or controlling power plants, for example in a transformer substation.
The device network comprises individual PPP connections [0036] 2 (PPP—“Point to Point Protocol”), which can be connected to the proxy server 1 by means of a star coupler 3, or a separate Ethernet segment. The proxy server 1 provides a dedicated homepage in the form of HTML data (HTML—“Hypertext Markup Language”), which shows an overview of the field devices FG1 . . . FGN which can be reached in the device network (cf. FIG. 2); the homepage can be displayed in the user facilities N1 . . . NN using a standard browser.
In line with FIG. 1, the field devices FG[0037] 1 . . . FGN are equipped with the star coupler 3 and a modem 4 connected thereto. In this case, the field devices FG1 . . . FGN are connected to the modem 4 directly by means of the star coupler 3 via an asynchronous serial interface. Various forms of coupling using active and passive star couplers are possible. The protocol used for accessing the field devices FG1 . . . FGN is an IP protocol (IP—“Internet Protocol”) via a PPP link layer.
If the field devices FG[0038] 1 . . . FGN are equipped with an Ethernet access point, the Ethernet access points are connected to a switch or a hub. If this switch or this hub also has a PPP port besides Ethernet ports, then it is referred to as a router. This PPP port can then likewise be connected directly to the modem 4.
In the company intranet, the user facilities N[0039] 1 . . . NN connected to the local area network have access to a modem 5 which can be connected to the device network's modem 4 via a telecommunication network 6, for example a telephone network based on an ISDN network or a mobile radio network. If a respective data communication connection is set up in the user facilities N1 . . . NN, then the field devices FG1 . . . FGN can be respectively accessed from the user facilities N1 . . . NN. If the proxy server 1 is now addressed by the user facilities N1 . . . NN, each of the user facilities N1 . . . NN connected to the company intranet can access the field devices FG1 . . . FGN for observation and operation. The proxy server 1 “mirrors” all the field devices FG1 . . . FGN, i.e. information about the field devices FG1 . . . FGN, into the company intranet. To this end, the proxy server 1 processes the following protocols: HTTP protocol (HTTP—“Hypertext Transfer Protocol”) and RPC protocol (RPC—“Remote Procedure Call”). The HTTP protocol is used for transferring static data. These are data which are transferred just once to the proxy server 1 and are then stored in a file store there for later retrieval by the user facilities N1 . . . NN. The RPC protocol, which is likewise an IP-based protocol, is used for transferring dynamic data. The dynamic data are, in particular, measurements detected in the field devices FG1 . . . FGN and/or event lists, relating to information about events in the field devices FG1 . . . FGN.
The HTTP protocol allows the user facilities N[0040] 1 . . . NN to access the field devices FG1 . . . FGN. Access within the context of the O&O system first involves selecting the associated IP address of the field device which is to be operated/observed in order to transmit HTML data from the field device to the user facility used in this instance of application, the HTML data comprising data which can be used to generate a representation of the field device in the browser facility of the retrieving user facility, as shown by way of example in FIG. 3. Retrieval of the HTML data for generating the representation shown in FIG. 3 can be triggered by the user selecting one of the field devices shown in the overview in FIG. 2, for example by actuating a mouse or a keyboard on the user facility.
In line with FIG. 3, the following information is shown on the interface [0041] 20 of the browser facility (cf. left-hand side in FIG. 3): field device family (e.g. SIPROTEC4), field device class and field device type 21, a control tree 22, the version of the O&O tool 23 (version and date) and details relating to the connection 24 to the field device (MLFB—“machine-readable factory designation”, BF number, connection status and IP address). The interface also displays the HTML page 25 associated with a link or branch in the control tree 22. Depending on the link selected in the control tree 22, the associated HTML page 25 is displayed on the browser facility's interface 20.
The HTML pages stored in the field devices FG[0042] 1 . . . FGN, i.e. including the HTML page 25 used to generate the representation shown in FIG. 3, can comprise Java code which prompts the browser facility in the respective user facility N1 . . . NN to set up a further connection to the field devices FG1 . . . FGN, in parallel with the existing HTTP connection, in order to display the HTML page loaded from the field devices FG1 . . . FGN. This second connection uses the RPC protocol to transfer dynamic data, such as event lists or measurements, from the field devices FG1 . . . FGN particularly quickly and effectively for representation in the user facilities N1 . . . NN within a selected HTML page, for example the HTML page 25 shown in FIG. 3.
Retrieval of Information from the Field Devices [0043]
FIG. 4 shows a schematic illustration to explain in more detail the retrieval of information within the context of the O&O system from the field devices FG[0044] 1 . . . FGN to the user facilities N1 . . . NN.
In line with FIG. 4, a browser facility [0045] 31 is installed on a user personal computer 30, which is an exemplary form of the user facilities N1 . . . NN. The user personal computer 30 is connected to a field device 33 via an IP network 32, which can comprise the proxy server 1, the star coupler 3, the modem 4, the modem 5 and the telecommunication network 6. The field device 33 has an HTTP server 34. The field device 33 stores HTML pages 35 which comprise information specific to this field device 33. By way of example, the HTML pages 35 contain an HTML representation of the front view of the field device 33. The HTML pages 35 are specifically in tune with the field device 33 and can be retrieved from the HTTP server 34 in the field device 33 by the user personal computer 30 by means of an HTTP download. The requesting of the HTML pages 35 from the field device 33 can be triggered by means of the input of an URL (URL—“Uniform Resource Locator”) in the browser facility 31 or by using the reference from another HTML page (“link”). Besides the HTML pages 35, the field device 33 provides a series of raw data 36 (measurements, parameters etc.) in the form of files. The HTML pages 35 contain references to the raw data 36 available in the field device 33. If the raw data 36 are to be evaluated or changed in another way, a program is needed which can produce high-quality data formats on the basis of particular algorithms. These data formats can then be used by the program for screen display in connection with analysis options, for example. The computation power required for this is generally not available in the field device 33. The browser facility 31 can be used to give the user the option of using the IP network 32 to access the HTML pages 35 from the field device 33 and hence also the raw data 36, referenced therein, from the field device 33 via communication connections (modem, telephone networks, LAN—“Local Area Network”, WAN—“Wide Area Network”). In line with FIG. 5, this is done by using the browser facility 31 to request the HTML page(s) 35 from the user personal computer 30 first of all. After the HTTP server 34 in the field device 33 has provided the HTML page(s) 35, including the references contained therein to the raw data 36, the HTML page 35 and the raw data 36 are transferred to the user personal computer 30. In this context, the HTML page 35 and the raw data 36 are transferred between the field device 33 and the user personal computer 30 using separate protocols, preferably the HTTP and RPC protocols. The user personal computer can then process the raw data 36 using suitable programs. To execute the RPC protocol, the field device 33 additionally comprises an RPC server 34 a.
When the HTML page [0046] 35 is downloaded from the HTTP server 34, the referenced files containing the raw data 36 can automatically be loaded as well. The call from the HTML page 35 can have the following appearance: <EMBED SRC=“rawdata.ext”>. The parameter “SRC” references the file including the raw data 36 from the field device 33. In addition, downloading of the raw data 36 can also be triggered using a link to the HTML page 35, which link needs to be activated by the user. For this case, the call in the HTML page 35 could have the following appearance: <a href=“rawdata.ext” type=“mime type”>link<a>.
So that the browser facility [0047] 31 is able to start the correct program for processing the raw data 36 further, the browser facility 31 needs to be notified of the content type of the raw data 36. There are different procedures depending on the operating system used on the user personal computer 30, and depending on the browser facility 31 used. It is possible to evaluate both the file extension (for example “*.ext”) and the MIME type (MIME—“Multipurpose Internet Mail Extension”) simultaneously delivered by the HTTP server 34. The raw data processing program started by the browser facility 31 undertakes the conversion of the downloaded raw data 36. The raw data processing program can be in the form of a browser plugin, in the form of an activeX component or in the form of an external program.
In this context, it is necessary to distinguish between various types of raw data. Sporadically arising raw data [0048] 36 are preferably processed using a browser plugin or an ActiveX component. In this connection, the data are accessed using the TCP protocol. If the aim is to process constantly updated raw data 36 in the form of a continuous datastream, then it makes sense to use a more effective protocol for the transfer to the user personal computer 30 (the user facilities N1 . . . NN). Use of the additional RPC protocol allows the information about the field device(s) FG1 . . . FGN or 33 which is to be represented in the user facilities N1 . . . NN (or the user personal computer 30) to be split into static and dynamic information. The static information is transferred using the HTTP standard protocol, while the dynamic, that is to say variable, data are transferred using the more effective RPC protocol. The complexity which would arise as a result of connection setup/cleardown and connection monitoring if the dynamic data were sent using the HTTP protocol would exceed that of the event-dependent, repeated sending of the dynamic data using the RPC protocol. Since generally only a small volume of data needs to be transmitted quickly (measurements, signal lists, . . . ), the use of a connectionless protocol, particularly of the RPC protocol, for the dynamic data is advantageous. In the case of a remote procedure call (RPC), a local program calls a procedure on a remote system. The concept of the remote procedure call ensures that the network code remains hidden in the RPC interface and in the network routines. This avoids the need for the application programs (client and server) to concern themselves with details, such as EBCDIC < - - - > ASCII conversion, numerical conversion, socket, session etc. One aim of RPC is to simplify the implementation of distributed applications. UDP (UDP—“User Defined Protocol”) is used by a few applications which send only short messages and are able to repeat these. UDP is therefore an ideal protocol for distributing information which is constantly changing, such as stock market prices. Instead of packing the data into a TCP envelope and then into the IP envelope, they now migrate into a UDP envelope before entering the IP envelope. Although UDP is domiciled in the same layer as the connection-oriented TCP, it is a connectionless protocol. The use of the UDP protocol appears appropriate whenever just a small volume of data needs to be transmitted quickly. Hence, application programs between client and server involve an exchange of short queries and responses. In this case, the complexity which arises as a result of connection setup/cleardown and connection monitoring would exceed that of resending the data. The separate transfer of static and dynamic data between the field devices FG1 . . . FGN in the device network and the user facilities N1 . . . NN in the company intranet using different protocols is optimized by virtue of the provision and specific form of the proxy server 1, which will be described in detail later.
The text below describes the use of the RPC protocol for retrieving the dynamic data in a client/server arrangement (user facilities N[0049] 1 . . . NN/field devices FG1 . . . FGN) with reference to the schematic illustration in FIG. 6.
An RPC call proceeds in the following exemplary manner: [0050]
(a) A client process [0051] 100 running within the browser 31 (cf. FIG. 4) calls an RPC interface 101. This client process 100 may be, by way of example, a Java applet embedded in an HTML page. The task of the RPC interface 101 is to specify the subprogram entry. The specification contains the name of the function and also the number and types of the parameters. This defines a logical entry. The RPC interface 101 allows the remotely situated procedure 102 to be started.
(b) The parameters of the client process [0052] 100 are read by the RPC interface 101. The purpose of the RPC interface 101 is to package and convert the parameters for the server program.
(c) The network routines send the messages to a server process [0053] 103 running in the RPC server 34 a.
(d) An RPC interface [0054] 104 for the server process 103 reconstructs the parameters from the message packets.
(e) Then, the server program is called. This is done by defining a server stub. This stub is the actual entry into the procedure which is on the server process [0055] 103.
(f) When the procedure has been executed, control is passed to the RPC interface [0056] 104 again.
(g) The interface [0057] 104 packages the return parameters and then transports the data to the network routines.
(h) The network routines transport the data about network-dependent calls to the client process [0058] 101.
(i) The RPC interface [0059] 101 for the client process 100 unpacks the parameters and supplies the specified parameters with the new data.
(j) Control is returned to the client process [0060] 100, which is able to process the received data further.
The concept of the remote procedure call ensures that the network code remains hidden in the RPC interface and in the network routines. This avoids the need for the application programs (client and server) to concern themselves with details, such as EBCDIC < - - - > ASCII conversion, numerical conversion, socket, session etc. One advantage of using the RPC protocol for the dynamic data is simplification of the implementation of distributed applications. [0061]
Operating the Field Devices [0062]
The retrieval of information from the field device [0063] 33, which comprises the HTTP server 34, described in connection with FIG. 4 can also be used in connection with actions within the context of the observation and operating system which are performed for the purpose of operating the field device 33. This allows the field device 33 to be operated using the browser facility 31. This is described in more detail below.
The field device [0064] 33 contains a memory facility 35 a, storing control software in the form of HTML pages 35, and a Java archive or data from which HTML pages can be generated. The control software is tailored specifically to the field device 33. Input of the URL address of the field device 33 by the user starts an HTTP download, which downloads the control software from the HTTP server 34 in the field device 33 to the user personal computer 30. When the control software has been downloaded from the field device 33 to the user personal computer 30 in the form of the HTML page(s) 35, the front view of the field device 33 with all the control and display elements is shown within the browser facility (cf. FIG. 3). The user can then trigger particular control functions in the field device 33 using a mouse click on the screen of the user personal computer 30. The user action is transmitted to the field device 33 by means of a fast and effective protocol which firstly transfers said control requests from the user personal computer 30 to the field device 33 and secondly reads back reactions from the field device 33. For this purpose, the internal control and display functions of the field device 33 are published for the interface of the browser facility 31, e.g. keyboard buffer, display buffer, LED status.
Operation by the user involves an exchange of short queries and responses between the user personal computer [0065] 30 and the field device 33 within the context of a client-server relationship. In this context, the complexity arising in connection with the setup/cleardown and monitoring of the HTTP connection between the user personal computer 30 and the field device 33 would exceed the complexity arising in the event of the data being sent and received again in line with a connectionless protocol. Since generally only a small volume of data needs to be transmitted quickly (e.g. keystroke, display content, LED status), the use of a fast, effective, connectionless protocol makes sense, for example the RPC protocol described above. Methods for compressing data are used to reduce the volume of data interchanged (e.g. display content) between the user personal computer 30 and the field device 33.
Internet protocols, such as TCP/IP and HTTP, provide no kind of security mechanisms. Additional protocols are required in order to allow secure communication. The mechanisms for protecting security-related actions on the field device [0066] 33 using TCP/IP communication are of particular importance. The control actions on the field device 33 can be classified in terms of protecting against unauthorized access operations (cf. table 1). TABLE 1 Action Security risk Measures Read Low - if the RPC data An internal UDP measurements; traffic is protocol (UDP - concomitantly read, Read signal lists Information relating to “User Defined operational management Protocol”) is (operational used. Since this measurements, signals, protocol is faults) may be viewed known only to to the extent of the the data displayed on the manufacturer, HTML pages reengineering is necessary in order to decrypt the contents Reparameterize High - these actions Optional device are password protected encryption of on the device the very short protocols (complex) Switch, control, Very high - the 128-bit erase buffers protocols may be encryption of recorded and password subsequently repeated protected actions
Abusive actions when operating the field device [0067] 33 can be substantially prevented by means of the following measures:
a firewall (e.g. proxy server) allows the internal network (company intranet/LAN) to set up a protected connection to another network (e.g. Internet). [0068]
When delivered, the field device [0069] 33 is set such that keys allowing full input of customer passwords are disabled. This disablement needs to be cancelled by the customer on the field device 33 itself or using the control program in the browser facility 31 on the user personal computer 30 (input of password required). Upon delivery, therefore, only simple control actions using the browser facility 31 are possible: navigation in the control menu, display of measurements, parameters and signal lists.
Parameterization of the field device [0070] 33 in the front view emulation is possible with knowledge of the passwords as on the field device 33 if the disablement of the keys required to do so has been cancelled.
Security-related actions on the field device [0071] 33 (switching, controlling, erasing buffers, . . . ) are protected by authentication protocols, e.g. using a hash function and a key generated by the field device 33. This means that the connection protocol cannot be used to infer passwords which have been input. This method is used to take a message of arbitrary length and form a 128-bit information item, the “message digest”, which will be attached to the original message. The receiver (field device 33) compares the “message digest” with the one ascertained by the field device 33 from the information item. This means that field device passwords are not transferred via the communication connection.
The keys generated in the field device [0072] 33 expire after a short time and can be used for a transfer only once. Hence, recording security-related protocols and subsequently repeating these recorded protocols have no effect.
Proxy Server [0073]
An element for optimized implementation of the described functional interaction between the elements of the observation and operating system, for example the use of the RPC protocol, the retrieval of the raw data from the field devices FG[0074] 1 . . . FGN and the operation of the field devices using browsers on the user facilities N1 . . . NN, is the proxy server 1. Known standard HTTP proxy servers support the HTTP protocol exclusively and are thus not able to serve as a gateway between the device network and the company intranet. For this reason, a specific proxy server 1 designed for the O&O system has been created which supports both of the protocols (HTTP, RPC) used by the field devices FG1 . . . FGN.
A significant advantage which exists when the proxy server [0075] 1 is used, as compared with the device network being coupled to the company intranet by means of routers or, if there is no WAN connection (WAN—“Wide Area Network”) between the device network and the intranet, the device network segment being coupled directly using a hub or a switch, is the use of “caching”.
The principle underlying this method (“caching”) is described briefly below on a general basis, without reference to the aforementioned figures. [0076]
If a client sends a query regarding an object to a server facility, this query is first routed via a “proxy facility”. The proxy facility checks whether the object in question is already present in a local memory (cache) in the proxy facility, which is generally formed on a hard disk. If this establishes that the object is not available locally in the memory, the proxy facility forwards the query to an actual destination server facility. From there, the proxy facility obtains the object and stores a copy of the object for further queries regarding this object in a local memory before the proxy facility forwards the object to the querying client. If the object is found in the proxy facility's local memory, however, then the client's query is not sent to the destination server facility, but rather the client receives the desired object transmitted directly from the proxy facility. A prerequisite for optimum performance of the method described is a sufficiently large memory area in the proxy facility, i.e. of the order of magnitude of between several hundred MB and several GBytes. Otherwise, the local memory in the proxy facility overflows and a “garbage collector” needs to be started, which filters outdated objects from the memory in order to create space for new objects there. [0077]
Advantages of the method described (“caching”) are as follows: an improvement in performance (faster data transport than externally); a saving in terms of external bandwidth (more space for other services remains free); a reduction in the response times; removal of load from the destination server facility; transporting the object from the proxy facility to the client incurs no or smaller transfer costs; and the number of hits in the proxy facility's local memory may be very high, depending on use. [0078]
The proxy server [0079] 1 used to connect the device network and the company intranet (cf. FIG. 1) is based on the basic principle described and, furthermore, has the advantages cited below, on account of the specific form, which is described in detail later on.
The use of the proxy server [0080] 1 (cf. FIG. 1) affords significant speed advantages for accessing the device network. The proxy server 1 comprises a file store or file cache which is optimized for application in the O&O system and buffers files retrieved from the field devices FG1 . . . FGN with static data in the proxy server 1. If such a file is being accessed for the first time, then this file needs to be fetched directly from one of the field devices FG1 . . . FGN. When access to this file is repeated, the file can then be delivered directly from the file cache in the proxy server 1, however. Since the local company intranet is generally much faster than a modem connection to the field devices FG1 . . . FGN, this results in significant speed advantages for accessing the device network, since ongoing operation now involves only the dynamic data, which are much smaller in volume than the HTML pages and the Java archives, being transferred via the slow modem connection.
In addition, the proxy server [0081] 1 increases the security in the network. The proxy server 1 separates the two networks, device network and company intranet, from one another and transfers only the protocols which are processed in the proxy server 1. This means that the requests generated for the field devices FG1 . . . FGN by a browser on the user facilities N1 . . . NN are transferred from the company intranet. In the opposite direction, only the responses generated by the field devices FG1 . . . FGN are transferred. This means that other data packets circulating in the company intranet are kept away from the device network and thus do not influence the throughput in the device network. In addition, a high volume of data arising in the device network cannot increase the network load in the company intranet as a result of cross communication between the field devices FG1 . . . FGN.
Use of the RPC protocol by means of the proxy server [0082] 1 has the advantage of ensuring that the opportunity for accessing the field devices FG1 . . . FGN remains limited to the company intranet connected to the proxy server 1. A company intranet is today usually connected to the Internet via an HTTP gateway. In this case, this gateway undertakes a firewall function (cf. FIG. 7) by blocking transfer of the RPC protocol. This means that it is no longer possible to access the data in the field devices FG1 . . . FGN outside of the company intranet, since the dynamic data in the field devices FG1 . . . FGN are transferred using the RPC protocol.
The proxy server [0083] 1 allows many different functions which are not available in the case of the previously customary, direct access to the field devices FG1 . . . FGN. The following catalogue lists further essential functions which are obtained in connection with the subsequent, detailed description of the proxy server 1:
A dedicated homepage is provided which can be used to reach all the connected field devices FG[0084] 1 . . . FGN.
The connected field devices FG[0085] 1 . . . FGN are automatically addressed and identified; these field devices FG1 . . . FGN are represented in the homepage as starting page on the user facilities N1 . . . NN for direct device access.
Access using device names for the field devices FG[0086] 1 . . . FGN is made possible, and this is more user-friendly than access using the IP address.
The proxy server [0087] 1 can be configured using browsers on the user facilities N1 . . . NN (e-mail addresses, telephone numbers, device names, . . . ).
The proxy server [0088] 1 defines the possible access parts (“firewall function”).
The proxy server [0089] 1 can buffer-store data from the field devices FG1 . . . FGN. This function is suitable, by way of example, for logging the fault information or the operational measurements. These data are stored internally in an XML database (XML—“Extended Markup Language”).
The proxy server can provide the data transferred from the field devices FG[0090] 1 . . . FGN using the RPC protocol in XML format. This allows, by way of example, user-specific extensions of the representations available in the proxy server 1 to be made. To this end, an XSL parser (XSL—“Extended Stylesheet Language”) integrated in the proxy server 1 is available.
The filters for the XML database, which are able to be implemented using the XSL parser, allow the proxy server [0091] 1 to be used likewise as a client for further applications.
Signaling of events in the LAN (LAN =“Local Area Network”) via e-mail is possible. The proxy server [0092] 1 provides dedicated e-mail mailboxes which can be retrieved using a POP3 client (POP3—“Post Office Protocol Stepping 3”), such as Outlook. In addition, it is possible for e-mails to be forwarded to another mailbox using an STMP server (SMTP—“Simple Message Transfer Protocol”) integrated in the proxy server 1.
The form of the proxy server [0093] 1 is described in more detail below.
FIG. 7 shows an arrangement with the device network and the company intranet shown in FIG. 1, where elements of the proxy server [0094] 1 are shown schematically. FIG. 8 shows function blocks of the proxy server 1 in a block diagram.
In line with FIG. 7, each of the field devices FG[0095] 1 . . . FGN has a respective HTTP server HS1 . . . HSN which correspond to the respective HTTP server 34 (cf. FIG. 4) and are connected to a star coupler 39. The proxy server 1 likewise has an HTTP server 40. The text below describes the way in which the proxy server 1 works, with reference to FIG. 8.
The proxy server [0096] 1 is accessed from the local network of the company intranet, which includes the user facilities N1 . . . NN with the respective modem connection to the device network, comprising the field devices, which may comprise a transformer substation or a plurality of substations. If one of the user facilities N1 . . . NN is addressed as a server using the associated local IP address, this access is forwarded via a TCP/IP stack 41 (TCP—“Transfer Control Protocol”) to the HTTP server 40.
The HTTP server [0097] 40 delivers the requested files to the company intranet. For this purpose, the HTTP server 40 addresses a cache manager 43 via a file filter 42. The file filter 42 normally forwards the request to the cache manager 43. Only particular requests are identified on the basis of the requested file type and supplied to a different processing path. These exceptions are described later on. The cache manager 43 at first attempts to find the requested file in the local files 44 or in a file cache 45. If the requested file is neither a local file on the proxy server 1 nor present in the file cache 45, the file request is forwarded to an HTTP client 46. This uses a further TCP/IP stack 47 to set up a connection to the HTTP server HS1, . . . or HSN in the addressed field device FG1, . . . or FGN in the device network in order to obtain the requested file from there.
As connection to the device network, a modem connection using the PPP protocol is preferably used (cf. FIG. 1). However, since the proxy server [0098] 1 can use this modem connection to maintain a plurality of connections to various field devices FG1 . . . FGN at the same time, arbitration is required for this modem connection, since the PPP protocol can manage only a point-to-point connection. To this end, a block slot protocol 48 is used. This protocol assigns the individual PPP connections time slices on the modem communication path and thus prevents collisions between the individual connections. The block slot protocol 48 is also responsible for identifying all the field devices FG1 . . . FGN which are active in the device network. To this end, the device network is cyclically searched for active field devices. The identified active field devices are entered into an XML database 50 on the proxy server 1 by a device manager 49.
The XML database [0099] 50 is a data tree stored on the basis of the standardized “Document Object Model”. If an HTML page loaded via the HTTP server 40 into the browser of a user facility N1, . . . or NN connected to the proxy server 1 now contains Java code which sets up a parallel UDP connection (UDP—“User Defined Protocol”) for the RPC protocol, then this path is used to address an RPC server 51 from the company intranet. Since, for performance reasons, the RPC protocol is based on the standardized UDP/IP protocol, the proxy server 1 needs to include a connection manager 52 in this case, since the UDP protocol does not work on a connection-oriented basis. The connection manager 52 ensures that each user facility N1 . . . NN from the company intranet has reserved for it a dedicated communication port for an RPC client 53 on the proxy server 1 into the device network. The RPC requests from the company intranet are then forwarded directly to the device network using the RPC client 53 on the proxy server 1.
The responses from the field devices FG[0100] 1 . . . FGN to RPC requests are forwarded to the RPC server 51. This forwards the response from the respective field device FG1, . . . or FGN to the user facilities via the company intranet. In parallel therewith, the dynamic data from the respective field device FG1, . . . or FGN which are currently being transferred in the RPC protocol are stored in the XML database 50 in the proxy server 1.
The data stored in the XML database [0101] 50 can be converted into any other data formats using an XSL parser 54 integrated in the proxy server 1. The transformation instructions required for this purpose need to be stored locally in the proxy server 1 as an XSL script file. To trigger such a transformation process, an *.XML file needs to be requested on the HTTP server 40. Such a request is filtered out of the normal access path to the cache manager 43 by the file filter 42 connected to the HTTP server 40 and is forwarded to the XSL parser 54. The letter reads from the files stored locally in the proxy server 1 not only the requested XML file but also an XSL file of the same name, and starts the transformation process. The result of this transformation is sent to the requesting user by the HTTP server 40. In this way, by way of example, HTML files can be produced dynamically from an XSL master containing the current data in the field devices FG1 . . . FGN from the XML database 50, or simply a subtree of the database can be transferred as XML file.
The file filter [0102] 42, the cache manager 43, the local files 44, the file cache 45, the XSL parser 54 and the XML database 50 form a file system in the proxy server 1.
Individual function blocks of the proxy server [0103] 1 are described in more detail below.
HTTP Server [0104]
An explanation will first be given of the basic manner of operation of the HTTP server [0105] 40 formed in the proxy server 1 (cf. FIG. 8), with a few fundamental principles of HTTP being described for the purpose of better understanding.
As in the case of other application protocols on the Internet, HTTP (HTTP—“Hypertext Transfer Protocol”) is an ASCII protocol, which, for data interchange, requires a secure TCP connection between a client (computer belonging to the Internet user) and a server (server facility on which retrievable Internet contents—data—are available). The starting point defined in this case is the port [0106] 80, i.e. an HTTP server listens in on this port for new client connections. Alternatively, the majority of HTTP server software can also be instructed, using an appropriate configuration dialog, to use another port for making contact.
In contrast to other protocols, e.g. FTP (FTP—“File Transfer Protocol”) and POP3, a connection between an HTTP client and an HTTP server is very short-lived. The HTTP client sets up a TCP connection to the desired HTTP server via the port [0107] 80 and sends a query regarding a desired document to the HTTP server. The HTTP server receives the query, evaluates it and—in the event of success—returns the desired document to the HTTP client. The HTTP server automatically closes the TCP connection after it has sent the HTTP client the requested document or an error message as a response to its query.
One important functionality of HTTP is that the HTTP client can notify the HTTP server of what kind of data it is able to understand. Every query therefore needs to involve a communication between the HTTP client and the HTTP server regarding how the data are to be transferred. This communication gives rise to a “surplus” or overhead. HTTP is therefore also referred to as a stateless protocol, because the connection does not pass through a plurality of phases, from login through data interchange to logout by the HTTP client. On the one hand, this facilitates the development of HTTP client/HTTP server software, but it is not very efficient in terms of the use of the available bandwidth. [0108]
The HTTP protocol is used to obtain access to sources in URL format (URL—“Uniform Resource Locator”). The HTTP client, usually a web browser on the Internet user's computer. It requires an HTML page and generates, on the basis thereof, a sequence of queries relating to the file references in this HTML page. The user will then probably click on a link in the requested HTML page, and the HTTP client sends a query, relating to the HTML pages linked by means of this link, to the same or another HTTP server. These further communication connections no longer have any information about a previous connection. This works for simple client/server environments. For more comprehensive communications, this manner of operation may become problematical, however, because this surplus (“overhead”) is incurred for any volume of data needing to be transferred, however small, which reduces efficiency. [0109]
FIG. 9 shows a schematic illustration of the syntax of a query in connection with an HTTP client/server interaction. [0110]
The HTTP client/server interaction comprises a single query/response communication. It comprises a “request line”, one or more optional “request header fields” and an optional “entity body”. From the HTTP client end [0111] 60, that is to say generally from the Internet browser, a TCP connection to the HTTP server 61 is opened 62. Next, the HTTP client 60 sends a command string to the HTTP server 61. The HTTP server 61 uses the TCP connection opened by the HTTP client 60 to respond with a header which, besides the HTTP version supported by the HTTP server 61, also contains the MIME type and the coding of the requested file. This header in ASCII format has the content of the requested file appended to it by the HTTP server 61. When the HTTP server 61 has sent the entire file, it closes the TCP connection opened by the HTTP client 60 again 63. This procedure can be repeated as often as desired.
The following compilation shows the flow of a typical HTTP access operation: [0112]
1. “connection” (connection setup) [0113]
WWW-client sets up a TCP/IP connection to the WWW server [0114]
2. “request”[0115]
Indication of an access method (GET, HEADER, POST [0116]
Specification of the desired document by means of URL [0117]
Additional information in the form of MIME header [0118]
Data (for POST) [0119]
3. “response”[0120]
Header with status code [0121]
Document in HTML format [0123]
Data in other formats (images, sound . . . ) [0124]
4. “close” (connection cleardown) [0125]
Normally from the HTTP server, following data transfer [0126]
In special cases on the HTTP client (transfer time, storage space) [0127]
In this context, the “request line” comprises three text fields separated by spaces. The first field specifies the method (or the command). The second field specifies the name of the source (is the URL without indication of the protocol and of the host). The last field specifies the protocol version used by the HTTP client [0128] 60, for Example HTTP/1.0. The “request header fields” give additional information about the query and the HTTP client 60. The fields are used as a kind of RPC parameter. Each field comprises a name, followed by a colon and the field value. The order of the “header fields” is not important in this context. The “entity body” is sometimes used by HTTP clients 60 in order to send larger information packets to the HTTP server 61.
File Cache [0129]
To allow the cache manager [0130] 43 to work as efficiently as possible, the file cache 45 does not work, as is customary, with the URL, date and the service life of the files which are to be managed, but rather uses further criteria to identify a file. If just the three stated criteria were used for the decision regarding whether a file available locally in the file cache is identical to the file available in the field device, then it would be necessary to compare the stated file features in order to carry out this test. This would require the header for each file to be requested from the field device. However, since the file system in the field devices FG1 . . . FGN is loaded as a unit in the form of KON files (converted files—format of the files which can be loaded into the user facilities N1 . . . NN), such a comparison is not required for every file. One exception in this case is the files produced dynamically in the field devices FG1 . . . FGN, for example the file MLFB.TXT (MLFB—machine-readable factory designation), which is read from the file system in the field devices FG1 . . . FGN, but rather is generated from the MLFB which is set in the respective field device FG1, . . . or FGN.
Serving as a distinguishing feature between these two file forms, namely the static files and the files including dynamic data, is an entry in a file “nocache.txt”. All the files generated dynamically in the field devices FG[0131] 1 . . . FGN need to appear in this file.
Static files are characterized by an infinite service life by the HTTP server HS[0132] 1 . . . HSN in the field devices FG1 . . . FGN. An example of the content of the file “nocache.txt” is shown below: /mlfb.txt: MLFB, BF No., displaytype /textpool.zip: device-specific texts for applets (multilingual) /ver.txt: version, date /chartab.jar: device character set
In this context, the file “ver.txt” can have/indicate the following content: [0133]
V01.01.01 [0134]
Tue, Oct 24, 2000 07:50:00 GMT [0135]
Slot Protocol for the Proxy Server [0136]
Slot protocol [0137] 48 (cf. FIG. 8) is used to link the proxy server 1 to the field devices FG1 . . . FGN in an arrangement with a star coupler as shown in FIG. 7. The slot protocol 48 is divided into the two areas of (i) device identification and (ii) arbitration of the star coupler arrangement. The device identification is used for automatically identifying the field devices FG1 . . . FGN connected to the star coupler 39. The arbitration needs to prevent collisions between datagrams from different field devices FG1 . . . FGN on the communication connection between the proxy server 1 and the individual field devices FG1 . . . FGN.
The device identification when the star coupler arrangement [0138] 39 is used is described below.
Device Identification [0139]
Device identification is a part of the slot protocol [0140] 48. This protocol part occupies the serial connection exclusively, i.e. no other communication may be active on the modem link during device identification. For this reason, the device identification is activated only when the modem connection is set up. In the course of operation of the observation and operating system, this protocol part is inactive. The device identification can be activated when required, however.
FIG. 10 shows a master-slave arrangement with a star coupler to explain the device identification. [0141]
The slot protocol [0142] 48 works on the basis of the master-slave principle. A master 70 is on the top access point in FIG. 10. The bottom access points associated with a star coupler 71, which corresponds to the star coupler 3 in FIG. 1, are occupied by one respective slave S1 . . . SN, which correspond to the field devices FG1 . . . FGN shown in FIG. 1. The master 70 could poll for any possible address of the connected slaves S1 . . . SN and, in the event of a response to this query, could incorporate the slave S1, . . . or SN found into the list of the devices which are known to the master 70. This procedure can no longer be performed with an address range of 32 bits, however. In this case, 2{circumflex over ( )}32 polling operations would be necessary. This number is no longer implementable, however, since in this case the time required for this polling operation would exceed the service life of the plant. To be able to identify the devices connected to the master 70 automatically nevertheless, the invention solves the problem in the following manner:
In the case of an addressing scheme with a binary-coded address having a permanently prescribed address length, a query involves polling for an address range. The slaves which are present in the polled address range respond to this query. Since a plurality of field devices (slaves) may be present in the same polled address range in this instance, a simultaneous response from a plurality of the slaves S[0143] 1 . . . SN inevitably results in a collision in this case. This collision is consciously accepted and is part of the proposed method. For this reason, the master 70 checks only whether any response to its query has actually been received within a defined period of time.
If the address space of the addressable slave S[0144] 1 . . . SN is n bits, the master 70 sends a respective query with one definite bit of the address and a mask for the other address bits. Two polling operations can be used to test whether there are slaves in the address range prescribed by the definite bit. If a response to a query has been received for an address range, then the mask is reduced by one bit, and the next definite bit is tested using another two polling operations to determine whether there are slaves in the now smaller address range. If the query for the now smaller address range receives a response, then the next bit of the address range including slaves has been found. This procedure is repeated until the mask for the address range has been reduced to 0 bits. One of the slaves S1 . . . SN on the bus has then been clearly identified. If a polling operation for both states of the currently tested bit receives responses, then both branches are pursued further in the next iteration. Since, with a mask size of 0 bits, the device or the slave with the queried, now entirely definite address can respond to the query sent, it is also no longer possible for collisions to occur for the last query, and the response message from the slaves which are to be detected can contain spontaneous information about the state of the connected slaves. FIG. 12 explains the described method once again with reference to a simple addressing scheme with a 4-bit address, that is to say for an address space of 0 to 15. It is assumed that the devices with the address 3, 4 and 7 are present in the arrangement. The starting point is polling for the most significant bit.
That is to say, first the address space [0145] 0 to 7 and, in a second polling operation, the address space 8 to 15 are tested using a polling operation. This second polling operation does not receive a response from any device. For the first polling operation, the master receives one or more responses. For this reason, the mask is reduced by a further bit in the address space 0 to 7. That is to say, now the address range 0 to 3 is checked using a third polling address, and the address range 4 to 7 is checked using a fourth polling operation. This procedure is repeated in line with the illustration in FIG. 12 until the addresses have been resolved completely and hence all the devices have been found.
In the example described, the slaves S[0146] 1 . . . Sn or the field devices FG1 . . . FGN are connected to the master 70 using an IP-based protocol. In the IP protocol, the bus users have a 32-bit address. The address is split into octets, and each octet is represented in decimal form. The hexadecimal 32-bit number 0x8D8D8000 thus corresponds to the IP address 141.141.128.0. For the actual device identification/polling operation, a recursive variant of the method described in the preceding paragraph is used.
FIG. 11 shows the flowchart for the method in the form of a Nassi-Sneidermann diagram. [0147]
The method described involves the test for whether a field device (slave) can be addressed in the available address range being triggered by the master [0148] 70, preferably using a request datagram, which is known as such. In contrast to conventional methods, however, it is consciously accepted that a plurality of the slaves S1 . . . SN respond simultaneously to a request datagram sent by the master 70. The fact that the signals received from the slaves S1 . . . SN are logically combined in the star coupler 71 using a logic OR gate and that this aggregate signal is forwarded to the master 70 makes it possible to ensure that a response from one of the slaves S1 . . . SN is identified in the master 70 in all cases. If the response datagrams from a plurality of the slaves S1 . . . SN overlap in time, an erroneous datagram is received in the master 70. This case is also identified as a response.
Using the stipulation of a maximum response time for the slaves S[0149] 1 . . . SN to a request datagram from the master 70 and of the datagram transfer time, it is possible to define a monitoring time for the master 70. If the master 70 receives a response within this monitoring time, then there are slaves or field devices in the queried address range. Conversely, the queried address range contains no field devices if the master 70 has not received a response to the request within the monitoring time.
Since one of the slaves S[0150] 1 . . . SN may respond in the case of full resolution of the address in the request from the master 70 (i.e. the mask becomes empty), it is also no longer possible for any collision to occur in this case. This means that, in this case, the error protection of the received datagram can be used to exclude a line fault and hence any possible error identification for a connected slave. If, during the monitoring time, a request from the master is followed by the appearance of a line fault which is simulated by a slave which is not present, this results merely in extension of the polling procedure, but not in incorrect identification of connected slaves, since this line fault is identified no later than upon the full resolution of the mask.
The following paragraph uses an example to show the operation of the method: [0151] Test: 141.141.128.0 Mask: 255.255.128.0 Test: 141.141.0.0 Mask: 255.255.128.0 Test: 141.141.64.0 Mask: 255.255.192.0 Test: 141.141.96.0 Mask: 255.255.224.0 Test: 141.141.64.0 Mask: 255.255.224.0 Test: 141.141.80.0 Mask: 255.255.240.0 Test: 141.141.88.0 Mask: 255.255.248.0 Test: 141.141.80.0 Mask: 255.255.248.0 Test: 141.141.84.0 Mask: 255.255.252.0 Test: 141.141.86.0 Mask: 255.255.254.0 Test: 141.141.84.0 Mask: 255.255.254.0 Test: 141.141.85.0 Mask: 255.255.255.0 Test: 141.141.84.0 Mask: 255.255.255.0 Test: 141.141.84.128 Mask: 255.255.255.128 Test: 141.141.84.0 Mask: 255.255.255.128 Test: 141.141.84.64 Mask: 255.255.255.192 Test: 141.141.84.0 Mask: 255.255.255.192 Test: 141.141.84.32 Mask: 255.255.255.224 Test: 141.141.84.0 Mask: 255.255.255.224 Test: 141.141.84.16 Mask: 255.255.255.240 Test: 141.141.84.0 Mask: 255.255.255.240 Test: 141.141.84.8 Mask: 255.255.255.248 Test: 141.141.84.0 Mask: 255.255.255.248 Test: 141.141.84.4 Mask: 255.255.255.252 Test: 141.141.84.0 Mask: 255.255.255.252 Test: 141.141.84.2 Mask: 255.255.255.254 Test: 141.141.84.3 Mask: 255.255.255.255 Test: 141.141.84.2 Mask: 255.255.255.255 Found: 141.141.84.2 Test: 141.141.84.0 Mask: 255.255.255.254 Test: 141.141.80.0 Mask: 255.255.252.0 Test: 141.141.82.0 Mask: 255.255.254.0 Test: 141.141.80.0 Mask: 255.255.254.0 Test: 141.141.81.0 Mask: 255.255.255.0 Test: 141.141.80.0 Mask: 255.255.255.0 Test: 141.141.80.128 Mask: 255.255.255.128 Test: 141.141.80.192 Mask: 255.255.255.192 Test: 141.141.80.128 Mask: 255.255.255.192 Test: 141.141.80.160 Mask: 255.255.255.224 Test: 141.141.80.176 Mask: 255.255.255.240 Test: 141.141.80.160 Mask: 255.255.255.240 Test: 141.141.80.168 Mask: 255.255.255.248 Test: 141.141.80.160 Mask: 255.255.255.248 Test: 141.141.80.164 Mask: 255.255.255.252 Test: 141.141.80.166 Mask: 255.255.255.254 Test: 141.141.80.164 Mask: 255.255.255.254 Test: 141.141.80.165 Mask: 255.255.255.255 Test: 141.141.80.164 Mask: 255.255.255.255 Found: 141.141.80.164 Test: 141.141.80.160 Mask: 255.255.255.252 Test: 141.141.80.162 Mask: 255.255.255.254 Test: 141.141.80.163 Mask: 255.255.255.255 Found: 141.141.80.163 Test: 141.141.80.162 Mask: 255.255.255.255 Test: 141.141.80.160 Mask: 255.255.255.254 Test: 141.141.80.161 Mask: 255.255.255.255 Found: 141.141.80.161 Test: 141.141.80.160 Mask:255.255.255.255 Found: 141.141.80.160 Test: 141.141.80.128 Mask: 255.255.255.224 Test: 141.141.80.0 Mask: 255.255.255.128 Test: 141.141.64.0 Mask: 255.255.255.0 Test: 141.141.0.0 Mask: 255.255.255.0 58 Polling operations ...
The polling operations included the address space 141.141.0.0 to 141.141.255.255. The devices having the following addresses were found: [0152]
141.141.84.2 [0153]
141.141.80.164 [0154]
FIG. 12 illustrates the represented procedure in the form of a tree representation, where the fields with a bold border characterize the polling operations which have received responses from one or more slaves S[0158] 1 . . . SN or field devices.
Broadcast Service [0159]
For linking the proxy server [0160] 1 to the field devices FG1 . . . FGN, it is possible to use an IP based network instead of the simple architecture with a star coupler 39. In this case, arbitration of this network by a protocol, for example the slot protocol 48, is not necessary. This function is undertaken by the network itself. In this embodiment, it is likewise possible to use functions of the network for the device identification. In the case of a network connection between the proxy server 1 and the field devices FG1 . . . FGN, a broadcast service is used for autoconfiguration of the observation and operating system.
In both cases of the identification of the connected field devices FG[0161] 1 . . . FGN, i.e. in the case of the embodiment with a star coupler arrangement and when a network is used, particularly a LAN, the identification is carried out automatically when the observation and operating system is started up, and it takes place without prior parameterization of the components involved in the system.
The broadcast service is used to identify the field devices connected to the IP-based network (e.g. LAN), which include a server for their dedicated operation. In addition, the broadcast service is used to collect spontaneous events which have occurred in the connected field devices. The broadcast service is an IP application and is thus based on the functions of the IP stack and is supported by the UDP protocol. For this service, by way of example, a permanently prescribed port 0xD000 is reserved at the server end. At the client end, a free port is selected dynamically. The use of the standard UDP/IP protocol makes it possible, in this case, to obtain support from the IP programming interfaces of ordinary operating systems, such as MS Windows or Linux. This means that the proxy server [0162] 1 can be proposed for conventional office servers without difficulty.
The broadcast service is active both in the proxy server [0163] 1 and in the individual field devices. For the broadcast service, the proxy server 1 is stipulated as the master. A configuration polling operation is a UDP message sent by the master. This message is sent, depending on configuration, to a broadcast or multicast IP address. A description of broadcast or multicast IP addresses can be found, by way of example, in Karanjit S. Siyan: Inside TCP/IP Third Edition, New Riders Publishing, Indianapolis, 1997, ISBN 1-56205-714-6, pages 187ff.
All field devices will then respond to the master's configuration polling operation with a UDP message including the most important configuration data for the field device. Since, theoretically, all field devices connected to the IP-based network now wish to respond at the same time, there will at first be a few collisions on the bus used, these collisions being resolved by the CSMA/CD method (CSMA—“carrier sense, multiple access/collision detect”). A description of this method can likewise be found in Karanjit S. Siyan: Inside TCP/IP Third Edition, New Riders Publishing, Indianapolis, 1997, ISBN 1-56205-714-6, pages 97ff. The UDP response messages from all active field devices will thus arrive with the polling master within a certain time. The polling party is thus able to establish how many and what field devices there are in the network, and can subsequently request further information about the HTTP protocol or other IP-based protocols from the field devices. [0164]
The broadcast service also has the task of distributing an event spontaneously accumulating in one of the field devices in the IP-based network to the users of the broadcast service. Since, firstly, the field devices have no information about which master is responsible for this signal, and secondly it may be possible for a plurality of masters with distributed tasks to exist in the IP-based network, the event message is sent to the network users as a broadcast. Depending on the event type and the sender, the masters can ignore this signal or can trigger an action which uses a further protocol, e.g. HTTP, to retrieve additional information from the field device. This retrieval by the appropriate master of additional information from the field device sending the event serves simultaneously as acknowledgment of receipt by the master. If an event message is not acknowledged, then it is repeated at regular intervals (for example approximately 10 s or at a logarithmetically increasing time) until an acknowledgment is received from a master. [0165]
FIG. 13 shows a schematic illustration to explain the method within the context of the configuration polling operation. [0166]
The proxy server [0167] 1 sends, as master, a configuration query 72 as a broadcast to the users in the network. The field devices FG1 . . . FGN respond with a UDP datagram to the IP address of the master which sent the configuration query.
This UDP datagram contains the most important information about the connected devices, as already illustrated. [0168]
Device Management [0169]
The field devices or slaves identified with the aid of the device identification when the star coupler [0170] 39 or the broadcast service is used are managed in the proxy server 1 using the device manager 49 (cf. FIG. 8). FIG. 14 shows a schematic block diagram of the connection of the device manager 49 in the proxy server 1.
The device manager [0171] 49 provides the cache manager 43 and the XML database 50 with information about the field devices FG1 . . . FGN identified in the device network. To this end, the device manager 49 obtains its information about the connected field devices FG1 . . . FGN from the method taking place within the context of the slot protocol 48. This provides the IP addresses of the connected field devices FG1 . . . FGN. The device manager 49 is provided with the information about the identified field devices FG1 . . . FGN by the slot protocol 48. The slot protocol 48 supplies the device manager 49 with the IP addresses of the identified field devices FG1 . . . FGN. The other information about the field devices FG1 . . . FGN, which needs to be provided by the device manager 49 in the proxy server 1, is obtained when HTTP data are downloaded in stipulated files from the field devices FG1 . . . FGN. The device manager 49 uses the known IP addresses of the identified field devices FG1 . . . FGN to provide the cache manager 43 with the following information about the field devices FG1 . . . FGN: field device type, field device version and version of the file block for the observation and operating system.
The file cache [0172] 45 (cf. FIG. 8) likewise includes this information for the files already stored therein. This means that, when a file is requested from a particular one of the field devices FG1 . . . FGN, this information can be used to decide whether the file held in the file cache 45 is identical to the file which is available in the field device, without reading the file header of the requested file from the particular field device. The file's version information held in the file cache 45 is compared with the information from the device manager 49 for the IP address of the particular field device.
The connection of the device manager [0173] 49 to the XML database 50 serves to provide information from the field devices FG1 . . . FGN. This information is loaded from the field devices FG1 . . . FGN in the form of an XML file. The following table shows an overview of the contents of this file: Information Tag Description Device type DEV_TYPE Characters 1..6 in the MLFB MLFB MLFB Full MLFB of the device BE-Number BE_NR Device identifier (“unique number”) Version VER_KEYS List of version keys File VERSION Date and version number of System the file system Firmware VERSION Date and version number of the device firmware System VERSION Date and version number of firmware the system firmware used in the device “Noncacheable” NOCACHE List of all the files which files always need to be fetched directly from the device Menu tree MENU Device control tree for embedding into the proxy server control tree Process data DATA_OBJ List of XML files which describe all the process data which can be delivered by the device
This information is stored in a file “DevData.xml”. The device manager [0174] 49 prompts an HTTP download for this file when one of the field devices FG1 . . . FGN has been found by the slot protocol 48. Further files are loaded from the field device by the device manager 49 if their file path is included in this XML file, i.e. all files encapsulated with a <DEV_PATH>-tag are loaded.
Following download, the file “DevData.xml” is transformed in the proxy server [0175] 1, using the XSL parser 54, into the internal format of the proxy server 1 and is then entered in the XML database 50 of the proxy server 1.
XSL Parser [0176]
The XSL parser [0177] 54 (cf. FIG. 8) is used to produce dynamically generated HTML files from the central XML database 50 of the proxy server 1. This is done using XSL scripts which are stored locally in the proxy server 1. The XSL scripts can be installed on the proxy server 1 using an admin page.
FIG. 15 shows the connection of the XSL parser [0178] 54 in the proxy server 1.
If the HTTP server [0179] 40 is used by the user facilities N1 . . . NN to request an XML file from the intranet, then this request is filtered out by the file filter 42 and is forwarded to the XML front-end HTTP 55. This front-end searches for an XSL transformation script belonging to the request XML file and starts the XSL parser 54 with these two files.
Since dynamically generated HTML pages always use the data which are used from the XML database [0180] 50 which is present locally on the proxy server 1, the content of this database needs to be aligned with the data held in the devices. This alignment process is necessary because a large amount of the data stored in the XML database 50, such as measurements, are variable over time. This alignment is undertaken by the XML front-end RPC cache block 57. When the XSL parser 54 accesses the XML database 50, the interposed XML front-end 57 checks the validity period of the requested information. If the requested information has already become invalid, then it is re-requested by the connection manager 52 from the RPC client 53 from the device, is updated in the XML database 50 and is forwarded to the XSL parser 54.
The device manager [0181] 49 continually monitors the status of the devices connected to the device network and updates this information using the XML front-end device data 56 in the XML database 50.
The XSL parser [0182] 54 is the principal link for representing the current data, received from the field devices FG1 . . . FGN, from the XML database 50. Each XSL script prescribes transformation rules which stipulate how particular data from the XML database 50 are to be displayed in the form of HTML pages in the user facilities N1 . . . NN. One of the basic principles of XML is the separation of content and presentation. An XML document includes “content”, and its presentation needs to be defined separately, in the form of a stylesheet. There are various options for adding the representation information to an XML document. These are based on two fundamental methods: either the document is put into a representable form in line with a stylesheet or the stylesheet instructs the representation mechanism in how the individual elements of the document need to be represented. These two fundamental methods can be varied in different ways:
CSS stylesheet+XML document→XML-compatible browser The browser processes the document and the representation information in the form of a CSS stylesheet and reproduces a presentation. [0183]
XSL stylesheet+XML document→XSL-compatible representation program A representation program which can process XSL stylesheets receives, besides the document, the presentation information in the form of an XSL stylesheet. [0184]
XSL stylesheet+XML document→XSL transformer→HTML document The XML document is transformed, in line with the transformation rules of an XSL stylesheet, by an XSL transformer into an (X)HTML document which can then be represented by a browser. [0185]
FIG. 16 shows a schematic block diagram of an XSLT processor (XSL—“Extended Stylesheet Language Transformation”). [0186]
The block diagram shown in FIG. 16 clarifies once again the flow of data when an XML file is requested. The file Xview.XML requested by the client is forwarded to the XSLT processor [0187] 54 by the HTTP server. The XSLT processor searches for the file Xview.XSL belonging to the requested file Xview.XSL and starts the XSLT processor 54 with these two files. If the transformation process started using the requested file Xview.XML needs to use process data from the XML database 50 in the proxy server, then the transformation script Xview.XSL needs to contain a reference of this database. In the example shown in FIG. 16, this XML database 50 has the name Spirogate.XML.
Since all the information displayed using the user facilities N[0188] 1 . . . NN passes through an XSLT processor when it is requested, it is expedient to check the information requested in this process, as already described, for its validity using the XML front-end RPC cache 57 and to use the result for an update mechanism. This requires the XSLT parser to be manipulated such that it is possible to establish which data from the individual databases are involved in the design of the HTML page which is to be produced. This information is then used, in a second step, to establish whether these data are current. This is followed by initiation of the update mechanisms required for this purpose, provided that this is necessary, and then the parser procedure is started again, with data which are currently displayed to a user in any form using one or more of the user facilities N1 . . . NN ever being updated. This is achieved by virtue of only the requested data being updated in the XML database. The possibly considerable overall size of the XML database 50 results, with the aid of this mechanism, in a reduction of the data transferred between the field devices FG1 . . . FGN and the proxy server 1, since firstly data are fetched on request, and secondly the data required for the respective representation are ever fetched.
1. A method for operating and/or monitoring a field device using a user facility, in which a proxy server facility is produced, the proxy server facility being connected to the field device and to the user facility to interchange electronic data using the user facility to operate and/or observe the field devices, wherein the electronic data to be interchanged for operating and/or monitoring the field device comprise static data, which are transferred based on a first protocol standard, and dynamic data, which are transferred based on a second protocol standard.
2. The method as claimed in claim 1, wherein the first protocol standard is the HTTP protocol.
3. The method as claimed in claim 2, wherein the second protocol standard is used to use a connectionless protocol.
4. The method as claimed in claim 1, wherein the static data are transferred from the field device to the proxy server facility and are stored in a memory device in the proxy server facility when the static data are first called by the user facility, the static data thereby becoming available in the proxy server facility for retrieval by the user facility.
5. The method as claimed in claim 1, wherein the dynamic data are transferred from the field device to the proxy server facility and from the proxy server facility to the user facility whenever the dynamic data are called by the user facility.
6. The method as claimed in claim 1, wherein the dynamic and/or the static data are transferred from a server facility in the field device to the proxy server facility.
7. The method as claimed in claim 1, wherein the proxy server facility is configured using a browser facility which is installed on the user facility.
8. A proxy server apparatus, comprising: a first interface device to produce a first data connection to a field device; second interface device means to produce a second data connection to a user facility, so that the user facility is configured for use and to interchange electronic data to monitor and/or operate the field device; and a protocol processing device, configured so that the field device and the user facility are configured to interchange static, electronic data, which are transferred based on a first protocol standard, and dynamic, electronic data, which are transferred based on a second protocol standard.
9. The apparatus as claimed in claim 8, further comprising a memory facility for storing the static, electronic data.
10. The apparatus as claimed in claim 8, further comprising a parser facility for automatically converting electronic data into various formats.
11. The method as claimed in claim 1, wherein operating/monitoring of the field device is in a power plant.
12. The proxy server apparatus of claim 8, wherein operating/monitoring of the field device is in a power plant.
US10/492,630 2001-10-15 2002-09-26 Method for operating and observing field devices Active 2023-01-09 US7072987B2 (en)
DE10151115.9 2001-10-15
DE2001151115 DE10151115A1 (en) 2001-10-15 2001-10-15 Method for operating and observing field devices
PCT/DE2002/003711 WO2003038535A1 (en) 2001-10-15 2002-09-26 Method for operating and observing field devices
US10/492,630 Active 2023-01-09 US7072987B2 (en) 2001-10-15 2002-09-26 Method for operating and observing field devices
DE (2) DE10151115A1 (en)
US20030033133A1 (en) * 2001-08-07 2003-02-13 Dieter Kleyer Simulation system
US20050192922A1 (en) * 2004-02-27 2005-09-01 Edlund Stefan B. Client-server computing system capable of validating cached data based on data transformation
WO2006068558A1 (en) * 2004-12-22 2006-06-29 Telefonaktiebolaget Lm Ericsson (Publ) Methods and arrangements for caching static information for packet data applications in wireless communication systems
US20060229738A1 (en) * 2005-04-07 2006-10-12 Bhandiwad Deepak S Managing field devices having different device description specifications in a process control system
EP1715395A1 (en) * 2005-04-22 2006-10-25 TRUMPF Laser GmbH + Co.KG System for secure remote access
US20070100995A1 (en) * 2005-10-27 2007-05-03 Andreas Isenmann Interface for a database for a field unit
US20070136011A1 (en) * 2003-04-02 2007-06-14 Markus Kilian Method for approximating a measuring time and corresponding apparatus
US20070165654A1 (en) * 2005-10-13 2007-07-19 Huawei Technologies Co., Ltd Method for managing a terminal device
GB2442358A (en) * 2006-09-29 2008-04-02 Fisher Rosemount Systems Inc Communication in process control systems.
US20080320100A1 (en) * 2007-06-22 2008-12-25 Batson James D Determining playability of media files with minimal downloading
US20100082678A1 (en) * 2008-09-30 2010-04-01 Rockwell Automation Technologies, Inc. Aggregation server with industrial automation control and information visualization placeshifting
WO2010047740A1 (en) * 2008-10-23 2010-04-29 Canon Kabushiki Kaisha Remote control of a host computer
EP2595016A1 (en) * 2011-11-17 2013-05-22 VEGA Grieshaber KG Method, computer program, computer-readable medium and computing unit for operating field devices
US20140067924A1 (en) * 2012-08-14 2014-03-06 International Business Machines Corporation Remote procedure call for a distributed system
US20140181951A1 (en) * 2012-12-21 2014-06-26 Rolf Birkhofer Method for Remotely Servicing a Field Device of Automation Technology
US20160050295A1 (en) * 2010-03-24 2016-02-18 Fisher-Rosemount Systems, Inc. Methods and apparatus to access process data stored on a server
JP2016105331A (en) * 2010-03-24 2016-06-09 フィッシャー−ローズマウント システムズ,インコーポレイテッド Method and apparatus to display process data
US6721780B1 (en) * 1999-11-09 2004-04-13 Fireclick, Inc. Predictive pre-download of network objects
DE10050993A1 (en) * 2000-10-14 2002-05-02 Aloys Wobben Plant overview
US7483983B1 (en) 2000-11-13 2009-01-27 Telecommunication Systems, Inc. Method and system for deploying content to wireless devices
US7269784B1 (en) 2001-01-22 2007-09-11 Kasriel Stephane Server-originated differential caching
JP4824266B2 (en) * 2001-02-05 2011-11-30 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ How to transfer objects that conform to the format
US7185063B1 (en) 2001-06-22 2007-02-27 Digital River, Inc. Content delivery network using differential caching
US7092997B1 (en) * 2001-08-06 2006-08-15 Digital River, Inc. Template identification with differential caching
US7210142B2 (en) * 2001-08-31 2007-04-24 Sony Corporation Client-server bidirectional synchronization via browser plug in for an XM radio system
US7191233B2 (en) * 2001-09-17 2007-03-13 Telecommunication Systems, Inc. System for automated, mid-session, user-directed, device-to-device session transfer system
DE10151116A1 (en) * 2001-10-15 2003-05-08 Siemens Ag Procedure for commissioning an operating and monitoring system for field devices
US20070088518A1 (en) * 2001-12-27 2007-04-19 Michael Braun Automated method for generating program modules, to be used for controlling field devices, from a machine-readable parameterized specification of the field devices
US7296051B1 (en) 2002-02-19 2007-11-13 Digital River, Inc. Predictive predownload of templates with delta encoding
US7487261B1 (en) 2002-02-22 2009-02-03 Digital River, Inc. Delta caching service
US7426535B2 (en) 2002-10-08 2008-09-16 Telecommunication Systems, Inc. Coordination of data received from one or more sources over one or more channels into a single context
AT405035T (en) * 2002-11-15 2008-08-15 Abb Research Ltd Configuration system for network devices and method for reconfiguring devices
US7392310B2 (en) * 2002-12-26 2008-06-24 Ricoh Company, Ltd. Method and system for using data structures to store database information for multiple vendors and model support for remotely monitored devices
DE10326665A1 (en) * 2003-06-11 2005-01-20 Endress + Hauser Process Solutions Ag Method for monitoring a field device
DE10335429A1 (en) * 2003-07-31 2005-02-24 Siemens Ag Field unit log generation method for use in an automation system whereby field unit data are requested from an automation system processing unit by a monitoring application running on a user data processing system and recorded
US8266241B1 (en) * 2004-06-22 2012-09-11 Apple Inc. Image sharing
US8145748B2 (en) * 2004-12-13 2012-03-27 American Power Conversion Corporation Remote monitoring system
US7711814B1 (en) * 2004-12-13 2010-05-04 American Power Conversion Corporation Method and system for remote monitoring of a power supply device with user registration capability
US20060174161A1 (en) * 2005-02-01 2006-08-03 Credence Systems Corporation Viewer for test apparatus hardware
US20070097969A1 (en) * 2005-11-02 2007-05-03 Alain Regnier Approach for discovering network resources
DE102005063080A1 (en) * 2005-12-29 2007-07-05 Endress + Hauser Process Solutions Ag Automation engineering system maintaining method, involves connecting maintenance program with email server, managing field devices as email user, allocating email addresses for devices, and managing information as emails in devices
DE102006004633A1 (en) * 2006-01-31 2007-08-16 Phoenix Contact Gmbh & Co. Kg Distributed automation system
DE102006018220B4 (en) * 2006-04-19 2008-07-31 Festo Ag & Co Valve battery and communication method for it
US7904917B2 (en) * 2006-12-18 2011-03-08 Ricoh Company, Ltd. Processing fast and slow SOAP requests differently in a web service application of a multi-functional peripheral
US7680877B2 (en) * 2006-12-18 2010-03-16 Ricoh Company, Ltd. Implementing a web service application on a device with multiple threads
US7873647B2 (en) * 2006-12-18 2011-01-18 Ricoh Company, Ltd. Web services device profile on a multi-service device: device and facility manager
US7987278B2 (en) * 2006-12-18 2011-07-26 Ricoh Company, Ltd. Web services device profile on a multi-service device: dynamic addition of services
US8127306B2 (en) * 2006-12-18 2012-02-28 Ricoh Company, Ltd. Integrating eventing in a web service application of a multi-functional peripheral
US8112766B2 (en) 2006-12-21 2012-02-07 Ricoh Company, Ltd. Multi-threaded device and facility manager
US8321546B2 (en) * 2007-01-10 2012-11-27 Ricoh Company, Ltd. Integrating discovery functionality within a device and facility manager
US8239876B2 (en) * 2007-06-12 2012-08-07 Ricoh Company, Ltd. Efficient web services application status self-control system on image-forming device
US8782771B2 (en) * 2007-06-19 2014-07-15 Rockwell Automation Technologies, Inc. Real-time industrial firewall
US8453164B2 (en) * 2007-09-27 2013-05-28 Ricoh Company, Ltd. Method and apparatus for reduction of event notification within a web service application of a multi-functional peripheral
EP2063331A1 (en) * 2007-11-21 2009-05-27 Pepperl + Fuchs Gmbh Sensor for automation technology and method for configuring a sensor
DE102009046806A1 (en) * 2009-11-18 2011-06-01 Codewrights Gmbh Method for providing device-specific information of a field device of automation technology
DE102009046934A1 (en) * 2009-11-20 2011-05-26 Endress + Hauser Process Solutions Ag Configuration unit for use in server for setting cyclic data traffic between server and e.g. filling level measuring device utilized in process automation technology for detecting filling level, determines multi-variable-containers
US9182757B2 (en) * 2011-03-30 2015-11-10 Fisher-Rosemount Systems, Inc. Methods and apparatus to transmit device description files to a host
US9294574B2 (en) * 2012-09-12 2016-03-22 Electronics For Imaging, Inc. Device discovery using broadcast technology
DE102012112427A1 (en) * 2012-12-17 2014-06-18 Endress + Hauser Conducta Gesellschaft für Mess- und Regeltechnik mbH + Co. KG Method for operating field device for process automation technology, involves transmitting operating software of field device to higher-level computer unit during activation of field device
US10120350B2 (en) * 2013-03-11 2018-11-06 Fisher-Rosemount Systems, Inc. Background collection of diagnostic data from field instrumentation devices
DE102013108478A1 (en) * 2013-08-06 2015-02-12 Endress+Hauser Process Solutions Ag Method for expanding an embedded software component of a field device
DE102014016819A1 (en) * 2014-11-14 2016-05-19 Abb Technology Ag Method and device for managing and configuring field devices of an automation system
DE102015012064A1 (en) * 2015-09-22 2017-03-23 Rhebo GmbH Method and device for monitoring control systems
US5732219A (en) * 1995-03-17 1998-03-24 Vermeer Technologies, Inc. Computer system and computer-implemented process for remote editing of computer files
US6298377B1 (en) * 1998-06-01 2001-10-02 Metso Field Systems Oy Field device management system
US20030041135A1 (en) * 2001-08-21 2003-02-27 Keyes Marion A. Shared-use data processing for process control systems
US6738388B1 (en) * 1998-09-10 2004-05-18 Fisher-Rosemount Systems, Inc. Shadow function block interface for use in a process control network
US6785724B1 (en) * 1999-11-02 2004-08-31 Walchem Corporation On-demand web server
US6871211B2 (en) * 2000-03-28 2005-03-22 Ge Medical Systems Information Technologies, Inc. Intranet-based medical data distribution system
US6209048B1 (en) 1996-02-09 2001-03-27 Ricoh Company, Ltd. Peripheral with integrated HTTP server for remote access using URL's
US6396805B2 (en) 1997-03-25 2002-05-28 Intel Corporation System for recovering from disruption of a data transfer
US6321272B1 (en) 1997-09-10 2001-11-20 Schneider Automation, Inc. Apparatus for controlling internetwork communications
WO2000077592A2 (en) 1999-06-11 2000-12-21 The Foxboro Company Control device providing a virtual machine environment and an ip network
US20040128346A1 (en) * 2001-07-16 2004-07-01 Shmuel Melamed Bandwidth savings and qos improvement for www sites by catching static and dynamic content on a distributed network of caches
US6988142B2 (en) * 2000-08-24 2006-01-17 Red Hat, Inc. Method and apparatus for handling communication requests at a server without context switching
US20040260405A1 (en) * 2003-06-18 2004-12-23 Ron Eddie Modular monitoring, control and device management for use with process control systems
2001-10-15 DE DE2001151115 patent/DE10151115A1/en not_active Withdrawn
2002-09-26 WO PCT/DE2002/003711 patent/WO2003038535A1/en active IP Right Grant
2002-09-26 DE DE2002508617 patent/DE50208617D1/en active Active
US7756696B2 (en) * 2001-08-07 2010-07-13 Siemens Aktiengesellschaft Simulation system of technical plant
US7580810B2 (en) * 2003-04-02 2009-08-25 Endress + Hauser Gmbh + Co. Kg Method for determining a measuring point in time for a field device and corresponding field device in which a measuring point in time has been determined
US7317952B2 (en) * 2005-04-07 2008-01-08 Honeywell International Inc. Managing field devices having different device description specifications in a process control system
WO2006111376A1 (en) * 2005-04-22 2006-10-26 Trumpf Laser Gmbh + Co. Kg Device for secure remote access
US20080091794A1 (en) * 2005-04-22 2008-04-17 Trumpf Laser Gmbh + Co. Kg System and method for secure remote access
US7761551B2 (en) 2005-04-22 2010-07-20 Trumpf Laser Gmbh + Co. Kg System and method for secure remote access
US7889684B2 (en) * 2005-10-13 2011-02-15 Huawei Technologies Co., Ltd. Method for managing a terminal device
WO2007048608A1 (en) * 2005-10-27 2007-05-03 Vega Grieshaber Kg Database interface for field device
US7685267B2 (en) 2005-10-27 2010-03-23 Vega Grieshaber Kg Method and system for connecting to a field device
GB2442358B (en) * 2006-09-29 2011-11-09 Fisher Rosemount Systems Inc Flexible input/output devices for use in process control systems
US20080080395A1 (en) * 2006-09-29 2008-04-03 Gary Keith Law Flexible input/output devices for use in process control systems
US8761196B2 (en) 2006-09-29 2014-06-24 Fisher-Rosemount Systems, Inc. Flexible input/output devices for use in process control systems
US9015276B2 (en) 2007-06-22 2015-04-21 Apple Inc. Determining playability of media files with minimal downloading
US8489702B2 (en) * 2007-06-22 2013-07-16 Apple Inc. Determining playability of media files with minimal downloading
US20100106766A1 (en) * 2008-10-23 2010-04-29 Canon Kabushiki Kaisha Remote control of a host computer
JP2012506592A (en) * 2008-10-23 2012-03-15 キヤノン株式会社 Remote control of host computer
WO2013072425A1 (en) * 2011-11-17 2013-05-23 Vega Grieshaber Kg Method, computer program, computer-readable medium, and computing unit for operating field devices
CN103946755A (en) * 2011-11-17 2014-07-23 Vega格里沙贝两合公司 Method, computer program, computer-readable medium, and computing unit for operating field devices
US9804907B2 (en) * 2012-08-14 2017-10-31 International Business Machines Corporation Remote procedure call for a distributed system
DE10151115A1 (en) 2003-05-08
US8458467B2 (en) 2013-06-04 Method and apparatus for adaptive application message payload content transformation in a network infrastructure element
US7178149B2 (en) 2007-02-13 XML scripting of soap commands
US6601086B1 (en) 2003-07-29 Service provider for providing data, applications and services to embedded devices and for facilitating control and monitoring of embedded devices
EP1327348B1 (en) 2015-10-21 A method and system for remote configuration of process data access servers
US7085841B2 (en) 2006-08-01 Industrial controller interface providing standardized object access
DE60224849T2 (en) 2009-01-22 Method and device for managing tree data exchange
US6636875B1 (en) 2003-10-21 System and method for synchronizing related data elements in disparate storage systems
US8010097B2 (en) 2011-08-30 System and method for processing extensible markup language (XML) documents
US6430164B1 (en) 2002-08-06 Communications involving disparate protocol network/bus and device subsystems
EP0903889B1 (en) 2007-04-04 Internet enabled computer system management
US6370141B1 (en) 2002-04-09 Method and apparatus for configuring an internet appliance
DE69934871T2 (en) 2007-07-05 Method and system for optimally selecting a web firewall in a TCP / IP network
FI111760B (en) 2003-09-15 Wireless control of a field device in an industrial process
JP3935986B2 (en) 2007-06-27 Network information resource monitoring system for notifying changes in information resources in a network
US6356906B1 (en) 2002-03-12 Standard database queries within standard request-response protocols
US7032002B1 (en) 2006-04-18 Service broker for processing data from a data network
JP5461501B2 (en) 2014-04-02 Web interface to input / output devices
EP1020804B1 (en) 2004-11-17 A system for managing user-characterizing network protocol headers
US6751653B2 (en) 2004-06-15 Assembly of a graphical program for accessing data from a data source/target
CA2454219C (en) 2010-11-30 System and method for providing remote data access for a mobile communication device
AU2001259093B2 (en) 2007-01-04 Electronic communications in intelligent electronic devices
DE60308700T2 (en) 2007-08-16 Dynamic remote configuration of a webserver for providing capacity on request
CN1386220B (en) 2010-05-05 Automated tool management in multi-protocol environment
US6526566B1 (en) 2003-02-25 Graphical programming system and method including nodes for programmatically accessing data sources and targets
JP2004533179A (en) 2004-10-28 Apparatus and method for intelligent and secure data manipulation
Owner name: SIEMENS AKTIENGESELLSCHAFT, GERMANY
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:JURISCH, ANDREAS;SCHWENKE, MICHAEL;WALZ, STEFAN;REEL/FRAME:015593/0229
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553)
|
cc/2020-05/en_middle_0032.json.gz/line8228
|
__label__wiki
| 0.634881
| 0.634881
|
US7500154B2 - Method and system for generating a console log - Google Patents
Method and system for generating a console log Download PDF
Billy G. Moon
Marco Molteni
Mark Schnell
Cisco Technology Inc
2004-12-17 Application filed by Cisco Technology Inc filed Critical Cisco Technology Inc
2004-12-17 Assigned to CISCO TECHNOLOGY, INC. reassignment CISCO TECHNOLOGY, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MOLTENI, MARCO, MOON, BILLY G., SCHNELL, MARK
230000001360 synchronised Effects 0 claims description 8
239000002609 media Substances 0 claims 2
230000006399 behavior Effects 0 description 1
H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
H04L43/00—Arrangements for monitoring or testing packet switching networks
G06F11/00—Error detection; Error correction; Monitoring
G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
G06F11/0745—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in an input/output transactions management context
G06F11/0766—Error or fault reporting or storing
G06F11/0781—Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module, e.g. according to a severity level
A method and system are provided for generating a console log of a device (e.g., a router). During the powering on of the device, certain information may have to be written to the console log. If the information to be written is critical, the console log is generated. In case the information is non-critical, the system checks whether a console device is connected to the device. If a console device is connected to the device, the information is written to the console log. Otherwise, if there is no console device connected to the device, the information is not written to the console log.
1. Field of Invention
This invention relates in general to the boot time associated with a device. More specifically, the invention relates to methods and systems for generating the console log of a device.
2. Description of the Background Art
Hardware devices, such as routers, have the provision to access diagnostic information pertaining to the device. Apart from diagnostic information, console logs for copyright and agreement notices may also be generated by means of this provision. The diagnostic information may be generated or provided during powering on of a device, after powering on the device, or if the device sends a special message during its normal functioning. The diagnostic information is made accessible to a user by generating a console log. The device provides a console port through which the diagnostic information may be transmitted to generate the console log. The console port may consist of a Universal Asynchronous Receiver Transmitter (UART). The UART may be interrupt-driven or poll-driven. It may also contain First In First Out (FIFO) memory, which allows for more than one byte to be queued for transmission. The UART may also have associated control signals that allow the detection of a data terminal or a modem. It may support synchronous or asynchronous calls. Synchronous calls are usually used for printing critical information. However, in such a system, the powering on time of the device is increased substantially, since the information is sent to the console log during the powering on. Also, all the processes are blocked till the critical information has been written or printed to the console log. Typically, a console log printout causes a delay of a minimum of 60 milliseconds and a maximum of 700 milliseconds. Thus, critical information after booting, or any information (i.e., critical or otherwise) during booting, may be written or printed using polling in a synchronous fashion; that is, all process(es) in the platform are blocked until critical information has been written or printed to a console port. This is necessary to guarantee that any message is in fact printed during failure cases. However, this assumes that there is “listener” for the information.
What is needed is an apparatus and method for optimizing a console log by by-passing synchronous (blocking) writing or printing to the console log when no “listener” is present. What is further needed is an apparatus and method for altering or changing the behavior of a print process to a console log, and to not stop processing other tasks, after detecting that no “listener” is present.
SUMMARY OF THE EMBODIMENTS OF THE INVENTION
In one embodiment, the invention provides a method for generating a console log of a device when the device is powered on. The console log is generated in response to a request from the device to write information to the console log. The method comprises the steps of (i) checking whether the information is critical, and (ii) writing the information to the console log if it is critical. If the information is not critical, the method comprises checking for the presence of a console device attached to a console port, and by-passing writing information to the console log if the console device is not detected. Therefore, an embodiment of the present invention provides a method comprising: (i) checking whether the information is critical, (ii) writing the information to the console log if it is critical; else (iii) checking for the presence of a console device attached to a console port, and (iv) by-passing writing the information to the console log if the console device is not detected.
In another embodiment of the invention, a method for generating a console log of a device is provided. The method comprises (i) writing critical information to the console log during the powering on of the device, (ii) writing non-critical information to the console log during the powering on of the device if a console device is attached to a console port of the device, (iii) checking whether the device has a message to display once it is powered on, and (iv) writing the message to the console log if the console device is detected.
In another embodiment, the invention provides a method for generating a console log of a device when the device is powered on. The console log is generated in response to a request from the device to write information to the console log. The method comprises (i) checking for the presence of a console device attached to a console port, (ii) by-passing writing the information to the console log if the console device is not detected, and (iii) writing the information to the console log if the console device is detected.
In another embodiment, the invention provides a system for generating a console log of a device when the device is powered on. The device sends a request to write information to the console log. The system comprises (i) means for checking whether the information is critical, (ii) means for writing the information to the console log, and (iii) means for checking for the presence of a console device attached to a console port. The information is not written to the console log if the console device is not detected.
In another embodiment, the invention provides a system for generating a console log of a router. The system comprises (i) an information writer for writing information to the console log, (ii) a console checker for checking whether a console device is connected to a console port of the device, wherein the information is not written to the console log if the console device is not detected, (iii) and a message checker for checking whether the device has a message to write to the console log once it is powered on.
These provisions, together with various ancillary provisions and features that will become apparent to artisans skilled in the art, as the following description proceeds, are achieved by means of devices, assemblies, systems, and methods of embodiments of the present invention, various embodiments thereof being shown with reference to the accompanying drawings, by way of example only, wherein:
FIG. 1 illustrates a schematic diagram of the environment wherein a console log generator can be implemented, in accordance with an exemplary embodiment of the present invention.
FIG. 2 illustrates a schematic diagram of a console log generator, in accordance with an exemplary embodiment of the invention.
FIG. 3 illustrates a flow diagram describing a method for generating a console log during the powering on of a device, in accordance with an exemplary embodiment of the invention.
FIG. 4 illustrates a flow diagram describing the method for generating the console log after a request to write the information to the console log has been given, in accordance with an exemplary embodiment of the invention.
DETAILED DESCRIPTION OF THE EMBODIMENTS OF THE INVENTION
The invention provides a method and system to generate a console log for devices, such as routers. During the powering on of the device, diagnostic information relating to the device may be written to a console log. Also, after the powering on, the device may send a message that is to be written to the console log. In various embodiments of the invention, the diagnostic information may be printed by means of a console device. It is to be noted that the process of writing to the console device is hereinafter referred to as printing.
FIG. 1 illustrates a schematic diagram of the environment wherein a system for generating a console log can be implemented, in accordance with an exemplary embodiment of the present invention. The environment comprises a device 102, a console log generator 104, a console device 106, and a UART 108. Device 102 may be a router in various embodiments. It sends information to be written to a console log. The information may be diagnostic information, copyright notices or agreement notices in various embodiments of the invention. In an embodiment of the invention, the information may be classified as either critical or non-critical. Examples of critical information include fatal errors and crash stack traces or security alert. An example fatal error might be a memory fault, which would prevent the platform from booting. A crash trace might happen when a process attempts to address improper memory (software logic error) in which case a calling stack with pointers to code segments is printed so that the defect may be traced. An example of a security alert would be when the system configuration is changed or attempted to be changed. Console log generator 104 sends the information to be written in to the console log only if console device 106 is connected to a console port of device 102. Additionally, in various embodiments of the invention, console log generator 104 checks whether the information is critical or non-critical, and accordingly, sends the information to be written to console device 106. In another embodiment, UART 108 may be connected to console port of device 102. The receive data pin of UART 108 may be connected to console log generator 104. UART 102 uses console log generator to determine whether console device 106 is connected to device 102. If console device 106 is detected, a log is generated. Console device 106 may be a printer, a display device, a modem to provide remote access to the platform, a terminal server that aggregates the output of several co-located routers into a single device or a monitor that reads the console logs and takes other action such as reconfiguring the system or sounding an alarm. In one embodiment, console log generator 104 is a part of device 102.
FIG. 2 illustrates a schematic diagram of console log generator 104, in accordance with an embodiment of the invention. Console log generator 104 includes an information checker 202, an information writer 204, a console checker 206, and a message checker 208.
During the powering on, device 102 sends information that is to be written to the console log. This information may be sent in the form of data packets, each packet comprising various fields, such as a field that indicates the criticality of the information. In an embodiment, the packet may be a log-d packet. In another embodiment, the information may be sent via an application program interface (API) by an internal application. Information checker 202 checks whether the information sent by device 102 is critical or non-critical. If the information is critical, information writer 204 writes the information to the console log. If the information is non-critical, console checker 206 checks whether console device 106 is connected to a console port. In an embodiment of the invention, information checker 202 reads the data packets sent by device 102 and checks the appropriate tag of the packet, to identify whether the information is critical or not.
The console port is a part of device 102 and enables connection with console device 106. The console port includes a UART. The UART may be interrupt-driven or poll-driven.
Console checker 206 identifies the presence of console device 106 connected to device 102 by measuring the ‘idle voltage’ on a receive data pin of the console port. In one embodiment, when a console device is attached to the console port, the ‘idle voltage’ is a low reference voltage, for example, 12 V or less. In one embodiment, idle voltage is anything less than −3 volts on the device's receive data pin. The receive data pin is the pin through which the router receives data. When console device 106 is attached to the console, it is required to pull the receive data pin to −12 volts to indicate an RS232 idle condition. Console checker 206 therefore can detect when console device 106 is attached. If console device 106 is connected, then information writer 204 writes the information to the console log. In an embodiment of the invention, console checker 206 may be a comparator circuit that compares the voltage at the receive data pin of the console port with the low reference voltage. In another embodiment, devices (e.g., device 102) check whether console device 106 is sending a start bit. A start bit indicates a busy state. Either of busy or idle state indicates the presence of console device 106. Also, neither busy nor idle state indicates the absence of console device 106. In another embodiment, a timer condition may be applied during the busy state. If a signal indicates busy state for more than a given time period, then it is implied that a functioning console device 106 is not attached. The time period is typically greater than ten byte times.
Further, once device 102 is powered on, it may send a message to be written to the console log. Subsequently, message checker 208 checks whether device 102 has sent a message. In various embodiments, this check is periodically performed. In an embodiment of the present invention, message checker 208 periodically sends a polling message to device 102, to check for the information to be written to the console log. In another embodiment of the present invention, message checker 208 waits for a signal from device 102. The signal indicates the presence of information to be written into the console log.
Each of the elements of console log generator 104 can be implemented on a chip as a part of, for example, an application-specific integrated circuit and field-programmable gate arrays. Further, some of the elements of console log generator 104, for example information checker 202 can be implemented as software modules or as a combination of hardware and software modules.
FIG. 3 illustrates a flow diagram describing a method to generate the console log after a request to write the information to the console log is made, in accordance with an exemplary embodiment of the invention. At step 302, device 102 sends a request to write the information to the console log. At step 304, information checker 202 checks whether the information or the message is critical or non-critical. If the information is non-critical, console checker 206 checks the ‘idle voltage’ at the receive data pin at step 306. Based on the ‘idle voltage’, a check is carried out to identify whether a console device is connected, as shown in step 308. If a console device is connected, the information is written to the console log, as shown in step 310. If the console device is not connected, the information is not written to the console log. If it is identified at step 304 that the information is critical, then the information is directly written to the console log, as shown in step 310.
FIG. 4 illustrates a flow diagram describing the method for generating the console log during the powering on of a device, in accordance with an exemplary embodiment of the invention. Booting or powering on of the device takes place, as shown in step 402. During the powering on, device 102 sends a request to write the critical and non-critical information to the console log, as shown in steps 404 and 406, respectively. Once the request to write the information to the console log is made, the steps described in conjunction with FIG. 3 are followed. Subsequently, after the device has been powered on, for example, when ‘buginfo’ is to be written, or the synchronous output is to be specified in a command line interface of the router, message checker 208 periodically checks device 102 for new messages, as shown in step 408. If it is identified at step 410 that device 102 has a message that needs to be written to the console log, then device 102 may send a request to write the message, along with an information priority. The information priority decides whether the information is critical or non-critical. Subsequently, the message is written into the console log, if the console device is present at step 412, by following steps described in conjunction with FIG. 3.
Embodiments of the present invention have the advantage that the powering on time of device 102 is reduced. Another advantage is that device 102 does not use resources to write information to be written to the console device, unless the console device is actually connected.
Although the invention has been discussed with respect to specific embodiments thereof, these embodiments are merely illustrative and not restrictive of the invention.
Although specific protocols have been used to describe embodiments, other embodiments can use other transmission protocols or standards. Use of the terms ‘peer’, ‘client’, and ‘server’ can include any type of device, operation, or other process. The present invention can operate between any two processes or entities including users, devices, functional systems, or combinations of hardware and software. Peer-to-peer networks and any other networks or systems where the roles of client and server are switched, change dynamically, or are not even present, are within the scope of the invention.
Any suitable programming language can be used to implement the routines of the present invention including C, C++, Java, assembly language, etc. Different programming techniques such as procedural or object oriented can be employed. The routines can execute on a single processing device or multiple processors. Although the steps, operations, or computations may be presented in a specific order, this order may be changed in different embodiments. In some embodiments, multiple steps shown sequentially in this specification can be performed at the same time. The sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc. The routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing.
In the description herein for embodiments of the present invention, numerous specific details are provided, such as examples of components and/or methods, to provide a thorough understanding of the embodiments of the present invention. One skilled in the relevant art will recognize, however, that an embodiment of the invention can be practiced without one or more of the specific details, or with other apparatuses, systems, assemblies, methods, components, materials, parts, and/or the like. In other instances, well-known structures, materials or operations are not specifically shown or described in detail, to avoid obscuring aspects of the embodiments of the present invention.
Reference throughout this specification to “one embodiment”, “an embodiment”, or “a specific embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention, and not necessarily in all embodiments. Therefore, the appearance of the phrases “in one embodiment”, “in an embodiment”, or “in a specific embodiment” in various places throughout this specification do not necessarily refer to the same embodiment. Furthermore, the particular features, structures or characteristics of any specific embodiment of the present invention may be combined in any suitable manner with one or more other embodiments. It is to be understood that other variations and modifications of the embodiments of the present invention, described and illustrated herein, are possible in light of the teachings herein and are to be considered as part of the spirit and scope of the present invention.
Further, at least some of the components of an embodiment of the invention may be implemented by using a programmed general-purpose digital computer, by means of application-specific integrated circuits, programmable logic devices, field-programmable gate arrays, or by using a network of interconnected components and circuits. Connections may be wired, wireless, by modem, and so forth.
It will also be appreciated that one or more of the elements depicted in the drawings/figures can also be implemented either in a separate or integrated manner, or even removed or rendered inoperable in certain cases, as is useful, in accordance with a particular application.
Additionally, any signal arrows in the drawings/figures should be considered only as exemplary, and not limiting, unless otherwise specifically mentioned. Combinations of components or steps will also be considered as being noted, where the terminology renders the ability to separate or combine as unclear.
As used in the description herein and throughout the claims that follow, ‘a’, ‘an’, and ‘the’ includes plural references, unless the context clearly dictates otherwise. Also, as used in the description herein and throughout the claims that follow, the meaning of ‘in’ includes ‘in’ as well as ‘on’, unless the context clearly dictates otherwise.
The foregoing description of the illustrated embodiments of the present invention, including what is described in the abstract, is not intended to be exhaustive or limit the invention to the precise forms disclosed herein. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes only, various equivalent modifications are possible within the spirit and scope of the present invention, as those skilled in the relevant art will recognize and appreciate. As indicated, these modifications may be made to the present invention in light of the foregoing description of the illustrated embodiments of the present invention, and are to be included within the spirit and scope of the present invention.
Therefore, while the present invention has been described herein with reference to particular embodiments thereof, latitude of modification and various changes and substitutions are intended in the foregoing disclosures. It will be appreciated that in some instances some features of the embodiments of the invention will be employed without the corresponding use of other features, without departing from the scope and spirit of the invention, as set forth. Therefore, many modifications may be made, to adapt a particular situation or material to the essential scope and spirit of the present invention. It is intended that the invention is not limited to the particular terms used in the following claims, and/or to the particular embodiment disclosed, as the best mode contemplated for carrying out this invention. The invention will include any and all embodiments and equivalents falling within the scope of the appended claims.
1. A method for generating a console log of a device when the device is powered on, the device sending a request to write information to the console log, the method comprising:
checking whether the information is critical;
writing the information to the console log if it is critical;
checking for the presence of the console device attached to a console port to determine if the console device is able to receive the information for the console log; and
by-passing writing the information to the console log if the console device is not detected such that the by-passing of writing of the information to the console log does not block performing of one or more processes to be performed during powering on of the device.
2. The method according to claim 1 further comprises writing the information to the console log if the console device is detected.
3. The method according to claim 1, wherein the console port comprises a Universal Asynchronous Receiver Transmitter (UART).
4. The method according to claim 3, wherein the UART is poll-driven or interrupt driven.
5. The method according to claim 1, wherein the presence of the console device is detected by measuring the idle voltage at the console port.
6. The method according to claim 5, wherein the user console device is connected to the console port if the idle voltage is a low reference voltage.
7. The method according to claim 1, wherein the device is a router.
8. A method for generating a console log of a device, the method comprising:
writing critical information to the console log during the powering on of the device;
writing non-critical information to the console log during the powering on of the device if a console device is attached to a console port of the device;
by-passing writing the non-critical information to the console log if the console device is not detected such that the by-passing of writing of the information to the console log does not block performing of one or more processes to be performed during powering on of the device;
checking whether the device has a message to display once it is powered on; and
writing the message to the console log if the console device is detected.
9. The method according to claim 8, wherein the console port comprises a UART.
10. The method according to claim 9, wherein the UART is interrupt driven or poll-driven.
11. The method according to claim 8, wherein presence of the console device is detected by measuring the idle voltage at the console port.
12. The method according to claim 11, wherein the console device is connected to the console port if the idle voltage is a low reference voltage.
13. The method according to claim 8, wherein the device is a router.
14. The method according to claim 8, wherein the checking for the message is performed periodically.
15. A method for generating a console log of a device, the device sending a request to write information to the console log, the method comprising:
detecting the presence of a console device attached to a console port of the device;
by-passing writing the information to the console log if the console device is not detected such that the by-passing of writing of the information to the console log does not block performing of one or more processes to be performed during powering on of the device; and
writing the information to the console log if the console device is detected.
16. A system for generating a console log of a device when the device is powered on, the device sending a request to write information to the console log, the system comprising:
means for checking whether the information is critical;
means for writing the information to the console log; and
means for checking for the presence of a console device attached to a console port, wherein the information is not written to the console log if the console device is not detected such that not writing of the information to the console log does not block performing of one or more processes to be performed during powering on of the device.
17. The system according to claim 16, wherein the console port comprises a UART.
18. The system according to claim 16, wherein the means for checking for the presence of the console device measures the idle voltage at the console port.
19. The system according to claim 18, wherein the console device is connected to the console port if the idle voltage is a low reference voltage.
20. A system for generating a console log of a router comprising:
an information writer for writing information to the console log;
an information checker for checking whether information is critical or non-critical;
a console checker for checking whether a console device is connected to a console port of the device, wherein the information is not written to the console log if the console device is not detected such that not writing of the information to the console log does not block performing of one or more processes to be performed during powering on of the device; and
a message checker for checking whether the device has a message to write to the console log once it is powered on.
22. The system according to claim 21, wherein the UART is interrupt driven or poll-driven.
23. The system according to claim 20, wherein the presence of the console device is detected by measuring the idle voltage at the console port.
24. The system according to claim 20, wherein the message checker performs the check periodically.
25. An apparatus for generating a console log of a router comprising:
a processing system including a processor coupled to a display and user input device;
a machine-readable medium including instructions executable by the processor comprising
one or more instructions for checking whether the information is critical;
one or more instructions for writing the information to the console log; and
one or more instructions for checking for the presence of a console device attached to a console port, wherein the information is not written to the console log if the console device is not detected such that the writing of the information to the console log does not block performing of one or more processes to be performed during powering on of the device.
26. A machine-readable medium including instructions executable by the processor comprising:
27. The method of claim 1, wherein writing of the information to the log comprises a synchronous operation that blocks other operations from being performed during powering on of the device.
29. The system of claim 20, wherein writing of the information to the log comprises a synchronous operation that blocks other operations from being performed during powering on of the device.
US11/016,094 2004-12-17 2004-12-17 Method and system for generating a console log Active 2026-06-27 US7500154B2 (en)
US11/016,094 US7500154B2 (en) 2004-12-17 2004-12-17 Method and system for generating a console log
US11/016,094 Active 2026-06-27 US7500154B2 (en) 2004-12-17 2004-12-17 Method and system for generating a console log
US9170667B2 (en) 2012-06-01 2015-10-27 Microsoft Technology Licensing, Llc Contextual user interface
US9381427B2 (en) 2012-06-01 2016-07-05 Microsoft Technology Licensing, Llc Generic companion-messaging between media platforms
US5047977A (en) * 1988-04-08 1991-09-10 International Business Machines Corporation Methods of generating and retrieving error and task message records within a multitasking computer system
US20030079007A1 (en) * 2001-10-22 2003-04-24 Merkin Cynthia M. Redundant source event log
US6654915B1 (en) * 2000-09-11 2003-11-25 Unisys Corporation Automatic fault management system utilizing electronic service requests
US20050010545A1 (en) * 2003-07-08 2005-01-13 Hewlett-Packard Development Company, L.P. Method and system for managing events
US7046213B2 (en) * 2002-06-05 2006-05-16 Ibm Apparatus and method for direct manipulation of electronic information
US7111206B1 (en) * 2001-09-19 2006-09-19 Juniper Networks, Inc. Diagnosis of network fault conditions
US7213176B2 (en) * 2003-12-10 2007-05-01 Electronic Data Systems Corporation Adaptive log file scanning utility
Cisco Systems, "SFR System Functional Specification" (Paper Document), Copyright (C) 2004, 34 pages.
US9690465B2 (en) 2012-06-01 2017-06-27 Microsoft Technology Licensing, Llc Control of remote applications using companion device
US10025478B2 (en) 2012-06-01 2018-07-17 Microsoft Technology Licensing, Llc Media-aware interface
US10248301B2 (en) 2012-06-01 2019-04-02 Microsoft Technology Licensing, Llc Contextual user interface
KR100727050B1 (en) 2007-06-12 System and method for monitoring and controlling a power manageable resource
US9495180B2 (en) 2016-11-15 Optimized resource allocation for virtual machines within a malware content detection system
US6353854B1 (en) 2002-03-05 Automatic reconfiguration system for change in management servers having protocol destination addresses
US7424666B2 (en) 2008-09-09 Method and apparatus to detect/manage faults in a system
US6324644B1 (en) 2001-11-27 Network enhanced bios enabling remote management of a computer without a functioning operating system
KR100524055B1 (en) 2005-10-19 Computer system having the function of remote waking up and method for remote waking up the computer system
US6687817B1 (en) 2004-02-03 Configuration of a network device via the network
US20070088988A1 (en) 2007-04-19 System and method for logging recoverable errors
TWI229796B (en) 2005-03-21 Method and system to implement a system event log for system manageability
US8219496B2 (en) 2012-07-10 Method of and apparatus for ascertaining the status of a data processing environment
US6021493A (en) 2000-02-01 System and method for detecting when a computer system is removed from a network
US7020573B2 (en) 2006-03-28 Enhanced testing for compliance with universal plug and play protocols
US6233634B1 (en) 2001-05-15 Server controller configured to snoop and receive a duplicative copy of display data presented to a video controller
US5857074A (en) 1999-01-05 Server controller responsive to various communication protocols for allowing remote communication to a host computer connected thereto
US5852720A (en) 1998-12-22 System for storing display data during first time period prior to failure of computer and during second time period after reset of the computer
US7760769B1 (en) 2010-07-20 Serial stream filtering
US6311296B1 (en) 2001-10-30 Bus management card for use in a system for bus monitoring
US6718489B1 (en) 2004-04-06 Electronic service request generator for automatic fault management system
KR100943012B1 (en) 2010-02-18 Merging multi-line log entries
US8127015B2 (en) 2012-02-28 Alerting system, architecture and circuitry
US20020152421A1 (en) 2002-10-17 Diagnostic cage for testing redundant system controllers
US20040003322A1 (en) 2004-01-01 Method and apparatus for maintaining data integrity using a system management processor
US7260749B2 (en) 2007-08-21 Hot plug interfaces and failure handling
US7010639B2 (en) 2006-03-07 Inter integrated circuit bus router for preventing communication to an unauthorized port
CN1755644B (en) 2010-12-08 Method, system, and apparatus for providing customer product support for a software program based upon states of program execution instability
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOON, BILLY G.;MOLTENI, MARCO;SCHNELL, MARK;REEL/FRAME:016109/0439
|
cc/2020-05/en_middle_0032.json.gz/line8229
|
__label__wiki
| 0.505228
| 0.505228
|
US7788651B2 - Anonymous types - Google Patents
Anonymous types Download PDF
Expired - Fee Related, expires 2029-04-01
Henricus Johannes Maria Meijer
Brian C. Beckman
Paul A. Vick
2005-09-02 Application filed by Microsoft Corp filed Critical Microsoft Corp
2005-12-07 Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BECKMAN, BRIAN C., VICK, PAUL A., MEIJER, HENRICUS JOHANNES MARIA, SILVER, AMANDA
238000003860 storage Methods 0 claims description 12
239000002609 media Substances 0 claims description 5
230000014509 gene expression Effects 0 description 3
230000027455 binding Effects 0 description 2
238000004590 computer program Methods 0 description 2
238000005225 electronics Methods 0 description 2
239000010751 BS 2869 Class A2 Substances 0 description 1
230000004075 alteration Effects 0 description 1
238000009739 binding Methods 0 description 1
230000001131 transforming Effects 0 description 1
G06F8/00—Arrangements for software engineering
G06F8/40—Transformation of program code
G06F8/41—Compilation
G06F8/43—Checking; Contextual analysis
G06F8/436—Semantic checking
G06F8/437—Type checking
A computer-implemented system for representing data comprises a position indicator that indicates a position of a datum within a group, a name indicator that optionally names the datum, and a value of the datum. A type to be assigned to the datum is derived from at least one of a name of the datum and the position of the datum within the group. Methods of using the system are also provided.
Many modern programming languages support the concept of types. A type usually is statically assigned to some programming construct when source code that implements a programming construct is translated by a compiler into an executable computer program, that is, at compile time. This procedure is often called early binding. Alternatively, a type often can be late bound or assigned once enough information about the programming construct is known to be able to derive or deduce the appropriate type for that programming construct. Some high-level programming languages, along with compilers that support those languages, can support both early and late bindings.
Computing systems increasingly must work with data from diverse sources. Often the data with which these systems must work is in a variety of different formats and representations. Each of these formats and representations has its own strengths and weaknesses. Choice among formats is a common problem encountered by software developers.
Among the most popular of formats for data are formats based upon a relational data model. This model is commonly applied in relational databases that often allow queries of stored data using an implementation of a relational calculus. Query results often imply a projection of members of various source values into a new target value. Software developers often find it inconvenient or impractical to project into a named or nominal type. Current systems commonly require use of named or nominal types and fail to provide an effective alternative to ease programming burdens for software developers.
The following presents a simplified summary in order to provide a basic understanding and high-level survey. This summary is not an extensive overview. It is neither intended to identify key or critical elements nor to delineate scope. The sole purpose of this summary is to present some concepts in a simplified form as a prelude to the more detailed description later presented. Additionally, section headings used herein are provided merely for convenience and should not be taken as limiting in any way.
An anonymous type can be constructed from an access list of ordered name-value pairs. The anonymous type is both expressible and denotable, allowing for use in programming languages. This programming construct can be used to access data in situations when a programmer does not desire to declare a new type or simply desires the flexibility afforded by an anonymous type.
Members of an anonymous type can be assigned types by using named access of members or indexed (positional) access. Names of members can be duplicated, allowing for ready use with data sources such as XML documents that allow for name duplication. Members can also be unnamed. Positional access can be absolute in the sense that each member occupies an ordered position or relative in the sense that members sharing a duplicated name each have an index relative to others with that name.
The disclosed and described components and methods comprise one or more of the features hereinafter described and particularly pointed out in the claims. The following description and the annexed drawings set forth in detail certain specific illustrative components and methods. However, these components and methods are indicative of but a few of the various ways in which the disclosed components and methods can be employed. Specific implementations of the disclosed and described components and methods can include some, many, or all of such components and methods, as well as their equivalents. Variations of the specific implementations and examples presented herein will become apparent from the following detailed description when considered in conjunction with the drawings.
FIG. 1 is a block diagram of an assignment list.
FIG. 2 is a system block diagram of an association list.
FIG. 3 is a system block diagram of a cross-assembly interface system.
FIG. 4 is a system block diagram of a compiler system.
FIG. 5 is a flow diagram depicting a general processing flow of a method that can be employed in accordance with components that are disclosed and described herein.
FIG. 7 is a block diagram of an exemplary computing environment.
FIG. 8 is a system block diagram of an exemplary networking environment.
As used in this application, the terms “component,” “system,” “module,” and the like are intended to refer to a computer-related entity, such as hardware, software (for instance, in execution), and/or firmware. For example, a component can be a process running on a processor, a processor, an object, an executable, a program, and/or a computer. Also, both an application running on a server and the server can be components. One or more components can reside within a process and a component can be localized on one computer and/or distributed between two or more computers.
Disclosed components and methods are described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the disclosed subject matter. It may be evident, however, that certain of these specific details can be omitted or combined with others in a specific implementation. In other instances, certain structures and devices are shown in block diagram form in order to facilitate description. Additionally, although specific examples set forth may use terminology that is consistent with client/server architectures or may even be examples of client/server implementations, skilled artisans will appreciate that the roles of client and server may be reversed, that the disclosed and described components and methods are not limited to client/server architectures and may be readily adapted for use in other architectures, specifically including peer-to-peer (P2P) architectures, without departing from the spirit or scope of the disclosed and described components and methods. Further, it should be noted that although specific examples presented herein include or reference specific components, an implementation of the components and methods disclosed and described herein is not necessarily limited to those specific components and can be employed in other contexts as well.
It should also be appreciated that although specific examples presented may describe or depict systems or methods that are based upon components of personal computers, the use of components and methods disclosed and described herein is not limited to that domain. For example, the disclosed and described components and methods can be used in a distributed or network computing environment. Additionally or alternatively, the disclosed and described components and methods can be used on a single server accessed by multiple clients. Those of ordinary skill in the art will readily recognize that the disclosed and described components and methods can be used to create other components and execute other methods on a wide variety of computing devices.
FIG. 1 is a block diagram of an assignment list 100. The assignment list 100 can be used to create ordered name-value pairs that can describe some datum. These ordered name-value pairs can be used to assign a type to a datum.
The assignment list 100 includes a plurality of rows. Each row 110, 120, 130 of the plurality of rows includes a position field 140, a name field 150, and a value field 160. This configuration can provide a flexible framework for indexed access of name-value pairs. Also, this configuration can be used to access metadata that can be used by a compiler to assign a type to a specific name-value pair. Such a scheme can be used when working with relational data, among other forms of data.
When using relational data, programmers can use a query language such as the structured query language (SQL) or another suitable language. When so doing, programmers ideally would like to write queries in a form similar to the following.
Select name, age From Customers Where Customers.age > 42
A query of this form can return a value that has a name field and an age field. This returned value can be used to create a tuple. However, the constructed tuple, as well as its name and age fields, has no named type.
Metadata can be used to derive or deduce a type for the tuple or its fields, or both. For example, the value “3” can have a type Integer. The value “True” can have a type Boolean. Similarly data rows or tuples can be assigned types based upon values. Consider the following data row.
Name=“Erik”, Age=42
This data row can be given the following type description.
{Name As String, Age As Integer}
The given type description can be used as a notation for a type.
Throughout this disclosure, such types are sometimes referred to as anonymous types. Anonymous types can be described as having two main features. First, such types are expressible. It is possible to construct an expression whose value is an association list. Second, anonymous types are denotable. It is possible to declare a variable whose type is an association list. The following exemplary code segment can further illustrate these points.
A query can be written as follows.
Dim R = Select { Name = C.Name Age = C.Age } From C in Customers Where C.Age > 42
Applying the previously presented type description, this query can result in R having the following type.
IEnumerable (Of { Name As String, Age As Integer } )
FIG. 2 is a block diagram of an association list 200. The association list 200 includes ordered rows 210, 220, 230, 240 of name-value pairs. Each row 210, 220, 230, 240 of name-value pairs includes a position 250, a name 260, and a value 270. Each row 210, 220, 230, 240 also has an associated first type 280 or a second type 290. As illustrated, names can be duplicated. Usually, such name duplication is prohibited, especially in data sources like relational databases where column names within a table must be unique. However, such name duplication is common in data sources created using extensible markup language (XML).
Consider the following exemplary code segment that illustrates name duplication.
Dim Verse = { .A = “I”, .B = “am”, .B = “not the”, .A = “Dancing Queen” }
This code segment can correspond to the following segment from an XML data document.
<Verse> <A> I </A> <B> am </B> <B> not the </B> <A> Dancing Queen </A> </Verse>
The allowance of name duplication can give rise to a need for an ability to disambiguate names so that each name can be uniquely identified. This need can be addressed at the programming language level by providing indices for members of Verse. For example, to access “I”, a value can be obtained by accessing Verse (0) to obtain a value from the zero-th position ofVerse. Verse (2) can yield the value not the. Alternatively or additionally, Verse. A (0) can be accessed as the zero-th position A. Accessing Verse. A (1) would similarly yield the value Dancing Queen.
Unnamed values can also be allowed. Consider the following exemplary code segment.
Dim Pair={True, 3.14}
Types of the members of Pair are Boolean and Float, respectively. Also, the type of Pair itself is {Boolean, Float}. In this specific example, order of members matters. Members are unnamed, therefore named access is unavailable. Positional access can be used to obtain a value of each member and assign a type to a member.
To support use of unnamed members, compiler-generated names or hidden names can be used as part of the implementation. For example, the following can be implemented as part of a compiler to account for the members of Pair.
{ Foo$5 = true Foo$8 = 3.14 }
The concepts and examples presented above can also be combined. For instance, a declared item can include not only unnamed members but also duplicate names of members. In such case, positional access, either absolute or relative can be used to obtain information from or about the members. In this context, absolute indexing can refer to indexing based upon all members of an object. Relative indexing can refer to indexing of members having duplicated names.
Indexing in this manner can also be used when members have the same duplicated name but different types. For example, consider the following type description.
{A As Boolean, A As String}
A compiler that supports positional access in the manner disclosed and described herein can be used to provide different types for members having the same name. If a static type of a member is known at compile time, that type can be early bound. For example, consider the following exemplary code segment based upon the foregoing Verse example.
Dim Line=Verse.A (0)
Line has type String because A (0) has type String. If this fact is known at compile time, the String type can be early bound. If not, type Object can be used.
Because members are ordered, positional access can be used. If the index is known statically, the compiler can return the known type. If the index is not known statically, the type can be Object. If a name is specified, and that name is unique, then it is possible to know statically the type of the named member. If the name is a duplicate, it is possible to index further. If the index is statically known, the compiler will know the type. If not, the type can be Object. In a case where a member is unnamed, a positional index can be used. If that index is known statically, the type is known. If not, the type can be Object.
Another example follows. Consider the following exemplary code segment of a type description.
X As { . . ., A As TA0, . . . // ith member . . ., A As TA1, . . . // jth member . . ., B As TB, . . . // kth member . . ., TC, . . . // lth member }
Using indexed access, X (I), I can be a compile-time constant. In this case, it can be determined that the type of X (j) is X (j ) As TA1. Alternatively, when the compiler works with X (E) where E is some expression, X (E) can be typed as Object. Using named access, when unique names are used, X.B As TB is evident. When duplicate names are used, relative indexing can be used. Here, in the case of X.A (I) where I is a compile-time constant, X.A (0) As TA0. Where I is not a compile-time constant, X.A (E) As Object.
Implementation of anonymous types can take a variety of forms. Such forms can be largely dependent upon choices of a specific implementer, including choice of a specific programming language with which anonymous types are to be used. Among possible implementations are those that use a designated interface class. Also possible are implementations that use a special compiler-only class. Erasure methods can also be applied as part of the implementation.
Consider the following exemplary code segment.
Dim X As {Name As String, Age As Integer} // erasure to: Dim X As IAssociationList or Dim X As Object
In this example, the runtime environment does not know anything about the type {Name As String, Age As Integer}. Erasure is used to obtain a type that can be directly supported. Erasure can be to any interface that can support an association list or even to just the Object base type. The compiler tracks X for typing.
X.Name // is erased to CType (X.[“Name”], String)
To implement association lists, a compiler may have one class that implements an interface to be used in all cases. The compiler knows statically that it needs to convert an anonymous type and can generate a class that implements IAssociationList in response to handling an association list in code. For example, the following approach shown in an exemplary code segment can be used.
Class SpecialClass Implements IAssociationList Dim Name As String Dim Age As Integer . . . End Class
The compiler can then directly access its own implementation.
The interface is some appropriate interface that allows for support of all necessary operations. Code written and compiled can be compiled into an assembly for a runtime environment. Multiple assemblies can exist and can be compiled from the same source code. Consider two assemblies, A1 and A2.
A1: Class C Dim X As Int End Class A2: Class C Dim X As Int End Class
A1.C is not the same as A2.C. The runtime environment sees the types as different because types are normally restricted within an assembly. To avoid this problem, both classes implement IAssociationList as a type of a third assembly to be able to pass types between assemblies. The approach can be used to provide a type that can be used across any boundary within which types are usually restricted. Use of a common interface or base type in this manner can avoid the need for structural types.
FIG. 3 is a system block diagram of a cross-assembly interface system 300. The cross-assembly interface system 300 can provide a uniform or common type view for association lists across assemblies. Additionally or alternatively, the cross-assembly interface system 300 can be used to provide a uniform or common type view for association lists across any boundary that constrains types.
A compiler 310 can support a high-level programming language and specifically can translate computer source code written in that high-level programming language into machine-executable code. The compiler 310 can access a type library 320 as part of that conversion to obtain any needed typing information. Source code can be compiled into assemblies 330, 340. Assemblies 330, 340 can be created from the same source code or from different sources of code. An interface 350 can provide a common typed view to the assemblies 330, 340 such that both assemblies 330, 340 see instances of that interface as the same type.
FIG. 4 is a system block diagram of a compiler system 400 that can implement association lists. The compiler system 400 can be used to generate compiled code from source code that includes anonymous types. The system 400 includes a compiler 410. The compiler 410 can support a high-level programming language and specifically can convert source code written in that supported high-level programming language to machine-executable code. As part of that conversion, the compiler can implement anonymous types in at least one of the ways disclosed and described previously.
Source code 420 can include an association list. This source code can be an input for the compiler 410 as part of a conversion to machine-executable code or other creation of an executable software program. The compiler 410 can also access a type library 430 as part of its operation when assigning types to programming constructs included in the source code 420. The compiler 410 can output compiled code 440.
In operation, the compiler system 400 can function as follows. The compiler 410 accesses the source code 420 and begins processing the source code 420 by scanning and parsing the code. When the compiler 410 identifies an anonymous type, the compiler 410 can implement the anonymous type in one of the ways mentioned in conjunction with earlier figures. As part of that implementation, the compiler 410 can access a type library 430 to obtain needed type information. The compiler 410 outputs compiled code 440 that can be executed by a computer.
With reference to FIGS. 5-7, flowcharts in accordance with various methods or procedures are presented. While, for purposes of simplicity of explanation, the one or more methodologies shown herein, for example, in the form of a flow chart, are shown and described as a series of acts, it is to be understood and appreciated that neither the illustrated and described methods and procedures nor any components with which such methods or procedures can be used are necessarily limited by the order of acts, as some acts may occur in a different order and/or concurrently with other acts from that shown and described herein. For example, those skilled in the art will understand and appreciate that a methodology could alternatively be represented as a series of interrelated states or events, such as in a state diagram. Moreover, not all illustrated acts may be required to implement a methodology or procedure.
FIG. 5 is a flow diagram depicting a general processing flow of a method 500 that can be employed in accordance with components that are disclosed and described herein. The method 500 can be used to assign type information to a programming construct. Specifically, the method 500 can be used to discern a type based upon positional information.
Processing of the method 500 begins at START block 510 and continues to process block 520. At process block 520, information about the position of a member of an object is obtained. This positional information can specifically include a value of an absolute or relative index of the member or an expression that can be evaluated to provide such a value. Processing continues to decision block 530 where a determination is made whether the positional information is a compile-time constant. If this determination is yes, processing of the method 500 continues to process block 540. At process block 540, information regarding the member located at the index value is accessed. A type of that member that is statically known is determined at process block 550. That type is returned at process block 560.
If the determination made at decision block 530 is no, processing of the method 500 continues to process block 570. At process block 570, a general or default type of Object is returned. Processing from either process block 560 or process block 570 terminates at END block 580.
FIG. 6 is a flow diagram depicting a general processing flow of a method 600 that can be employed in accordance with components that are disclosed and described herein. The method 600 can be used to assign type information to a programming construct. Specifically, the method 600 can be used to discern a type based upon name information.
Processing of the method 600 begins at START block 610 and continues to process block 620. At process block 620, a name of a member of an object is obtained. At decision block 630, a determination is made whether the name of the member is a duplicated name. If yes, processing of the method 600 continues to process block 640. At process block 640, index information about the named member is obtained. An index-based type check is performed at process block 650 to determine a type of the named member. Specifically, any of the index-based type checks previously disclosed and described in conjunction with other figures can be used. Another suitable index-based type check can also be used.
If the determination made at decision block 630 is no, indicating that a unique name is used for the member, processing continues to process block 660 where a type of the member is obtained. Processing from either process block 650 or process block 660 continues to process block 670 where the obtained type of the member is returned. Processing concludes at END block 680.
In order to provide additional context for implementation, FIGS. 7-8 and the following discussion is intended to provide a brief, general description of a suitable computing environment within which disclosed and described components and methods can be implemented. While various specific implementations have been described above in the general context of computer-executable instructions of a computer program that runs on a local computer and/or remote computer, those skilled in the art will recognize that other implementations are also possible either alone or in combination with other program modules. Generally, program modules include routines, programs, components, data structures, etc. that perform particular tasks and/or implement particular abstract data types.
Moreover, those skilled in the art will appreciate that the above-described components and methods may be practiced with other computer system configurations, including single-processor or multi-processor computer systems, minicomputers, mainframe computers, as well as personal computers, hand-held computing devices, microprocessor-based and/or programmable consumer electronics, and the like, each of which may operatively communicate with one or more associated devices. Certain illustrated aspects of the disclosed and described components and methods may also be practiced in distributed computing environments where certain tasks are performed by remote processing devices that are linked through a communications network or other data connection. However, some, if not all, of these aspects may be practiced on stand-alone computers. In a distributed computing environment, program modules may be located in local and/or remote memory storage devices.
With reference to FIG. 7, an exemplary environment 700 for implementing various aspects of the invention includes a computer 712. The computer 712 includes a processing unit 714, a system memory 716, and a system bus 718. The system bus 718 couples system components including, but not limited to, the system memory 716 to the processing unit 714. The processing unit 714 can be any of various available processors. Dual microprocessors and other multiprocessor architectures also can be employed as the processing unit 714.
The system bus 718 can be any of several types of bus structure(s) including the memory bus or memory controller, a peripheral bus or external bus, and/or a local bus using any variety of available bus architectures including, but not limited to, Industrial Standard Architecture (ISA), Micro-Channel Architecture (MSA), Extended ISA (EISA), Intelligent Drive Electronics (IDE), VESA Local Bus (VLB), Peripheral Component Interconnect (PCI), Card Bus, Universal Serial Bus (USB), Advanced Graphics Port (AGP), Personal Computer Memory Card International Association bus (PCMCIA), Firewire (IEEE 1394), and Small Computer Systems Interface (SCSI).
The system memory 716 includes volatile memory 720 and nonvolatile memory 722. The basic input/output system (BIOS), containing the basic routines to transfer information between elements within the computer 712, such as during start-up, is stored in nonvolatile memory 722. By way of illustration, and not limitation, nonvolatile memory 722 can include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory 720 includes random access memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as synchronous RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).
Computer 712 also includes removable/non-removable, volatile/non-volatile computer storage media. For example, FIG. 7 illustrates a disk storage 724. The disk storage 724 includes, but is not limited to, devices like a magnetic disk drive, floppy disk drive, tape drive, Jaz drive, Zip drive, LS-100 drive, flash memory card, or memory stick. In addition, disk storage 724 can include storage media separately or in combination with other storage media including, but not limited to, an optical disk drive such as a compact disk ROM device (CD-ROM), CD recordable drive (CD-R Drive), CD rewritable drive (CD-RW Drive) or a digital versatile disk ROM drive (DVD-ROM). To facilitate connection of the disk storage devices 724 to the system bus 718, a removable or non-removable interface is typically used such as interface 726.
It is to be appreciated that FIG. 7 describes software that acts as an intermediary between users and the basic computer resources described in the suitable operating environment 700. Such software includes an operating system 728. The operating system 728, which can be stored on the disk storage 724, acts to control and allocate resources of the computer system 712. System applications 730 take advantage of the management of resources by operating system 728 through program modules 732 and program data 734 stored either in system memory 716 or on disk storage 724. It is to be appreciated that the subject invention can be implemented with various operating systems or combinations of operating systems.
A user enters commands or information into the computer 712 through input device(s) 736. The input devices 736 include, but are not limited to, a pointing device such as a mouse, trackball, stylus, touch pad, keyboard, microphone, joystick, game pad, satellite dish, scanner, TV tuner card, digital camera, digital video camera, web camera, and the like. These and other input devices connect to the processing unit 714 through the system bus 718 via interface port(s) 738. Interface port(s) 738 include, for example, a serial port, a parallel port, a game port, and a universal serial bus (USB). Output device(s) 740 use some of the same type of ports as input device(s) 736. Thus, for example, a USB port may be used to provide input to computer 712, and to output information from computer 712 to an output device 740. Output adapter 742 is provided to illustrate that there are some output devices 740 like monitors, speakers, and printers, among other output devices 740, which require special adapters. The output adapters 742 include, by way of illustration and not limitation, video and sound cards that provide a means of connection between the output device 740 and the system bus 718. It should be noted that other devices and/or systems of devices provide both input and output capabilities such as remote computer(s) 744.
Computer 712 can operate in a networked environment using logical connections to one or more remote computers, such as remote computer(s) 744. The remote computer(s) 744 can be a personal computer, a server, a router, a network PC, a workstation, a microprocessor based appliance, a peer device or other common network node and the like, and typically includes many or all of the elements described relative to computer 712. For purposes of brevity, only a memory storage device 746 is illustrated with remote computer(s) 744. Remote computer(s) 744 is logically connected to computer 712 through a network interface 748 and then physically connected via communication connection 750. Network interface 748 encompasses wire and/or wireless communication networks such as local-area networks (LAN) and wide-area networks (WAN). LAN technologies include Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet, Token Ring and the like. WAN technologies include, but are not limited to, point-to-point links, circuit switching networks like Integrated Services Digital Networks (ISDN) and variations thereon, packet switching networks, and Digital Subscriber Lines (DSL).
Communication connection(s) 750 refers to the hardware/software employed to connect the network interface 748 to the bus 718. While communication connection 750 is shown for illustrative clarity inside computer 712, it can also be external to computer 712. The hardware/software necessary for connection to the network interface 748 includes, for exemplary purposes only, internal and external technologies such as, modems including regular telephone grade modems, cable modems and DSL modems, ISDN adapters, and Ethernet cards.
FIG. 8 is a schematic block diagram of a sample-computing environment 800 within which the disclosed and described components and methods can be used. The system 800 includes one or more client(s) 810. The client(s) 810 can be hardware and/or software (for example, threads, processes, computing devices). The system 800 also includes one or more server(s) 820. The server(s) 820 can be hardware and/or software (for example, threads, processes, computing devices). The server(s) 820 can house threads or processes to perform transformations by employing the disclosed and described components or methods, for example.
One possible means of communication between a client 810 and a server 820 can be in the form of a data packet adapted to be transmitted between two or more computer processes. The system 800 includes a communication framework 840 that can be employed to facilitate communications between the client(s) 810 and the server(s) 820. The client(s) 810 are operably connected to one or more client data store(s) 850 that can be employed to store information local to the client(s) 810. Similarly, the server(s) 820 are operably connected to one or more server data store(s) 830 that can be employed to store information local to the server(s) 840.
What has been described above includes examples of the subject invention. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the subject invention, but one of ordinary skill in the art may recognize that many further combinations and permutations of the subject invention are possible. Accordingly, the subject invention is intended to embrace all such alterations, modifications, and variations that fall within the spirit and scope of the appended claims.
In particular and in regard to the various functions performed by the above described components, devices, circuits, systems and the like, the terms (including a reference to a “means”) used to describe such components are intended to correspond, unless otherwise indicated, to any component which performs the specified function of the described component (e.g., a functional equivalent), even though not structurally equivalent to the disclosed structure, which performs the function in the herein illustrated exemplary aspects of the invention. In this regard, it will also be recognized that the invention includes a system as well as a computer-readable medium having computer-executable instructions for performing the acts and/or events of the various methods of the invention.
In addition, while a particular feature of the invention may have been disclosed with respect to only one of several implementations, such feature may be combined with one or more other features of the other implementations as may be desired and advantageous for any given or particular application. Furthermore, to the extent that the terms “includes,” and “including” and variants thereof are used in either the detailed description or the claims, these terms are intended to be inclusive in a manner similar to the term “comprising.”
1. A computer-implemented system for compiling code segments, the system comprising:
a computer-readable storage medium having stored thereon a computer-executable compiler component, the compiler component configured to compile one or more code segments into assembly code, the one or more code segments including:
a variable name assigned to an anonymous type that does not have a defined type prior to being compiled, the anonymous type including a plurality of fields including:
a first field named a first name;
a second field named the first name;
a third field named a second name; and
a fourth field named the second name; and
a combined reference to the variable name and the first name of the first and second fields of the anonymous structure, the combined reference including a position indicator applied to the first name in the combined reference, the position indicator being configured to indicate a position of one of the first and second fields relative to the other of the first and second fields, but not relative to the plurality of named fields as a whole;
wherein the compiler component compiles the anonymous type by converting the anonymous type into an instance of a class that implements the lAssociationList interface such that the compiled anonymous type is accessible across assembly boundaries during runtime.
2. The system of claim 1, wherein the position indicator, which is configured to indicate the position of one of the first and second fields relative to the other of the first and second fields, but not relative to the plurality of named fields as a whole, causes the combined reference to return an individual value of the first or second field that is at the position indicated by the position indicator, but not return both values of the first and second fields.
3. The system of claim 1, wherein the plurality of fields include one or more unnamed fields, and wherein the compiler component generates hidden names to assign to the unnamed fields during compilation.
4. A method for compiling code segments, the method comprising:
receiving, at a compiler, one or more code segments that include an anonymous type comprising a variable name assigned to a plurality of fields, the anonymous type not having a defined type prior to being compiled, wherein the plurality of fields includes:
wherein the one or more code segments further include a combined reference to the variable name and the first name of the first and second fields of the anonymous structure, the combined reference including a position indicator applied to the first name in the combined reference, the position indicator being configured to indicate a position of one of the first and second fields relative to the other of the first and second fields, but not relative to the plurality of named fields as a whole; and
compiling the one or more code segments including compiling the anonymous type by converting the anonymous type into an instance of a class that implements the lAssociationList interface such that the compiled anonymous type is accessible across assembly boundaries during runtime.
5. The method of claim 4, wherein the position indicator, which is configured to indicate the position of one of the first and second fields relative to the other of the first and second fields, but not relative to the plurality of named fields as a whole, causes the combined reference to return an individual value of the first or second field that is at the position indicated by the position indicator, but not return both values of the first and second fields.
6. The method of claim 4, wherein the plurality of fields include one or more unnamed fields, and wherein the compiler component generates hidden names to assign to the unnamed fields during compilation.
a processor; and
system memory storing a compiler component that is configured to compile one or more code segments into assembly code, the one or more code segments including:
US11/219,256 2005-09-02 2005-09-02 Anonymous types Expired - Fee Related US7788651B2 (en)
US11/219,256 US7788651B2 (en) 2005-09-02 2005-09-02 Anonymous types
US11/219,256 Expired - Fee Related US7788651B2 (en) 2005-09-02 2005-09-02 Anonymous types
US7788651B2 (en) * 2005-09-02 2010-08-31 Microsoft Corporation Anonymous types
US7519606B2 (en) * 2006-01-31 2009-04-14 International Business Machines Corporation Schema mapping specification framework
US8954939B2 (en) * 2012-12-31 2015-02-10 Microsoft Corporation Extending a development environment
US6112199A (en) * 1995-10-18 2000-08-29 Nelson; Paul M. Data item values
US20020138819A1 (en) * 2000-12-19 2002-09-26 Hills Theodore S. Computer programming language to describe and encapsulate a computer as a set of classes and objects
US20020147725A1 (en) * 2001-04-05 2002-10-10 Sun Microsystems, Inc. Method and apparatus for database table definition
US20030037051A1 (en) * 1999-07-20 2003-02-20 Gruenwald Bjorn J. System and method for organizing data
US6708222B1 (en) * 1997-05-01 2004-03-16 Microsoft Corporation Method and system for locating enclosing owners of embedded objects
US20040268307A1 (en) * 2003-06-27 2004-12-30 Microsoft Corporation Representing type information in a compiler and programming tools framework
US20050177578A1 (en) * 2004-02-10 2005-08-11 Chen Yao-Ching S. Efficient type annontation of XML schema-validated XML documents without schema validation
US20050246716A1 (en) * 2001-07-10 2005-11-03 Microsoft Corporation Application program interface for network software platform
US7047249B1 (en) * 1998-12-22 2006-05-16 Computer Associates Think, Inc. Method and apparatus for executing stored code objects in a database
US20060179075A1 (en) * 2005-02-07 2006-08-10 Fay Jonathan E Method and system for obfuscating data structures by deterministic natural data substitution
US20060195460A1 (en) * 2005-02-28 2006-08-31 Microsoft Corporation Data model for object-relational data
US20060212861A1 (en) * 2005-03-18 2006-09-21 Microsoft Corporation Typed intermediate representation for object-oriented languages
US20060288345A1 (en) * 1999-07-16 2006-12-21 Rice Todd M Fault tolerant and combinatorial software environment system, method and medium
US20070006141A1 (en) * 2005-06-30 2007-01-04 Gilad Bracha Introspection support for local and anonymous classes
US20070027862A1 (en) * 2005-07-29 2007-02-01 Microsoft Corporation Anonymous types for statically typed queries
US20070055962A1 (en) * 2005-09-02 2007-03-08 Microsoft Corporation Anonymous types
US7275079B2 (en) * 2000-08-08 2007-09-25 International Business Machines Corporation Common application metamodel including C/C++ metamodel
US7389498B2 (en) * 2003-03-25 2008-06-17 Microsoft Corporation Core object-oriented type system for semi-structured data
US7669184B2 (en) * 2005-06-30 2010-02-23 Sun Microsystems, Inc. Introspection support for local and anonymous classes
Dare Obasanjo, Introducing Comega, Jan. 12, 2005, Published on XML.com, pp. 1-12. *
Patrick Smacchia; Introduction to C# Anonymous Methods; Dec. 28, 2004; TheServerSide.NET; pp. 1-14. *
Leino et al. 2004 Object invariants in dynamic contexts
Grant et al. 2000 DyC: an expressive annotation-directed dynamic compiler for C
Smith et al. 1998 Heterogeneous process migration: The Tui system
US6286134B1 (en) 2001-09-04 Instruction selection in a multi-platform environment
US7996388B2 (en) 2011-08-09 Adding new continuous queries to a data stream management system operating on existing queries
US6954748B2 (en) 2005-10-11 Remote data access and integration of distributed data sources through data schema and query abstraction
US7805435B2 (en) 2010-09-28 Transformation of a physical query into an abstract query
US7539688B2 (en) 2009-05-26 Systems and methods for supporting inheritance for user-defined types
US6163776A (en) 2000-12-19 System and method for exchanging data and commands between an object oriented system and relational system
US7024417B1 (en) 2006-04-04 Data mining framework using a signature associated with an algorithm
US7526468B2 (en) 2009-04-28 System and method for recursive path analysis of DBMS procedures
US7526503B2 (en) 2009-04-28 Interactive schema translation with instance-level mapping
US7219330B2 (en) 2007-05-15 Extensible metadata
JP5255000B2 (en) 2013-08-07 Query pattern to enable type flow of element types
US7984043B1 (en) 2011-07-19 System and method for distributed query processing using configuration-independent query plans
US5940819A (en) 1999-08-17 User specification of query access paths in a relational database management system
US5987455A (en) 1999-11-16 Intelligent compilation of procedural functions for query processing systems
JP2006244498A (en) 2006-09-14 Data model for object relational data
US7103590B1 (en) 2006-09-05 Method and system for pipelined database table functions
US7096229B2 (en) 2006-08-22 Dynamic content generation/regeneration for a database schema abstraction
US7254810B2 (en) 2007-08-07 Apparatus and method for using database knowledge to optimize a computer program
US7454413B2 (en) 2008-11-18 Query expressions and interactions with metadata
US5504885A (en) 1996-04-02 O-R gateway: a system for connecting object-oriented application programs and relational databases
US7461052B2 (en) 2008-12-02 Abstract query plan
US6108659A (en) 2000-08-22 Method and apparatus for executing stored code objects in a database
Owner name: MICROSOFT CORPORATION, WASHINGTON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MEIJER, HENRICUS JOHANNES MARIA;BECKMAN, BRIAN C.;VICK, PAUL A.;AND OTHERS;REEL/FRAME:016861/0170;SIGNING DATES FROM 20050901 TO 20050902
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MEIJER, HENRICUS JOHANNES MARIA;BECKMAN, BRIAN C.;VICK, PAUL A.;AND OTHERS;SIGNING DATES FROM 20050901 TO 20050902;REEL/FRAME:016861/0170
2014-08-31 LAPS Lapse for failure to pay maintenance fees
2014-09-29 STCH Information on status: patent discontinuation
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362
2014-10-21 FP Expired due to failure to pay maintenance fee
|
cc/2020-05/en_middle_0032.json.gz/line8230
|
__label__cc
| 0.622578
| 0.377422
|
US9594427B2 - Finger tracking - Google Patents
Finger tracking Download PDF
Nissanka Arachchige Bodhi Priyantha
Jie Liu
2014-05-23 Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
2014-05-23 Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: PRIYANTHA, NISSANKA ARACHCHIGE BODHI, LIU, JIE
210000002435 Tendons Anatomy 0 abstract claims description 22
238000004458 analytical methods Methods 0 claims description 10
239000004984 smart glasses Substances 0 claims description 10
230000036410 touch Effects 0 description 35
230000003993 interaction Effects 0 description 11
230000001133 acceleration Effects 0 description 8
230000001939 inductive effects Effects 0 description 5
238000003306 harvesting Methods 0 description 4
238000010079 rubber tapping Methods 0 description 3
239000008264 clouds Substances 0 description 2
229920002574 CR-39 Polymers 0 description 1
241000854491 Delta Species 0 description 1
210000004247 Hand Anatomy 0 description 1
210000001503 Joints Anatomy 0 description 1
210000000707 Wrist Anatomy 0 description 1
230000003139 buffering Effects 0 description 1
239000011162 core materials Substances 0 description 1
239000010432 diamond Substances 0 description 1
239000010437 gem Substances 0 description 1
239000010977 jade Substances 0 description 1
230000003278 mimic Effects 0 description 1
239000011707 mineral Substances 0 description 1
230000000704 physical effects Effects 0 description 1
230000011218 segmentation Effects 0 description 1
230000007958 sleep Effects 0 description 1
210000001519 tissues Anatomy 0 description 1
238000007514 turning Methods 0 description 1
239000011089 white board Substances 0 description 1
238000004804 winding Methods 0 description 1
G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
G06F3/011—Arrangements for interaction with the human body, e.g. for user immersion in virtual reality
G06F3/014—Hand-worn input/output arrangements, e.g. data gloves
G06F1/00—Details not covered by groups G06F3/00 – G06F13/00 and G06F21/00
G06F1/16—Constructional details or arrangements
G06F1/1613—Constructional details or arrangements for portable computers
G06F1/163—Wearable computers, e.g. on a belt
G06F1/1633—Constructional details or arrangements of portable computers not specific to the type of enclosures covered by groups G06F1/1615 - G06F1/1626
G06F1/1684—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675
G06F1/1698—Constructional details or arrangements related to integrated I/O peripherals not covered by groups G06F1/1635 - G06F1/1675 the I/O peripheral being a sending/receiving arrangement to establish a cordless communication link, e.g. radio or infrared link, integrated cellular phone
G06F3/017—Gesture based interaction, e.g. based on a set of recognized hand gestures
G06F3/03—Arrangements for converting the position or the displacement of a member into a coded form
G06F3/041—Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
G06F2203/00—Indexing scheme relating to G06F3/00 - G06F3/048
G06F2203/033—Indexing scheme relating to G06F3/033
G06F2203/0331—Finger worn pointing device
The description relates to smart rings. One example can include a finger band configured to accommodate a user's finger. This example can also include a set of pressure sensors positioned on an inner surface of the finger band and configured to sense changes to tendons of the user's finger as pressure differentials and to output associated signals. The example can further include a gesture component configured to interpret the signals from the set of pressure sensors to identify individual actions performed by the user's finger.
Increasingly users interact with their mobile devices on the go. Many users continuously utilize various device applications. For instance, users listen to music on mobile devices while traveling, and constantly check E-mails. Shoppers browse through their shopping lists and do price comparisons while shopping, among others.
Interacting with mobile devices on-the-go tends to require the user to enter different gestures to scroll, zoom, flip, and/or enter text on graphical user interface (GUI) elements. The smart phone with its relatively large display has provided a unified and convenient platform for such interactions. However, more recent trends in wearable devices such as glasses, wrist bands, and watches have made such interactions limited and awkward due to the lack of touch real estate and the positioning of the device itself.
While mobile device interfaces continue to shrink, interfaces of remote display devices such as TVs and game consoles are becoming even more complex, requiring extensive maneuvering via simple remote controllers or requiring remote control with full keyboard-like capability. For example, with a conventional remote control, a simple task such as entering text to search for a movie title becomes a monumental task leading to a poor user experience.
The above listed example is intended to provide a quick reference to aid the reader and is not intended to define the scope of the concepts described herein.
The accompanying drawings illustrate implementations of the concepts conveyed in the present document. Features of the illustrated implementations can be more readily understood by reference to the following description taken in conjunction with the accompanying drawings. Like reference numbers in the various drawings are used wherever feasible to indicate like elements. Further, the left-most numeral of each reference number conveys the FIG. and associated discussion where the reference number is first introduced.
FIGS. 1 and 2 collectively show example smart ring applications in accordance with some implementations of the present concepts.
FIGS. 3-5 show example smart ring use case scenarios in accordance with some implementations of the present concepts.
FIG. 6 shows a system example in accordance with some implementations of the present concepts.
FIG. 7 shows stroke gesture primitives that can be utilized in accordance with some implementations of the present concepts.
FIG. 8 shows a state diagram that can be utilized in accordance with some implementations of the present concepts.
FIG. 9 shows an example flow chart in accordance with some implementations of the present concepts.
The present concepts relate to allowing a user to use his/her fingers to control a device. The implementations relate to a wearable ring platform (e.g., smart ring) worn on one or more of the user's fingers. (As used herein, the term ‘finger’ can include the ‘thumb’). The smart ring can detect and interpret various control gestures or actions performed by the user. The smart ring can wirelessly transmit the control gestures to the device. As used herein any action that can be performed by one or more fingers can be thought of as a gesture. Thus, the action of touching a surface with the finger can be an example of a gesture. Similarly, touching and sliding the finger on a surface can be a gesture. Moving the finger in the air or bending the finger can be a gesture. Further, the action of waving with one or more fingers can be a gesture. Actions performed by both hands can also be a gesture. In summary, actions can include touch gestures and non-touch gestures and/or single finger gestures and multi-finger gestures. Further examples of actions (e.g., gestures) are described below.
Introductory FIGS. 1-2 show a human hand 100. Most of the hand is covered with skin 102. However, for purposes of explanation, the skin is not shown for a portion of the hand relating to the index finger 104 to allow visualization of the underlying tissues. More specifically, tendons 106 are visible on the index finger. These tendons can move when the finger moves or when the finger imparts a force on a surface. FIG. 2 introduces a pressure sensitive smart ring (or ‘smart ring device’ or ‘smart ring’) 202 positioned on the user's index finger. The pressure sensitive smart ring can include elements for detecting changes to the tendons. Examples of these elements are discussed in more detail below relative to FIG. 6. (Note that to avoid clutter on the drawing page, on FIG. 2, the tendon 106 lead line only goes to one of the tendons rather than two in FIG. 1).
FIG. 3 shows a first use case scenario 300 involving a user 302 wearing an example of pressure sensitive smart ring 202. In this case the user is engaging a digital display device 304. In this example, the digital display device includes a depth sensor 306. In some implementations the depth sensor can be manifest as a red, green, blue, plus depth (RGBD) camera. Various types of visible light, non-visible light, and/or sonic depth sensors, among others can be employed.
The depth sensor 306 can be useful in detecting the presence of user 302 in front of the digital display device 304 and detecting gestures performed by the user in front of the digital display device. However, the depth sensor may not be able to accurately detect user actions close to the digital display device. For instance, the depth sensor may not be able to distinguish whether the user is pointing at a location on the digital display device or touching the location on the digital display device. The pressure sensitive smart ring 202 can determine whether the user's finger is touching a surface as indicated by ‘starburst’ 308. Further, the pressure sensitive smart ring 202 can determine that while touching the surface the finger is moving in a downward direction as indicated by arrow 310. Data from the depth sensor 306 and the pressure sensitive smart ring 202 can detect user gestures in front of the digital display device as well as user contact of the digital display device. Thus, the pressure sensitive smart ring 202 and the depth sensor 306 can collectively provide information that can allow the digital display device to function in a manner similar to a touch sensitive display device without actually being ‘touch sensitive.’
FIG. 4 shows another use case scenario 400 that is similar to the use case scenario of FIG. 3. In this case, the pressure sensitive smart ring 202 can operate cooperatively with smart glasses 402 to provide information about user 302. For instance, the smart glasses can capture information about what is in front of the user. In this example, the smart glasses can ‘see’ content on the digital display device 304. The smart glasses may be less effective at determining whether the user 302 is touching the digital display device 304. However, as explained above relative to FIG. 3, the pressure sensitive smart ring 202 can accurately determine whether the user is touching the digital display device. The pressure sensitive smart ring 202 and the smart glasses 402 can communicate with the digital display device 304 to detect user gestures (both touch and non-touch) to provide an enhanced interactive experience to the user.
FIG. 5 shows another use case scenario 500 at instance one, instance two, and instance three. Scenario 500 involves pressure sensitive smart rings 202(1) and 202(2) and a smart watch 502. Pressure sensitive smart ring 202(1) is positioned on the user's index finger 104 and pressure sensitive smart ring 202(2) is positioned on the user's middle finger. Instance one shows the user touching the smart watch with his index finger 104. This touch can be detected by pressure sensitive smart ring 202(1). This touch can be interpreted as a first user command, such as to select an application to run on the smart watch.
Instance two shows the user performing a non-touch command by bending the index finger 104 at the middle joint. This non-touch command can be detected by pressure sensitive smart ring 202(1) and distinguished by the smart ring from the command of instance one by a pressure profile (e.g., which pressure sensors detect pressure). This command could be interpreted as a scroll down command by the smart watch, for example.
Instance three shows a similar non-touch command to instance two except that it is performed by both the index finger and the middle finger (e.g. a multi-finger gesture) and detected by pressure sensitive smart ring 202(1) and pressure sensitive smart ring 202(2). This command could be interpreted as a ‘select’ command by the smart watch, for example. Mechanisms for accomplishing this functionality are described below relative to FIG. 6.
FIG. 6 shows a gesture detection system 600. For purposes of explanation, system 600 includes pressure sensitive smart ring 202, digital display device 304, depth sensor 306, smart glasses 402, smart watch 502, and a smart phone 602. Any of these devices can communicate over one or more networks 604.
Two configurations 606(1) and 606(2) are illustrated for pressure sensitive smart ring 202. Briefly, configuration 606(1) represents an operating system centric configuration and configuration 606(2) represents a system on a chip configuration. Configuration 606(1) is organized into one or more applications 610, operating system 612, and hardware 614. Configuration 606(2) is organized into shared resources 616, dedicated resources 618, and an interface 620 there between.
In either configuration, the pressure sensitive smart ring 202 can include storage 622, a processor 624, a battery 626 (or other power source), a battery charger 628, sensors 630, a communication component 632, and/or a gesture component 634. These elements can be positioned in/on or otherwise associated with a physical finger band 636. For instance, the elements can be positioned within the finger band 636 so that the pressure sensitive smart ring 202 has the general appearance of a traditional ‘jewelry’ ring. The finger band 636 can be formed of various materials such as plastics, polymers, and/or natural materials such as jade or other minerals. The pressure sensitive smart ring 202 can also include ornamental aspects such as precious stones to mimic a traditional jewelry ring.
From one perspective, any of pressure sensitive smart ring 202, digital display device 304, depth sensor 306, smart glasses 402, smart watch 502, and/or smart phone 602 can be thought of as computers.
The term “device,” “computer,” or “computing device” as used herein can mean any type of device that has some amount of processing capability and/or storage capability. Processing capability can be provided by one or more processors that can execute data in the form of computer-readable instructions to provide a functionality. Data, such as computer-readable instructions and/or user-related data, can be stored on storage, such as storage that can be internal or external to the computer. The storage can include any one or more of volatile or non-volatile memory, hard drives, flash storage devices, and/or optical storage devices (e.g., CDs, DVDs etc.), remote storage (e.g., cloud-based storage), among others. As used herein, the term “computer-readable media” can include signals. In contrast, the term “computer-readable storage media” excludes signals. Computer-readable storage media includes “computer-readable storage devices.” Examples of computer-readable storage devices include volatile storage media, such as RAM, and non-volatile storage media, such as hard drives, optical discs, and/or flash memory, among others.
As mentioned above, configuration 606(2) can be thought of as a system on a chip (SOC) type design. In such a case, functionality provided by the device can be integrated on a single SOC or multiple coupled SOCs. One or more processors can be configured to coordinate with shared resources, such as memory, storage, etc., and/or one or more dedicated resources, such as hardware blocks configured to perform certain specific functionality. Thus, the term “processor” as used herein can also refer to central processing units (CPU), graphical processing units (CPUs), controllers, microcontrollers, processor cores, or other types of processing devices.
Generally, any of the functions described herein can be implemented using software, firmware, hardware (e.g., fixed-logic circuitry), manual processing, or a combination of these implementations. The term “component” as used herein generally represents software, firmware, hardware, whole devices or networks, or a combination thereof. In the case of a software implementation, for instance, these may represent program code that performs specified tasks when executed on a processor (e.g., CPU or CPUs). The program code can be stored in one or more computer-readable memory devices, such as computer-readable storage media. The features and techniques of the component are platform-independent, meaning that they may be implemented on a variety of commercial computing platforms having a variety of processing configurations.
The battery 626 can be charged in various ways by the battery charger 628. In one instance, the battery charger is manifest as a wireless inductive charger. The wireless inductive charger can include multiple conductive coils wrapping around the pressure sensitive smart ring 202, such as following the ring shape of the finger band 636. In other configurations the coils can be associated with the ring but not coiled around the ring. For instance, small coils can be contained within the finger band or otherwise associated with the finger band. The wireless inductive charger can capture magnetic energy from wireless chargers. The wireless chargers can be included in any of digital display device 304, depth sensor 306, smart glasses 402, smart watch 502, smart phone 602, and/or other devices. Beyond the charging facet, the wireless inductive charging feature can provide a proximity sensing function for the two devices. For instance, when the user places his hand with the pressure sensitive smart ring 202 near the smart phone 602, the wireless inductive charger can detect the magnetic field of the smart phone and thus indicate to the pressure sensitive smart ring 202 that it is proximate to the smart phone. Similarly, the entry of the pressure sensitive smart ring 202 into the magnetic field generated by the smart phone can indicate to the smart phone that the pressure sensitive smart ring 202 is proximate to the smart phone. In summary, some pressure sensitive smart ring implementations can opportunistically harvest energy from an NFC-enabled companion device, such as devices 304, 306, 402, 502, and/or 602, among others for perpetual operation without explicit charging.
Further, powering sensors and analyzing sensor data consumes power. The gesture component 634 can manage the sensors 630, battery 626, processor 624, and/or other components to conserve resources. In other configurations a power management controller (not shown) may manage the components. Several techniques for conserving power usage are described below.
Multiple types of sensors 630 can be included in the pressure sensitive smart ring 202. Of course, the sensors can include pressure sensors 638. In this example, three pressure sensors are illustrated positioned on an inner surface 640 (e.g., inwardly facing surface) of the finger band 636. In this case, when the pressure sensitive smart ring 202 is worn by the user, pressure sensor 638(1) is configured to be positioned at the 8-9 o'clock position (with the diamond at the top of the ring acting as 12 o'clock). Pressure sensor 638(2) is configured to be positioned at the 6 o'clock position and pressure sensor 638(3) is configured to be positioned at the 3-4 o'clock position. Of course, other numbers and/or positions of pressure sensors can be employed. For example, a radial array of pressure sensors could be positioned on the inside surface of the ring so that even if the ring spins on the user's finger, pressure detected by generally opposing pressure sensors can be indicative of a touch gesture. Examples of pressure sensors can include force sensitive resistors and/or piezoelectric sensors, among others. In some cases the pressure sensor can be coupled to a low power comparator and controlled by power gating as determined by the gesture component 634.
Sensors 630 can also include accelerometers, gyroscopes, magnetometers, and/or microphones, among others. For instance, the implementation of FIG. 4 can include pressure sensors to detect contact with the surface and accelerometers to detect the downward movement. While not shown in FIG. 4, the gyros could further detect ‘twisting’ of the pressure sensitive smart ring 202 to allow a straight down movement to be distinguished from a down and to the left or a down and to the right gesture. In another configuration, motion can be detected via the microphone as audio signals. Such a configuration can use less power than may be consumed by accelerometers.
In one such implementation an audio based motion detector can have multiple sub modules, such as a microphone with a built-in amplifier and high pass filter, a high-pass analog filter to filter out typical environmental noise, an amplifier, a low-pass filter, and an envelope detector.
The gesture component 634 can receive input from the sensors 630. The gesture component 634 can identify user actions from the sensor input. For instance, assume that the user performs the touch action of instance one of FIG. 5. In that case, pressure sensors 638(1) and 638(3) of FIG. 6 would detect pressure created by the lateral tendons and pressure sensor 638(2) would not detect pressure. The gesture component can interpret the output of the three sensors 638(1)-638(3) as a touch gesture. Now assume that the user performs the finger bend gesture of FIG. 5 instance two. In that case, each of sensors, 638(1), 638(2), and 638(3) would detect pressure. The gesture component can interpret the output of the three sensors 638(1)-638(3) as a non-touch finger bend gesture.
Other action detection (e.g., gesture detection) scenarios that involve identification of tapping, swiping, scrolling, and stroking for hand written text entry are described below.
The communication component 632 can allow the pressure sensitive smart ring 202 to communicate with various devices, such as the illustrated companion devices. The communication component can include a receiver and a transmitter and/or other radio frequency circuitry for communicating with various technologies, such as cellular, Wi-Fi (IEEE 802.xx), Bluetooth, etc.
Note that in some cases the gesture component 634 on the pressure sensitive ring 202 can be relatively robust and perform analysis on signals received from sensors 630 to identify a user action. The gesture component could then send an indication of the identified user action to a companion device (e.g., any of devices 304, 306, 402, 502, and/or 602) that the pressure sensitive smart ring is operating in cooperation with. In other cases, the pressure sensitive smart ring could send the signals to the companion device. A gesture component (not shown) on the companion device could then analyze the sensor signals to identify the user action. In a similar scenario the pressure sensitive smart ring could send information to a remote resource, such as cloud based resources for processing.
The discussion below provides further details on specific implementations of the pressure sensitive smart ring 202. For purposes of explanation, in this discussion smart phone 602 operates as a companion device to the pressure sensitive smart ring 202. In this case, sensors 630 include force sensitive resistors, accelerometers, and an audio based sensor configured to detect motion of the user's finger on a surface. In this discussion, only a single pressure sensitive smart ring 202 is employed, but as noted above, the user could wear anywhere from one to ten pressure sensitive smart rings 202 (e.g., one on each finger including thumbs).
To conserve energy, the gesture detection component 634 can place the pressure sensitive smart ring 202 in an inactive sleep state to prevent accidental interpretation of day-to-day user activities as gestures. In this state, the ring's accelerometer can be in a low-power autonomous motion-detection state.
When the user is ready to enter gestures on an available surface, the pressure sensitive smart ring 202 can be brought into an active state by tapping the surface four times (or some other unique action). Once in the active state, the pressure sensitive smart ring 202 can enter a touch-detect active state by turning on the touch detection sensor. The 1st tap can help trigger the accelerometer motion detector, while the rest of the taps can be used to reduce accidental triggering of the active state. The gesture component 634 can collect raw accelerometer readings which can also be buffered during the touch-detect state.
When the user touches the surface to enter a gesture, the touch is detected by the pressure sensors, and the pressure sensitive smart ring 202 can enter motion-detect state. In the motion-detect state, the audio-based motion detector can be turned on to detect the motion of the finger along the surface. During this state, processed accelerometer components along a plane of the ring can be stored (e.g., yz plane). At the end of motion or the touch, the gesture detection component 634 can employ a classifier to the accelerometer data to identify the gesture.
This implementation of the gesture component 634 can implement the following four groups of gestures including, tap, swipe, scroll, and written text, which are summarized in Table 1. Of course other gestures are contemplated, especially when the user wears pressure sensitive smart rings on multiple fingers.
Tap. The tap gesture can satisfy a similar functionality to the typical tap gesture on a touch sensitive surface, or the left mouse click. Similar to touch surfaces and mice, multiple, closely spaced, tap actions can define multiple gestures. For instance, two double-taps can be used to transition between “active” and “inactive” modes as described above.
Swipe. The swipe gesture can be used with primitive touch interfaces for quickly scanning through multiple windows or a collection of items such as photos. This implementation of the pressure sensitive smart ring 202 can support four different swipe actions which include: swipe-up, swipe-down, swipe-left, and swipe-right.
TABLE 1 Different gestures, including different modes, and number of classification primitives can be implemented on the pressure sensitive smart ring 202. Gesture Modes # primitives Tap down 1 Swipe up, down, left, right 4 Scroll up, down, left, right 6 right-up, left-down Written Text English characters 12
Scroll. The scroll action can be similar to the touch surface or mouse-based scroll. The gesture component 634 can identify six scroll actions: scroll-left, scroll-right, scroll-up, scroll-down, scroll-right-up, and scroll-left-down.
Writing-based text entry. The pressure sensitive smart ring 202 can also implement a writing-based English text entry, where the user can simply write the characters on a surface using the index finger.
The gesture component 634 can treat each character as a combination of multiple primitive shapes called “strokes”. FIG. 7 shows examples of stroke gesture primitives 700. In this example, 12 strokes are used for text entry in this implementation. The strokes can include directional and/or rotational movements. The gesture component can identify these strokes, and can also measure inter-stoke latencies which can help identify strokes belonging to a single character. The stroke identifiers and inter-stroke latencies can be used to identify the individual characters at a remote device.
In this implementation, size and weight constraints limit the size of the battery used to power the pressure sensitive smart ring 202. In one case, a 10 mAh battery capacity can be used to approximate a traditional jewelry type ring. This battery can fit in the crown or the finger band of the pressure sensitive smart ring 202.
This relatively small 10 mAh battery capacity may cause the user to recharge the battery several times within a day, which would potentially be a large obstacle to the usability of the platform. To overcome this limitation, the pressure sensitive smart ring 202 can use the subcarrier based NFC energy harvesting approach to passively recharge the ring battery while the user is holding the smart phone 602 next to the ring.
To harvest energy from an NFC enabled antenna, the smart ring has a coil loop wound around the ring finger band. Winding the coil around the ring finger band can enable a large (and potentially maximum) loop size to achieve better energy harvesting.
Surface Detection
This implementation can use a combination of two techniques to detect the motion of the user's finger on a surface. As mentioned above, the pressure sensor can detect the finger touching a surface by sensing the pressure imparted by a lateral tendon of the finger; while an energy-efficient audio sensor can detect the movement of the finger on the surface by listening to the audio signal generated by the friction between the finger and the surface.
More specifically, the gesture component 634 can interpret the acoustic signals generated due to the friction when the finger moves across the surface to detect finger motion on the surface.
The amount of audio energy emitted from the finger/surface interaction is a function of the speed of finger motion and the physical properties of the surface.
Some implementations can offer enhanced surface detection using pressure and audio-based techniques. For instance, a combination of tendon pressure and audio based techniques can be analyzed to provide efficient and reliable surface detection due to the complementary characteristics of these techniques.
The tendon pressure-based technique can consume an order of magnitude less power than the audio-based solution, however, unlike the audio based solution, the pressure-based technique tends not to be able to identify finger motion directly. Accelerometers offer another solution, but at the potential cost of extra processing overhead and segmentation errors that can severely affect the system performance.
The audio-solution can detect both motion and touch during motion. However, the audio-based solution can be affected by ambient audio noise-induced errors. Band-pass filtering can remove a significant portion of these errors. The touch detector can prevent the accidental triggering of motion sensing due to errors that are not filtered. The touch detector can also prevent cascading failures by touch-based gating of the gesture detection in the presence of noise.
Gesture Classification
In some implementations the gesture component 634 can utilize classifiers for identifying the gesture primitives. For instance, gesture primitives can be categorized based on starting dynamics, real-timeliness, and context dependency of interpretation.
Hard landing gestures start with the user's finger landing on the surface at a relatively high velocity. Both taps and swipes can be hard landing gestures. Soft landing gestures can start with the finger meeting the surface at a low velocity. Both scroll gestures and strokes for text entry can be soft landing gestures.
The scroll gestures can entail real-time identification, since the user tends to desire continuous feedback on the current scroll position. Due to short interaction time, both tap and swipe gestures can be identified in non-real-time after the gesture has been completed. The strokes for text entry can also be identified in non-real-time, at the end of each stroke to improve classification accuracy. This is acceptable since the high-level symbols, such as characters, can only be interpreted after collecting all strokes that make up the character, due to lack of absolute position.
Context free gestures are gestures that can be interpreted on the pressure sensitive smart ring 202 without the knowledge of the user interface (UI) element the user is interacting with. Both tapping and swiping gestures belong to this category.
Context dependent gestures can utilize knowledge of the current UI element type for correct interpretation by the pressure sensitive smart ring 202. Some of the stroke and scroll gestures that look identical can be interpreted differently due to different real-time needs. To enable proper interpretation of these, the gesture component 634 can operate on the presumption that the remote device informs the pressure sensitive smart ring 202 when the user starts and stops interacting with a text entry area.
Resolving Angular Ambiguity of Accelerometer Data
The pressure sensitive smart ring 202's gesture component 634 can use the accelerometer data to identify different gestures on a surface. When gestures are performed on a surface, the signature of the gesture tends to be captured in the acceleration components that are parallel to the surface of interaction. Since the pressure sensitive smart ring 202, when worn on the finger, does not stay parallel to the interaction surface, and since individual users' frames of reference will differ from one another, the gesture component can convert the (x,y,z) components of the accelerometer to the (x,y,z) components with respect to the interacting plane. Some implementations can assume a horizontal plane of interaction, which is true for most of the interaction surfaces available in the environment. Other implementations can handle the interaction on an arbitrarily inclined plane.
For computing the components along the interacting plane, the gesture component 634 can use the gravity acceleration vector just prior to movement of the finger to determine the inclination of the finger to the plane, since this angle can vary across users and instances.
To perform this normalization, the gesture component 634 can compute two angles: pitch (8) and roll (0). These angles can be computed according to the following equations:
θ xyz = tan - 1 ( - G px G pz ) ( 1 ) ϕ xyz = tan - 1 ( G py G px 2 + G pz 2 ) ( 2 )
After computing these angles while the finger is stationary, they can be applied to subsequent accelerometer samples to compensate for finger orientation while the finger is moving:
x normal =−x·cos(−φ)+z·sin(−φ) (3)
y normal =y·cos(θ)−z·sin(θ) (4)
There are two limitations to correcting for the finger angle in this way. First, some implementations can operate on the assumption that these angles do not change during a gesture—if this assumption is violated, the gravity vector may pollute the x and y components, and a fraction of the x and y accelerations will be falsely attributed to the z axis. Second, some implementations do not correct for a third orientation angle, yaw (ψ), if gyros are not utilized (gravity vector provides no information as to how the finger twists in a plane perpendicular to gravity). Thus, these implementations can leverage the assumption that the user's finger motion will be perpendicular to their body and the impact of ψ is negligible. If this assumption is violated, the x and y acceleration components may not be properly separated. While worth noting, neither of these limitations tends to have a significant impact on classification accuracy.
Gesture Classification Overview
Some implementations of the gesture component 634 can use a two-level classification scheme for gesture classification. When the pressure sensors indicate a touch event, the top-level classifier, called the landing classifier, can be invoked to classify the event as either a soft landing event or a hard landing event. The gesture component 634 can evaluate the output of the landing classifier and the UI context reported by the companion device (e.g., the device the user is engaging). The gesture component 634 can then invoke one of the low level classifiers—swipe-tap, stroke, or scroll.
The gesture component 634 can also invoke the swipe-tap classifier to handle a hard landing. This classifier can use the surface touch duration—determined by the length of the audio envelope, and the accelerometer samples to classify the event as either a tap gesture or one of the four swipe gestures.
For a soft landing, if the context reports text input, the gesture component 634 can invoke the stroke classifier. Since there can be multiple consecutive strokes during a single touch, for example when writing L character, accelerometer data collected after the soft landing can be segmented based on the audio envelope. These segmented data can be fed to the stroke classifier to classify the stroke to one of the 12 possible strokes. This process can continue until the finger leaves the surface.
For a soft landing with a non-text input context, the gesture component 634 can invoke the scroll classifier. The scroll classifier can first detect a short ‘nudge’ at the start of the scroll based on the audio envelope, and can classify the data collected between the touch event and the end of the nudge to determine the type of scroll event. After this classification stage, the smart ring periodically can transmit ‘in-scroll’ messages to the companion device to provide real-time information on the continued scroll event until the finger stops moving and leaves the surface.
FIG. 8 shows a state diagram 800 of how different classification stages can be invoked in some implementations. The rest of this section describes these classification stages in more detail.
Landing Classifier
While the finger is moving on a surface, negligible activity on an accelerometer's z-axis is expected. However, when the finger initially lands on the surface, the finger can abruptly stop, causing large magnitude, short-lived spikes induced by the finger's sudden deceleration. The gesture component 634 (FIG. 6) can classify hard landings versus soft landings by exploiting this activity on the accelerometer z-axis at the beginning of a gesture entry. When a surface is initially detected at 802, n samples can be evaluated surrounding the start of motion. These n samples may be used as the input to a heuristic, threshold-based classification or as the input to an SVM classifier. The intuition behind the efficacy of each of these approaches is the existence of large, observable deltas in z-axis acceleration. To summarize, the z-axis magnitude can be compared to a threshold. A magnitude below the threshold can indicate a soft landing 804. A magnitude that is equal to or above the threshold can indicate a hard landing 806.
Swipe-Tap classifier
The swipe-tap classifier can be invoked after detecting a hard landing 806. A duration envelope of the contact of the finger across the surface can be compared to a duration threshold. A duration envelope that is less than the duration threshold can indicate a tap event 808. A duration that is longer than the duration threshold can indicate a swipe event 810.
A tap gesture can be identified solely from the envelope information, while identification of a swipe can entail further classification.
Stroke Classifier
Returning to soft landing 804, the soft landing can be evaluated to distinguish a scroll 812 from a stroke 814. An SVM classifier can be utilized to classify strokes. The SVM classifier can use the x, y, and z axis accelerometer readings as the feature vector. Since the stroke duration can vary at different instances as well as across users, a sample, such as 100 points can be linearly interpolated across each x and y axis sample for a given gesture. A fixed number of averages can be computed across these interpolated points for each axis. This set of averages can then be passed to the SVM classifier.
Scroll Classifier
Scroll classification can happen after a stroke is detected based on the context of the remote user interface (e.g., the companion device that the user is engaging). A short gesture, called a ‘nudge’, can be detected and classified using the SVM classifier to determine the start of one of the six possible scroll gestures. Some implementations can utilize a relatively small number of (such as six) different scroll gestures to ease classification of the scroll action with only a small number of samples. After the user performs the nudge, the length of the envelope can provide real-time information to the remote device on the progress of the scroll action.
Operating Modes
When the pressure sensitive smart ring 202 is in the active mode (touch-detect, or touch-process), the activity of the platform can be driven by the accelerometer. The accelerometer can autonomously collect samples at ≃400 Hz (for example) and can interrupt the microcontroller when a new sample is available.
During touch-detect, the sampled data can be buffered for landing type estimation, the microcontroller interrupt service routine (ISR) also can check the status of the touch detector.
If touch is active, the pressure sensitive smart ring 202 can transition to touch-process mode. In this mode, the audio-based motion detector output can be sampled at ≃100 Hz with processor ADC (at every 4th ISR). Once motion is detected—determined by the change of audio envelope by a preset threshold—the pressure sensitive smart ring 202 can start accumulating coordinate-aligned accelerometer data. At the end of the motion, the appropriate classifier can be invoked, and the results can be transmitted over the radio (e.g., communication component 632), such as by using a best effort transmission scheme.
SVM Classifier Implementation
As introduced above, an SVM classifier can be employed for gesture classification. The SVM classifier can be a multi-class linear-kernel SVM classifier. The SVM classifier can use pair-wise classification, entailing n(n−1)/pair-wise classifiers to classify n classes.
Some implementations can use four features for each x and y axis, resulting in eight SVM features. Each (F(i)X, F(i)Y) feature tuple can be calculated by first breaking all the (x,y) acceleration data in to four buckets, and then averaging the data in each bucket. The x and y acceleration component of each data sample can be computed immediately after reading (x,y,z) acceleration data sample from the accelerometer.
Due to limited RAM size, instead of buffering data at 400 Hz until the end of a gesture, some implementations can employ running averages of each n samples of data to be calculated. Value n can be selected such that there are at most 60 computed averages for the worst case duration of each gesture class. Once the gesture ends, these pre-computed averages can be broken into four equal-size buckets to compute the four feature tuples.
NFC Energy Harvesting
As mentioned above, wireless charging can be achieved via magnetic fields generated by a companion device, such as smart phone 602. Some implementations can be configured so that the charging occurs efficiently (potentially maximally) when the user holds the smart phone in a natural manner with the ring bearing hand.
In summary, at least some of the present implementations can offer a low-power wearable smart ring that can enable users to enter gestures by interacting on arbitrary surfaces. The smart ring can use energy efficient finger-tendon based touch detection and audio-based motion detection to capture user interaction instances. A light-weight mufti-classifier solution accurately classifies different gesture primitives. In one case, using a 10 mAh battery powered by energy harvested from an NFC-enabled smart phone, the ring can support more than 10 hours of active user interactions.
Example Methods
FIG. 9 illustrates a flowchart of a method or technique 900 that is consistent with at least some implementations of the present concepts.
At block 902, the method can obtain signals reflecting pressure of a tendon of a user's finger on a ring positioned on the finger.
At block 904, the method can interpret the signals to identify an action performed by the finger.
In some cases, the method can be performed on the ring by a processor or microcontroller. In other cases, the signals can be sent from the ring to another device, such as a companion device that is proximate to the ring and is working cooperatively with the ring. The companion device can then perform the interpreting. Some implementations can involve a single user wearing multiple rings. In such a case, each ring can communicate its signals to the companion device (e.g., with a different ring identifier with the signals). The companion device can then interpret actions relating to a single finger or multiple fingers (e.g., multi-finger gestures). For instance, the user may have waved a single finger to invoke a specific user command or the user could have waved all the fingers of the hand to invoke a different user command. In some cases, the smart ring may contain other sensors that sense other parameters. Signals from the other sensors can be interpreted in combination with signals from the pressure sensors to identify the user action. In still other cases, sensors on other devices may provide signals that can be utilized in combination with the sensed signals to identify the user action. Examples of such scenarios are illustrated relative to FIGS. 3-5 where the digital display 304, the depth sensor 306, the smart glasses 402, and/or the smart watch 502 may sense the user and provide data that is useful in combination with the pressure data. Also, in some cases, such as a digital whiteboard scenario, multiple users may be performing actions and each user may be wearing one or more smart rings.
The order in which the above methods are described is not intended to be construed as a limitation, and any number of the described blocks can be combined in any order to implement the method, or an alternate method. Furthermore, the method can be implemented in any suitable hardware, software, firmware, or combination thereof, such that a computing device can implement the method (e.g., computer-implemented method). In one case, the method is stored on a computer-readable storage media as a set of instructions such that execution by a processor of a computing device causes the computing device to perform the method.
In summary, the present implementations can derive useful information about user actions from pressure sensors on a smart ring worn on a user's finger.
The described methods or processes can be performed by the systems and/or devices described above, and/or by other devices and/or systems. The order in which the methods are described is not intended to be construed as a limitation, and any number of the described acts can be combined in any order to implement the method, or an alternate method. Furthermore, the method can be implemented in any suitable hardware, software, firmware, or combination thereof, such that a device can implement the method. In one case, the method is stored on computer-readable storage media as a set of instructions such that execution by a processor of a computing device causes the computing device to perform the method.
Although techniques, methods, devices, systems, etc., pertaining to detecting user actions are described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed methods, devices, systems, etc.
The invention claimed is:
1. A smart ring device, comprising:
a finger band configured to accommodate a user's finger;
at least one pressure sensor secured to the finger band in a manner that can detect pressure imparted by a tendon passing through the finger band during performance of actions by the user's finger; and,
a gesture component configured to:
perform an analysis of pressure signals from the at least one pressure sensor indicating that the tendon has imparted pressure on the at least one pressure sensor; and
based at least on the analysis of the pressure signals indicating that the tendon has imparted pressure on the at least one pressure sensor, detect that the user's finger is touching a surface of another device.
2. The smart ring device of claim 1, further comprising a battery and a wireless charger for the battery contained in the finger band.
3. The smart ring device of claim 2, wherein the wireless charger comprises conductive coils, wherein the conductive coils are wrapped around the finger band or wherein the conductive coils are associated with the finger band but do not wrap around the finger band.
4. The smart ring device of claim 1, wherein the at least one pressure sensor comprises an array of pressure sensors radially distributed around an inner surface of the finger band.
5. The smart ring device of claim 1, wherein the pressure sensor comprises a force sensitive resistor or a piezoelectric sensor.
6. The smart ring device of claim 1, further comprising motion detectors.
7. The smart ring device of claim 6, wherein the motion detectors comprise audio sensors or accelerometers.
8. The smart ring device of claim 1, further comprising a communication component configured to communicate an indication of the user's finger touching the surface to a companion device.
9. The smart ring device of claim 8, wherein the communication component comprises a Bluetooth transmitter.
10. The smart ring device of claim 1, wherein the gesture component is further configured to:
in a first instance:
receive an indication that the another device is in a text input context; and
responsive to the indication that the another device is in the text input context, interpret an action performed by the user's finger using a stroke classifier; and
in a second instance:
receive an indication that the another device is in a non-text input context; and
responsive to the indication that the another device is in the non-text input context, interpret the action using a scroll classifier.
11. A smart wearable device, comprising:
a set of pressure sensors positioned on an inner surface of the finger band and configured to sense changes to tendons of the user's finger as pressure differentials and to output associated pressure signals indicating pressure imparted by the tendons on the set of pressure sensors; and
a processor configured via computer-readable instructions that, when executed by the processor, cause the processor to:
perform an analysis of the pressure signals indicating the pressure imparted by the tendons on the set of pressure sensors; and
based at least on the analysis of the pressure signals indicatinq the pressure imparted by the tendons on the set of pressure sensors, detect that the user's finger is touching a surface of another device.
12. The smart wearable device of claim 11, wherein the computer-readable instructions, when executed by the processor, cause the processor to:
distinguish an individual touch action performed by the touching from another individual action where the user performs a non-touch gesture without touching the surface of the another device.
13. The smart wearable device of claim 12, wherein the non-touch gesture comprises a finger bend.
14. The smart wearable device of claim 11, further comprising another sensor and wherein the computer-readable instructions, when executed by the processor, cause the processor to:
determine direction of movement of the smart wearable device from output of the another sensor.
15. The smart wearable device of claim 14, wherein the another sensor comprises a microphone.
16. A method performed by one or more processors, the method comprising:
obtaining pressure signals reflecting pressure imparted by tendon of a user's finger on a pressure sensor positioned on the user's finger;
performing an analysis of the pressure signals indicating the pressure imparted by the tendon on the pressure sensor; and
based at least on the analysis, interpreting the pressure signals reflecting the pressure of the tendon as an indication that the user's finger has contacted a surface of another device.
17. The method of claim 16, wherein the pressure sensor is positioned on a ring and the analysis is performed by the ring.
18. The method of claim 16, wherein the pressure sensor is positioned on a wearable device, the obtaining the pressure signals is performed by a companion device other than the wearable device, and wherein the companion device performs the analysis.
19. The method of claim 18, further comprising:
obtaining, by the companion device, further pressure signals from other pressure sensors positioned on other fingers of the user, and wherein the analysis comprises identifying a multi-finger gesture performed by the user based at least on the pressure signals and the further pressure signals.
20. The method of claim 18, wherein the companion device comprises a smart phone, a smart watch, smart glasses, or a display device.
obtaining additional signals relating to movement of the user's finger while in contact with the surface of the another device and wherein the interpreting comprises interpreting the pressure signals and the additional signals to identify an action performed while the user's finger is in contact with the surface of the another device.
US14/286,910 2014-05-23 2014-05-23 Finger tracking Active US9594427B2 (en)
US14/286,910 US9594427B2 (en) 2014-05-23 2014-05-23 Finger tracking
PCT/US2015/031290 WO2015179262A1 (en) 2014-05-23 2015-05-18 Finger tracking
CN201580024018.8A CN106462239B (en) 2014-05-23 2015-05-18 Finger trail
EP15728263.3A EP3146410B1 (en) 2014-05-23 2015-05-18 Finger tracking
KR1020167036032A KR20170008854A (en) 2014-05-23 2015-05-18 Finger tracking
US15/223,887 US10191543B2 (en) 2014-05-23 2016-07-29 Wearable device touch detection
US16/005,056 US10359846B2 (en) 2014-05-23 2018-06-11 Wearable device gesture detection
US15/223,887 Continuation US10191543B2 (en) 2014-05-23 2016-07-29 Wearable device touch detection
US14/286,910 Active US9594427B2 (en) 2014-05-23 2014-05-23 Finger tracking
US15/223,887 Active US10191543B2 (en) 2014-05-23 2016-07-29 Wearable device touch detection
US16/005,056 Active US10359846B2 (en) 2014-05-23 2018-06-11 Wearable device gesture detection
KR (1) KR20170008854A (en)
US10459495B2 (en) * 2017-12-19 2019-10-29 North Inc. Wearable electronic devices having an inward facing input device and methods of use thereof
US9594427B2 (en) 2014-05-23 2017-03-14 Microsoft Technology Licensing, Llc Finger tracking
US9582076B2 (en) 2014-09-17 2017-02-28 Microsoft Technology Licensing, Llc Smart ring
US10474191B2 (en) 2014-10-15 2019-11-12 Motionvirtual, Inc. Wearable device
US9619049B2 (en) * 2015-02-18 2017-04-11 International Business Machines Corporation One-handed operation of mobile electronic devices
US9891718B2 (en) 2015-04-22 2018-02-13 Medibotics Llc Devices for measuring finger motion and recognizing hand gestures
US9921651B2 (en) * 2015-04-29 2018-03-20 International Business Machines Company Video display for visually impaired people
US9887591B2 (en) 2015-05-13 2018-02-06 International Business Machines Corporation Electric ring with external power source
KR20170028130A (en) 2015-09-03 2017-03-13 박준호 Wearable device
WO2018006291A1 (en) * 2016-07-06 2018-01-11 华为技术有限公司 Interaction device, system and method
US10251056B2 (en) * 2016-07-13 2019-04-02 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
US10372892B2 (en) 2016-07-13 2019-08-06 Motorola Mobility Llc Electronic device with gesture actuation of companion devices, and corresponding systems and methods
US9716779B1 (en) * 2016-08-31 2017-07-25 Maxine Nicodemus Wireless communication system
US10095342B2 (en) 2016-11-14 2018-10-09 Google Llc Apparatus for sensing user input
EP3340031A1 (en) * 2016-12-21 2018-06-27 Nxp B.V. Motion detection circuits, and associated methods
US10001808B1 (en) * 2017-03-29 2018-06-19 Google Llc Mobile device accessory equipped to communicate with mobile device
US10013081B1 (en) 2017-04-04 2018-07-03 Google Llc Electronic circuit and method to account for strain gauge variation
WO2018187557A1 (en) * 2017-04-05 2018-10-11 Microsensor Labs, LLC System and method for proximity sensing of movable portions of a premises
US10514797B2 (en) 2017-04-18 2019-12-24 Google Llc Force-sensitive user input interface for an electronic device
CN107329574A (en) * 2017-06-30 2017-11-07 联想(北京)有限公司 Input method and system for electronic equipment
US20190347479A1 (en) * 2018-05-10 2019-11-14 International Business Machines Corporation Writing recognition using wearable pressure sensing device
US20030142065A1 (en) 2002-01-28 2003-07-31 Kourosh Pahlavan Ring pointer device with inertial sensors
US20030214481A1 (en) 2002-05-14 2003-11-20 Yongming Xiong Finger worn and operated input device and method of use
US20040012559A1 (en) 2002-07-17 2004-01-22 Kanazawa University Input device
US20040032346A1 (en) 2002-08-19 2004-02-19 Samsung Electro-Mechanics Co., Ltd. Information input device, information processing device and information input method
US6882128B1 (en) 2000-09-27 2005-04-19 Science Applications International Corporation Method and system for energy reclamation and reuse
US20060001646A1 (en) 2004-07-02 2006-01-05 Wei Hai Finger worn and operated input device
EP1785808A1 (en) 2005-11-10 2007-05-16 Research In Motion Limited System and method for activating an electronic device
US20080014989A1 (en) 2006-07-13 2008-01-17 Sony Ericsson Mobile Communications Ab Conveying commands to a mobile terminal through body actions
US20090058830A1 (en) * 2007-01-07 2009-03-05 Scott Herz Portable multifunction device, method, and graphical user interface for interpreting a finger gesture
US20090096746A1 (en) 2007-10-12 2009-04-16 Immersion Corp., A Delaware Corporation Method and Apparatus for Wearable Remote Interface Device
US20090278798A1 (en) 2006-07-26 2009-11-12 The Research Foundation Of The State University Of New York Active Fingertip-Mounted Object Digitizer
US20090295758A1 (en) 2008-05-27 2009-12-03 Industrial Technology Research Institute Method for writing motion and trajectory recognition and writing apparatus and recognizing system
US20100007511A1 (en) 2008-07-14 2010-01-14 Sony Ericsson Mobile Communications Ab Touchless control of a control device
US20100030695A1 (en) 2008-02-08 2010-02-04 Microsoft Corporation Mobile device security using wearable security tokens
US20100302137A1 (en) 2009-05-27 2010-12-02 Microsoft Corporation Touch Sensitive Display Apparatus using sensor input
US20110007035A1 (en) * 2007-08-19 2011-01-13 Saar Shai Finger-worn devices and related methods of use
EP2302882A1 (en) 2009-09-24 2011-03-30 Research In Motion Limited Communication device and method for initiating NFC communication
WO2011055326A1 (en) 2009-11-04 2011-05-12 Igal Firsov Universal input/output human user interface
US20110212687A1 (en) 2010-02-26 2011-09-01 Research In Motion Limited Communications device responsive to near field communications (nfc) to enter locked or unlocked operating modes
US8033916B2 (en) 2007-05-04 2011-10-11 Theodore Caldwell Grip pressure sensor
US20110260839A1 (en) 2010-04-27 2011-10-27 Passif Semiconductor Corp Autonomous battery-free microwave frequency communication system
US20110313922A1 (en) 2009-06-22 2011-12-22 Mourad Ben Ayed System For NFC Authentication Based on BLUETOOTH Proximity
US20120024947A1 (en) 2010-07-29 2012-02-02 Bank Of America Corporation Wearable article having point of sale payment functionality
US20120038652A1 (en) 2010-08-12 2012-02-16 Palm, Inc. Accepting motion-based character input on mobile computing devices
US20120075173A1 (en) 2010-09-23 2012-03-29 Nokia Corporation Apparatus and method for user input
US20120083205A1 (en) 2010-10-04 2012-04-05 Qualcomm Incorporated Nfc device having a differential input envelope detector
US8179604B1 (en) 2011-07-13 2012-05-15 Google Inc. Wearable marker for passive interaction
US20120139708A1 (en) * 2010-12-06 2012-06-07 Massachusetts Institute Of Technology Wireless Hand Gesture Capture
US20120178365A1 (en) 2011-01-07 2012-07-12 Ran Katz Non-Volatile Memory for Contactless Systems
US20120206485A1 (en) 2010-02-28 2012-08-16 Osterhout Group, Inc. Ar glasses with event and sensor triggered user movement control of ar eyepiece facilities
US20120256860A1 (en) * 2011-04-05 2012-10-11 James Robert Justice Directional Finger Recognition Authoring
US8292833B2 (en) 2009-08-27 2012-10-23 Electronics And Telecommunications Research Institute Finger motion detecting apparatus and method
US20120309354A1 (en) 2011-06-06 2012-12-06 Syracuse University Situation aware security system and method for mobile devices
US20120315843A1 (en) 2011-06-10 2012-12-13 Broadcom Corporation Communications Device for Intelligently Routing Information Among Multiple User Interfaces
US20130005241A1 (en) 2011-06-28 2013-01-03 Broadcom Corporation Memory arbitrator for electronics communications devices
US20130022214A1 (en) 2011-07-19 2013-01-24 Dolby International Ab Method and System for Touch Gesture Detection in Response to Microphone Output
US20130027341A1 (en) 2010-04-16 2013-01-31 Mastandrea Nicholas J Wearable motion sensing computing interface
US20130050087A1 (en) 2011-08-31 2013-02-28 Hon Hai Precision Industry Co., Ltd. Multi-functional mouse assembly and input operation method thereof
US20130100044A1 (en) 2011-10-24 2013-04-25 Motorola Mobility, Inc. Method for Detecting Wake Conditions of a Portable Electronic Device
US8447704B2 (en) 2008-06-26 2013-05-21 Microsoft Corporation Recognizing gestures from forearm EMG signals
US20130127980A1 (en) 2010-02-28 2013-05-23 Osterhout Group, Inc. Video display modification based on sensor input for a see-through near-to-eye display
US20130135223A1 (en) * 2009-12-13 2013-05-30 Ringbow Ltd. Finger-worn input devices and methods of use
US20130157565A1 (en) 2011-12-14 2013-06-20 Marvell World Trade Ltd. Method and apparatus for charging a battery in a mobile device through a near field communication (nfc) antenna
US8478195B1 (en) 2012-02-17 2013-07-02 Google Inc. Two-factor user authentication using near field communication
US20130169560A1 (en) 2012-01-04 2013-07-04 Tobii Technology Ab System for gaze interaction
US20130203345A1 (en) 2005-12-31 2013-08-08 Blaze Mobile Wireless Bidirectional Communications between a Mobile Device and Associated Secure Element using Inaudible Sound Waves
US20130229508A1 (en) 2012-03-01 2013-09-05 Qualcomm Incorporated Gesture Detection Based on Information from Multiple Types of Sensors
US20130260689A1 (en) 2012-03-30 2013-10-03 Qualcomm Incorporated Wirelessly Powered Input Device
US8559987B1 (en) 2005-12-31 2013-10-15 Blaze Mobile, Inc. Wireless bidirectional communications between a mobile device and associated secure element
US20130290522A1 (en) 2012-04-11 2013-10-31 Edward F. Behm, Jr. Engine, System and Method of Locating a Mobile Device and Reporting on Other Devices Proximately Located Thereto
US20130285969A1 (en) 2011-09-30 2013-10-31 Giuseppe Raffa Detection of gesture data segmentation in mobile devices
US8572764B2 (en) 2010-12-09 2013-11-05 Dieter Thellmann Exercising glove
US8615374B1 (en) 2006-06-09 2013-12-24 Rockwell Automation Technologies, Inc. Modular, configurable, intelligent sensor system
US20140028547A1 (en) 2012-07-26 2014-01-30 Stmicroelectronics, Inc. Simple user interface device and chipset implementation combination for consumer interaction with any screen based interface
US20140085177A1 (en) * 2012-09-21 2014-03-27 Nokia Corporation Method and apparatus for responding to input based upon relative finger position
US20140101755A1 (en) 2012-10-10 2014-04-10 Research In Motion Limited Mobile wireless communications device providing security features based upon wearable near field communication (nfc) device and related methods
US20140143737A1 (en) 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. Transition and Interaction Model for Wearable Electronic Device
US20140139422A1 (en) 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. User Gesture Input to Wearable Electronic Device Involving Outward-Facing Sensor of Device
US20140139637A1 (en) * 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. Wearable Electronic Device
US20140138447A1 (en) 2012-11-20 2014-05-22 Omne Mobile Payments LLC Electronic card with a programmable magnetic stripe
US20140139486A1 (en) 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. Placement of Optical Sensor on Wearable Electronic Device
US20140143784A1 (en) 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. Controlling Remote Electronic Device with Wearable Electronic Device
US20140139454A1 (en) 2012-11-20 2014-05-22 Samsung Electronics Company, Ltd. User Gesture Input to Wearable Electronic Device Involving Movement of Device
US8742623B1 (en) 2013-09-16 2014-06-03 Google Inc. Device with dual power sources
US20140176809A1 (en) 2012-12-25 2014-06-26 Askey Computer Corp Ring-type remote control device, scaling control method and tap control method thereof
US20140187150A1 (en) 2012-12-27 2014-07-03 Cambridge Silicon Radio Limited Near Field Communication Devices and Methods
US20140285416A1 (en) 2013-03-20 2014-09-25 Microsoft Corporation Short Range Wireless Powered Ring for User Interaction and Sensing
US20140308930A1 (en) 2013-04-12 2014-10-16 Bao Tran Timely, glanceable information on a wearable device
US20150078586A1 (en) 2013-09-16 2015-03-19 Amazon Technologies, Inc. User input with fingerprint sensor
US20150133193A1 (en) 2013-03-15 2015-05-14 Smart Patents L.L.C Wearable devices and associated systems
US20150220158A1 (en) 2014-01-07 2015-08-06 Nod Inc. Methods and Apparatus for Mapping of Arbitrary Human Motion Within an Arbitrary Space Bounded by a User's Range of Motion
US20150326985A1 (en) 2014-05-08 2015-11-12 Microsoft Corporation Hand-worn device for surface gesture input
US20160077587A1 (en) 2014-09-17 2016-03-17 Microsoft Corporation Smart ring
US20160334870A1 (en) 2014-05-23 2016-11-17 Microsoft Technology Licensing, Llc Wearable device touch detection
US5832296A (en) * 1995-04-26 1998-11-03 Interval Research Corp. Wearable context sensitive user interface for interacting with plurality of electronic devices of interest to the user
US7042438B2 (en) 2003-09-06 2006-05-09 Mcrae Michael William Hand manipulated data apparatus for computers and video games
KR101299682B1 (en) 2006-10-16 2013-08-22 삼성전자주식회사 Universal input device
US20090251407A1 (en) * 2008-04-03 2009-10-08 Microsoft Corporation Device interaction with combination of rings
KR100920252B1 (en) 2008-11-07 2009-10-05 서창수 The mouse controlled by movements of finger
US8717291B2 (en) 2009-10-07 2014-05-06 AFA Micro Co. Motion sensitive gesture device
WO2011106797A1 (en) 2010-02-28 2011-09-01 Osterhout Group, Inc. Projection triggering through an external marker in an augmented reality eyepiece
US20140063055A1 (en) * 2010-02-28 2014-03-06 Osterhout Group, Inc. Ar glasses specific user interface and control interface based on a connected external device type
US20120075196A1 (en) * 2010-09-23 2012-03-29 Nokia Corporation Apparatus and method for user input
US10061387B2 (en) * 2011-03-31 2018-08-28 Nokia Technologies Oy Method and apparatus for providing user interfaces
USD705228S1 (en) 2012-02-23 2014-05-20 Marni Peters Actuating ring
US9235241B2 (en) 2012-07-29 2016-01-12 Qualcomm Incorporated Anatomical gestures detection system using radio signals
US8743052B1 (en) 2012-11-24 2014-06-03 Eric Jeffrey Keller Computing interface system
WO2014144015A2 (en) 2013-03-15 2014-09-18 Keller Eric Jeffrey Computing interface system
CN103777752A (en) * 2013-11-02 2014-05-07 上海威璞电子科技有限公司 Gesture recognition device based on arm muscle current detection and motion sensor
US9965761B2 (en) 2014-01-07 2018-05-08 Nod, Inc. Methods and apparatus for providing secure identification, payment processing and/or signing using a gesture-based input device
KR101933289B1 (en) 2014-04-01 2018-12-27 애플 인크. Devices and methods for a ring computing device
KR20160015050A (en) 2014-07-30 2016-02-12 엘지전자 주식회사 Mobile terminal
2015-05-18 CN CN201580024018.8A patent/CN106462239B/en active IP Right Grant
2015-05-18 KR KR1020167036032A patent/KR20170008854A/en unknown
US20050186994A1 (en) 2000-09-27 2005-08-25 Science Applications International Corporation Method and system for energy reclamation and reuse
US6861945B2 (en) 2002-08-19 2005-03-01 Samsung Electro-Mechanics Co., Ltd. Information input device, information processing device and information input method
US20140180851A1 (en) 2005-12-31 2014-06-26 Blaze Mobile, Inc. Using Harvested Power for NFC Transactions
US8879986B2 (en) 2005-12-31 2014-11-04 Michelle Fisher Wireless bidirectional communications between a mobile device and associated secure element using inaudible sound waves
US7702282B2 (en) 2006-07-13 2010-04-20 Sony Ericsoon Mobile Communications Ab Conveying commands to a mobile terminal through body actions
US8405612B2 (en) * 2007-10-12 2013-03-26 Immersion Corporation Method and apparatus for wearable remote interface device
US8106749B2 (en) 2008-07-14 2012-01-31 Sony Ericsson Mobile Communications Ab Touchless control of a control device
US8112066B2 (en) 2009-06-22 2012-02-07 Mourad Ben Ayed System for NFC authentication based on BLUETOOTH proximity
US8526880B2 (en) 2010-02-26 2013-09-03 Blackberry Limited Communications device responsive to near field communications (NFC) to enter locked or unlocked operating modes
US8500031B2 (en) 2010-07-29 2013-08-06 Bank Of America Corporation Wearable article having point of sale payment functionality
US8820649B2 (en) 2012-11-20 2014-09-02 Omne Mobile Payments, Inc. Electronic card with a programmable magnetic stripe
US9360946B2 (en) 2014-05-08 2016-06-07 Microsoft Technology Licensing, Llc Hand-worn device for surface gesture input
"Lightglove", retrieved at <<http://lightglove.com/>> on Apr. 28, 2014, 1 page.
"Lightglove", retrieved at > on Apr. 28, 2014, 1 page.
"Logisys", retrieved at <<http://www.logisyscomputer.com/viewsku.asp?SKUID=MS601BK&DID=KEYBOARD>>, published on Jul. 3, 2004, 1 page.
"Logisys", retrieved at >, published on Jul. 3, 2004, 1 page.
"Ring: Shortcut Everything", retrieved at <<https://www.kickstarter.com/projects/1761670738/ring-shortcut-everything>> on Apr. 28, 2014, 27 pages.
"Ring: Shortcut Everything", retrieved at > on Apr. 28, 2014, 27 pages.
"Wearfin", retrieved at <<http://wearfin.com>>on Apr. 28, 2014, 9 pages.
"Wearfin", retrieved at >on Apr. 28, 2014, 9 pages.
Agrawal et al., "Using Mobile Phones to Write in Air," MobiSys '11, Jun. 28-Jul. 1, 2011, Bethesda, Maryland, 14 pages.
Ahmad et al., "UbiHand: A Wearable Input Device for 3D Interaction", ACM SIGGRAPH 2006 Research posters, Jul. 30-Aug. 3, 2006, 1 page.
Akay, A., "Acoustics of friction," The Journal of the Acoustical Society of America, 111 (4), Apr. 2002, pp. 1525-1548, 24 pages.
Amendent/Response filed Sep. 22, 2014 to Non-Final Office Action mailed Jun. 24, 2014 from U.S. Appl. No. 13/847,900, 11 pages.
Amendment filed Jun. 14, 2016 to the Notice of Allowance mailed Mar. 22, 2016 from U.S. Appl. No. 14/489,385, 7 pages.
Amendment/Response filed Jan. 28, 2015 to Final Office Action mailed Oct. 29, 2014 from U.S. Appl. No. 13/847,900, 12 pages.
Amendment/Response filed May 11, 2015 to Non-Final Office Action mailed Feb. 18, 2015 from U.S. Appl. No. 13/847,900, 10 pages.
Amft, et al., "Sensing Muscle Activities with Body-Worn Sensors", In Proceedings of the International Workshop on Wearable and Implantable Body Sensor Networks, Apr. 3, 2006, 4 pages.
Amma et al., "Airwriting: Hands-free Mobile Text Input by Spotting and Continuous Recognition of 3d-Space Handwriting with Inertial Sensors", 16th International Symposium on Wearable Computers, Jun. 18, 2012, 8 pages.
Article 34 Demand mailed Nov. 10, 2015 from PCT Patent Application PCT/US2015/028682, 10 pages.
Chan et al., "FingerPad: Private and Subtle Interaction Using Fingertips", Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology, Oct. 8-11, 2013, pp. 255-260, 6 pages.
Chang et al., "LIBSVM: A Library for Support Vector Machines," ACM Transactions on Intelligent Systems and Technology, vol. 2, No. 3, Apr. 2011, 27 pages.
Chang, Janie, "Intuitive Uls Featured During UIST 2012", Oct. 8, 2012, retrieved at <<http://research.microsoft.com/en-us/news/features/uist2012-100812.aspx>>on Apr. 28, 2014, 4 pages.
Chang, Janie, "Intuitive Uls Featured During UIST 2012", Oct. 8, 2012, retrieved at >on Apr. 28, 2014, 4 pages.
Chen et al., "uTrack: 3D Input Using Two Magnetic Sensors", Proceedings of the 26th Annual ACM Symposium on User Interface Software and Technology, Oct. 8-11, 2013, pp. 237-244, 8 pages.
Communication pursuant to Rule 161(1) and 162 EPC mailed Dec. 15, 2016 from European Patent Application No. 15722634.1, 2 pages.
Cypress Semiconductor, "CY3290-TMA400EVK TrueTouch Gen4 Evaluation Test Kit," retrieved at <<http://www.cyrpress.com//documentation/development-kitsboards/cy2390-tma400evk-truetouch-gen4-evalutation-test-kit>>on Sep. 11, 2015, 2 pp.
Dunlop et al., "The challenge of Mobile Devices for Human Computer Interaction," Personal Ubiquitous Computing, Jan. 2002, pp. 6:235-236, 2 pages.
Eronen et al., "User Interfaces for Digital Television: A navigator Case Study," AVI 2000,ACM, pp. 276-279, 4 pages.
Final Office Action mailed Dec. 22, 2016 from U.S. Appl. No. 13/847,900, 15 pages.
Final Office Action mailed Jun. 19, 2015 from U.S. Appl. No. 13/847,900, 13 pages.
Final Office action mailed Mar. 11, 2016 from U.S. Appl. No. 13/847,900, 19 pages.
Final Office Action mailed Nov. 5, 2015 from U.S. Appl. No. 14/489,385, 16 pages.
Final Office Action mailed Oct. 29, 2014 from U.S. Appl. No. 13/847,900, 13 pages.
Genius Kye Systems Group, "Wireless Thumb Cursor Controller," retrieved on Sep. 11, 2015 from <<http://www.genuisnet.com/wSite/ct?xltem=51880&ctNode=3619&mp=1, 1 page.
Goel et al., "Surfacelink: Using Inertial and Acoustic Sensing to Enable Multi-Device Interaction on a Surface," Chi 14', Apr. 26-May 1, 2014, Toronto, Ontario, Canada, 10 pages.
Gummeson et al., "An Energy Harvesting Wearable Ring Platform for Gesture Input on Surfaces," MobiSys '14, Jun. 16-19, 2014, Bretton Woods, New Hampshire, 14 pages.
Gummeson et al., "EnGarde: Protecting the Mobile Phone from Malicious NFC Interactions," MobiSys '13, Jun. 25-28, 2013, Taipei, Taiwan, 14 pages.
Gustafson et al., "Imaginary Interfaces: Spatial Interaction with Empty Hands and without Visual Feedback", Proceedings of the 23nd Annual ACM Symposium on User Interface Software and Technology, Oct. 3-6, 2010, pp. 3-12, 10 pages.
Harrison et al., "Skinput: Appropriating the Body as an Input Surface," Proceedings of the ACM International Conference of Human-Computer Interaction, Apr. 10, 2010, 10 pages.
Harrison, et al., "Scratch Input: Creating Large, Inexpensive, Unpowered and Mobile Finger Input Surfaces", In Proceedings of the 21st Annual ACM Symposium on User Interface Software and Technology, Oct. 19, 2008, pp. 205-208.
Harrison, et al., "Tapsense: Enhancing Finger Interaction on Touch Surfaces", In Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, Oct. 16, 2011, 8 pages.
Howard et al., "Lightglove: Wrist-Worn Virtual Typing and Pointing", Proceedings of the 5th IEEE International Symposium on Wearable Computers, Oct. 8-9, 2001, pp. 172-173, 2 pages.
International Preliminary Report on Patentability mailed Aug. 1, 2016 from PCT Patent Application No. PCT/US2015/031290, 8 pages.
International Preliminary Report on Patentability mailed Aug. 17, 2016 from PCT Patent Application No. PCT/US2015/028682, 8 pages.
International Preliminary Report on Patentability mailed Oct. 1, 2015 from PCT Patent Application No. PCT/US2014/031145, 7 pages.
International Preliminary Report on Patentability mailed Sep. 22, 2015 from PCT Patent Application PCT/US2014/031145, 7 pages.
International Search Report & Written Opinion mailed Jun. 25, 2014 from PCT Patent Application No. PCT/US/2014/031145, 9 pages.
International Search Report and Written Opinion mailed Aug. 4, 2015 from PCT Patent Application No. PCT/US2015/031290, 10 pages.
International Search Report and Written Opinion mailed Jul. 28, 2015 from PCT Patent Application No. PCT/US2015/028682, 12 pages.
International Search Report and Written Opinion mailed Oct. 26, 2015 from PCT Application No. PCT/US2015/049272, 13 pages.
Kienzle et al., "LightRing: Always-Available 2D Input on Any Surface", Proceedings of the 27th Annual ACM Symposium on User Interface Software and Technology, Oct. 5-8, 2014, pp. 157-160, 4 pages.
Kim et al., "Digits: Freehand 3D Interactions Anywhere Using a Wrist-Worn Gloveless Sensor", Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, Oct. 7-10, 2012, pp. 167-176, 10 pages.
Kye Systems Corp., "Ring mouse," retrieved Jan. 29, 2013 from <<http://www.geniusnet.com/wSite/public/Mmo/4/Ring-Mousei.jpg, 1 page.
Lam et al., "MIDS: Micro Input Devices System Using MEMS Sensors", IEEE Conference on Intelligent Robots and Systems, Oct. 2002, pp. 1184-1189, 6 pages.
Liu et al., "uWave: Accelerometer-based personalized gesture recognition and its applications," Pervasive and Mobile Computing 5, 2009, pp. 657-675, 19 pages.
Lopes, et al., "Augmenting Touch Interaction through Acoustic Sensing", In Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces, Nov. 13, 2011.
Lukowicz, et al., "Detecting and Interpreting Muscle Activity with Wearable Force Sensors", In Pervasive Computing Lecture Notes in Computer Science vol. 3968, May 7, 2006, 4 pages.
Mackenzie, Scott, "Fitts' Law as a Research and Design Tool in Human-Computer Interaction", Human-Computer Interaction, Mar. 1992, vol. 7, No. 1, pp. 91-139, 49 pages.
Morris et al., "Emerging Input Technologies for Always-Available Mobile Interaction", Foundations and Trends in Human-Computer Interaction, Apr. 2011, vol. 4, No. 4, pp. 245-316, 74 pages.
Murray-Smith et al., "Stane: Synthesized Surfaces for Tactile Input," Chi 2008, Apr. 5-10, 2008, Florence, Italy, 4 pages.
Nanayakkara et al., "EyeRing: A Finger-worn Assistant", Proceedings of Extended Abstracts on Human Factors in Computing Systems, CHI'12, May 5-10, 2012, 6 pages.
Nilkura et al., "Anywhere Surface Touch: Utilizing any surface as an input area", Proceedings of the 5th Augmented Human International Conference, AH'14, Mar. 7-9, 2014, pp. 1-8, 8 pages.
Non-Final Office Action mailed Feb. 18, 2015 from U.S. Appl. No. 13/847,900, 13 pages.
Non-Final Office Action mailed Jun. 17, 2015 from U.S. Appl. No. 14/489,385, 15 pages.
Non-Final Office Action mailed Nov. 18, 2016 from U.S. Appl. No. 15/287,500, 11 pages.
Non-Final Office action mailed Oct. 5, 2015 from U.S Appl. No. 13/847,900, 13 pages.
Notice of Allowability mailed Oct. 24, 2016 from U.S. Appl. No. 14/489,385, 38 pages.
Notice of Allowance mailed Feb. 16, 2016 from U.S. Appl. No. 14/987,526, 8 pages.
Notice of Allowance mailed Jul. 6, 2016 from US. Appl. No. 14/489,385, 8 pages.
Notice of Allowance mailed Mar. 22, 2016 from U.S. Appl. No. 14/489,385, 12 pages.
Notice of Allowance mailed Sep. 9, 2015 from U.S. Appl. No. 14/273,238, 8 pages.
Ogata et al., "iRing: Intelligent Ring Using Infrared Reflection," UIST '12, Oct. 7-10, 2012, Cambridge, MA, 6 pages.
Ogris, et al., "Using FSR based Muscle Activity Monitoring to Recognize Manipulative Arm", In Proceedings of the 11th IEEE International Symposium on Wearable Computers, Jan. 2007, 4 pages.
Pedley, Mark, "Tilt Sensing Using a Three-Axis Accelerometer," Freescale Semiconductor, Doc. No. AN3461, Rev. 6, Mar. 2013, 22 pages.
Response and PCT Demand filed Nov. 18, 2015 to International Search Report and Written Opinion mailed Aug. 4, 2015 from PCT Patent Application No. PCT/US2015/031290, 8 pages.
Response filed Feb. 22, 2016 to the Final Office Action mailed Nov. 5, 2015 from U.S. Patent Appl. No. 14/489,385, 11 pages.
Response filed Jan. 5, 2016 to the Non-Final Office action mailed Oct. 5, 2015 from U.S. Appl. No. 13/847,900, 10 pages.
Response filed May 17, 2016 to the Final Office Action mailed Mar. 11, 2016 from U.S. Appl. No. 13/847,900, 11 pages.
Response filed May 17, 2016 to the Final Office Action mailed Mar. 11, 2016 to U.S. Appl. No. 13/847,900, 11 pages.
Response filed Sep. 14, 2015 to the Non-Final Office Action mailed Jun. 17, 2015 from U.S Appl. No. 14/489,385, 10 pages.
Response filed Sep. 16, 2015 to Final Office Action mailed Jun. 19, 2015 from U.S. Appl. No. 13/847,900, 13 pages.
Response filed Sep. 25, 2016 to the Non-Final Office Action mailed Jun. 24, 2016 from U.S Patent Appl. No. 13/847,900, 12 pages.
Saponas et al., "PocketTouch: Through-Fabric Capacitive Touch Input", Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, Oct. 14, 2011, 1 page.
Schlomer et al., "Gesture Recognition with a Wii Controller," TEI '08, Feb. 18-20, 2008, Bonn, Germany, pp. 11-14, 4 pages.
Second Written Opinion mailed Apr. 28, 2016 from PCT Application No. PCT/US2015/028682, 7 pages.
Shepard et al., "LiveLab: Measuring Wireless Networks and Smartphone Users in the Field," ACM SIGMETRICS Performance Evaluation Review, 2011, 38(3), pp. 15-20, 6 pages.
Shilkrot et al., "FingerReader: A Wearable Device to Support Text Reading on the Go", Proceedings of Conference on Human Factors in Computing Systems, Apr. 26-May 1, 2014, 6 pages.
Sturman et al., "A Survey of Glove-based Input", IEEE Computer Graphics and Applications, Jan. 1994, vol. 14, No. 1, pp. 30-39, 10 pages.
Texas Instruments, "HF Antenna Design Notes," Technical Report, SCBA034, Sep. 2003, 51 pages.
U.S. Appl. No. 13/847,900, filed Mar. 20, 2013 Priyantha et al.
U.S. Appl. No. 14/273,238, filed May 8, 2014 Priyantha et al.
Wolf et al., "Tickle: A Surface-independent Interaction Technique for Grasp Interfaces", Proceedings of the 7th International Conference on Tangible, Embedded and Embodied Interaction, TEI 2013, Feb. 10-13, 2013, 8 pages.
Yang, et al., "Magic Finger: Always-Available Input through Finger Instrumentation", In Proceedings of the 25th Annual ACM Symposium on User Interface Software and Technology, Oct. 7, 2012, pp. 147-156.
Zhang et al., "A Ring-shaped Interactive Device for Large Remote Display and Mobile Device Control," Proceedings of the 13th International Conference on Ubiquitous Computing (UbiComp '11), Sep. 17, 2011, Beijing, China, 2 pages.
Zhang, et al., "A Ring-Shaped Interactive Device for Large Remote Display and Mobile Device Control", In Proceedings of the 13th International Conference on Ubiquitous Computing, Jul. 17, 2011, pp. 473-474.
US10101887B2 (en) 2018-10-16 Device, method, and graphical user interface for navigating user interface hierarchies
EP3170062B1 (en) 2019-08-21 Raise gesture detection in a device
US10162512B2 (en) 2018-12-25 Mobile terminal and method for detecting a gesture to control functions
US10126826B2 (en) 2018-11-13 System and method for interaction with digital devices
US9081571B2 (en) 2015-07-14 Gesture detection management for an electronic device
US20130271350A1 (en) 2013-10-17 Multi-segment wearable accessory
US9535506B2 (en) 2017-01-03 Efficient gesture processing
EP3108351B1 (en) 2019-05-08 Activity continuation between electronic devices
JP6509486B2 (en) 2019-05-08 Wearable electronic device
US9791957B2 (en) 2017-10-17 Dynamic input at a touch-based interface based on pressure
CN100445937C (en) 2008-12-24 Handwriting path identifying system and method
US10139915B1 (en) 2018-11-27 Gesture-based small device input
AU2013260682B2 (en) 2019-05-16 Transition and interaction model for wearable electronic device
AU2013260681B2 (en) 2019-08-15 Controlling remote electronic device with wearable electronic device
US9405379B2 (en) 2016-08-02 Classification of user input
KR20140064688A (en) 2014-05-28 Placement of optical sensor on wearable electronic device
US9229489B2 (en) 2016-01-05 Adjusting mobile device state based on user intentions and/or identity
KR20140064693A (en) 2014-05-28 User gesture input to wearable electronic device involving movement of device
EP2733598B1 (en) 2019-04-03 GUI transitions on wearable electronic device
US9880620B2 (en) 2018-01-30 Smart ring
KR20140064694A (en) 2014-05-28 User gesture input to wearable electronic device involving outward-facing sensor of device
CN103793075B (en) 2017-02-15 Recognition method applied to intelligent wrist watch
US10423214B2 (en) 2019-09-24 Delegating processing from wearable electronic device
KR20160128378A (en) 2016-11-07 Text input on an interactive display
Feldman et al. 2005 ReachMedia: On-the-move interaction with everyday objects
Owner name: MICROSOFT CORPORATION, UNITED STATES
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:PRIYANTHA, NISSANKA ARACHCHIGE BODHI;LIU, JIE;SIGNING DATES FROM 20140507 TO 20140522;REEL/FRAME:032960/0096
|
cc/2020-05/en_middle_0032.json.gz/line8231
|
__label__wiki
| 0.960867
| 0.960867
|
On the Campus Taking aim at comedy; grad students at Terrace
By David Walter ’11
Published in the January 19, 2011 Issue
Michael Witte ’66
“We’re crazy tonight!” exclaimed senior Willie Myers at the start of a late-November rehearsal for the Quipfire! comedy team.
But there’s a method to the madness. Visits with several Princeton comedy groups suggested that there’s no such thing as an easy laugh. Consistently good humor demands consistent, concerted effort.
Quipfire!, one of Princeton’s two improvisational humor troupes (the other is Fuzzy Dice), performs throughout the year. The “crazy” November rehearsal the group held in a Jones Hall seminar room was one of many in advance of the group’s December shows.
Instead of working from scripts, Quipfire! performers create sketches on the fly using short audience prompts. Improv practice helps the group’s nine members sharpen their scene-building skills and comedic timing.
In sets of three and four, the rehearsing performers took turns acting out practice prompts. “Bottleneck” set the stage for a shootout in a ChapStick factory; “Crouching” concerned a family’s tumultuous visit from Aztec god Quetzalcoatl.
But calamitous incident alone does not a successful scene make. The best skits, members say, grow out of recognizable relationships, some core relatable truth.
Another comedy group, Princeton South Asian Theatrics (PSAT), writes and performs two full-length plays a year (again: effort!). Its latest debuted the weekend of Dec. 3, a crime caper called Dial M For Marriage Murder.
PSAT, which bills itself as “the nation’s first South Asian theater group,” was founded in 1998 as a more drama-minded organization, said junior Myra Gupta, PSAT’s co-president.
“Over the years, we realized that Indian accents are maybe the funniest things in the entire world, so we decided to make our plays exclusively comedies,” Gupta said.
At a November run-through of Dial M, a full complement of Indian accents was on display, ranging from Telugu in the east to Gujarati in the west.
Most performers just imitate their parents, Gupta said.
With a 26-actor cast, rehearsals were a complex undertaking. The play’s setting, an Indian wedding, calls for many large, tumultous crowd scenes, some of which feature a cow. “Of course there’s a cow,” Gupta said. “It’s Indian.”
In addition to leading PSAT, Gupta also serves as the editor-in-chief of The Princeton Tiger, which stands apart from other Princeton humor groups for its focus on the printed word.
Weekly meetings at 48 University Place are one venue for Tiger staff members to pitch possible article ideas.
“An amazing new superhero comic: The Five-O’Clock Shadow.”
“Time magazine’s 100 least-influential people.”
“Feminist Spanish teacher refuses to do masculine words.”
But times are changing.
Financial constraints have led the magazine, first published in 1882, to cut back its print run from six to two issues a year. Most articles now find an exclusive home on Tiger’s revamped website (www.tigermag.com).
The switch to Web publishing has also spurred Tiger’s expansion into a newer medium: the YouTube video.
Last spring, Tiger debuted “Discussions in Contemporary Poetry with Paul Muldoon,” in which Tiger president Jim Valcourt ’12 leads the Pulitzer-winning poet in a deconstruction of “Tik-Tok,” a song by dance-pop singer Ke$ha (Muldoon: “Tik-Tok ... I mean that’s time, you know what I’m saying?”). The video was picked up by a number of media outlets.
Fall brought “Welcome To Princeton,” a collaboration with the Undergraduate Student Government in which the ghost of Woodrow Wilson 1879 shows a new student that “there’s a lot more to Princeton than using grade deflation as a scapegoat.” The video features a senior member of the University administration in a last-minute cameo.
The group is hard at work filming new mini-movies, and Valcourt sees a strong digital future for his storied publication.
“There will never be a shortage of things to ridicule,” he said.
By Carolyn Edelstein ’10 GS
Members of Terrace Club voted Dec. 7 to broaden its membership, opening its doors to as many as 10 graduate students this spring.
During a debate over pitchers of homemade spiked cider, some members of the eating club voiced concerns that grad students would usurp undergraduate spots (they will not, promised Ricardo Lopez ’12, the club’s president-elect). Another said that the presence of grad students might deter sophomores from joining Terrace. To vociferous support, Rachel Jackson ’11 countered that the Terrace community is famed for its inclusiveness and embrace of the eclectic values that appeal to individuals from both student populations.
Still, Terrace members said that graduate students who join the club likely would be a narrow, self-selecting group.
The club’s graduate board voted in favor of admitting a small number of graduate students a few years ago, but the experiment was short-lived, said Harold Helms ’56, who chairs the board.
Grad students struggled to pay the full club fee, which covers all meals and social events. The fee is now $7,200 per year, and Lopez hopes to negotiate a shared-meal plan option with the University to subsidize the membership cost and allow grad students to take meals at Terrace and other locations.
Jason Wexler GS, who frequents the club’s live concerts, said that though he would not want to give up the graduate-student environment of Procter Hall, a split-meal plan with Terrace “would offer a nice change from the dining hall setting.”
President Tilghman voiced support for Terrace’s plans as a move to help bridge the divide between undergraduate and grad students “in line with measures the University has taken, including the creation of Campus Club and the introduction of resident graduate students at the residential colleges.”
Likewise, Khee-Gan Lee GS, communications director for the Graduate Student Government, wrote in a letter to The Daily Princetonian that Terrace’s move “would be a step forward in the integration and acceptance of graduate students in the University.”
But Alan Futran and Stephanie Amato, first-year chemical engineering students, said they are not inclined to join an undergraduate club. “I think we grad students feel like we have been there, done that,” Amato laughed.
Read letters and comments from PAW’s Inbox
At home at Terrace
By Alan Johnson *08
Wilson School auction helps at-risk youth
Pranks for the memories
The very best of student escapades
|
cc/2020-05/en_middle_0032.json.gz/line8233
|
__label__wiki
| 0.579037
| 0.579037
|
The Stuart court and Europe : essays in politics and political culture /
edited by R. Malcolm Smuts.
Cambridge ; New York : Cambridge University Press, 1996.
xiii, 289 p. : ill. ; 24 cm.
052155439X (hc)
UTL at Downsview
May be requested
DA375 .S83 1996 SCAR
DA375 .S83 1996X
Trinity College (John W Graham)
DA375 .S83 1996 TRIN
UofT at Mississauga
DA375 .S83 1996 ERIN
Victoria University CRRS
Library use only
DA375 .S89 1996
Europe--Foreign relations--Great Britain.
Great Britain--Court and courtiers--History--17th century.
Great Britain--Foreign relations--Europe.
added author
Smuts, R. Malcolm (Robert Malcolm)
The Stuart court and Europe : essays in politics and political culture / edited by R. Malcolm Smuts.
Includes bibliographical references and index.
"Expert analysis on international themes will certainly attract many to this collection."Greg McNamara, Sixteenth Century Journal
"...readers can agree with Parker that Smuts'contributors have provided generally"excellent papers"(p. 282)on a theme of wide and enduring interest." Albion
"This has interdisciplinary dimensions and will be of interest to many students of the period, political as well as cultural." Frank T. Melton, Canadian Journal of History
To find out how to look for other reviews, please see our guides to finding book reviews in the Sciences or Social Sciences and Humanities.
This interdisciplinary collection examines the multiple ties that connected the Stuart court to Europe, and the ways in which these shaped English politics and political culture. Together, the essays demonstrate that even the domestic history of the period can only be understood fully by taking into account the international horizons, concerns and affiliations of the British ruling elite. The opening essays by Jonathan Scott develop a provocative overview of the whole period. The remaining contributions examine topics such as the European roots of common law thought; the nature of national identity; the use of visual display in conveying the grandeur of kingship; the religion of Charles II; and the role of Charles's French mistress, the duchess of Portsmouth, in English and international politics. A concluding chapter by Geoffrey Parker suggests several new avenues for placing the British Isles within a European perspective.
This interdisciplinary collection stresses the cosmopolitan nature of society, politics and culture at the Stuart court, and the importance of this cosmopolitanism in shaping political life and culture well beyond the court itself. The essays deal with the actual operation of the court, politics, and the systems of cultural meaning in which political life was embedded. Also included are a provocative overview of the whole period by Jonathan Scott, and a concluding chapter by Geoffrey Parker that suggests several new avenues for placing the British Isles within a European perspective.
This interdisciplinary 1996 collection examines the multiple ties that connected the Stuart court to Europe, and the ways in which these shaped English politics and political culture. Together, the essays demonstrate that even the domestic history of the period can only be understood fully by taking into account the international horizons, concerns and affiliations of the British ruling elite. The opening essays by Jonathan Scott develop a provocative overview of the whole period. The remaining contributions examine topics such as the European roots of common law thought; the nature of national identity; the use of visual display in conveying the grandeur of kingship; the religion of Charles II; and the role of Charles's French mistress, the duchess of Portsmouth, in English and international politics. A concluding chapter by Geoffrey Parker suggests several new avenues for placing the British Isles within a European perspective.
Description for Bookstore
This interdisciplinary collection stresses the cosmopolitan nature of society, politics and culture at the Stuart court, and the importance of this cosmopolitanism in shaping political life and culture well beyond the court itself. The essays deal both with the actual operation of the court, politics, and the systems of cultural meaning in which political life was embedded.
Description for Library
This interdisciplinary collection stresses the cosmopolitan nature of society, politics and culture at the Stuart court, and the importance of this cosmopolitanism in shaping political life and culture well beyond the court itself. The essays deal both with the actual operation of the court, politics, and the systems of cultural meaning in which political life was embedded. Also included are a provocative overview of the whole period by Jonathan Scott, and a concluding chapter by Geoffrey Parker which suggests several new avenues for placing the British Isles within a European perspective.
This interdisciplinary 1996 collection stresses the cosmopolitan nature of society, politics and culture at the Stuart court, and the importance of this cosmopolitanism in shaping political life and culture well beyond the court itself. The essays deal both with the actual operation of the court, politics, and the systems of cultural meaning in which political life was embedded.
England's troubles, 1603-1702
The ancient constitution reassessed
The common law, the court and the languages of politics in early modern England
The invention of Britain and the early Stuart masque
Art and the material culture of kingship in early Stuart England
The Hector of Germanie, or the Palsgrave, Prime Elector and Anglo-German relations of early Stuart England: the view from the popular stage
Old English honour in an evil time: aristocratic privilege in the 1620s
The theatre of dynasty Caroline
French philosophy and English politics in interregnum poetry
'Crouching at home and cruel while abroad': Restoration constructions of national and international character Annabel Patterson
The religion of Charles II
The duchess of Portsmouth: English royal consort and French politician
The world beyond Whitehall
This information is provided by a service that aggregates data from review sources and other sources that are often consulted by libraries, and readers. The University does not edit this information and merely includes it as a convenience for users. It does not warrant that reviews are accurate. As with any review users should approach reviews critically and where deemed necessary should consult multiple review sources. Any concerns or questions about particular reviews should be directed to the reviewer and/or publisher.
|
cc/2020-05/en_middle_0032.json.gz/line8243
|
__label__cc
| 0.601167
| 0.398833
|
Things to do in Singapore
Seek To Travel editor | January 19, 2019
A small-city state in Southeast Asia, Singapore, attracts people with its classic combination of beauty and modern technology. Founded in 1819 as a British colony, Singapore is now known as an international financial center and one of Asia’s trade tigers.
It is a flourishing metropolis providing a first-class infrastructure, fully-linked transportation system, positive business environment, brilliant living amenities, and a rich culture mainly influenced by the four prime communities; Chinese, Malay, Indian, and Eurasian.
This region possesses a great wealth of historical treasures from the past in the form of ancient buildings, customs and values, even after undergoing extreme social and geographical changes.
With an extensive array of incredible sights, high-end shopping centers, and delectable culinary choices, Singapore never fails to dazzle the tourists by its charm and beauty. Every new year, Singapore brings unmissable events, festivals and new points of interest.
There are so many things that can make your trip memorable in Singapore. Here are the 10 things to do in Singapore that you certainly wouldn’t want to miss.
Best Things to do in Singapore
HSBC Women’s World Champions (HWC) Event
Singapore International Festival of Arts
Singapore River Festival
The Singapore Flyer!
The World Gourmet Summit
For Best Flight and Hotels Deals, Check Below
1: Get Lucky by Celebrating Chinese New Year
Overview: Also called the Lunar New Year or the Spring Festival, Chinese New Year is the most famous Chinese event.
Main Attraction: Every year, between January and February, the whole Chinatown comes together to see the streets illuminated with the bright and beautiful lanterns. It continues for almost a month, making people soak in the festive mood with lively dragon dances, colorful processions and parades, night markets, and decorated houses.
Exchanging mandarin oranges for good luck, giving money-filled envelopes to kids, and feasting with family and friends on unique dishes is truly an experience not to be missed. This is also a fantastic option if you’re considering what things to do in Singapore with kids.
Related Article: Things to do in Thailand
2: Catch the Top Sporting Action at HSBC Women’s World Champions (HWC) Event
Overview: With the top women golfers invited and numerous local and international music performances, HSBC Women’s World Champions guarantees sports fans a great time. Various Olympic gold-medalists and champions have made a stunning comeback on this event.
Main Attraction: This four-day tournament will be held from 28 Feb, bringing the best 20 players from the Rolex Women’s World Ranking to the greens at Sentosa Golf Club. Edge-of-your-seat golf action aside, this event is also known for an exciting line-up of music and food offerings in the club.
At this electrifying tournament, you can watch the world’s best professionals in action while tucking into delectable foods from world-class restaurants and enjoying the amazing performances by local and international DJs.
Related Article: Most Instagrammable places in Australia
3: Attend the Prestigious Singapore International Festival of Arts (SIFA)
Overview: Organized by Arts House Limited, it is one of the significant festivals in the regional arts category.
Main Attraction: This festival is usually held in the middle of the year and stretches for a month from May to June. It includes theatre, music, dance along with other categories. SIFA wishes to encourage diverse audiences through great artistic experiences by bringing local and global performers together.
From great international film screenings to lively street performances, Singapore celebrates the art with a smorgasbord of dance, music, paintings, and theatre shows. This festival is a “must-do” for art buffs travelling to Singapore.
Related Article: Things to do in Bali
Travelling soon? Don’t forget to get a Travel Insurance. Checkout the price, takes just a minute
4: Celebrate Great Heritage with Singapore River Festival
Overview: Every year, this festival stays for a week from October to November and features performances and parades along the Singapore River. The Singapore River Festival combines the three quays: Clarke Quay, Boat Quay, and Robertson Quay to offer wonderful carnival activities to make your time extra memorable.
Main Attraction: To celebrate the heritage and people, the Festival brings the largest markets across Clarke Quay, movie screenings, circus and theatre performances, kites, light shows, game shows, magic shows, themed parties, and food stalls.
Noting this festival’s slogan Your River, Your Vibe different activities are offered to appeal to an even wider audience than previous years.
Related Article: Things to do in Tokyo
5: Visit the Resplendent Raffles Hotel
Overview: Like many buildings, the Raffles Hotel gets its name from the founder of modern Singapore, Sir Stamford Raffles. This hotel was founded in 1887 and has become a classic landmark throughout the Far East, attracting celebrity guests including Queen Elizabeth II and Charlie Chaplin, amongst others.
Main Attraction: Visiting a place like Raffles Hotel is truly an excellent experience as it is a historical, luxurious hotel that has kept its traditions and aesthetics since the day it was opened. You certainly would have an incomplete experience at Raffles Hotel if you don’t try their iconic cocktail the Singapore Slinger.
Related Article: Things to do in Osaka
6: Spend a Day at Sentosa Island
Overview: A must-see place in Singapore, Sentosa Island, also called Asia’s favorite playground, is fifteen minutes away from Singapore downtown. This gorgeous piece of land draws the attention of around 20 million visitors annually.
Main Attraction: Sentosa Island is an incredible playground that has something for everyone. From water activities including the compilation of water parks, beach clubs, Dolphin Lagoon, and Underwater World Singapore, and mountainous adventure such as cable car, etc. to historical forts and shopping centers and restaurants, Sentosa has great chunks of fun and entertainment to make your trip exciting and thrilling.
Other great attractions like Madame Tussauds wax museum and Universal Studios amusement park are located on Sentosa Island to provide endless fun to the visitors. With numerous fun-filled activities for everyone, Sentosa may have you wishing you could extend a few days in Singapore to a 365 day sajourn.
Related Article: Things to do in Singapore on a Budget
Search for Best flight deals online
7: Immerse Yourself in Chinese Culture in Chinatown
Overview: From ancient temples and old shophouses to modern boutiques and chic restaurants – this place gives visitors a glimpse of the old and new culture. For a real Chinese experience, explore the alleyways of Chinatown.
Main Attraction: This gold mine of Chinese heritage has Singapore’s oldest temple Thian Hock Keng (which was constructed without the use of nails!).
Then, there is a Chinatown Heritage Center that will definitely take you back in time, a four-story Buddha Tooth Relic Temple that showcases over 300 Buddhist artifacts from different Asian regions, and a street market where you can gorge on scrumptious food. A visit to Chinatown can also be a good choice if you’re looking for Things to do in Singapore on a budget.
Related Article: Things to do in India
8: Ride the Singapore Flyer
Overview: Since 2008, the Singapore Flyer has been lifting people 540 ft high into the air. It is, of course, one of the world’s largest observation wheels, providing 360⁰ panoramic views of the city. With 28 air-conditioned glass capsules, Singapore Flyer has become the biggest billing attraction in the entire city-state.
Main Attraction: If you ride on a cloudless day, you may be fortunate enough to see as far as Indonesia and Malaysia. While visiting the Singapore Flyer, you can enjoy fun-filled and relaxing activities like riding e-bicycles, e-scooters, hoverboards, pampering yourself at the spa, watching movies in the XD theatre, or having cocktails, Champaign or a “high in the sky” dining experience.
This has also got to rank as one of the best things to do in Singapore at night.
Related Article: Weird Things to do in Japan
9: Stroll Through the Singapore Botanic Gardens
Overview: Inaugurated in 1859, the Singapore Botanic Gardens is the country’s first UNESCO Heritage Site.
Main Attraction: It is one of Singapore’s largest green spaces, home to the National Orchid Garden, that boasts the globe’s biggest orchid display with more than 60,000 plants and orchids. SBG houses three beautiful lakes, from which the Swan Lake is the most gorgeous.
This place has private tour guides to offer insights into the importance of the plants displayed. While being a famous and favorite place for walking or jogging, it is also a prime center for horticultural research.
Moreover, multimedia botanical exhibits are displayed at the SBG Heritage Museum to provide details of the Garden’s rich heritage.
This beautiful 60-acres land lets you marvel at the futuristic beauty of Singapore and spend your whole day amidst the wonders of nature.
Related Article: Things to do in Phuket
10: Indulge in the Finest World Cuisines at World Gourmet Summit
Overview: It is a spectacular event, held every year in April, that provides an epicurean platform to meet the globe’s leading chefs and wine specialists showing their remarkable skills. The World Gourmet Summit features only Michelin starred cooking masters and exhibits an amazing spread of gastronomic experiences for the fine dining fanatics.
Main Attraction: For wine enthusiasts, there are special wine tasting sessions where you get to sample the wines from Tuscany and Burgundy. Besides eating, foodies can speak to the world-renowned chefs or participate in live cooking workshops. So, if you want to celebrate food with your closed ones, attend the delicious World Gourmet Summit.
Plan your holiday:
We recommend Bookings.com for Accommodation Deals – Check here
We recommend World Nomad for Travel Insurance. Its super quick to check the price. Check price here
Flight Deals:
We recommend Skyscanner. Check the deals here
Car Rentals:
We recommend CarRentals.com
We recommend Books and Ebooks from Lonely Planet
For over a century, Singapore has been considered one of the most modern and attractive locations in the world. Its unusual cultural tapestry offers people great sightseeing, shopping, and culinary opportunities.
A calendar fully-loaded with traditional festivals and celebrated all around the year adds to its ethnic charm. From beautiful islands and remarkable skyscrapers to thrilling events and exciting nightlife, there are so many things that invite the people to discover every facet and corner of this elegant city-state.
Those planning to visit Singapore should prepare themselves for a trip of the lifetime.
Which of these things will you do or have done in Singapore ?
Please comment below, we would love to hear from you.
#Asia
#Gardens
#Island
15 Best Things to Do in Seoul You Must Experience – Mostly Free
Ultimate Nusa Dua Guide | Things to do, Tips and more (2020)
Things To Do In Bali – Only Guide You Will Need in 2020
10 Unique Things To Do In India – Suggested by the Locals (2019)
Complete Guide To Hire A Private Driver In Bali (2020 Guide)
Things To Do In Bali With Family ( 2020 Guide )
21 Best Things to do in Seminyak | The Ultimate Guide ( 2020 )
15 Best Things to do in Tokyo – The Ultimate Guide 2019
20 Things to do in Thailand
|
cc/2020-05/en_middle_0032.json.gz/line8246
|
__label__wiki
| 0.503568
| 0.503568
|
Lyle Taylor
Bustling striker Lyle is a prolific goalscorer and a Montserrat international.
A Millwall Academy product, the lethal forward had a spell with Bournemouth before hitting remarkable form with Falkirk in the Scottish Division One.
After an impressive 29 goals in one season for the Bairns, including two hat-tricks, Lyle moved back to England with Sheffield United.
Two loan spells at Partick Thistle either side of a move to Scunthorpe yielded more goals and AFC Wimbledon snapped him up in 2015.
The striker’s 23 goals played a crucial part in the Dons’ promotion to League One in 2016, including a strike in the play-off final against Plymouth Argyle.
Lyle continues to be a potent forward in League One and he scored his first Dons’ hat-trick against Rotherham United in October 2017. Lyle joined Charlton Athletic in the summer of 2018.
Lyle signed for Charlton Athletic from AFC Wimbledon in July 2018.
Lyle Taylor goes PINK for October
Everyone please go check out Lyle Taylors social media pages for all the links to donate to help this great cause for Cancer Research UK. Lyle will 'GO PINK' for the 2nd October running and has again dyed his hair PINK and will wear PINK boots to support this amazing cause. Everyone is getting behind Lyle and we ask you to please support this great cause. Well done again Lyle such an amazing gesture again.
Lewis Miller signs contract extension
LT9 FIFA19 TOTS
Lyle Taylor has finally got his hands on his very own EA Sports FIFA 19 TOTS card! Just reward after such an unbelievable season, 25 goals and 14 assists was the obvious reason you received this Lyle, well done!!
|
cc/2020-05/en_middle_0032.json.gz/line8252
|
__label__cc
| 0.667378
| 0.332622
|
InC-Assurance
AD Alternative Means - 2013
Questions for Microsoft
InCommon Assurance Program
AD Silver Cookbook
Created by Ann West (internet2.edu), last modified by David Walker on Jul 12, 2013
On October 6, 2011, Steven VanRoekel, the Federal Chief Information Officer, issued a memorandum (http://www.howto.gov/sites/default/files/omb-req-externally-issued-cred_0.pdf), specifying a timetable for federal agencies to begin leveraging externally-issued credentials. The Federal Identity, Credential, and Access Management Subcommittee (FICAM - http://www.idmanagement.gov/pages.cfm/page/ICAM) is named as responsible for certifying the entities that may issue such credentials.
InCommon (http://www.incommon.org) is a Trust Framework Provider, certified by FICAM under the Trust Frame Provider Adoption Process (TFPAP - http://www.idmanagement.gov/documents/FICAM_TFS_TFPAP_v1.1.0.pdf) at assurance levels 1 (InCommon Bronze) and 2 (InCommon Silver). As a certified trust framework provider, InCommon is authorized to certify campuses to issue identity assertions over the Internet to government agency service providers at assurance levels 1 and 2. The documents governing InCommon's trust framework are available at http://www.incommon.org/assurance/components.html; of particular relevance here is "Identity Assurance Profiles - Bronze and Silver" (IAP - http://www.incommon.org/docs/assurance/IAP.pdf).
The InCommon Assurance Program is currently sponsoring a group of university representatives who are exploring means that can be used to certify for InCommon Silver when password credentials used for Silver-level authentication are stored in an Active Directory instance. "IAP Requirements and Gaps for Active Directory Domain Services" (https://spaces.at.internet2.edu/x/BA8wAg) is a brief summary of that work.
Finally, universities are (multi-vendor) "BYOD" environments. While standards for end-user devices are often established, typically little enforcement is exercised over the types and configuration of devices that may be used to access services. It is important that services be capable of protecting themselves from non-compliant end-user behavior.
Protected Channels - IAP 4.2.3.6.1b - Gaps
RC4 HMAC encryption is not NIST or FIPS approved, and we would like to determine if it's comparable to those methodologies that are. Can you help with this? (See http://www.incommon.org/assurance/alternativemeans.html for the criteria we will consider.)
Currently, it is not very practical to crack RC4 HMAC, even though it has long-known vulnerabilities. If that were to change (e.g., a simple crack program posted on the Internet), does Microsoft have a response procedure for such compromises? How will this procedure protect Microsoft's customers that may be operating at LoA-2 via an alternate means exception?
What encryption algorithms does Windows Secure Channel use?
What's the impact of turning on the FIPS setting on all Domain Clients? What's the impact on Domain Controllers?
As NIST has observed, the initial key used by Kerberos is typically encrypted only by the user's password, which enables brute force attacks against the password. Does AD have mitigation for this? Does NTLMv2 also have this vulnerability?
For reference to this issue see NIST 800-63-1, the following sections:
Section 3: The definition of Kerberos on page 10, calling out known vulnerabilities against offline attacks
Section 8.2.2, Footnote #26, which defines criteria for "impractical" eavesdropping attacks
Section 9.3.2.2, describing that "...the use of Kerberos keys derived from user generated passwords is not permitted at Level 2 or above."
What should one do to enable distinguishing between NTLM v1 and v2 in the logs? We would like to downgrade a user's assurance level if they access a service that employs NTLM v1. To generalize, we're looking to detect the overall technical context of the authentication event: protocol, encryption algorithm, tunnel, client platform options, etc. Is this information available?
When BitLocker full disk encryption is used are disk sectors decrypted only as they are read? What is the recommended/supported BitLocker configuration for use with AD-DS?
Does Syskey use NIST/FIPS Approved Algorithms for encryption?
Are AD-DS password credentials replicated and stored by other Microsoft identity management components, such as ADFS or Azure services? If so, what are those components?
Does Microsoft have a strategy for supporting compliance with the Federal Identity, Credential, and Access Management (FICAM) requirements at LoA-2, perhaps through Microsoft's partnership with the Kantara Initiative? If so, what is the time frame?
Does Microsoft have a strategy for AD integration of non-Windows and old-Windows client platforms that will use NIST/FIPS approved algorithms for transport of passwords over a network? If so, what is the time frame?
Is it possible to configure AD so that the NetUserChangePassword and NetUserSetInfo protocols require NIST approved algorithms for encrypting the session over which the password data is passed?
Reviewing "IAP Requirements and Gaps for Active Directory Domain Services" overall, are there other issues we should address?
{"serverDuration": 83, "requestCorrelationId": "21740c57ad3964bf"}
|
cc/2020-05/en_middle_0032.json.gz/line8257
|
__label__wiki
| 0.796333
| 0.796333
|
Ready to research House of Marley and discover 10,000 other top national sponsors?
USA-MI
House of Marley viewed 0 seconds ago
Nevada Donor Network viewed 24 seconds ago
Tyra Beauty viewed 25 seconds ago
Working together for a better world, The House of Marley was created from the belief in Bob Marley’s vision of “One World, One Love”. Driven by the desire to bring joy and spread happiness to people around the world, The House of Marley developed a range of earth-friendly, innovative products that adhere to the Marley family core values: equality, unity, authenticity, charity and sustainability. The first phase includes a line of consumer electronics including boom boxes, docking stations, ear buds and headphones. The second phase will include categories such as luggage, bags, kitchenware, aromatherapy, and sensory products such as soy-based, organic candles.
House of Marley signs deal with Florida Surfing Championships
See more updates for House of Marley
This SponsorPitch page is about House of Marley and contains information about this organization's sponsorship activity, sponsorship decision makers and sponsorship preferences. This page is not endorsed by or affiliated with House of Marley, though it may be actively managed and updated by company representatives. If you currently work at this organization, click the Manage Sponsor button to request management privileges. . All trademarks, service marks and copyrights are property of their respective owners.
|
cc/2020-05/en_middle_0032.json.gz/line8259
|
__label__cc
| 0.64581
| 0.35419
|
10 Best Themed Hotels Across America
By Mia Maguire February 8, 2019
Image courtesy of Madonna Inn
* America is the home to some of the best themed hotels in the world
* Stay somewhere out of the box for your next vacation
* Whether you’re a sci-fi fan or art lover, our list has the place for you
If you’re planning a domestic vacation and want to stay somewhere a little bit different than your standard hotel, read on for the best themed hotels across the country, for a lodging experience you’ll never forget.
1. The Red Carpet Inn & Greenwood Fanta Suites Hotel
Located 15 minutes south of downtown Indianapolis, this eclectic hotel looks pretty unassuming from the outside, but step into one of their 20 themed suites, and you’ll see that this hotel has some pretty stellar accommodations. Notable themed-suites include the “Space Odyssey” (pictured below), “Alien Invasion,” “Cinderella,” and “Casino Royale.” Each elaborately decorated room is outfitted to look like a movie set, for a lodging experience that you will surely never forget. Despite the kitschy interior, each suite is well equipped with luxury amenities to keep you comfortable and feeling at home–despite the otherworldly setting.
1 Person Commenting
Ron Ablang
Wouldn't be nice to see each of these on a map of the United States so you...
Wouldn’t be nice to see each of these on a map of the United States so you…
Image courtesy of Greenwood Fantasy Suites
Buy: 21c Museum Hotel $246.00+
2. 21c Museum Hotel
Art museum or hotel? The line is blurred at this upscale hotel chain that functions as both. With locations in Nashville, Lexington, Durham, Kansas City, Oklahoma City and more, this chic hotel maintains its artistically flavored boutique appeal, while still remaining accessible to accommodate those travelling throughout America. Each hotel location has a permanent collection of works, as well as a rotating exhibition curated with a variety of themes that feature both established and up and coming artists from across the globe. Our favorite 21c location is the Cincinnati, OH branch, which has a lobby filled with contemporary art pieces spanning across a wide variety of art genres and mediums. Some of the most well-known pieces in their collection include photographs from Chuck Close along with mixed media works by Andreas Serrano.
Image courtesy of 21c Museum Hotels
3. The Clown Motel
This Tonopah, NV joint may or may not be haunted, but it certainly wins for most offbeat and kitschy hotel of the list. Located in a small mining town between Las Vegas and Reno, the campy motel’s fright factor is amplified by its neighboring proximity to the historic (and unlit) Old Miner’s Cemetery. Despite its unsettling surroundings, the current owner adamantly insists that the actual motel is not haunted. It is, however, home to over 600 clowns–in the form of images and figurines, to be clear, but those with coulrophobia (fear of clowns) can be somewhat soothed, as the motel will gladly remove clown imagery from the room upon request–though you’ll have to shut your eyes in the clown-infested lobby. A recent study suggested that Americans are more afraid of clowns than climate change, so this desert motel will test your courage for both phobias.
Photo courtesy of Trip Adviser
Buy: The Clown Motel Prices Vary
4. The Stanley Hotel
While this hotel doesn’t fit neatly into the “themed hotel,” category, its grand stature and pop culture connection make it an apt inclusion on our list. This hotel is the site responsible for inspiring Stanley Kubrick’s iconic film adaptation of Stephen King’s, The Shining. Apparently, after Kubrick and his wife stayed at the hotel in room 217 (still the most requested guest room today) the iconic film director was convinced the hotel was haunted, and eventually lead to his conception of the classic thriller. And despite its significance in the film canon, this stately hotel is packed with both historic charm and modern amenities for the ultimate lodging experience when visiting the Rocky Mountains. The grand hotel opened back in 1909 and has been rumored to be haunted. Despite the otherworldly rumors, staying at the hotel comes with a handful of complimentary perks including in-room hot tubs, ghost-themed tours, continental breakfast and stunning mountain views.
Image courtesy the Stanley Hotel
Buy: The Stanley Hotel $329.00+
5. Dog Bark Park Inn
Located in Cottonwood, ID, this beagle-shaped hotel has become recognized as one of America’s best roadside attractions and a cultural landmark for the state. This “mom and pop” shop is actually owned by a husband and wife (both artists) who opened the inn in 1997. The Dog Bark Park offers guests a truly nostalgic experience, designed to help you enjoy the simpler things in life. Instead of the televisions and high-tech computer, the inn is stocked with a variety of cards and board games for your entertainment–though WiFi is now enabled in the hotel. Naturally, this inn is pet-friendly for a small additional fee.
Image courtesy of TripAdvisor
Buy: Dog Bark Park Inn Bed & Breakfast $124.00
6. Madonna Inn
If you should ever find yourself near the coast of Central California, The Madonna Inn is a legendary landmark not to be missed. The hotel’s over-the-top style is slightly campy, with an underlying western-romantic aesthetic dressed up with opulent baroque and rococo-fashioned ornamentation. The landmark hotel was opened in 1958 by Alex Madonna and his wife, Phyllis. Each of the 110 guest rooms and suites are uniquely designed and themed–most colored in various gradients of pink with gilded mirrors, lush floral arrangements and plenty of velvet. Sensory overload has never been so delightful than at the Madonna, with its eclectic interior constantly teetering between decadent plush and downright gaudy. The Madonna Inn’s most famous guest suites include the beloved Caveman Suite and the Barbie Dreamhouse doppelgänger, the Floral Fantasy room. Other unique elements include the hotel’s notorious waterfall urinal and a pink colored tennis court.
Buy: Madonna Inn $232.00+
7. The Legoland Hotel
This palatial hotel accompanies the second Legoland Amusement park in Winter Haven, FL. This medieval LEGO castle is even guarded with mystical dragons and guards–all rendered with LEGO’s signature bold color scheme. Its pseudo-medieval facade fortifies its fun-filled interior, which houses an over-sized pool, restaurants and dozens of kid-zones. Fully-themed guest rooms include upgraded amenities like an in-room mini fridge, LEGO bricks to play and build with in your room, a king size bed for the adults in the party and a separate sleeping area for the kiddos, complete with an entertainment center, bunk bed and pull out trundle. Other hotel perks include a welcome treasure hunt for guests upon arrival and for those attending the amusement park, early access to the rides.
Image courtesy of Legoland
Buy: Legoland Hotel $218.00+
8. Carlton Arm Hotel
Contemporary art lovers will love this unique hotel in Manhattan’s Uptown district. Each of the guest rooms are curated by up and coming contemporary artists, with mural paintings on the wall, reliefs and other ornamental decor curated by the participating artist. The century-old hotel has functioned as number of institutions throughout its colored history–including operating as a boarding house and later as a prostitution hub. In the 1980s, writer and construction worker Ed Ryan reinvented the space as a hotel, inviting artists around the world to leave their imprint on the room in exchange for free lodging while staying in the city. One of the most well-known artists to leave their mark at the Carlson Arm is the notoriously secretive street artist Banksy, who stayed at the hotel in his early career and painted a mural on the stair case and in room b5 in 1999.
Image courtesy of Carlton Arms
Buy: Carlton Arms Hotel $124.00
9. McMenamins Kennedy School
Located just 10 minutes away from downtown Portland, this converted 1915 elementary school is a trip back in time. However, you won’t get busted for drinking or falling asleep in class here. And despite the decision to keep the school’s original decorum, this detention-free facility will even allow you to have a cocktail and a cigar in what was once the principal’s office, enjoy a pint of craft beer from their in-house brewery, or watch an R-rated movie in their old school auditorium. Each of the 57 guest rooms are themed according to the scholastic style. Some of the rooms even have antique classroom phones and chalkboards, while others are furnished with an author’s theme, equipped with old-fashioned classic books and original lithographs.
Image courtesy of Trip Adviser
Buy: McMenamins Kennedy School $175.00+
10. Featherbed Railroad Bed & Breakfast Resort
This unlikely lodge offers guests a truly unique lodging experience with a variety of 1o different train cabooses, each designed and decorated according to a specific theme or modeled after a Hollywood film. Some of the most popular “rooms,” include the Casablanca Caboose, The Easy Rider Caboose, and The Wine Country Caboose. Each cozy caboose suite feels homey and intimate, but thanks to the outdoor surrounding (in Northern California’s wine country, adjacent to the Clear Lake) the space never feels cramped.
Image courtesy of Feathrbed Railroad Bed and Breakfast
Buy: The Featherbed Railroad Bed & Breakfast Prices Vary
If you buy something because we told you about it, we may receive compensation from retail partners.
Hacks Travel Hacks Hotels Las Vegas Los Angeles New York Portland road trips Things to Do Travel
|
cc/2020-05/en_middle_0032.json.gz/line8261
|
__label__wiki
| 0.795177
| 0.795177
|
The Art of Hyping Machine Translation
Academia ·
by Gino Diño
Baidu is China’s top search engine, one of the country’s leading proponents of artificial intelligence, and an excellent study in public relations handiwork.
In mid-October 2018, Baidu’s research team published a research paper titled “STACL: Simultaneous Translation with Integrated Anticipation and Controllable Latency.” The publication came in the run up to the 2018 edition of the Conference on Empirical Methods in Natural Language Processing, as thousands of the world’s leading researchers in machine translation and natural language processing descend on Brussels to share their latest findings.
At the time, the Baidu paper seemed like just another incremental development in neural machine translation (NMT) research. But then Baidu’s PR machinery began churning.
Baidu’s PR agency sent press releases, the research paper itself, and a GitHub demo page to numerous media outlets for coverage—Slator included. The agency wrote that STACL “can translate just a few seconds into the speaker’s speech and finish just a few seconds after the speaker finishes, very much like a simultaneous interpreter.” Within hours, widespread media coverage ensued:
“Linguists, update your resumes because Baidu thinks it has cracked fast AI translation,” by The Register
“Baidu’s AI Can Do Simultaneous Translation Between Any Two Languages,” by IEEE Spectrum
“Baidu’s Chinese-to-English translator finishes your sentence for you,” from MIT Technology Review
“Baidu Looks to Amaze With A.I. Translation in Real Time,” from Fortune.com
“Baidu creates the world’s first simultaneous translation system,” from SiliconAngle
“China’s Baidu challenges Google with A.I. that translates languages in real-time,” by CNBC
“Baidu to debut simultaneous machine translation in latest challenge to Google,” from SCMP
Other headlines were more straightforward yet still took the well spun PR message at face value:
“Baidu launches simultaneous language translation AI,” from VentureBeat
“Baidu develops its own take on real-time translation (Google has some fresh competition),” from Engadget
“Baidu releases a new AI translation system, STACL, that can do simultaneous interpretation,” by Packt Hub
Links to the media coverage the paper garnered including logos of the outlets were displayed on the Baidu Research group’s Github demo page.
As these articles and headlines stand uncorrected, they are now beginning to be picked up by other media outlets over time. Case in point, Axios linked to the IEEE Spectrum article in a piece on the dominance of English in scientific discourse.
As part of the PR push, Baidu conducted a public demo of STACL at the November 1 annual Baidu World Congress. During the event, two screens at either side of the main display displayed automatic speech recognition output and STACL’s simultaneous translation at the same time.
Baidu STACL Demo: Two screens show automatic speech recognition output on one and STACL simultaneous translation in another
However, the simultaneous interpretation available on the live stream was still provided by human interpreters.
Unpacking STACL
So what is STACL and does the research merit such coverage? Compared to a regular NMT engine that “processes” an entire sentence and then translates it, STACL is “fed” the source sentence word by word, and begins translating the input once it reaches a specified number of words. Baidu’s research team called it a wait-k model, where users can specify how many words STACL should wait for before beginning translation.
STACL translates the partial input as it goes and attempts to predict words that may only appear towards the end of a source sentence. For example, in languages like German where important parts of speech such as verbs and negation typically appear at the end of the sentence, STACL will need to guess the verb or negation as it translates a German source sentence into, say, English. STACL’s prediction method also uses context from the language data on which it is trained.
The researchers conducted experiments on English-to-German and Chinese-to-English translation tasks.
The catch? At a wait-5 model (system waits five words before beginning translation), STACL’s output quality is slightly below the current state-of-the-art. Go lower, such as a wait-3 model (system waits three words), and the predicted words can be completely wrong.
Indeed, the research paper points out that the more words the system has to wait for, the better the output becomes, so it is essentially a balancing act between how simultaneous the translation is and how fluent it becomes.
Time to Update Interpreter Resumes?
Baidu’s press release said the research was “inspired by human simultaneous interpreters, who routinely anticipate or predict materials that the speaker is about to cover in a few seconds into the future.”
In the research paper’s introduction, the endgame is made apparent: “Simultaneous translation has the potential to automate simultaneous interpretation.”
So should interpreters heed The Register’s words and update their resumes? Nope. Slator reached out to NMT experts to get their take on STACL:
“Firstly, I think we still need to be careful not to classify every new piece of research as a breakthrough,” said Dr. John Tinsley, Co-Founder and CEO of Iconic Translation Machines. He said simultaneous translation “has been around for a while, and there have been a few implementations in the context of NMT already.”
“We still need to be careful not to classify every new piece of research as a breakthrough” — John Tinsley, Co-Founder and CEO, Iconic Translation Machines
Tinsley noted that exploring this technology particularly for interpretation is “enticing,” adding that “it’s positive to have good research teams working in this area and taking steps forward. That being said, I think that’s what we’re looking at here—steps forward.” He also informed Slator that he and his team will be “digging a little deeper under the hood” of the STACL paper in the future.
A Solution in Search of a Problem
Professor Andy Way, Full Professor at Dublin City University and Deputy Director of the ADAPT Centre for Digital Content Technology, said: “It looks to me like this is a solution in search of a problem.”
“If this is not a tool to support interpreters, but instead is intended to replace them, then I think you know based on my track record what I would say about that,” he added.
Prof. Way said simultaneous interpretation is one of the hardest tasks in the business, and human interpreters are “great at what they do.” With that in mind, he noted that STACL’s lower BLEU scores raises deployment issues.
“The situations in which interpreters are deployed are usually places where critical decisions need to be made. Would you trust a machine in such a situation?” — Professor Andy Way, Full Professor at Dublin City University
“Not a Scientific Breakthrough”
As for Dr. Jean Senellart, the Systran Global CTO provided Slator with an impromptu, brief version of a review he said he would give if the paper was submitted to a conference. He noted that after conferring with Chinese colleagues, he was told the announcement made a lot of noise and it seemed like it was presented “as being equivalent in importance to the paper of Microsoft [on achieving human parity].”
Dr. Senellart’s first point was that the presentation was misleading because in an actual consecutive interpreting scenario, while the interpreter may be translating after every full sentence, he or she is also part of the communication flow, to the point that the speaker may pause to allow the interpreter to ask questions or clarifications before translating.
“In this workflow, we are indeed doubling the time needed for the communication,” he said.
In the case of MT, Senellart clarified that waiting a certain number of words before translating, as STACL does, is not necessary. “The machine can listen and compute simultaneously, there would not be a need to pause the communication so both would be qualified as an additive latency,” he said.
Senellart said that on a 30 minute speech, an NMT engine that translated after each full sentence and STACL “would only differ by a few seconds.” He added that those few seconds “would not justify a loss of quality of several BLEU points.”
Slator also reached out to two of the authors of Baidu’s STACL paper: Mingbo Ma and Liang Huang. Huang addressed the above concern, conceding that it is “true only for speech-to-text translation in a conference setting.” However, he offered what he called “a more common scenario: 1-on-1 dialog (e.g., ordering food).”
“Here this full-sentence translation strategy would cause a 2x delay,” he said.
“While our current technology is still speech-to-text, we are also working on expanding it to simultaneous speech-to-speech translation.” — Liang Huang, Principal Scientist, Baidu Silicon Valley AI Lab
In his impromptu review, Senellart continued that “the use case is wrongly presented and wants to drive the reader to some understanding that the machine has reached a new ‘superhuman ability’.”
To this point, Huang simply stated: “We never claimed “superhuman ability”.”
Senellart also addressed a claim in the paper where the authors said STACL’s overhead is “much more desirable” because it was additive instead of multiplicative like the overhead of an NMT engine that translates after every full sentence.
“It is wrong,” he said. “Because even if this statement is true (consecutive vs. simultaneous in the human world), the method they are trying to replace (waiting to the end of the sentence) is falling in the same category than their presented method (both are additive).”
As for the science behind it, Senellart said “there is no new idea” behind STACL: “the solution they propose would be the default solution anyone who did not read the paper would set up.” He clarified that this is not necessarily bad, “but this is not a scientific breakthrough.” Indeed, simultaneous translation has been looked at before, prior to NMT, and there have been proposals for incorporating it into an NMT engine as early as 2016.
Small BLEU Penalty; Huge Translation Error
Finally, Senellart noticed that there was “almost no qualitative or quantitative evaluation [performed], and this absence most likely covers for big errors.” He pointed out in one of the examples given in the research paper and the GitHub demo page, STACL correctly predicted and translated “to meet.”
“But here what if the final verb is not meet, but “call”, or something totally different?” Senellart said. “The change of the verb will be only a small BLEU penalty but a huge translation error—how does the model try to recover (if it does) when it finally encodes the verb and “realizes” that the full sentence is wrong?”
Huang confirmed that they did only use BLEU, but also said that “we predict (or “anticipate”) all kinds of words, not just verbs, and if there is a major problem in the prediction, it should reflect in BLEU score as well.” He added that they intend to incorporate human evaluations on prediction accuracy.
“We also acknowledge that (a) our current work can’t fix a previous prediction mistake, and (b) it can’t even “detect” such a mistake,” he said. “But we are working on ways to address these problems.”
Perhaps anticipating a bit of pushback from the machine translation community—with Microsoft’s controversial “human parity” claim a cautionary tale—Baidu did add a closer to their press release stating that “STACL is not intended to replace human interpreters, who will continue to be depended upon for their professional services for many years to come.”
According to them, it was merely meant to make simultaneous translation “more accessible.”
Editor’s note: This article has been updated to correct a minor issue depicting STACL’s demo during the Baidu World Congress live stream on November 1.
Download the Slator 2019 Neural Machine Translation Report for the latest insights on the state-of-the art in neural machine translation and its deployment.
Slator 2019 Neural Machine Translation Report: Deploying NMT in Operations
32 pages, NMT state-of-the-art, 5 case studies, 30 commentaries, NMT in day-to-day operations
$85 BUY NOW
Andy WayarXivBaiduJean SenellartJohn TinsleyLiang Huangmachine translationMingbo Maneural machine translationsimultaneous interpretationSTACL
Content strategy expert and Online Editor for Slator; father, husband, gamer, writer―not necessarily in that order.
Spanish Translator (Latin American Spanish)
|
cc/2020-05/en_middle_0032.json.gz/line8264
|
__label__cc
| 0.567377
| 0.432623
|
Start it @KBC and HubSpot accelerate the growth of startups together
#internetday
Tuesday, October 29, 2019 — Start it @KBC, the largest accelerator for startups in Belgium, welcomes HubSpot as a new partner. The software platform of this leading technology company not only gives startups the possibility to automate processes but also gives them a better insight into customer experiences. This way they can scale faster and will be armed to compete with big corporations.
The collaboration with HubSpot enables startups in the Start it @KBC ecosystem to better respond to what is going on with their customers. "HubSpot brings marketing, sales, and customer insights together in one tool," explains Anna Thomlinson, the managing director of Start it @KBC. “Gaining insight into how customers deal with your product is nowadays often more important than the product itself. A mediocre product that offers a strong digital customer experience will sell better than an excellent product without an online strategy.”
The startups that are part of Start it @KBC receive up to 90% off the HubSpot software for marketing, sales, and services (the CRM software is free for all users). Startups can also follow webinars via the HubSpot platform and call on the expertise of the fast-growing company. They can receive real-time suggestions to improve their SEO, tips on how to respond better to social media, and how to set up an automated personalized follow-up for customers.
Support to optimally use the platform
The collaboration between Start it @KBC and HubSpot is part of a special program that the technology company has set up to help startups grow, explains Kaythlin Das, business development Manager of HubSpot for Startups. “Belgium has a growing community of passionate startups. We not only want to give the founders the tools to work more efficiently and to better understand their customers, but also want to continuously guide them in this.”
Elixir Solutions, a "graduate" startup from the Start it @KBC community and agency partner of HubSpot, will support the founders to get the most out of the HubSpot platform. "Startups want to do as much as possible themselves and often don’t have the budget to pay an expensive, monthly fee to an agency," says Carl Bouckaert, CEO Elixir Solutions, from experience. "That is why Elixir offers them the opportunity to purchase HubSpot ad hoc expertise on a pay-as-you-go basis and provide them with training to make optimal use of the tools' options."
Nathalie Claessens Start it @KBC
nathalie@contentcats.be
@NathalieClaess1
startit.be
About Start it @KBC
Start it @KBC supports and promotes entrepreneurs with innovative ideas and scalable business models and has within its community over 750 startups and scale-ups, making it the largest community of its kind in Belgium. As a founder-centric pioneer in Belgium, Start it @KBC aims to have a positive impact on the country’s economy and society, e.g. for diversity and female entrepreneurship.
Startups can apply throughout the year via www.startit.be. The selected founders pitch for a professional jury twice a year, and a new group of startups begins the one year-long tailor-made accelerator programme, with top-notch mentorship, diverse expertise, an extensive international network and an inspiring co-working space.
Start it @KBC also has a clear international vision, with hubs in Budapest, Gyor and Prague, in addition to Antwerp, Brussels, Ghent, Hasselt, Leuven, Kortrijk, and a presence in New York, San Francisco and London. As of 2017, Start it @KBC has been a member of the Global Accelerator Network (GAN), a select network of 120 global accelerator programmes, offering extra opportunities for startups on the international stage and up to 1 million dollars’ worth of exclusive advantages from technology partners.
Start it @KBC was established in 2014. Today it is a partnership between Accenture, DPG Media, KBC, and Telenet. With Start it X, the accelerator launched a sister company to support intrapreneurs in large corporates.
For more information: www.startit.be
For Start it @KBC logos and images: startitkbc.prezly.com/media
Press kit Start it @KBC
www.startit.be
startit@kbc.be
Start it @KBC
Sint-Pietersvliet 7
|
cc/2020-05/en_middle_0032.json.gz/line8271
|
__label__cc
| 0.53887
| 0.46113
|
There needs to be a special prize for The Terror because it was able to include every single British male actor of a certain age. Is that Tobias Menzies and Ciarán Hinds having a Rome reunion? Yes it is! Is that Fisher Bloom from Lark Rise to Candleford I see, aka Matthew McNulty? Yes in one! Could that be Victor Colleano from Mr Selfridge? But of course! On and on you will name check every actor in this series, yes that IS George Warleggan's dogsbody, but there are literally SO MANY characters you will have no idea who's who so you will literally be calling Victor Victor instead of Henry Collins and Fisher is Fisher, not Lt. Edward Little. And yes, I had to look up their names because I literally had no idea what their names were even though I devoured every episode of this show that merges the history of a doomed expedition to find the Northwest Passage with supernatural elements from Native folklore. So you're probably wondering why watch this show that leaves you scratching your head half the time wondering who everyone is referring to? The answer is twofold and it's two characters that are polar opposites (see what I did with the polar joke?) Henry Goodsir played by Paul Ready and Cornelius Hickey played by Adam Nagaitis are just riveting. You will never love a character as much as Henry Goodsir and you will never hate a character as much as Cornelius Hickey. Henry Goodsir is a creature of pure light and goodness and you will want to protect him from all the ills of the world while every time Cornelius Hickey is on screen you will be calling for his head on a pike. These two made the series. These two deserved Emmy nominations. But the problem there is you'd have to remember their names...
Labels: Adaptation, And the Emmy Goes To, Arctic, Cornelius Hickey, Dan Simmons, Folklore, George Warleggan, Henry Goodsir, Lark Rise to Candleford, Mr. Selfridge, Northwest Passage, The Terror, Tobias Menzies
|
cc/2020-05/en_middle_0032.json.gz/line8277
|
__label__cc
| 0.610715
| 0.389285
|
This article describes the methodology behind posts on this site that use vehicle tracking data from the Toronto Transit Commission to analyze route operations. This is intended for readers with an interest in the technical process by which the raw tracking data are transformed and presented.
Over time, this process has evolved as new questions have been posed, and as ways to present the data have evolved. This is not a definitive “way to do it”, but a description of the approaches and techniques I have used.
All monitoring data were provided by the TTC to which I extend my thanks. The processes, code and analysis are all my own and have been developed since early 2007.
Note: A few of the sample files here are in comma-delimited format and are intended to be opened by Excel or a similar program that will automatically format them in a table.
There is a change log for this article at the end.
The Vehicle Tracking System
The TTC’s vehicle monitoring system called CIS (Communications and Information System) has been in use for about three decades. In its original form, the method for locating vehicles was rather primitive and depended on a combination of:
Short-range transmitters called “signposts” at many locations in the city. When a vehicle passed one, it would record the unique code from this signpost and include that value in its position reports.
Hub odometers on vehicles to measure distances travelled.
The scheduled location of each run on a route.
This system had many limitations, and producing clean data for analysis was challenging. Each route had its peculiarities about which the less said, the better, but the architecture of the original design compromised the accuracy of the data.
The location resolution by CIS was fraught with problems because it was calculated based on two factors: the identity of the most recent electronic “signpost” passed by the vehicle, and the distance travelled since the time that signpost was registered. Notable by its absence was any information about the direction of travel.
Vehicle locations were reported only to the nearest intersection, and logical inconsistencies could occur when CIS lost track of the direction a vehicle was actually travelling or, indeed, whether it was still even on its assigned route.
A vehicle could go off route or make a U-turn, but CIS kept incrementing its position in the “expected” direction of travel. Only when additional signpost readings confirmed that the vehicle was not where it was expected did CIS start reporting accurate locations. This produced events I referred to as “teleportations” where vehicles “moved” instantaneously over large distances when their position was corrected.
All vehicles now have GPS units, and the monitoring data include latitude and longitude rather than computed street locations using the signpost, odometer and schedule data. Although it is possible to get “rogue” readings from GPS errors, these typically are corrected in the next report, 20 seconds later, and the erroneous data can simply be discarded as being too far from the route’s actual location.
The data supplied by the TTC now contain one record every 20 seconds per vehicle, the polling cycle of the CIS system (the central system updates the information from every vehicle in the fleet every 20 seconds). These changes combine to give a much more detailed and accurate view of each vehicle’s location and behaviour.
Looking at the Raw Data
Sample_512_20100101_GPS_Data
This is one page of raw data for January 1, 2010 for the St. Clair 512 route. The cars in question are leaving Roncesvalles Carhouse to enter service, and if you plug the latitude and longitude information into Google Maps, you will see where the cars were actually located. The fields are:
Date, time, route, run, vehicle, latitude, longitude
Over the years, the exact format of the data supplied by the TTC has varied slightly (the biggest change came with the conversion to GPS), but this is the general idea. Other data elements are available, but these are all that is needed for service analysis.
A larger set of data (covering the period up to 9:00 am) produces the following when plotted.
Sample_512_GPS_Plots
There are two pages in this example. The first includes all the data letting Excel automatically set the boundaries of what it displays depending on the data range. The “J” shaped object near the bottom is the St. Clair route itself (including the path from Roncesvalles to St. Clair via King and Bathurst). Other data points well beyond are rogue GPS data. These (and the carhouse trips) will be filtered out by the mapping process.
The second is the same information but with the bounds of the chart set to include only the actual route data. Clearly visible here is the loop at Roncesvalles Carhouse, the short excursion through Bathurst Station, and the loops on the St. Clair line itself.
Note that although St. Clair Avenue is a more or less straight line, it is not horizontal because the Toronto street grid does not lie along the strict east-west and north-south world grid.
The following plots show a sample of GPS data points from three routes with no underlying map reference. The bounds of the displays have been chosen to show only the area where each route operates although there are some rogue data points well outside this as in the St. Clair example above.
Sample_504_GPS_Plot
Sample_54_GPS_Plot
The outline of a route is quite clear along with common short turn routes, carhouse/garage, and the yards. Note that for some routes, vehicles can be found on many streets other than their official route. These data points must be excluded from the analysis.
Mapping The Data
Each route has its own two-dimensional position and form, and this makes a generalized approach to analysis of the raw data quite difficult. The first step is to transform data from the route-specific GPS information into a more generalized format that can be used for any route.
In these analyses, the route is considered as a straight line regardless of its actual geography. In effect, if the route were a piece of string on a map, the string is pulled out straight. This allows every location on the route to have a position value in one dimension rather than two.
In my analyses based on pre-GPS data, each intersection reported by CIS was converted to a position on a route. For example on the St. Clair car, the loop at St. Clair Station was 0, and the loop at Gunn’s Road was 650. The scale I used was 100 = 1km. A vehicle’s location was, at best, accurate to the reported intersection, and each intersection on the St. Clair route had an associated position in the range of 0 to 650.
With the advent of GPS, the position of a vehicle must be translated from global coordinates to the linear system. For an east-west route, the latitude values (north-south) lie within a narrow band, while the longitude values (east-west) vary along the route. It is extremely unlikely that any route’s vehicles move strictly in one compass direction because “east west” streets do not lie along lines of latitude.
However, this does not matter as long as a route (or segment of a route) is fairly straight. For an east-west segment, the longitude of a vehicle can be scaled onto the internal co-ordinate system used for analysis. As an example, Yonge to Bathurst is 2km, and this would be 200 in the internal system. The longitude of the intersections with an east-west street define the “0” and “200” positions, and everything else is scaled in between. For north-south segments, the latitude performs the same function.
Each section of the route is defined by a “box” with:
maximum and minimum latitude and longitude values (the east, west, north and south edges of the box);
an indication of whether the primary direction of travel is east-west or north-south (it is also possible for travel to be west-east or south-north on U-shaped routes such as King;
the internal co-ordinate values corresponding to the corners of the box defining the route segment.
These boxes may touch at edges, but they do not overlap. This ensures that any GPS reading is resolved to only one segment of a route. Each segment has an associated length between the real bounds of the route it encloses. I have generally used Google Street View’s computation of walking distances to get the separations between individual points on a route. The segments may not all have the same orientation, but pasted together they represent the route to scale in one dimension.
In practice, things are a bit trickier, and even a straight route like St. Clair must be subdivided for various reasons:
Cars running to and from service via Bathurst Street will report longitudes within the range for St. Clair itself, but the vehicles will not actually be on the route. The situation becomes even worse downtown with many nearby streets on a tight grid where streetcars may be diverting or short turning.
Occasionally, a GPS unit will report a spurious location, typically only for one data point. Cars have reported locations in the wilds of Caledon, Barrie and the middle of Lake Ontario. These events are rare, but they must be filtered out.
At some locations, a route is “wider” than otherwise. St. Clair West Station is an example where cars travel both north-south and east-west. Loops and carhouses have this characteristic, and the filtering system must be generous enough to include them while omitting the truly off-route values.
Using 504 King as an example, Roncesvalles Avenue is quite well defined and has no data points nearby other than in the carhouse. The “east west” section is trickier because cars may be found on nearby streets short-turning. If only their longitude were considered, they would appear to move back and forth on King when in fact they were not on it at all. The big loop via Parliament and Dundas similarly needs to be filtered out by defining boxes tightly around the main route segments on Broadview, Queen and King.
This is illustrated in the following chart.
Sample_504_GPS_Boxes
Here the data points are overlaid by the boxes bounding each route segment. For reference, a line showing the location of Queen Street (orange) has been included to indicate the need to keep each segment’s box close to King Street.
Sample_504_Map_Parms
The preceding table gives the numeric values associated with each box. In the course of developing a new “map” for a route, some trial and error is required to discover unexpected places where vehicles wander off route and their locations must be filtered out. This is a particular problem for buses which are not constrained by a track network.
This route-specific table gives the bounds of each segment (the corners of the boxes), and whether the location should be calculated N/S, E/W, S/N or W/E. For the east-west segments, longitude determines the offset of a vehicle within a box. For north-south segments, latitude is used.
In practice, building these tables has been the most tedious part of the exercise, but once completed for a route, changes are needed only to accommodate special cases such as long-term diversions.
In the case of King cars short-turning via Parliament/Dundas, cars disappear where they go off route, and reappear when they return. The same approach can be used for route branches if the behaviour of vehicles on the branch itself is not part of the overall route analysis.
Branching routes require special treatment to isolate vehicle movements on each branch. Obviously a route with branches cannot be described within a one-dimensional range of values. For analysis, branches are “lopped off” by leaving a gap in the internal values.
For example, in the combined analysis of the Kingston Road services 502 and 503, the internal values for the 502 route (Bingham Loop to McCaul Loop) range from 0 to 1000, while those for the 503 (Don Bridge to York) begin at 1400. The mapping routines treat a large jump in position as a break and do not interpolate travel over the intermediate “ghost” section of the route. Similarly, the conversion of vehicle positions to “as operated” schedules will skip over the break. The effect is just as if there were a long off-route diversion that is not part of the mapped route – vehicles disappear at the branching point and reappear in a separately mapped route segment. (See examples later of this situation.)
Samples for three bus routes:
Sample_36_GPS_Boxes
Finch West 36 is shown for the overall route and in five subsections (from west to east) at a finer scale to illustrate the handling of places where the route has curves and branches.
Flemingdon Park 100 is shown because it is a very twisty route in parts and poses some challenges in conversion to a linear map. For example:
The Linkwood branch is omitted. Buses taking this route vanish and reappear on the main route’s plot as a result. This is a comparatively infrequent peak period service.
Buses operate in both directions via a “stub” on Concorde Place north of Wynford. For the purpose of mapping, the entire stub is considered as having one position.
Buses operate in one direction only around the Gervais, Eglinton, Don Mills, Wynford loop. The east and south path (westbound) is given the same co-ordinates as the north and east path (eastbound) and so the effect is as if this loop were flattened.
With this scheme, GPS values can be quickly and easily converted to the internal co-ordinate system. The process for mapping a vehicle’s location to the internal one-dimensional view of a route is:
Scan the table of “boxes” defining each segment of the route to see whether the current point lies inside any of them (in other words, are both the latitude and longitude of the vehicle within the range defined for a specific box). If not, this is a rogue data point and it is ignored. (It could be a GPS error, an off-route garage/carhouse trip, or a diversion.)
Each box has a direction associated with it based on which end of the route we consider to be “zero”, and the predominant compass direction of travel.
For example, on Broadview Avenue, vehicles move north to south (considering Broadview Station as zero) and so from the subway south to Queen, decreasing latitudes (movement southward) correspond to increasing values in the co-ordinate system. Queen is, nominally, two km south of Danforth and is therefore “200” on our scale. Any location in between is scaled from 0 to 200 based on its latitude within the range of the box. This process is much simpler than trying to calculate actual distance travelled based on the geometry of the street(s) involved. (Broadview Avenue is actually broken into two sections in the table, and the “zero” point is north of Danforth so that Queen is at “225”.)
Other route segments work the same way, but with different ranges of values appropriate to their position on the route.
There are several small segments/boxes defined between Broadview and Parliament because Queen and King are quite close together. A box with Broadview/Queen at its northeast corner and King/Parliament at its southwest would include Queen west of the Don Bridge and data points that we don’t want.
Roncesvalles Avenue is south to north, but otherwise the premise is the same with distances being scaled from the south side of the box northward rather than north-to-south as on Broadview.
Creating the Service Graphs
With the GPS data converted to a linear internal co-ordinate system, each vehicle’s data becomes a column in a table. Each time slot takes one row in the table, with a 20-second increment corresponding to the CIS polling cycle. For a 24-hour period, this gives a table 4320 (24×180) rows long. A separate column is used for each vehicle.
In cases where data points are missing (typically caused by out-of-bound readings or by cars that do not respond to every poll), any empty time slots are filled by interpolation between the “good” values. In the old intersection-based data, these interpolations could cover a considerable distance because location reports might be several minutes apart. With the GPS data, the gaps are typically only one data point wide except where a car “vanishes” within the downtown canyon.
For gaps of less than two minutes (seven 20-second polls), a vehicle position will be interpolated. For larger gaps, the vehicle is assumed to have gone off route.
The data are organized by vehicle number rather than by run number because it is vehicles that riders see providing service. Run numbers are internal to the TTC schedules, and on some routes such as Queen, a car’s run number may be changed due to step back or step forward crewing. This happens when an operator changes cars to get back on time, and takes their run number with them to the new car. It is possible to have two or more cars reporting the same run number in the course of the day.
Even with the wonders of GPS, there are still a few oddities that can show up. For example, a vehicle may actually be stationary, but it keeps reporting locations slightly different from each other on each observation. This small sawtooth pattern is easy to see in the charts, but it can foul up some types of analysis that depend on deciding when a vehicle has actually turned around. These are filtered out with a pattern recognition routine, and the oddball data are smoothed out to a better-behaved approximation.
Another problem can arise in that the CIS data stream may contain two reports for the same vehicle at the same time. This is a side-effect of the way that tracking data are polled and reported on 20-second cycles. Sometimes, two reports for the same vehicle appear within one cycle. When this happens, the second value is ignored for purposes of plotting vehicle movements. (This approach is required by the internal data structure in various programs where there is only one “slot” to hold a vehicle’s location for each possible 20-second interval.)
With vehicle movements translated to a series of values in a one-dimensional space, they can be directly plotted for location and time producing a characteristic zig-zag chart first devised in the 19th century to represent railway timetables. The spacing of the lines shows how close or far apart vehicles are, and the slope of the lines shows the speed of vehicles through various parts of the route. Vehicles that are stopped show up as horizontal lines, and with the accuracy of GPS data, it is possible to “see” holds for traffic lights and for stops. Where the stops are farside, two separate stops at an intersection can be resolved to distinguish delays due to stop service time from that caused by the signals.
The following file contains the data for all vehicles for the period 0700 to 0959 on route 504 King for May 1, 2013 in comma delimited format.
Sample_504_20130501_Mapped_Data
Note that in some cases there are gaps in the data corresponding to periods where cars “vanished” from a route. For example, between 0712 and 0717, cars 4031 and 4041 appear at Queen & Broadview (roughly 225), travel a short distance (to about 270) and then disappear. They reappear a bit later (at roughly 180). These are trips operating into service from Russell Carhouse via Queen, Parliament and Dundas to Broadview because the west-to-north switch at Broadview is out of service pending repairs.
Some columns are empty because the vehicles to which they apply were not in service for the period included in this extract.
Sample_504_20130501_Chart
This chart is one page covering the AM peak for 504 King on May 1, 2013. It is created directly from the mapped data in the CSV file linked above
Creating “As Operated” Timetables
Published TTC timetables show the scheduled times vehicles leave their termini, and scheduled running times define when vehicles should pass by various locations along the route. An “as operated” timetable shows what the service actually looked like on one day. These tables are not published in the articles, but they are an essential part of headway and link time analysis.
Just as one might see an interurban bus or railway timetable with a list of stations, the “as operated” timetable contains a set of “timepoints” on a route. These are not the official timepoints from the schedules, but points chosen by me to subdivide the route into sections of interest for analysis. (Traffic engineers might refer to these locations as “screenlines”, but I use “timepoints” because this matches the way that the TTC carves up its routes.)
When a vehicle goes off route for a short turn or diversion, it will usually reappear somewhere else. This presents a challenge for different types of analysis.
On the service graphs, we may want to see one vehicle as a continuous trace even when it appears to jump (via a diversion) from one point on the line to another. However, for analysis of headways and link times, we don’t want to “see” that jump or include it as if the vehicle had travelled through the bypassed section of a route. (This problem arises because a two-dimensional travel path is condensed into one dimension.)
There are two options:
Generate two versions of the mapped data, one including the jumps and one omitting them. This is most easily done by treating the absence of a vehicle for more than some time threshold, or its arrival at a point considerably distant from the last “on route” place we saw it, as breaks. This is considerably simpler with the GPS-based data and reports (usually) of vehicle locations every 20 seconds than it was with the old CIS data.
Avoid definition of “time points” for measuring headways and link times that lie within the span of a commonly-used short turn. For example, don’t put a timepoint on King at Queen and Broadview but rather use a location north of Dundas or west of Parliament. Even this approach can be fooled because not all short turns follow the same path.
Each route requires careful choice of the points where headways and link times will be measured to work around the geometry of the route and its common short turns. However, once the “map” defining the route and its time points is set up and known to behave well, this can be recycled for any new data that comes in for analysis.
Scanning through each vehicle’s data, a program compares the reported locations for each pair of time intervals with the locations of timepoints. Remember that by this stage in the process, all of the data have been converted to the single-dimensional internal position values, and we don’t have to worry about the physical latitudes and longitudes. Various conditions can apply.
The locations do not bracket a timepoint. This is not a time of interest.
The “before” and “after” locations bracket a timepoint, but do not exactly match its location. In this situation, an artificial time midway between the two is created. If the “before” location is reported at the “00” second, and the “after” is at “20”, then the timepoint is assumed to have been crossed on the “10”. Since the length of one interval is only 20 seconds, this does not seriously misrepresent the exact time a vehicle passed a point.
Either the “before” or the “after” locations match a timepoint. If “before”, then this gives the time a vehicle left that point. If “after”, this gives the time a vehicle arrived at that point.
Both locations match a timepoint. The vehicle is stationary right at the point of interest.
Whenever the direction of travel reverses, locations in the internal co-ordinates will descend rather than ascend (or vice-versa). This usually signals the start of a trip in the opposite direction. For the purpose of timetable creation, this is the point where a new row in the table is created, but this has its challenges:
The rogue sawtooth behaviour in GPS data described above can be troublesome because a vehicle appears to be starting new trips. Filtering by looking ahead in the data is needed to determine whether a vehicle has actually turned around.
Another problem can arise where a route has a large on street loop around which vehicles may pass in either direction. The point where a new trip in the opposite direction on a route begins is not necessarily the same as the point where the previous one ended. An example is the Parliament/Dundas short turn of 504 King which can be used in either direction. Cars can disappear and reappear at either King/Parliament or Broadview/Dundas.
Special considerations apply to locations where a car can legitimately reverse direction without starting a new trip. For example, at St. Clair West Station, westbound cars run east briefly within the loop as they traverse the loading platform. Although it is a short distance, this shows up in the GPS data. Provided that no timepoints are defined within such an area, the timetable creation routine will not be confused by the reversal. In this example, a timepoint east or west of the loop would behave properly, but not one within the loop itself.
TTC schedules refer to “up” and “down” trips. Typically “up” is westbound or northbound, while “down” is eastbound or southbound. Three versions of the timetable are written into separate files.
A complete timetable showing both directions. This is used to check the overall process, and to debug problems with mapping that might generate unexpected behaviour (typically fragmentary trips).
A timetable showing only “up” trips.
A timetable showing only “down” trips.
Sample_504_20130501_Schedule
This file is the “as operated” schedule for 504 King for May 1, 2013. It includes some bus shuttles that covered part of the route in the evening.
The data are organized in vehicle number sequence and by time within each vehicle. Westbound trips (“up”) read left to right, while eastbound trips (down) read right to left.
Car 4000 starts out from Russell carhouse and first appears arriving at Broadview Station. It makes two round trips to Dundas West Station and then runs in to Russell at the end of the AM peak. Note the missing information for the downtown section on most trips for 4000 and a few other vehicles.
This is due to problems with these vehicles’ resolution of GPS information that causes them to give rogue information. The problem lasts long enough that the mapping program has assumed that they went off route. If this were a more pervasive behaviour (more cars, more locations), it would severely interfere with data analysis (not to mention route monitoring).
Only certain cars are affected and they show up repeatedly in the data like this.
Creating the Headway Charts
The direction-specific timetables give the departure times for each vehicle from each timepoint for one direction’s travel. Reading “down” the columns of departures and sorting the entries by time gives the actual headway between each vehicle. Reading “across” the columns of locations gives the link times between each location.
If, for example, all of the departures westbound from Yonge St. are sorted by time, this gives the actual timetable for someone waiting on the platform at that location. From that, it is easy to calculate the headways between vehicles.
Similarly, by using the “depart” and “arrive” times for any two points in one direction, one can get the link times for each trip. Sorting by time of day gives the data that becomes the link table.
The calculated headways and link times are placed in a table organized by location and time-of-day. These data directly create the headway and link time charts.
On busy bus routes with frequent service (e.g. Finch West), it is possible to have multiple vehicles cross a timepoint within the same CIS polling interval (typically when a traffic light turns green and a herd of buses moves off). In this case, the first vehicle found in the data is assigned the headway to the preceding one, and the others are assigned a headway of zero.
For each timepoint on one day, this process will produce a list of value pairs containing a time and a headway. These are arranged in time sequence so that when plotted as a scatter diagram in Excel, the points can be joined with a line and can have a trend line interpolated. The trend line gives a sense of the general movement of data values smoothing out the short-range noise, while the line following the points shows the erratic nature of headway values scattered around the trend.
This noise is a direct result of the variation in headways from vehicle bunching, and the data points tend to occupy a wide band looking more like a cloud than a closely related, well-behaved set of data. Although the TTC’s goal is to have all service run ±3 minutes to schedule or to headway (depending on which report you read), the actual scatter of the data is well beyond a band six minutes wide. For frequent routes (headways of 3 minutes or better), of course all headways below the scheduled value are “in bounds” because the lower bound is negative.
The trend lines also show the degree to which data may be quite similar overall despite the variations from day to day. Headways may follow the same general pattern and average values, but be wildly different at the detail level from one day to the next.
Sample_504_20130501_Headways_WB
This CSV file contains the headway information for “up” or westbound trips on 504 King for May 1, 2013. Each of the “timepoints” I have defined has a set of columns with vehicle numbers, times, and headways between vehicles. These data directly generate the following charts.
Sample_504_20130501_Headways_WB_Charts
Creating the Link Time Charts
Link times show the time required for a vehicle to travel from one point to another. As discussed above, there are arrival and departure times at each “timepoint” for each vehicle. The elapsed time between a departure from point “n” and arrival at “n+1” gives the link time.
As with headways, link times can also have multiple vehicles starting from a timepoint together, but they probably do not get to the next timepoint as a group, and each vehicle’s time is calculated separately.
The link times are plotted in the same manner as the headways with a trend line to show the overall movement of data values. Generally speaking, link times are much more tightly clustered around the trend lines than headways. This indicates that the time needed to get from point “a” to “b” is fairly reliable and predictable in most cases even though the spacing of individual vehicles may be less so.
A special case of link time calculations occurs at terminals. Layover/recovery times vary immensely both on the schedules and among vehicles on a route. It is not uncommon to see vehicles leave terminals in a bunch after even the last of the parade has had a few minutes’ rest. This has nothing to do with schedules or traffic congestion or the myriad other excuses. It is a simple case that nobody actually dispatches vehicles on a regular headway, and some operators take longer recovery times than are scheduled hoping to make up their time enroute.
To analyse the variation in terminal times, a “link” is defined from a timepoint near the terminal (e.g. from just west of Yonge & St. Clair through St. Clair Station and back again). These “link times” tend to vary much more than the times between points on a route.
Monthly Headway and Link Time Charts
The daily charts show headways and link times for each point along a route while the monthly charts consolidate daily data for each timepoint into one set of charts. This allows comparison of data for multiple days.
In practice, the data are subdivided into weeks for display purposes so that the number of lines on one chart is kept within reason. Generally speaking, trend lines will follow similar paths from day to day except when there is a major service disruption. Events such as construction projects tend to show up for specific links on a route and for a period of time that the event causes congestion and delay.
Having a larger set of data to work with allows for generation of average and standard deviation charts. These are done separately for weekdays, Saturdays and Sunday/Holidays. This can be thrown off if there was a considerable change in the route’s character during a month under study. For weekend values, there are usually only four or five days participating, and relatively few observations per hour. One oddball day due to major delays, a parade, etc., can distort the calculated average and SD values. Such situations need to be handled on an “as they arise” basis.
Here are samples of the monthly headway and link time charts:
29_201509_101_King_MonthHeadways
29_201505_10107_King_TransitRd_MonthLinks
The first set of charts shows the headways northbound at King & Dufferin for the month of September 2015. Each day has its own set of coloured dots and trend line. In addition, all of the weekdays are presented on one page. This is intended not to show individual data, but the overall behaviour for the month. The more spread out the “cloud” of data points is, the less reliable the service. This is also shown on the three “Stats” tabs which show the averages and standard deviations for each group of days.
The MonthLinks file shows the travel times from King to Transit Road (most of the route, not including the terminal loops) for May 2015. Again, the scatter in the dots gives a sense of the degree of variation, while trend lines for individual days show that not all days (especially on weekends) have the same behaviour.
The “Data” tabs for these charts are generated initially as .csv files and then imported into templates. The .csv versions will be used later in historical analyses (see below).
Headway Adherence
From the table of headways at each timepoint, it is possible to count the number of entries by period and location that fall within various bounds or values. This, in theory, allows an estimate of headway adherence by the TTC’s formula of ±3 minutes. However, there is a difficulty here given the actual behaviour of the schedules.
The transition from one headway to another occurs at different times for each location and direction of service.
These transitions are not necessarily instantaneous, and there may be a period when scheduled headways shift gradually from peak to off-peak (for example).
Vehicles that are being short turned do not necessarily contribute to the quality of service. For example, a King car short turned eastbound at Church may be counted at Yonge, but it provides no useful service to riders waiting there.
Vehicles may serve a stop advertising one destination, but be short-turned before they reach a rider’s intended stop. This will be very annoying depending on the origin-destination pattern of the riders, and the point at which the vehicle advertised its actual destination or the operator announced the change to riders.
The actual setting of the destination sign (even the digital ones) is not included in the CIS data stream, and so there is no way to tell where a vehicle claims to be going when it arrives at a stop, let alone to determine when the advertised destination changed.
Although I have published some analyses of the actual behaviour of services as compared with the TTC’s goals, these are tricky to build because of all of the caveats listed here. This is a project not just for one rainy day.
Congestion and Average Speed Charts
It is impractical to chart every small section of a route as a separate link and produce individual local analyses. General changes in link times over one or two kilometres will show areas of congestion, but for a fine-grained view, a different charts are needed.
Remember that the internal representation of vehicle positions was translated from GPS to a linear set of values. Every 20 seconds this gives a snapshot of the location of each vehicle on a route. The King route, for example, is nearly 13km one way, and on the internal scale of 1 unit to 10 metres, this means there are about 1300 possible locations for a car at each observation. In practice, there are at most about 40 cars in service, and so for one set of observations, most locations are empty. However, if the locations are counted over an hour, then the locations with the most observed cars are also going to be the locations where cars are travelling the slowest or are stopped.
Thinking back to the mapped data table, each row in that table is a snapshot for one moment in time giving the location of each vehicle (if it is active and on the route). Collectively, 180 rows give one hour’s worth data. It is quite straightforward to spin through the entire table counting vehicles by location and hour, but care is needed to only count vehicles moving in the desired direction.
504_201403W1_WB_VehCounts
These charts, each showing one hour’s operation, show the onset and disappearance of congestion at various points along the route, but with the entire route visible on one chart. Link time charts cover only a segment and do not break down locations within the segment.
Each stop on a route shows up as a clear spike because vehicles will tend to stop there for multiple 20-second intervals. Where traffic is seriously congested ahead of a stop or a traffic signal, vehicles will spend more time and there will be higher counts within each unit.
A variation on this type of analysis looks at the change in position between current observations and the one 20 seconds in the future. This gives both the location and speed of a vehicle at a specific time. When these speeds are averaged over an hour, the result is a chart that complements the congestion plots with low points at or near stops and congested areas, and high points in between.
The two plots differ in that for the vehicle counts, the height of the spikes varies depending on service levels, while the speed charts are independent of the number of vehicles and make direct comparison between different times of the day quite easy. Stepping through the tabs of the spreadsheet, one can see areas of congestion form and recede by the hour.
504_201403W1_WB_SpeedStats
504_201403W1_EB_SpeedStats
Although the data can be consolidated (say for one set of weekdays, or for all Saturdays), this can mask effects that only occur a few of the selected days. For example, routes affected by night club activity tend to run comparatively freely early in the week, or on days with bad weather, but encounter traffic congestion and higher passenger demand on fair weather evenings late in the week. For example, some routes are affected by traffic around shopping plazas or entertainment locations that does not show up every day of the week, or even on every weekend.
Selection of the specific days or periods to chart can be an iterative process using the monthly plots to identify days with generally similar behaviour, and then drilling down to the detail.
Destination Charts
In some earlier articles, I included plots showing vehicle spacing and destinations. The intent was to give a sense of the scatter of headways leaving a point and how this was magnified by the short turns (scheduled or otherwise) in service.
The technique used was to look at the “as operated” schedule for the location and direction to be used as a starting point, and then scan across to see the last timepoint where the vehicle was observed. The combination of the departure time and the actual length of the trip defined a vertical bar, one for each vehicle as shown on the following charts:
200911DestinationsUpGlad
Data are shown for the 501 Queen route westbound from Gladstone for the November 1-30, 2009. The spaces between the bars show the regularity (or not) of the headways. The level and reliability of service actually reaching each point outbound on the route are revealed by the spacing between bars at each location.
(Apologies for the format which uses numeric location values rather than location specific grids lines. When this chart was developed, I had not yet switched to the latter format, and as I have not been generating any in the past few years, I have not updated the presentation.)
Historical View of Headways and Link Times
A fairly comment statement about traffic in Toronto is that it is worse than it used to be, and transit vehicles cannot get across their routes as quickly now as in days of yore. This is true in some cases, but an equally common situation is the disruption of a route by a temporary obstruction or diversion. With an accumulation of data from several months, it is possible to build histories of average travel times and headways, as well as SD values for these, to see how things have really evolved and where emerging problems might lie.
The process and chart format is the same for both types of analysis.
The monthly summaries (see above) contain all of the data for a given point (headway charts) or route segment (link time charts) organized by day, type of day and time.
To perform a review of a route over time, all of the monthly data for one point or link is read and consolidated by week and time (on a half hourly or hourly basis), with average and SD values calculated for each time interval for each week. Here are a few examples of the result:
504_105_Yonge_HeadwayHistory_SDC
504_214_BloorWest_HeadwayHistory_SDC
These charts show the evolution of headway values at Yonge westbound and at Bloor/Dundas southbound over the periods for which I have tracking data. Note how often the SD and average values overlap indicating the degree to which vehicles tend to operate in pairs.
504_11213_Jameson_EastofQueensway_LinkHistory_SDC
The section westbound from Jameson to The Queensway shows very large changes in travel time values, especially in the afternoon and evening when outbound motor traffic is attempting to reach (or to bypass) the Gardiner Expressway. The times vary a great deal depending on current conditions including factors such as close ramps and bridges, traffic signal behaviour and special events that produce heavy traffic flows at times other than the “traditional” peaks.
504_20605_University_Yonge_LinkHistory_SDC
Some areas have quite static travel times seen over a long period with interruptions caused by construction projects. King eastbound from University to Yonge lost the curb lane to construction in late 2013 and this caused substantial increases in travel time.
504_20504_Yonge_Jarvis_LinkHistory_SDC
Travel time eastbound from Yonge to Jarvis is another example of a value that has changed little over time. One visible exception is at the start of September 2014 when the TIFF diversion sent all King service via Queen Street.
The purpose of these charts is both to flag specific weeks for more detailed study, and to verify whether conditions are changing on a long term trend as opposed to short-lived upheavals.
One challenge with data subdivided at this level (especially if done to a half-hour resolution) is that “n” can be fairly small for a specific week and time slot, and a single delay of a few cars on one day can produce a spike in average and SD values. This is a catch-22 between consolidation and reporting at a more detailed level .
Conversion of Pre-GPS Data
When I started work on this back in 2007, the TTC was not yet using GPS data to record vehicle locations. Instead the tracking system estimated a vehicle’s location relative to specific intersections (mainly those with bus/car stops) through a combination of electronic signposts and hub odometer readings. This arrangement produced many strange behaviours in the data which were only corrected once the GPS info was added to the system.
For purposes of historical comparison, the old format data are converted to GPS by the simple process of matching intersection locations in that data with their GPS equivalents. From that point onward, the data are in a format that the current suite of programs understands.
Programming Languages and Data Formats
There is nothing very complex “under the covers” here. No esoteric programming languages or data structures were used, and the skill, such as it is, lies in understanding the peculiarities of the data and how the information can be consolidated into a standardized format.
All of the raw data are handled in CSV files so that they can exist outside any kind of formal database structure. The charts are all produced in Excel using templates that have been created specifically to take the CSV files as input.
The programming language is Rexx, something that will be familiar to old hand IBM mainframe folks like me, especially those from a Tech Support background. This was originally developed as a scripting language for IBM’s VM/CMS environment, but spread from there to many other platforms and is available on an open source basis. The birthday of Rexx is March 20, 1979. According to the official history, the name just “sounded nice”, but lore has it that there was a “Rex” pub not far from the lab where its creator worked. (This one was in Hursley, UK, not on Queen West.)
For more info, visit the Rexx Language Association. The specific implementation I am using is Open Object Rexx running on Windows.
The Excel charts are generated using Visual Basic macros within Excel to drive the process of populating multiple charts for various days of a month, locations on a route, etc.
No, don’t ask. I am not prepared to make the code open source.
Description of calculation of stats (averages, standard deviations, distributions) added.
Flemingdon Park 100 added as a sample route to illustrate a very twisting route layout with special mapping challenges.
Cutoff time for position interpolation reduced to two minutes to avoid errors at short off-route diversions and short turns.
Updated for clarification.
Speed and Vehicle Count charts added/updated for new format.
Destination chart replaced with .xlsx version.
Monthly headway and link time charts.
Headway and link time histories.
City of Toronto format charts.
3 thoughts on “Methodology For Analysis of TTC’s Vehicle Tracking Data”
Daniel Tripp | August 15, 2013 at 9:21 am
Thank you this, Steve. I’ve been wondering recently if you would publish something like this.
I have some questions if you have a minute:
– Where do you get the CIS data from?
Steve: From the TTC. I have an arrangement to request data for specific routes and periods. A few years ago, there was an idea to put this stuff online for general access, but it died with the Giambrone era.
– I wonder if you can elaborate on this “downtown canyon”. Is it because of the tall buildings downtown interfering with certain vehicle’s GPS readings? Also, you say it only affects certain vehicles – so do you maintain a list of, or at least generally know about, which vehicles these are? (I’m not asking for a list of vehicle IDs – only interested in your process.)
Steve: Yes. The problem is caused by reflections of GPS signals off of the buildings that confuse some readers. Most cars are not affected, but there are a few that show up regularly with wild readings starting roughly at University and ending a bit east of Yonge on King Street.
Thanks again. It’s great – important, even – to see how you do what you do.
Steve: Thanks. I know that some of these articles are tedious reading for many, but the documentation of the degree to which fact and fantasy about surface operations diverge is important. The single greatest impediment to attracting riders is service quality.
Steven | August 15, 2013 at 9:40 pm
The CIS data is actually obtainable by anyone. NextBus/TTC allows anyone to access the XML with the vehicle location at any given time. This is how all the apps get there data.
In order to have a complete set of data, one will need to write a program that fetches the XML data every 20 or 30 seconds for a period of time. By parsing the XMLs, you’ll have all the GPS coordinates of each vehicle on the route. You can have night bus routes and all those lightly used routes too.
Most app creators would use Java programming language because it has libraries for file fetching from the internet and XML parsing making it ideal for collecting data from NextBus.
Steve, I applaud you for the box method to map the data. It really takes precise measuring to determine if the vehicle location is on the route or not.
Steve: Yes, the real time data are available via Nextbus, but when, retrospectively, I want a month’s worth for ten routes, that’s a whole different matter. If the data arrived in XML format, they would be much bigger simply for all the tags. One month’s data for a busy route like King is 170mb after it has been unzipped, and that’s in csv format with no field identifiers.
Michael | April 4, 2014 at 11:29 pm
If you don’t mind, how did you label the stop names on the vertical axis of the service chart? I’ve been trying to google it, but I don’t even know what the function is called. Did you put the labels on using Excel?
Steve: Ah, yes, that was tricky. The chart page has a “height” in units used to map the service, and each of the stops (and its corresponding horizontal line) has a value in that co-ordinate system.
In the case of the chart you linked, for King, the height of the chart is 1300 units and Spadina is at 635. Therefore, this line (and its text) go at 635/1300 relative to zero as the horizontal access. This has to be scaled against the chart’s physical location which comes from the values in the top and height values for ActiveChart.Axes(xlValue) (which just for fun counts down from the top of the chart, not up). The horizontal positioning comes from the Left and Width values for ActiveChart.Axes(xlPrimary).
For each route, I wrote an Excel macro that spins through the list and converts the offset between the base line and the position of the stop into the page’s co-ordinate system. The text and the line are then drawn in at the proper vertical and horizontal positions on the page relative to the underlying chart. It took a while to get this to work properly, but once it did, the effect was almost magical.
This is actually done on a blank chart to produce a template for each route with the vertical scale preset to the appropriate height and with the reference lines drawn in. A separate macro populates the daily charts by importing .csv files containing the chart data into the template, and saving each day’s under its appropriate name.
Visual Basic is not my “first language”, but some of the code was developed by using the “Record Macro” function, performing what I wanted to do manually, and looking at the resulting code to see what Excel was expecting.
|
cc/2020-05/en_middle_0032.json.gz/line8281
|
__label__wiki
| 0.688582
| 0.688582
|
Swiita
Swiita Above Your Imagination
Game Of Thrones Season 8: Dead Man Walking
Game of thrones season 8 episodes 3 was more than wonderful but a class of movie, we hope to see which other movies can initiate in the future.
The highly anticipated third episode of this season’s “Game of Thrones” was an action-packed roller coaster ride that left fans dizzying over the heroics of Arya Stark, the show’s most fearsome protagonist, and a handful of characters who died trying to save mankind.
Queen cercei knows what’s coming for her, it’s not just man that are coming but a group of dead men walking, men who survived the great war that matters.
It was as if all hope would be lost when the night king raised a whole lot of armies for himself and it felt at that moment all hope was lost and looks glaring the night king would finally win after stabbing theon grejoy with his own weapon.
Jon snow on the other hand, knew he was strong hearted and stubborn to face the night king after bringing him down with his dragon and could have further done more than that but the night king was brilliant to stop him before getting close to him.
The dead is fearless and has nothing to die for, after all they are dead. The whole north fought the dead together and would regard themselves as a gladiator and monster, who can face any battle or fear. Jaime lannister told sir Brienne that he is no longer the man he used to be that knight people fear him for, that young warrior that kill the mad king but I think after the great war he would no longer be the man he has always been but a reformed fighter more stronger and brave.
The red woman, popularly known as the messenger for the lord of light Melisandre knew her mission was complete and it was time up for her, leaving behind her hope, disappointment, dreams and her precious pearl, which served to preserve her to look young, youthful and sexy, and almost made Stannis Baratheon lost his mind. Melisandre reappeared in timely fashion and lit up the Dothraki’s weapons, giving everyone a ray of hope (and a spectacular sight) in the middle of the night. That was short-lived, as the violent warriors were easily killed off by the dead.
Rhaegal and Drogon, the dragon Daenerys rides, were a powerful force in the battle until a snowstorm wrecked all visibility, and the dragons struggled to help out the fighters on the ground. When the Night King showed up riding the undead Viserion, things got even more hectic.
Viserion and Rhaegal literally slammed into each other in the snowstorm, with the wight dragon trying to cook Rhaegal’s rider as they slashed away at each other. The Night King took the opportunity to try to spear Rhaegal and take him down for good, just as he did with Viserion during the Season 7 episode Beyond the Wall. But Rhaegal eventually won the fight, tearing off a piece of Viserion’s face, and both the Night King and the wight dragon fell to Earth. But Rhaegal’s injuries were pretty severe, and he went plummeting to the ground, too–he crashed, throwing Jon from his back and that was the last we saw of the dragon.
The dragon queen, jon snow, arya stark and the whole north have a role to play in the last war. The prince jon snow was promised by the lord of light to bring the dawn but was ended by the servant of god of death, arya stark.
Game Of Thrones: Kings Landing Sacking
Director Miguel Sapochnik who was in charge for the making of Battle of the Bastards”
Game Of Thrones: Dire wolfs vs. Dragon showdown
As much as we would’ve loved to see a bunch of fluffy good boys patrolling
Game Of Thrones: Blood Moon
Game of Thrones is over, but if HBO has their way, we won’t be away
Developed by Organic Cell
× We love to hear from you?
|
cc/2020-05/en_middle_0032.json.gz/line8288
|
__label__cc
| 0.728502
| 0.271498
|
View Obituary Flint Journal Obituaries
Harry "Jeff" Urynowicz
URYNOWICZ, HARRY "JEFF" Harry "Jeff" Urynowicz passed away Thursday, January 30, 2014 surrounded in love by his immediate family. He was 71 years old. Jeff was married for 49 fun and adventurous years to Barbara (Pomeroy) and they had three wonderful children, Michael (Margaret), Kristi (Rich Boddy), and Laura (Norm Schultz). Jeff had three beloved grandchildren, Joseph and Elizabeth Urynowicz and Jeffrey Boddy. Born in Saginaw, Jeff worked as an Industrial Engineer at General Motors for 30 years in Flint. In 2002, Barb and Jeff moved to Fort Collins, Colorado to watch their grandchildren grow up. He was the best father in the world, the most considerate husband and a loving grandpa. The world was brighter when he was in it. A memorial service will be held Saturday, February 22, 2014 at 10:00 a.m. at the Timberline Church in Fort Collins, Colorado. In lieu of flowers, memorial contributions may be made to the Preston Robert Tisch Brain Tumor Center - Duke University, in care of Allnutt Funeral Service, 650 W. Drake Road, Fort Collins, Colorado 80526. Please visit www.allnutt.com to view Jeff's online obituary and send a message of condolence to the family.
Allnutt Funeral Services-Fort Collins
650 West Drake Road
All arrangements are locally delivered to Allnutt Funeral Services-Fort Collins by a local Fort Collins, CO florist.
In Loving Memory Arrangement
Simply Sweet $160.00
The In Loving Memory™ Arrangement pays tribute to a life well-lived with every beautiful bloom. Red roses and carnations pop amongst this incredible arrangement of white hydrangea, Oriental lilies, snapdragons, larkspur, Queen Anne's Lace and assorted lush greens, lovingly arranged in a large whitewash rectangular basket to create an impressive display of caring kindness.
Deluxe basket is approximately 28"H x 30"W.
Premium basket is Approximately 31"H x 33"W.
|
cc/2020-05/en_middle_0032.json.gz/line8295
|
__label__cc
| 0.728068
| 0.271932
|
Thank you Rich Wulf
I want a retreat. Not to retreat, just a retreat. I want to find a monastary and take a week or so to meditate and garden and clear myself out.
School is going well. Classes seem excellent, people are wonderful, and I feel genuinely happy. But I also feel excessively full. I feel tired and the semester's just begun. I wish that I could empty myself out, stretch my little just-breathing breaks into something that lasts for days.
I can't deny that part of this is because I'm reading Way of Shinsei in preperation for l5r. It's good but not great, mostly a game-iscized description of Buddhism for the ignorant, and as such I know the theology better than several (though not all) of the writers, but the allegories and descriptions of the roles monks play in the empire are worth reading. But everything seems so peaceful and quietly joyous. It's the peace I feel in reading O-Sensei's poetry.
Heaven, earth, humankind,
United in the Path of harmony and joy,
Following the Art of Peace,
Across vast seas,
And on the highest peaks.
But right now I feel too distracted to get into it. I need to clear my mind, empty my thoughts.
|
cc/2020-05/en_middle_0032.json.gz/line8296
|
__label__wiki
| 0.577396
| 0.577396
|
Rosatom Still Expecting Powerful Nuclear Icebreaker Arktika in 1st Half of 2020 – CEO
Rangers secure Scottish Cup progress with Stranraer victory
McGregor confident he has plenty still to achieve in UFC
Ashley Young joins Inter Milan from Manchester United
Trump just started a huge legal battle with California over lowering car emission standards
Date: September 18, 2019, 23:38
in: Politics
President Donald Trump announced Wednesday his administration will roll back a waiver to the Clean Air Act dating back to 1968 that allows the state of California to set higher emissions standards for cars than the federal government does.
The move is going to cause more headaches for an auto industry already buffeted by the Trump administration’s trade war with China. California officials have promised to challenge the revocation in court; state Attorney General Xavier Becerra said Trump had “no basis and no authority” to revoke the waiver.
Trump isn’t just igniting yet another fight with California, a blue state he has often feuded with. The waiver revocation is also part of his administration’s longstanding attempt to roll back federal fuel economy standards for cars and light trucks. Californians buy more cars than people in any other state, which means the emissions standards it sets for itself have big repercussions on the US economy as a whole. Thirteen states and the District of Columbia have also adopted California’s vehicle emissions rules.
So the California waiver was a big impediment to the Trump administration’s larger goal of rolling back regulations that were implemented to combat climate change.
In a string of Wednesday tweets announcing the rollback, Trump claimed it would make cars cheaper and safer, despite concerns from EPA officials that they could actually slightly increase highway deaths.
“There will be very little difference in emissions between the California Standard and the new U.S. Standard, but the cars will be far safer and much less expensive,” Trump tweeted. (There’s a double-digit difference between the miles-per-gallon target for 2026 by California and Trump’s EPA; 51 miles per gallon, compared to 37 miles per gallon).
And a subsequent Trump tweet carried what sounded like a threat to automakers if they don’t comply: “Automakers should seize this opportunity because without this alternative to California, you will be out of business.”
California state officials made it clear they don’t plan to accept the revocation of their waiver without a fight.
“It’s a move that could have devastating consequences for our kids’ health and the air we breathe if California were to roll over,” said Democratic Gov. Gavin Newsom in a statement. “We will fight this latest attempt and defend our clean car standards.”
Becerra, the California attorney general, agreed.
“We’re ready to fight for a future that you seem unable to comprehend; we’ll see you in court if you stand in our way,” Becerra said in a statement. “While the White House clings to the past, automakers and American families embrace cleaner cars.”
This is part of a longstanding effort from the Trump administration to undo climate change regulations
More than 20 percent of US greenhouse gas emissions come from cars and light-duty trucks, so increasing their efficiency is an important tactic for mitigating climate change.
The Obama administration ramped up these fuel efficiency standards in 2012, but the Trump administration wants to relax them, as it has already done with greenhouse gas emissions regulations for power plants.
However, some auto companies have already said they don’t want the Trump administration’s new fuel efficiency rules. In fact, four car manufacturers — Volkswagen, BMW, Ford, and Honda — in July reached a surprise deal with California air regulators to set higher emissions targets for themselves.
That voluntary deal would put the four auto companies on course to average 51 miles per gallon across all their sales by 2026.
As Vox’s Umair Irfan noted, it’s a slightly weaker standard than the standard the Obama administration set:
The deal between California and Volkswagen, BMW, Ford, and Honda has reportedly rankled Trump and administration officials so much so that they have put pressure on other car companies not to follow suit, per the New York Times.
But while automakers and people concerned about climate change want higher standards, the oil industry does not. As the New York Times reported in December, oil companies are wary of higher fuel efficiency standards, and are making their voices heard in the Trump White House:
The Trump administration has used a number of different tactics to try to push through their lower standards. First, they’ve tried to personally put pressure on auto companies. (Trump’s tweet telling automakers they’d lose business if they kept working with California appeared to be a continuation of that.)
Second, they’ve been claiming it would make automobiles safer, using the rationale that forcing automakers to meet tougher efficiency rules has the effect of making new cars more expensive — therefore causing people to drive around their old, unsafe cars for longer. Trump’s safety claim, however, is directly at odds with emails from EPA staffers that the AP obtained last year, raising concerns the move could actually slightly increase highway deaths per year.
But before any of this goes into effect, it could find itself tangled up in a long court battle first.
Trump’s move could be on shaky legal ground
Revoking California’s waiver to the Clean Air Act will mark the beginning of a lengthy legal battle between California and the Trump administration, and climate law experts have pointed out the White House is on shaky legal ground.
The administration’s legal argument is that it has “inherent authority” under the federal Clean Air Act to revoke California’s waiver because it goes against the Clean Air Act’s section 209, the specific law for state emissions standards.
But “the Clean Air Act does not contain any waiver revocation authority,” writes Julia Stein, an environmental attorney and project director at the UCLA School of Law. In a recent article, Stein argues the Clean Air Act gives the EPA the ability to deny a waiver before one is already granted, but not after.
In other words, because California was already granted a waiver by a previous administration, Stein says the law says the Trump administration can’t just take it away:
The state of California’s planned challenge the Trump administration’s revocation of their waiver could be a big legal test.
Sourse: vox.com
Previous : Trump just asked the Supreme Court to let him fire the CFPB’s head. The implications are enormous.
Next : The New York Times is the latest news outlet to end its Spanish-language coverage
Is abuse of power an impeachable offense?
January 20, 2020, 4:05
House managers: Trump poses an “immediate threat to the nation and the rule of law”
The Trump administration wants to weaken Obama’s healthy school lunch rules. Again.
The National Archives edited a Women’s March picture to be less critical of Trump
‘They May Be Among Us’: First Briton in Space Helen Sharman Claims Aliens Exist
January 6, 2020, 17:26
US Official Claims Cruise Missiles Used in Attack on Saudi Aramco Facilities – Report
Tottenham’s Giovani Lo Celso set to return against Red Star Belgrade
October 22, 2019, 5:08
England were the better team, concedes All Blacks coach Hansen
Julián Castro ends his presidential bid
Trump at private fundraiser reassures donors he’ll protect 2nd Amendment
Hasenhuttl believes Southampton have a ‘big opportunity’ against Everton
China Positively Assesses Recent Trade Consultations With US – Commerce Ministry
Mustafi and Elneny set for Arsenal exits as Emery tells them they have no future
Schumer: Democrats will try to overturn tax deduction cap
Eddie Jones’ England future beyond 2021 remains uncertain
IMF Selects Kristalina Georgieva to Serve as Managing Director – Statement
Sexton and Henshaw set to return for Cardiff clash
Judge directs State Department to hand over Ukraine documents to watchdog group
|
cc/2020-05/en_middle_0032.json.gz/line8299
|
__label__wiki
| 0.624673
| 0.624673
|
The Nerdy
Game of Thrones season 8 graces 16 Entertainment Weekly covers
Sean Aune - March 4, 2019
Game of Thrones season 8 is only weeks away, and the marketing push has kicked into high gear. To that end, Entertainment Weekly has...
HBO unleashes new Game of Thrones season 8 photos
Sean Aune - February 6, 2019
HBO dropped some official Game of Thrones season 8 photos on a hungry fan base on Wednesday. Game of Thrones season 8 is quickly approaching whether we...
John Wick Chapter 3 Trailer – Prepare for Blood
Sean Aune - January 17, 2019
The first trailer for John Wick: Chapter 3 - Parabellum has finally arrived! John Wick: Chapter 3 - Parabellum hits theaters on May 17.
Game of Thrones Final Season Premiere Date Announced
Game of Thrones is close to launching its final season, and at long last HBO has told us exactly when that will be happening.
Men in Black International Trailer Has Arrived
Sean Aune - December 20, 2018
The Men in Black are back, and this time they're going international.
Runaways Season 2 Trailer Shows a Surprising MCU Connection
Sean Aune - November 29, 2018
It seems that Nico (Lyrica Okano) is going to go through some major changes in Runaways season 2. Like, a connection to the Dark Dimension...
SpongeBob SquarePants Creator Passes Away at 57
Stephen Hillenburg, the creator of the hit series SpongeBob SquarePants, passed away on Tuesday at the age of 57. He had revealed in March...
Follow Superhero News
Jared Leto has a thirst for blood in the first trailer for Morbius
Brandon Russell - January 13, 2020
We knew Jared Leto’s Morbius was in production, and we knew it would be released this summer, we just didn’t expect a teaser so...
Doctor Strange 2 loses director due to creative differences
Doctor Strange couldn’t conjure a spell strong enough to keep director Scott Derrickson around. According to the director — complemented by a statement from Marvel...
Birds of Prey trailer has drugs, breakups, and a hyena named Bruce
Brandon Russell - January 9, 2020
You might be wondering: How’d Harley Quinn (Margot Robbie) separate from the Joker? According to the newest Birds of Prey trailer, the decision was...
New Mutants trailer – The Demon Bear arrives!
Sean Aune - January 6, 2020
At long last, a second New Mutants trailer has finally arrived and it looks as though the film will, at long last, see a...
Thor: Love and Thunder director says film will be “bigger, bolder and brighter”
Brandon Russell - December 18, 2019
It’ll be a few years before Thor: Love and Thunder hits theaters, but director Taika Waititi is already providing fans with details about the...
Superhero News collects the best superhero and comic book movie news from around the web.
© Fun Jug Media, LLC
|
cc/2020-05/en_middle_0032.json.gz/line8301
|
__label__wiki
| 0.648926
| 0.648926
|
Avrios has quietly raised $14M for an AI-fueled fleet management platform
Natasha Lomas @riptari / 1 year
Swiss startup Avrios reckons business mobility is going to get a whole lot more interesting as companies adopt more tailored mobility solutions, rather than sticking with the traditional one car per person model.
And at the same time as businesses are seeking to accelerate their progressive cred by moving away from combustion cars to greener alternatives, new urban mobility choices are starting to spring up to offer consumers a multi-modal spectrum of personal transport choice. So the days of businesses offering staff just a few choices of car model are numbered, is the thesis.
But with increased choice to balance, the job of the fleet manager looks set to get more challenging — both when it comes to negotiating with (more and smaller) suppliers; understanding costs and utility; and intelligently matching transportation solutions with business needs and staff desires, argues Avrios. Hence it believes AI will be a key aid to manage increasingly complex fleets.
Its platform, which focuses on passenger car and van fleets and is being used by ~700 customers (predominantly in Europe) to manage ~70,000 vehicles at this stage, is already using machine learning technology to help fleet managers stay on top of data related to car leasing costs.
But Avrios sees this as its foundational play, and is positioning its platform to support a much bigger shift it envisages coming down the pipe — as technologies such as electric cars gain in popularity and get increasingly slotted into business’ fleets.
The rich spectrum of possibility for personal urban mobility can already be glimpsed on the consumer side as ride-hailing giants like Uber turn their attention to car alternatives such as e-bikes and e-scooters.
Businesses, surely, won’t want to be left behind. Which means fleet management platforms will need to be up to challenge of handling all these newer and finer-grained transport options, argues Avrios co-founder and CEO Andreas Brenner.
After running a study on its own customer base last year, the 2015 founded startup estimates that at least 30% of the €60BN annual budget that European businesses currently spend on combustion cars will shift to other options over the next five years.
Its findings also suggest the vast majority of businesses (80%) are currently managing the looming shift in spreadsheets and Access databases — hence Avrios spying an opportunity to step in and support the disruptive market evolution. (And claiming spreadsheets as its main competitor.)
The initial play for its fleet management SaaS platform was also a supporting role (it launched as a dashboard in 2015, but was calling itself a platform by fall 2017), with the team building a system to ingest and process invoices and leasing documents for fleet managers, which Brenner says it has now almost entirely automated.
“You wouldn’t believe but, for example, almost none of the large leasing companies have APIs to import invoices or leasing data — so we essentially had to build a system where we would be able to process these contracts and invoices,” he tells TechCrunch.
“In the early days it all started out manually. But now we can process 99% of the documents fully automatically and this is not just the normal structured form recognition — it’s a true kind of AI system that we’re using. So that’s where most of the magic is happening.”
“The unique thing that we’re able to do is that we’re the only platform that’s able to help our customers import all of the unstructured data from multiple languages. And that’s a lot of information that’s necessary for fleet management, and that saves a lot of time,” he adds.
What he sees coming down the road is more exciting than tech that can automatically ingest French PDF invoices though — howsoever handy that might be — as businesses shift their policies to be able to accommodate a more richly fragmented mobility mix.
Another bit of research it carried out was to look at its customer data to consider how vehicles are currently being used — by looking at mileage and vehicle type — to “deduct the use-case of the vehicle”, as Brenner puts it.
“Our assumption is that any vehicle that isn’t driving a lot or isn’t carrying goods doesn’t make sense from an economic perspective — and is kind of the prime candidate for replacement by other options. At the very least by an electric car,” he suggests. “If I have a car that I’m only driving in the city for 10-20km a day it absolutely doesn’t make sense from an economic perspective to have that be a combustion car.”
That’s how they got to that 30% predictive shift away from combustion cars over the next five years.
They found customers were already implementing car policies that added electric vehicles to their mix (“the more progressive companies are even enforcing a certain share of electric vehicles in their 2019 car policies”, he says).
They also found a “big demand” for corporate car sharing — so the platform offers a booking module to cater to that.
Even more excitingly, they found that some customers were already piloting even greater flexibility — such as offering e-bikes to their staff.
“They’re really thinking hard about how to use all of the new possibilities to further drive employee motivation and retention,” Brenner suggests, arguing that offering staff multi-modal mobility options could be seen as an attractive corporate benefit. “And even expand the addressable groups of their current mobility policy.”
“It can be pretty motivating if, as an intern, you get access to an electric bicycle,” he continues, adding: “These are the kinds of things that we see our customers wrapping their heads around.”
That said, this level of flexibility is only at pilot stage in Europe at present now though.
But he “definitely” sees the European fleet market including electric vehicles in its car policies next year. And, beyond that, there’s potentially all sorts of mobility twists coming down the pipe in the next several years.
“The more creative or advanced options we see more pilots happening in 2019 — and then we think, based on the results of those, we’ll see more disruption in 2020,” he ventures, fleshing out the challenges that this will create for fleet managers.
“If you would put yourself in the shoes of a fleet manager, what you used to do is you used to have… typically two, three large preferred leasing providers. With those you would negotiate terms so that your employees could then choose from typically… 15 models plus some equipment options. That’s what it used to be and that was already considered complex, given all the different maintenance options, financing options etc available. And that’s the first problem we help our customers solve — to understand how is their car policy working?
“But as soon as you add more specialized, smaller suppliers you’re really faced with less volume negotiation. You’re faced with additional overhead. You’re faced with additional number of suppliers, and that’s what we see happening — if you look at the rental car companies they’re offering ever more specific offerings for individual use cases, if you look at shared mobility they’re offering ever more specific offers for specific use cases. And as a fleet manager if you want to somehow provide all that for your employees, for you it just means an explosion of the number of contracts you have to maintain, an explosion of the number of options you have to put into your mobility policy, and that’s an explosion in the complexity of decision making and also in kind of delivery to your employees.
“So that’s what it means for fleet managers — and that’s what we’re helping them with: The cost control, and also the delivery to the employees so they can book a pool car directly through our platform, they can order a leased car, a rental car directly through our platform. So that it all automatically aligns with the policy.”
The company claims its platform helps customers reduce their fleet administration overhead by 30% now and their fleet cost by up to 10%, as well as touting additional benefits around data privacy, and compliance with environmental and owner’s liability laws.
If the quantity and variety of mobility options proliferates, and gets as niche and nuanced as futuregazers suggest, then having a platform to manager cost, compliance and policy complexity starts to look essential — certainly for businesses with large staff and fleet bases to manage.
The majority of Avrios’ current business is in Europe, with customers which include insurance companies, retailers, fashion companies, machine manufacturers and professional service providers.
Brenner says they also have a handful of US and Middle Eastern and African customers (further noting that lots of its customers also have a global fleet footprint).
On the competitive front, he bills what it offers as “a true fleet management platform” — arguing it’s the first such player to do so, suggesting longer-in-the-tooth rivals have only offered fleet administration software and/or fleet management services (while the online portals of incumbents such as AFleetLogistics, Leaseplan and Arval are, as he tells it, “customer retention tools that suggest but don’t really provide transparency”).
“We have a platform approach, providing elements of what software providers would (structured data, reporting, etc) but also elements of what fleet management providers like FleetLogistics would (procurement automation, benchmarking cost against other fleets, optimizing the bidding process for the procurement of new fleets and fleet leases),” he adds. “We are neutral and help customers understand where they are truly losing money.”
The funding being disclosed to TechCrunch now covers a seed round raised in December 2015; a Series A in June 2017; and ~$4M of extension/acceleration funding which it closed in July 2018 — all previously unannounced. The funding total to date adds up to ~$14M — and investors in the business include Lakestar, Notion, Verve-Capital, Siraj Khaliq (Atomico) and Andrew Flett (Fleetmatics).
Brenner says the extension of the Series A will be used for product development — to “accelerate the transition from a fleet management dashboard towards adding more transportation options”.
It will also be used for scaling the business faster than initially planned. “We’re now considered growth stage so for a growth state startup it’s the typical stuff — product and sales and marketing,” he adds.
“Now we feel like we understand our story, we understand the long term direction we want to take the company, we understand who are customers are, what our position in the market is etc, so it felt like it was the right time to talk to the market a bit more publicly,” he says, explaining why they’ve keep their powder dry on funding announcements up to now.
“It was just a matter of focus on customers and product development rather than anything else.”
|
cc/2020-05/en_middle_0032.json.gz/line8312
|
__label__wiki
| 0.936574
| 0.936574
|
Hulu to debut new ad formats in 2020 focused on letting users make choices, transact with advertisers
Jan 15, 2020 Sarah Perez
Hulu is preparing to roll out new forms of advertising this year — one which will allow viewers to have more say in the ads that play, and another that lets the viewer engage with the brand in q
Hulu is down
Dec 19, 2019 Megan Rose Dickey
Less than one month after a major Hulu outage, Hulu is down again. We’ve been seeing reports on Twitter of Hulu streaming issues. It appears the issues have been ongoing for the last few hours.
Hulu launches its viewer-friendly ‘binge watch ads’
Dec 12, 2019 Sarah Perez
Hulu today is launching a new kind of ad experience that allows brands to specifically target binge-watchers — that is, viewers who are watching multiple episodes of a favorite program over a lo
Hulu is down, appears to be a major outage
Nov 24, 2019 Zack Whittaker
Hulu is currently down. We’re not sure why, and neither does Hulu. A stream of tweets complaining about the outage surfaced Sunday morning on the U.S. east coast, but it seems like a global outa
Hulu increases price for live TV by $10, to $55 per month
Nov 15, 2019 Anthony Ha
Hulu just sent an email to subscribers of its Hulu + Live TV plan announcing that the price of the basic live TV plan will increase from $44.99 per month to $54.99 per month. This is Hulu + Live TV
Hulu ramps up its personalization efforts, starting with launch of Like / Dislike buttons
Oct 16, 2019 Sarah Perez
Hulu says it’s working on several product changes to make its service more personalized to viewers. It recently launched an enhanced recommendation engine that now accounts for not just what you
Hulu rolls out 4K content to Xbox One, with Amazon Fire TV and others coming ‘soon’
Hulu this summer finally brought back 4K content to its service, after abruptly removing it in 2018 while it focused on other priorities. Initially, its 4K content was only available on Apple TV 4K an
Hulu finally launches support for downloads, initially to ad-free viewers
Hulu is finally adding downloads to its streaming service, years after Netflix and Amazon Prime Video did the same. The company had promised over a year ago that it would soon roll out support for off
YouTube TV is now available on Fire TV devices
Sep 30, 2019 Sarah Perez
Earlier this year, Google and Amazon reached an agreement to bring their streaming video apps to each other’s platforms, following years of anti-competitive, anti-consumer behavior on both of th
Tesla V10.0 car software update adds Smart Summon, Netflix/YouTube, Spotify, karaoke and more
Sep 26, 2019 Darrell Etherington
Tesla is rolling out a new software update that adds a slew of new features to its cars. These include the new “Smart Summon” feature, which will allow cars equipped with the optional $5,0
Meet VENN, the company hoping to build MTV for the gaming generation
Sep 17, 2019 Jonathan Shieber
Maybe a network will be the thing that replaces the single streaming media star. VENN, a new company launching with $17 million in funding from some of the biggest names in gaming, is hoping to harnes
Hulu will adapt Margaret Atwood’s sequel to ‘The Handmaid’s Tale’
Sep 04, 2019 Anthony Ha
MGM and Hulu announced today that they will be adapting “The Testaments,” Margaret Atwood’s sequel to her novel “The Handmaid’s Tale.” The series has been key in es
Hulu debuts an expanded Live TV Guide on web, Apple TV and Roku
Aug 28, 2019 Sarah Perez
Yesterday, Hulu began rolling out an updated version of its mobile app sporting the brand-new interface the company first unveiled at CES in January. However, it was missing one of the pre-announced a
Hulu redesigns its mobile app for better discovery
At this year’s CES event, Hulu announced plans to trial an updated version of its user interface that would do away with the confusing landing page called “Lineup.” At the time, the
The new Disney+ streaming service is oriented around fans and families
Aug 24, 2019 Jonathan Shieber
You can tell a lot about a service by what it prioritizes on its home screen. With the new Disney + service, the focus is initially organized by fan base, with different silos for the company’s
Hulu and Amazon Prime Video chip away at Netflix’s dominance
Netflix is still the No. 1 subscription streaming service in the U.S., according to a new report from eMarketer, but rivals, including Amazon Prime Video and Hulu, are starting to cut into its market
Disney+ comes to Canada and the Netherlands on Nov. 12, will support nearly all major platforms at launch
Aug 19, 2019 Darrell Etherington
Disney+ will have an international launch that begins at the same time as its rollout in the U.S., Disney revealed. The company will be launching its digital streaming service on November 12 in Canada
Week in Review: Netflix’s big problem and Apple’s thinnest product yet
Aug 11, 2019 Lucas Matney
Hey. This is Week-in-Review, where I give a heavy amount of analysis and/or rambling thoughts on one story while scouring the rest of the hundreds of stories that emerged on TechCrunch this week to su
Daily Crunch: Disney reveals streaming bundle
Aug 07, 2019 Anthony Ha
The Daily Crunch is TechCrunch’s roundup of our biggest and most important stories. If you’d like to get this delivered to your inbox every day at around 9am Pacific, you can subscribe her
Hulu brings back 4K content
Jul 12, 2019 Sarah Perez
Hulu has again launched 4K content on its service, as first noticed by a report on The Streamable today and confirmed to us by a company spokesperson. The streamer had been late to add support for 4K,
|
cc/2020-05/en_middle_0032.json.gz/line8313
|
__label__cc
| 0.581926
| 0.418074
|
How to Type Upside Down Question Mark
How Fleets Are Getting Smart with Mobile Phone Technology
After 4g Whats Next For Mobile
Using the Latest Technology at Low Cost
How to Protect Your Mac Against Viruses
You’re Only as Good as Your Weakest App: What a Pitiful…
Home Entertainment Kissanime | The Video Online Anime Website and Its Alternates Websites
Kissanime | The Video Online Anime Website and Its Alternates Websites
tilak raj
Do you love watching anime? Anime is a very famous form of Japanese animation. And of course its famous in Japan and makes fans all over the world crazy. Large glistening eyes, brightly colored hair, exaggerated facial expressions are some of the common things that remind of anime. There are many anime websites and KissAnime is one of them that makes anime – addicts go insane!
What is KissAnime – The background?
KissAnime is a famous website for 2 reasons, one it has the best English dubbed and subbed anime in high definition and second, it’s absolutely FREE!. If you are an anime lover, then you probably might have heard about KissAnime. And you can find millions of anime lovers here, as they are officially called “King of Anime Websites”. KissAnime uploads anime in all video quality from 240 to 1080p. The websites have a very clean and simple interface with various genres to pick from including, romance, fighting, comedy, horror adventure and much more.
Is Kissanime free?
All you have to sign up. You are allowed to make folders to list all the various animes you have watched and you can also share them with your friends through email. Here You will also get updates through the mail when they upload a new kind of anime. You can also comment on videos and join discussions. All these are absolutely FREE on Kissanime.
Kissanime is not just limited or a site just uploads cheap anime. There are loads of short series as well. You can also watch various dubbed seasons as well as movies too. The website proves to offer something for all, no matter what your taste is.
Is Kissanime legal?
Kissanime is one of the biggest anime streaming online site though it is not a legal platform, as the content shown on the site is not done by official ways followed by other applications. If you are watching a movie or an anime on their website it would not get you arrested. This is like the streaming sites, where the streamers are the ones who are performing the illegal things while you will be the watcher is doing anything wrong. So don’t panic while using the platform. It is unlawful to save things from the webpage. Kissanime is not a legal website, but a great source of Anime.
Also, Kissanime is safe to use and no virus is associated with its usage. The official site does not have any sort of malware. But, some sites have mirrored sites, which might have hackers and spammers. It is completely a copy of the official site. The Kissanime original site does not have any kind of malware or another spam ware.
How KissAnime works?
If you are an anime watcher, then KissAnime serves you the best. There are people who still don’t know how to use the website and how it works.
Pick your favorite anime from the category
Click the title and you will be redirected to a page which has a list of episodes that has anime.
Click ‘next’
Watch the episode you want
You can also download the episode, but scrolling the page down and click the button ‘save link’ with the desired pixel dimension. Your anime download will be done within seconds and you can enjoy watching it without buffering. If you have followed the steps mentioned above perfectly, then it’s easy to download anime videos from the website.
Do you have to create an account?
No, there is no need to create an account to watch the video. The sign-up option is for those who want to manage their favorite videos. You can also make folders to list down all the various series you have watched and make a wish list of what you want to watch too. You can share them with your friends via email and signing up gives you regular updates and keep you notified about your favorite series.
Top 10 alternatives of KissAnime
We have filtered the top KissAnime alternatives to give you the best. KissAnime was taken down a few times the website is not currently working under the name – www. Kissanime.ru, if you want to find a great alternative to the site, then check out the list below;
1. Anime Season
Being top on the list, a great website that offers quality anime video. The site is absolutely free and provides high-quality videos for the viewers. It’s a great alternative of KissAnime and it comes with minimal ads as compared to KissAnime site. You can get the list by recent views, genre and highest rated. This website is a place to watch cartoons and online anime.
2. Chia – Anime
This website is considered a real KissAnime alternative for various reasons. First, both the websites are free to access and offers a wide range of anime collection, which also includes videos, movies, and series. The only drawback of the Chia – Anime is the interface which seems to be a bit messy. You will notice ads all over the site, which makes browsing experience tuff.
3. Crunchyroll
The website was launched in 2006 and has a wide user base ever since. What makes this website so unique and a great alternative to KissAnime is that the site is not just for anime lovers. This is because the website is not just limited to anime but has so many other series in all languages, not just Japanese and English. The website’s categories are music, entertainment, anime, of course, manga and more. The website is a hub with more than 15000 hours worth of content that of OFFICIALLY LICENSED. Now, that being on roll! The website has one minor disadvantage, not all videos are free!
4. Anime lab
One of the best anime website that offers high-quality tracks from Japan. You can get various series added each week and more than 1000 of shows and series episodes are uploaded. It also has famous anime and their kinds. Each category is also segmented into subcategory offering various fold of options. You don’t have to register to watch videos on Animelab. Now that’s a great deal for anime freaks!
5. Anime-Planet
If you want old anime in HD then Anime-Planet website should be your preference. This site offers both old as well as new anime in high definition. The home page has the list sorted into sections based on the new anime, popular ones, and suggestions. This instantly catches you up with new releases and famous ones. The only drawback of the site is that like all another free anime site, it shows too many pop-ups and advertisements. This might not be a great deal though, and it’s still a desirable spot for anime watchers.
6. GoGoAnime
Not to be missed on the list! The website offers all sorts of anime from old to new and the latest. Along with the usual, this site has also a new season option as well, which displays the newly launched ones so you don’t miss out!
7. 9Anime
A great KissAnime alternative which is reliable as well as trusted. The website has more than 26000 anime series and movies to watch. You will be entertained for hours! The major benefit of this site is that you can suggest your favorite anime to be uploaded on the site. Another great feature of this website is that It allows you to stream in HD and offers English dubbed option.
8. Anime Land
A great alternative to KissAnime and has a huge list of dubbed anime movies from dragon ball to naruto and one piece. The website features new and latest anime collection at the home page. You can get quality anime videos from 480p to 1080p HD. No sign up needed to watch your favorite anime series and movies. Seamless streaming and minimal ad popups are its advantages. A well-organized website with a clean interface.
9. Anime Park
Another great website to watch anime episode in English subbed. You don’t have to pay anything and It’s absolutely free! You can also download your favorite anime shows and watch online. The website has more than four thousand anime series collection and all are absolutely free. The video quality available on this platform is a bit low when compared to the other. But still, you can watch shows from genres like romance, comedy, drama, action as well as adventure.
10. Masterani
Masterani.me is one of the most famous websites for anime streaming and an excellent alternative to KissAnime. Watching anime videos and shows is super easy and you don’t have to sign up. The only requirement you must have is the latest version of Flash player. You can check the show schedule which will be updated on the site and also saves shows and videos to watch later.
This is the list of KissAnime alternatives that offers some of the best quality anime videos and shows. Watching anime is extremely fun and if you are an anime lover then no exception.
So guys enjoy theTop 5 New & Hot Anime on Kissanime.
alternatives of KissAnime
Is Kissanime free
Is Kissanime legal
what is kissanime
why kissanime so popular
Previous articleSudoku Kingdom Solving Techniques When You Are Stuck | Works 100%
Next articleHow to remove Dllhost.exe *32 COM Surrogate Virus
What is Computer Vision?
Download and Install Skyrim Script Extender
How to remove Dllhost.exe *32 COM Surrogate Virus
Sudoku Kingdom Solving Techniques When You Are Stuck | Works 100%
Computers & Internet2
Tips And Tricks1
|
cc/2020-05/en_middle_0032.json.gz/line8314
|
__label__wiki
| 0.691296
| 0.691296
|
Techno UK
K-Lone – Dance Of The Vampires
Dub meets UK bass on this intoxicating EP.
“Dance Of The Vampires,” the A-side of K-Lone’s latest EP, surfaced earlier this month, but it could have come out a decade ago. Its dubwise contours echo the post-dubstep-adjacent sound of the early ’10s, when FWD-reared producers looked to house and techno’s slower tempos for guidance. But in this instance, it tracks a phenomenon where the reverse is happening—that is, producers trying to break free from familiar four-to-the-floor ideas, some of whom search UK club music’s heritage for creative solutions. Even casual listeners will have noticed, for example, the resurgence of breakbeats in house and techno. As Chal Ravens recently noted in the Wire, this desire to escape samey rhythms extends to the infiltration of dembow, IDM, footwork, gqom and other irregular patterns and tempos in productions and DJ sets.
So how does Dance Of The Vampires, which draws heavily from dub, figure into all that? In recent years, a handful of tastemaking artists and labels have reintroduced dub to the dance floor, a style that’s inspired so much UK club music. Put another way, dub is a natural space to explore for those who are tracing back the way through the hardcore continuum.
On Dance Of The Vampires, K-Lone turns the atmospheric dub abstractions of his 2017 EP In The Dust into something more DJ friendly—these tunes are perfect for the warm-up, the afters, or both. “Dance Of The Vampires” is an ethereal float of dub sirens, smoked-out ambience and dislocated chat from MCs, singers and, possibly, a cloakroom queue. “Sleepwalker,” a kind of dub techno lullaby, may be even better. Like “Dance Of The Vampires,” the B-side ticks along via K-Lone’s fragile percussion, in this case glass-bottle rides and matchsticky hi-hats. Small effects, like the radio-dial squalls, enhance “Sleepwalker”‘s filigree feel. But even as the music invites you to admire these details, you’re just as likely to drift off in its cloudy, intoxicating chords.
TechnoUK
Nizo: iPhone app dreams of Super 8 and aims to simplify the art of filmmaking
For Club Use Only: Best of 2019
|
cc/2020-05/en_middle_0032.json.gz/line8316
|
__label__wiki
| 0.525154
| 0.525154
|
Mtnl Sms Mobile Recharge Plans in Uttar Pradesh West
About Mtnl
MTNL (Mahanagar Telephone Nigam Limited) is a publicly listed state-owned enterprise state-owned telecom service provide operational in only Delhi and Mumbai metropolitans and at the island nation of Mauritius. The company enjoyed monopoly in until 1992, when the telecom sector was opened to other service providers.
The telco offers mobile services on GSM and CDMA platforms in addition to fixed line telephones and WLL services. MTNL’s various services include postpaid GSM service with value added services called Dolphin, a prepaid GSM service known as Trump and wireless landline service called Garuda.
The government-driven telco started 3G services in India under ‘MTNL 3G Jadoo.’ The 3G services offered include video calling, mobile TV and mobile broadband with high speed data connectivity up to 3.6 Megabits per second from 11 December 2008.
Delhi-headquartered telecom service provider rolled out its BlackBerry solutions on the 2G and 3G networks and indroduced India’s first 3G enabled BlackBerry Bold smart phones.
MTNL also started its fibre-to-the-home (FTTH) triple play (voice, video and data) service in Delhi on 9 November 2011 with a network speed up to 1 Gigabit per second and the similar service was launched for Mumbai subscribers on 1 March 2012.
MTNL FTTH Broadband offers several services based on triple play services like IPTV, HDTV, 3DTV, video on demand, bandwidth on demand, instant video conferencing, interactive gaming and several other value added services.
Aimed for households and small businesses. it also provides TriBand Internet services, through dialup and DSL as well as games on demand, video on demand, and IPTV services. On 9 November 2011, MTNL started fibre-to-the-home (FTTH) triple play (voice, video, and data) high-speed broadband service in Delhi.
Circle - UP West
Operator - MTNL
Recharge Type - SMS
Mtnl News
VRS to streamline BSNL, MTNL Opex: DoT official
BSNL, MTNL suffering due to decisions taken under UPA regime: Telecom Minister
BSNL, MTNL asset sale proceeds to clear debt, fund VRS
Government to 'relook' into BSNL 2G spectrum expiry
MTNL paid March salaries from internal accruals: CMD
'BSNL revival to take time, DoT to assist financially'
BSNL employee union opposes VRS, seeks 4G spectrum for telco revival
|
cc/2020-05/en_middle_0032.json.gz/line8321
|
__label__cc
| 0.727321
| 0.272679
|
Mount Pleasant, South Carolina
Upper Hand Tennis
Want to see the actual history?
Become a Recruiting Advantage Member to be able to view this player's
historic rankings and the histories for all other players in the system.
Senior Year (Sep 2018 - Aug 2019)
Choose a Year ------------------------------ Senior Year Junior Year Sophomore Year Freshman Year Choose a Ranking ------------------------------ Show Both Recruiting List Only TennisRPI Only
Recruiting List Percentile
TennisRPI Percentile
What is a percentile?
Your percentile is a value between 1 and 100 that indicates the percentage of players ranked below you. For instance, if you are ranked higher than 70% of all players, then you would be in the 70th percentile.
Why do you chart the percentile instead of the rank?
The number of ranked players in the TennisRecruiting.net lists changes from week to week, and the differences can be dramatic over long periods of time. For example, there may be only 500 players ranked before the busy summer season - and 1000 players ranked at the end. With these changes, your ranking may change significantly over long periods of time - and these changes are not necessarily correlated with your performance.
We have found that percentile does not fluctuate as widely as the raw rankings and better correlates with performance. Using percentiles makes the historical ranking charts more meaningful.
Why does the chart start at the 50th percentile?
The pool of players considered is much bigger than the players that we rank. Just meeting the eligibility requirements of our lists in terms of wins is an accomplishment. Since more than 50% of the players are ineligible across all classes, we decided to show from 50 to 100.
Yonex EZONE 100 2020 Tennis Racquet Review
Page updated on Wednesday, September 04, 2019 at 2:19:40 AM
|
cc/2020-05/en_middle_0032.json.gz/line8331
|
__label__cc
| 0.742191
| 0.257809
|
The AIBs home
The AIBs gala
AIBs gala dinner 2019
The AIBs Masterclass
2017 #iamabroadcaster Masterclass
Event partner for AIBs 2019 – Al Jazeera Media Network
Previous AIBs
Contact AIB
AIB Home
Janine Stein – Editorial Director – ContentAsia
Janine Stein is Editorial Director for ContentAsia’s information platforms, including print, multimedia and online. She has covered the Asian television, media and satellite business across Asia since 1989, and has worked for, among others, The Hollywood Reporter (U.S.), the South China Morning Post/Television & Entertainment Times (Hong Kong), Cable & Satellite Asia, Television Business International (TBI, U.K.) and Electronic Media (U.S.). Prior to 1989, she covered the African television and media industries for five years.
Among other roles, she was TV Editor for an English-language national daily and a correspondent for industry magazine Southern Screen & Stage out of Johannesburg.
The AIBs 2020 | timetable
2 April | Entries open
26 June | Closing date
July-August | Shortlisting begins
Mid-September | Shortlist announced
Mid-September-October | Judging
13 November | Awards night
PO Box 141 | Cranbrook |
TN17 9AJ | United Kingdom
The AIBs are an initiative of the Association for International Broadcasting, the not-for-profit non-governmental organisation
|
cc/2020-05/en_middle_0032.json.gz/line8333
|
__label__wiki
| 0.728316
| 0.728316
|
Trump lawyer says Trump couldn't be investigated in office even if he killed someone in public
safe!
Absolutely nothing could land President Trump in jail, or even under investigation.
At least that's the take of Trump's lawyer William Consovoy, who appeared before the Court of Appeals for the 2nd Circuit on Tuesday. Judge Denny Chin modified Trump's old suggestion to ask if the president could "shoot somebody" in public and not face consequences for it, and Consovoy said that's true.
While Consovoy argued to bar a subpoena for Trump's tax returns in New York, he played up the Justice Department Office of Legal Counsel opinion that bars a president from being indicted while in office. But Chin asked Consovoy if that applied to a hypothetical murder, asking "Local authorities couldn't investigate? They couldn’t do anything about it?" Consovoy conceded that yes, authorities could take action once Trump leaves the White House, but for now, "no."
Here's Donald Trump's lawyer claiming the president cannot even be investigated, let alone prosecuted, for committing a crime while in office, even if he murdered someone in public. pic.twitter.com/h0Rj5AZpPf
— Timothy Burke (@bubbaprog) October 23, 2019
Chin's question drew from Trump's 2016 allegation that he could "stand in the middle of 5th Avenue and shoot somebody" without losing voters. Now, at least according to Trump's lawyer, he wouldn't lose a day of his life to prison either. Kathryn Krawczyk
|
cc/2020-05/en_middle_0032.json.gz/line8336
|
__label__wiki
| 0.803479
| 0.803479
|
Unique Baseball Gifts
Become The Ultimate Fan
Ryne Sandberg of the Chicago Cubs becomes the first second baseman in history to notch consecutive 30-home run seasons
Aug 28, 1990 | Homerun History |
On August 28, 1990, Ryne Sandberg of the Chicago Cubs becomes the first second baseman in history to notch consecutive 30-home run seasons. Sandberg hits his milestone 30th home run against the Houston Astros, helping the Cubs to a 5-2 win.
PreviousEllis Burks becomes only the second Red Sox player to hit two home runs in the same inning when he goes deep twice in Boston’s eight-run fourth frame during the team’s 12-4 rout of the Tribe at Cleveland Stadium. In 1928, second baseman Bill Regan became the first BoSox player to accomplish the feat when he homered twice, including an inside-the-park round-tripper, in the top of the fourth inning against Chicago at Comiskey Park.
NextAt Minnesota, Twins SS Greg Gagne has a homer and three steals, including home, in a 6 – 1 win over the White Sox. Mark Guthrie goes the distance for the win.
Indians and brewers tie mark by hitting 11 homeruns in 9 inning game
Willie McCovey becomes first player to hit 2 homers an in inning twice
Wally Schang of the Philadelphia Athletics becomes the first major league player to hit home runs from both sides of the plate
Eddie Waitkus and Marv Rickert of the Chicago Cubs hit consecutive inside-the-park home runs
SEARCH Games, Players, Dates
We bring you cool stories about the game, players, ballparks and the people that shaped the game!
Subscribe to the Daily Rewind Podcast
Apple PodcastsSpotifyAndroidStitcherby EmailRSS
1984 Detroit Tiger Bless You Boys Poster $11.50 – $29.00
Baseball in Altoona: From the Mountain City to the Curve $12.15
Keepsake Engraved Bats $40.00
The Pittsburgh Pirates Encyclopedia: Second Edition
The Visit - Every pitcher has lived through this one $21.50 – $29.00
MVP Ultimate Fan Package $99.00
Tim Flannery on Sign Stealing In Baseball
Roy Halladay autopsy results released
Curt Schilling on sign stealing
The Phillies Special
Joe McCarthy 10 commandments for a Mlb manager
We have over 60 Categories!
We have over 60 Categories! Select Category 10 Strikeout Game (4) 200 Win (5) 3 Home Run Games (51) 3 homerun game (16) 3000 Hit Club (23) 3000 Strikeout (5) 300th Victory (15) 4 Home Run Games (11) 500 Homerun (17) 600 Homerun (5) active (29) active team (30) Adopted (6) AL MVP (28) ALCS (13) ALDS (7) All Star Game (46) American Association (1) American League (2) April (30) August (31) Awards (3) Ball Park (338) ballpark (25) Baseballs (1) Batting Feat (85) Batting Out of Turn (168) Biographies (86) Birth (112) Boston Red Sox (4) Classic Broadcast (23) Cleveland Indians (1) club record (3) Club Records (21) College (1) Comebacks (12) Commissioner (35) Contract (35) Cy Young Award (5) Cy Young Award American League (5) Cy Young Award National League (12) Cycle (23) death (70) Deaths (184) Debut (80) December (33) Division Clinchers (13) draft (15) Ejections (1) Exhibition (2) expansion (19) Extra Innings (22) Famous Thefts (35) Fans (3) February (29) Fielding (43) Fight (16) fights (5) Firsts (61) Franchise News (128) Free Agency (45) free agent (8) Gold Glove (5) Grand Slam (25) Grandslam (5) Hall of Fame (452) Hall of Fame Game (2) Hall Of Fame Inductions (51) Historic Events (4) Hit By Pitch (10) hitting streak (5) Hitting Streaks (33) Homerun History (188) Houston Astros (4) Houston Astros (1,631) How to adopt (2) in active team (70) Injury (65) Intentional Walks (6) Inter League Play (3) interleague (1) International (3) January (31) Japan (19) July (31) June (30) Labor Issue (2) Labor Issues (31) Lasts (47) League Executives (13) League News (14) Little League (3) Los Angeles Dodgers (1) lost homerun (129) lost homerun weather (149) Manager (168) Manager of Year (3) March (31) Mascot (4) May (31) Media (28) Milestones (153) Minor Leagues (48) Misc Player News (8) Months (13) Museums (1) MVP Awards (7) Negro Leagues (40) New York Yankees (2) NL MVP (30) NLCS (11) NLDS (7) No Hitter (10) No Hitters (126) November (30) October (31) Off The Field (45) Opening Day (24) Owners (45) past ball parks (212) Pennant Winners (28) perfect game (4) Perfect Games (5) Philadelphia Phillies (1) Pinch Hits (12) Pitchers Hitting Feats (20) pitching feat (9) Pitching Feats (164) Player (19,615) Player Streaks (36) Playoff Games (8) Podcast (27) Post Season (28) Presidents (6) Quiz (2) Rare Feats (1) Record Setters (103) retired uniforms (11) Retirement (63) Rivalries (2) Rookie of the Year (3) Rookie Of The Year American League (17) Rookie Of The Year National League (15) rules (41) Saves (2) Scandels (18) Season Recaps (2) Seasons (142) September (30) Special Days (28) Spring training (1) steroids (3) strikeouts (30) suspended (2) suspension (31) team executive (6) Team Streaks (22) This Day In Baseball (35,876) thisdayinbaseball (128) Transactions (536) Triple Crown (4) Triple Header (1) Triple Play (11) Umpire (24) Uniforms (8) walkoffs (23) Walks (4) WAR (29) Wild Card Games (5) women (6) World Series (143) World Series Clinchers (39)
This Day In Baseball January 19
Darrell Porter found dead at 50 - from toxic effects of cocaine and excited delirium
Boston Red Sox rookie Fred Lynn drives in 10 runs
Joe Bauman, of Roswell (Class C Longhorn League) hits 3 home runs in a twin bill win over Artesia, giving him an all-time season record of 72 round trippers.
Eddie Mathews claims he may hold out
Dedicate a event, game or player! Learn More!
|
cc/2020-05/en_middle_0032.json.gz/line8339
|
__label__cc
| 0.596807
| 0.403193
|
thisisfootballislife
This is all about the things that tie football to life. The shirts, the stadiums, the stories, the travel, the people, the politics, and everything in between.
Matchday Photos
F.Y.R Macedonia
F.Y.R. Macedonia
Politics/Sociology of Sport
Football Travel Stories
Non-Football Travel Stories
Classic Shirt Designs
White Hart Lane, London, England–(Tottenham Hotspur FC): Tottenham Hotspur-Besiktas JK (1-1) Matchday
thisisfootballislife England, England, Matchday Photos, Stadiums Besiktas JK, British Stadiums, English Football, Groundhopping, London, London Football, Matchday photos, Premier League, Stadiums, Tottenham Hotspur FC, Turkish Football, UEFA Europa League, White Hart Lane 1 Comment
Some more pictures of White Hart Lane taken from the away supporters section during the UEFA Europa League match between Tottenham Hotspur FC and Besiktas JK. White Hart lane opened more than a century ago in 1899 when the first match saw a modest crowd of just 5,000. While the record attendance is an astounding 75,038, from a match in 1938, the new seating regulations mean that the current capacity is 36,284. Since this is smaller than the capacity of many Premier League stadia there are plans for reconstruction afoot. Luckily, I was able to make it out before another classic British ground fades into the past. The stadium has a cosy feeling, there is no denying that, and as a fan it feels as if you are almost on the pitch. To get there, take the Victoria line to Seven Sisters station and change for a National Rail service to White Hart Lane station.
London Fall Football Fest 2014 (10.01.2014-10.06.2014): Six Days, Four Matches, One City
thisisfootballislife England, Football Travel Stories Arsenal FC, Besiktas JK, Boleyn Ground, Burak Yilmaz, Danny Welbeck, Emirates Stadium, England, English Football, Fernando Muslera, Football Shirts, Football Travel Stories, Galatasaray SK, Green Street Hooligans, League Two, London, Men United, National Gallery, Premier League, Prostate Cancer UK, Queen's Park Rangers, Roots Hall, Southend United FC, Tate Modern, Tottenham Hotspur FC, Turkey, Turkish Football, UEFA Champions League, UEFA Europa League, United Kingdom, Upton Park, Wesley Sneijder, West Ham United, White Hart Lane 5 Comments
Ölümle Yaşamı Ayıran Çizgi, Siyahla Beyazı Ayıramaz Ki . . .
The Line That Separates Life From Death Can’t Separate Black From White . . .
Those poetic lines come from Beşiktaş supporters and they became a bit of a mantra for me during my recent trip to London. It was four matches in six days, punctuated by all sorts of lessons learned on either side of lines that separate so many instances of life—things that are so close yet so far apart. One often thinks of white and black as opposites—symbolizing life and death, respectively. Yet, in the context of one football team, these two opposites are inseparable; separate they may mean two different things but together they symbolize something that is very much alive: love for one football team.
London Fall Football Fest Part One: The Line That Separates Football Crazy From Just Plain Crazy
Çocukluk aşkımsııııııın!!!!!
Sen ilk göz ağrımsıııııın!!!!
You’re my childhood love!!
You’re the first apple of my eye!!!
The tune—if it can even be called that—rises from a single tinny voice somewhere behind me. Imagine the most off-key singer you’ve ever heard . . . then ten times worse. This is something like that. I haven’t turned my head yet, neither has Ekin. We want to make it crystal clear that we are not with this man.
Kimseyi, kimseyi sevmedim senin gibiiiiii…
Sevdanın uğruna terkettim herşeyiiiii…
No one, I’ve loved no one like I’ve loved you…
I’ve abandoned everything for the sake of your passion…
No, we have certainly never seen this man in our life.
“John, what was our flight number?”
“Let me check . . . 519.”
“519? What kind of a flight number is that?”
“I don’t know man! It’s on the boarding pass!”
Hayatın anlamıııııı
GALATASARAY!!!!!!
The meaning of life is….
GALATASARAY!!!!!
The off key-tune keeps interrupting us as we try to fill out our immigration cards. Our minds have turned to mush after traveling and now, at 12am, this one-man sideshow is really the last straw. By now others have noticed him and are starting to stare. The UK citizens line is staring, and the non-Turkish contingent in the non-UK citizens line begin to send disapproving looks his way. He seems to be oblivious as I look him over.
He is definitely a strange looking fellow. But, then again, you’ve got to be a little off to be belting out Galatasaray songs in the middle of the night below the UK BORDER sign in the passport control line at London Stansted Airport.
I just hope that his ill-timed display of team pride won’t disrupt our entry; our purpose of visit—to see some football matches—could mean we get painted with the same brush as our wayward friend in line behind us. After all, the UK BORDER sign puts us in our place. We are all guilty until proven innocent here.
We inch through the line at a snail’s pace, everyone is being scrutinized down to the last detail. I’m not worried about getting to where we need to go—the busses to central London run 24 hours a day from Stansted. However, I am worried about the exchanges taking place behind me.
“I can see the light! We will get the three points from Arsenal!” He sounds confident, judging by the sound of his voice. Perhaps he hasn’t watched the first five matches of the season.
“What light? Have you seen us play lately? I’m treating this as a sightseeing trip!” Someone gives him the answer I would have given.
“A sight-seeing trip?” He gets in the other man’s face. “If you’re just here to see the sights then you can’t say ‘Galatasaray’!” He is definitely out of his mind and I just turn to Ekin. We share the same grave looks, looks we know all too well from living in the same country some 3,000 Kilometers away.
“Gözlerime bak! Gözlerime baksana!! (Look into my eyes! Look me in the eyes!)” he has now found another adversary and is staring him down in a zero-sum game. After all, they don’t have anywhere to go—they’re surrounded by velvet ropes on either side. Another man tries to intervene.
“Yapma, değmez. Haydi kardeşim, en azından burada yapma (Don’t do it, its not worth it. Come on brother, at least don’t do it here)”. I chuckle at the “don’t do it here”. Its clear that this man will cause some trouble in England—this just isn’t the time or place for it.
Ekin and I laugh at this with the people behind us in line. They are at least normal. One is a girl who has lived in London for seven years, another is a middle aged man who has come to see the game, like us. He says he is looking for tickets to the Beşiktaş match as well and Ekin—ever the optimist—assures him that some can be found.
“Well, if not, all I want to do is watch this Galatasaray match safe and sound.” He pauses as if for effect and all four of us look over our shoulders. “I mean, there will be people like that.”
Yes, there will indeed be people like that. I can read Ekin’s mind as we stand, immigration papers in hand, waiting for our turn to be examined beneath the UK BORDER sign. All we can do now is stay away from those who live on the other side of that line separating football crazy and just plain old crazy.
London Fall Football Fest Part Two: The Line That Separates Turkey From Europe (And England From Europe, For That Matter)—Arsenal FC-Galatasaray SK (4-1) 10.01.2014
We’re seated in the Arsenal seats but we may as well be in the Galatasaray section. Only a single police officer separates us from our fellow fans to the right; nothing separates us from the Arsenal fans to our left (who would surely tear us limb from limb if they knew our true allegiance).
Before I can get settled and take in the atmosphere of Emirates Stadium it seems as if the game is already over. Danny Welbeck has already netted two goals in the first half hour en route to his eventual hat trick. Not that this surprises me of course, I just thought that Galatasaray would be able to at least hold “the Gunners” off until the second half—such is the hopeless hope of a football fan. “Two nil, to the Arsenal…two NIL, to the Arsenal!” rings out across the Emirates Stadium, and I just hope that those around us don’t notice our conspicuous silence.
As the match starts to slip away from Galatasaray I can feel the tensions rise and the policeman next to us starts to scan the crowd, the nervous look showing in his young eyes. Like the oppressive humidity before an oncoming rainstorm the air is heavy and the inevitable thunderclap comes in the form of sound bombs. Then comes the downpour. Flares are literally raining down onto the pitch as the Galatasaray section is bathed in an orange glow. Smoke rises into the London night and that old familiar burning scent comes to my nostrils. I can’t help but think that “this is football”.
The grass has caught fire and Galatasaray keeper Fernando Muslera picks up one of the flares as Wesley Sneijder does his best to calm his fans down.
The Arsenal fans, for their part, are watching with a mix that is equal parts fear and glee. Fear because it is an unpredictable situation, glee because London has not seen such a colorful night in a long time. While pyro shows are common in Eastern European stadia, they are virtually non-existent in Britain. It is that strange sense of being both in and out of Europe that the English love to cultivate.
The PA announcer is barely audible as bottles begin to fly in the Galatasaray section. Arsenal fans in the upper decks are egging on the visiting supporters below as they return fire, not to be outdone. Extra police are called in to form a ring around the unruly supporters while the riot gear gets distributed among them. The policeman to our right takes off his vest and calmly dons his helmet as the Arsenal fans hold the tune “Who are ya?!” It is definitely going to be a long night, I can read it in the faces of the cops swarming around us.
The Arsenal fans are booing the Galatasaray fans with each chair that is thrown into the air. Their reaction is the right one—after all, you don’t go into someone’s house and ransack it. But this is football. The hooliganism that Britain terrorized Europe with in the 1980s has now come back to them. I would have preferred it if my fellow fans could have shown a modicum of self-control but that isn’t always possible. I think back to the man in the line at passport control. No, it isn’t always possible at all, and I’m not surprised. It is the childish glee of the Arsenal supporters that surprises me more. But it too is normal. After all, they can relax. They are the ones on the other side of the line. They are behind their police. They are an island. They are in Europe. And Turkey is not, it is that simple.
By halftime it is 3-0, seven minute into the second half it is 4-0 as Danny Welbeck completes his hat trick and I’m bracing for the chant “Five nil, to the Arsenal. FIVE nil! To the Arsenal!” but it never comes. Keeper Wojciech Szczesny is sent off just past the hour mark and Burak Yilmaz sends the substitute keeper the wrong way to grab a consolation goal and make it 4-1. My consolation is that four of the five goals came in the goal directly in front of me. But it is a hollow feeling, scraping what little happiness we can get out of a night where the lines between Turkey and Europe showed themselves as clear as the bright orange flares burning in the smoky air.
As the police dogs come onto the field to prevent a pitch invasion after the final whistle we file out, headed to the Arsenal Tavern down the road to drown our sorrows in a few pints of London Pride.
London Fall Football Fest Interlude #1: The Line That Separates Art from Art
I don’t think I’ll ever understand modern art. I’m trying to work off the previous night’s stress before tonight’s Tottenham-Beşiktaş match by taking in some “high culture” to offset my days and nights spent in the “low culture” of football stadiums. The day before it had been the National Gallery on Trafalgar Square, today it is Tate Modern on the banks of the Thames. As I stroll through the exhibits I find it difficult to wrap my mind around what constitutes “Art”. The masterpieces I saw at the National Gallery blew me away. On the same level as the pieces of the Hermitage in Saint Petersburg they inlcuded, among other things, Monets, Friedrichs, and what was probably the first “Instagram collage”…from 1642, a portrait of Cardinal Richelieu by Pilippe de Champaigne.
Now, I can only laugh when a mirror on canvas is presented to me as art. As if the mirror wasn’t enough, then there is of course a beige octagon on the wall. Or vertical brush strokes, painted until the paint runs out. Those too are art. I was hoping that the beers I drank at the Globe Theater—the absurdity of Shakespeare’s famous venue housing a watering hole aside—would kick in at the Tate but I have no such luck. I look at myself in the mirror, criticizing the lines on my face and decide “No. This is much too ugly to be art”. Or is it?
I remember a conversation I once had with a friend, himself an aspiring artist. When I told him that I disliked some of the pieces of modern art on display at the Rhode Island School of Design (RISD) museum—after all, is a simple black canvas with a red square art?—he told me that was exactly what art is supposed to do. Anger or dislike are still emotions just like love or enjoyment, so—even if it is not positive, if it elicits an emotion in the viewer then it is indeed art. By his definition then yes, I suppose Tate modern is certainly a tour de force of emotionally stirring artwork!
I am left trying to work out the thin line that separates the concepts of “art” in my head as I leave the former power plant that is now a modern art Mecca and head down the walking path along the Thames. Teenagers are skateboarding in front of an urban gallery of spray painted “art” while I peruse the nearby used book market. I choose The Rainbow by D.H. Lawrence, reasoning that a British author is most fitting. Plus, I think most of us can agree to its merit as “art”.
London Fall Football Fest Part Three: The Line That Separates The Bad People From The Good People—Tottenham Hotspur FC-Besiktas JK (1-1) 10.02.2014
“Hey! You! Take that Galatasaray shirt off, you can’t wear that here!” I look around with the most innocent “Who, me?” face I can muster as the cop comes up to me. We are buried in the innards of White Hart Lane in the small café area allotted to the Beşiktaş fans–the walls tell me what section I am in.
“Come on now, put something on over that shirt.” The cop is getting impatient as I attempt to explain. As I tell him that our friend invited me here and explicitly told me to wear my Galatasaray shirt it even seems like he will let me go. That is, until I feel a hand on my collar, trying to get at my throat. It is not the policeman’s hand, and it is not an English voice yelling in my ear. It’s…a Turkish voice.
“Cikart o formayı! (Take that jersey off!)”
“Sakin ol, polis ile konuşmaya calışıyorum! (Calm down, I’m trying to talk to the cop!)”
“Burası siyah beyaz tribünü seni öldürürüm! (This is a black and white crowd I’ll kill you!)”
The cop gives me his best “I told you so” look and all I can do is relent. After all, if these two Beşiktaş men were rational—and could understand from logic—I wouldn’t have a hand around my throat. All I can do is resign myself to falling into the policeman’s clutches. It is undoubtedly the safer option.
“Alright, alright” I acquiesce as he carts me away. I can feel the fifty-pound ticket going out the window, I figure he’s ejecting me.
“Where are your seats?” I’m relieved but he still has his arms around me as I direct him to where we were seated. As soon as I’m released I go for my shirt and begin buttoning it up over my beloved jersey. Ekin does the same as the cop looks on, making sure the job is done correctly.
“Ne yaptığıni sanıyorsun? (What do you think you’re doing?)” Asks one of the Beşiktaş fans below us as he watches me button up my shirt.
“Formaları çıkart dedi (He told us to take off our jerseys).” I say, nodding to the cop.
“Hayır. Çıkartmayacaksın. Forma kalcak. (No, you’re not taking it off. You’re going to keep it on)”.
The cop can only shake his head as they start arguing with him before he wanders off realizing we are in good hands. Sometimes there is no reasoning with football fans.
“Aşağıda saldırdılar bize (They attacked us downstairs).” I explain in a bid to clear our names as I slowly take my shirt off, revealing the jersey again.
“Boşver. Burası siyah beyaz tribünü falan değil forma’da ay yıldız yok mu? Burası kırmızı beyaz tribünü! (Forget it. This is not a black and white crowd isn’t there a Turkish flag on your shirt? This is a red and white crowd!).” He’s right—we’re here to support a Turkish team, as if the Englishmen surrounding us—the ones yelling profanities at us from behind the police line—care what team we support. They just know we’re the enemy, football is sometimes simple like that.
The men in front of us are definitely the good guys, the great guys. They almost want the people who attacked us to come to our seats so that they can set them straight. As one man says, its better to be in a Galatasaray shirt among the Beşiktaş supporters than be the one in a Fenerbahçe shirt among the Tottenham fans (apparently, there was someone like that in the stadium). One guy gives Ekin a Beşiktaş scarf that he wraps around his neck and I know that here, within five minutes, I have interacted with both spectrums of humanity. Luckily, here good has prevailed over bad in spectacular fashion. It’s one nil to the good guys after all.
Buoyed by the good guys’ support I redouble my singing, belting out Beşiktaş songs at the top of my lungs and sending a few choice words out to the Tottenham supporters to our right, focusing on a particular asshole who is mocking my Galatasaray shirt.
“Keep going in his language,” say the fans around me as I continue in a profanity laced exchange that cannot be printed here.
Luckily Demba Ba equalizes by converting his 88th minute spot kick to save me—and us—the blushes, allowing me to take out my anger at the bad guys by giving it to the Tottenham supporters. They’re not to be out done though, sending bottles and coins our way as a scuffle erupts between the fans following the final whistle. I have half a mind to pick up the coins that were thrown at us—after all, they’re British Pounds Sterling! Before I can do that, however, the cops push us back—there is no separation between good guys and bad guys, Galatasaray and Beşiktaş supporters here. We are all just potential hooligans, and they deal with us accordingly before sending us out into the night.
The author wearing the questionable jersey beneath the Spurs Shop.
London Fall Football Fest Interlude #2–The Line That Separates Being Lost in Life and Just Finding Your Way Through Life
Four in the morning and you’re sitting at a roulette table on Leicester Square. Soon the morning will come and make everything clear. Or so you hope. Until then its one more Maker’s Mark, and one more bet on Red. Or should it be evens? The day has been long but it isn’t over yet.
It started sightseeing and walking all over the city before moving to a London club, dancing with those girls who carry themselves with a sense of purpose, in a way that only the residents of a true world city can. Some were pretty in a British sense—something about the way they wear their hair. Others were partiers, on vacation from Berlin and Amsterdam. Staring at those dancing crowds you realize you’ve come a long way from getting foreign objects thrown at you on the terraces of White Hart Lane. But that’s not the purpose of your journey, they are not the objects of your attention. It can all wait, you say, following your friends into the casino.
You tell yourself you’re not lost, you’re just finding your way through life like you find your way through the crowds of the cities, the club, the casino, of the football stadiums. And that is where you find your confidence even though your life is as random as the silver ball spinning around the roulette table, waiting to land somewhere, anywhere at all . . .
London Fall Football Fest Part Four: The Line That Separates Dreams From Reality—Southend United-Morecambe (0-1) 10.04.2014
No trip to London would be complete without a little rain, and I get my share of it on a Saturday afternoon. In the drizzle the train pulls out of London’s Liverpool Street station and I settle in for the hour-long ride to Prittlewell in Southend-on-Sea. The train stops at a lonely suburban station and I follow the crowds in what I assume is the direction of the stadium under a rain that is slowly picking up.
At the central intersection there are a few pubs and the crowds have gotten larger, everyone making their way to Roots Hall Stadium. The mood seems buoyant, which is normal considering that Southend have gone four matches without defeat.
I queue for twenty minutes, thankful to be out of the rain, and eventually get my twenty-one pound ticket with…the amazing view of a support column. Thankfully, due to my experiences at Fenway Park I’m not too disappointed. It’s all just a part of the adventure.
No sooner have I settled in than Morecambe strike, Jack Redshaw hitting a fifth minute shot to put the visitors up 0-1. The home “shrimper” fans are not too disappointed that the visiting “shrimps” have scored—after all, Southend are on a good run of form. I like the idea of the match as a “Shrimp Derby” (both teams have shrimps on their badges) and strain around the column to look at the proceedings. Sitting behind that column and listening to the fans screaming at the top of their lungs I can’t help but realize it is all part of a losing battle. Roots Hall, with a capacity of just over 12,000, can not compete with the big money in London that I saw first hand in Emirates Stadium and White Hart Lane. Yet here these fans are, fighting the good fight of dreams in the face of reality. As football has become more and more about money, it is unlikely that any of these smaller teams will ever be able to truly compete with the teams in the Premier League and Championship any time soon. Sadly there isn’t much to see on the field either and, forty minutes later, its still 0-1 at halftime.
I head down to the bar underneath the stand for a half time pint of Foster’s in order to get the gloomy thoughts out of my head. It’s not surpising that a bar exists in the stadium—after all, the team were formed on May 19 1906 in the Blue Boar Pub! Watching highlights of other League Two matches deep inside Roots Hall I think back to high school. My soccer coach at the time, himself an ex Southend United player, had brought our whole team to London when we were just fifteen. It had been our first real experience in European Football (and European drinking), and for that I am forever indebted. The least I can do is take in a match at Roots Hall in return.
I decide to watch the second half from the top of the stand—I couldn’t go back to the column, now that Southend were attacking the goal with the obstructed view. Again, there isn’t much action even though Southend go close numerous times. Before the final whistle I get scolded for taking pictures by the steward—apparently it is grounds for dismissal. I told him I wasn’t going to make a live stream of the match via my smart phone’s video camera but he wasn’t amused. I guess, for some reason, I just can’t stop getting in trouble at matches during this London Fall Football Fest.
I’m not offended, he’s just doing his job. The match ends 0-1 to the visitors, just as the sun begins to break through the clouds. I head to the club shop after the final whistle and grab myself a Southend United shirt. I ask whose name should be on it and after a fierce discussion amongst the workers Jack Payne’s #19 is decided upon. Apparently he has been the best over the past month, shortlisted for the Player of the Month award.
What drove me to the shirt was a charity fundraiser for Prostate Cancer UK. The Men United logo to raise prostate cancer awareness in the UK will be displayed on every number of every football shirt in the Football League during the 2014-2015 season. This may not be as famous as the ALS Ice Bucket Challenge but it is no less important. Prostate Cancer affects one in every eight men in the UK, and one man will die of it every hour according to the charity. So the next time you pull on a Football League shirt, go the extra mile and get a name and number set to help raise awareness while showing your team pride.
For the match report please see Southend United’s website at http://www.southendunited.co.uk/news/article/041014-morecambe-match-report-1988517.aspx. For some professional quality pictures of the match please visit Southend United’s website for the Match Gallery at http://www.southendunited.co.uk/news/article/060114-morecambe-gallery-2000937.aspx.
London Fall Football Fest Part Five: The Line That Separates England’s Past from England’s Future—West Ham United-Queens Park Rangers (2-0) 10.05.2014
On my last day in London I find myself on Green Street (of Green Street Hooligans fame) getting tickets for an East London-West London derby clash between West Ham United and Queen’s Park Rangers. After getting my tickets from the Boleyn Ground I head down Green Street alone, just to get a sense of the area, and here it hits me how blurred the lines between England’s future and England’s past truly are.
It is a sight to see. Subcontinental clothiers line the street, windows full of saris that carry all the colors of the rainbow. The colors remind me a bit about my own closet of football shirts back home, and I feel how far I am from the clothiers of Picadilly Circus. Even the signs in the Underground advertise the same things—either sending money to India or Islamic dating. Britain’s colonial past is alive and well here in East London.
Being a child of parents that come from two different cultures I know how valuable biculturalism can be—but only if it is accepted. Otherwise, it falls pray to xenophobia and racism—destroyed before it can show its benefits. Here on Green Street watching the QPR and West Ham United fans walk together beneath signs for the Al-Madinah bookstore, I see just how complicated the relationship between England’s past and England’s future is.
Once my friends finally make it into the Boleyn Ground I’m confronted with this harsh reality again and—not being one to hold my tongue—I almost pay the price for it. I understand how difficult it is to accept immigrants and I know that those glassy blue eyes and beautiful blonde girls (who could only be British) are slowly being outnumbered by new arrivals either from the ex-colonial territories or Eastern Europe. Therefore, I understand but could never condone the sentiments of a particular West Ham United fan I encountered at the Boleyn Ground.
The friend I was staying with, Berker—himself Turkish but a man of the world having studied in the United States and lived in London for four years—led us to our seats. We thought we were in the correct row, since the writing noting the letters of the rows had worn out on the steps. Berker told the man sitting in what he thought were our seats that he was in the wrong area. Well, it turns out we were mistaken, standing in Row J instead of row I.
We apologized to the man, but—after explaining to us our error—I heard him mumble “learn the language”. And it pushed me off the deep end. I told him that it wasn’t my friend’s lack of linguistic skills (which he has in abundance, I might add) that brought us to the wrong row, it was the fact that the stadium’s infrastructure was out of date and that the paint denoting rows had worn off in this particular row. Before he could give me a response my friends chided me for talking back to him. Perhaps they are more refined than I am, I’m not sure. But the one thing I am sure of—despite not being part of any firm—is that one line from Green Street Hooligans rings true: “Its not about your friends having your back. Its about you having your friend’s backs”.
Our conflict settled we sat down and watched. West Ham went one to the good early on, much to the enjoyment of our ‘‘friend’’ behind us and went into halftime with the lead. At the half I went for a snack, as is my custom—Carlsberg and spicy hot dog was the fare on offer.
In feasting I missed United’s second goal, right at the beginning of the second half, but I didn’t really care. After all, I came for stadium culture and stadium fare. Plus, I’d already heard the faithful sing “Bubbles” upon entering the stadium, which was truly an experience to behold and something we can all relate to. We all have hopes and dreams that—for reasons out of our control—cant always be realized.
I’m forever blowing bubbles,
Pretty bubbles in the air,
They fly so high,
Nearly reach the sky,
Then like my dreams,
They fade and die.
Fortune’s always hiding,
I’ve looked everywhere,
Pretty bubbles in the air.
For a clip of a few renditions taken from Green Street Hooligans:
And for a Punk Rock Cover, why not the Cockney Rejects rendition from the 1980s—London Calling eh?
Football Shirts (78)
Classic Shirt Designs (13)
Football Travel Stories (31)
Matchday Photos (35)
F.Y.R Macedonia (1)
Non-Football Travel Stories (19)
Stadiums (101)
F.Y.R. Macedonia (1)
|
cc/2020-05/en_middle_0032.json.gz/line8340
|
__label__cc
| 0.587286
| 0.412714
|
Coffee Storage Information
COFFEE’S STORY AND HISTORY
Over the last several decades an international phenomenon has occurred, making coffee everybody's favorite "feel good" drink & launching its popularity to new heights. Coffee has taken the world by storm or shall we say by “The brewing of the storm”! This new found popularity has made coffee one of the world's most valuable & traded commodities.Throughout Europe it is astonishing how many coffee establishments are open and serving people each and every day. Europe's coffee capitals such as Vienna, Berlin, Barcelona, Paris Amsterdam, Nice, Stockholm, Copenhagen, Helsinki, Oslo and Prague have all brought a uniqueness and class to a centuries old profession, contributing heavily to coffee cultures world domination. Modern society has made Coffee more popular than tea in 2017! Now with climate warming the industry faces higher prices and specialty blends more valuable than ever. This has made proper Coffee Storage an important factor, indispensable for maintaining the value of your purchase, its freshness & flavor.
Roasted coffee beans emit comparably large amounts of gas, carbon dioxide to be specific. This is why most coffee manufacturers use foil bags with a one way degassing valve to store beans. The valves on these bags open at a specific pressure, allowing for the excess gases to escape. At the same time the one way valve is preventing oxygen from entering the bag & causing the beans to go stale. Absolutely the best way to store coffee beans or grounds is in an airtight container away from light, moisture and heat.
Coffeevacs offer several ways to store coffee. Our unique patented vacuum system creates a partial vacuum ensuring freshness. The 2 way press button acts in exactly the same way as a one way degassing valve, allowing natural gas pressure to escape, without allowing any oxygen into the container. Freshly roasted coffee requires the release of more C02 gas and our patented Coffeevac V - valve allows this excess build up to escape without the compromise or loss of flavor and freshness. Coffeevacs are a revolution in coffee storage; Airtight & Odor-Proof, they create a vacuum seal every time you open and close the container. They come in a large selection of sizes & in Solid, Tinted or Clear body styles. Tightvacs and Coffeevacs are also refrigerator & freezer friendly.
FREEZING COFFEE
It has been a long time belief & practice that freezing coffee is the best way to maintain the flavor & taste. This only applies to whole beans; not the ground coffee. Whole beans naturally preserve the flavor by keeping the inside of the bean from exposure to the elements. As soon as the bean is ground, it begins to lose its essence, flavor and vitality. By storing beans whole you can preserve the rich aromatic coffee taste you expect & enjoy. There are many experts who disagree with freezing coffee, citing that a frozen coffee bean causes the cell walls on the outer layer of the bean to burst. This changes the molecular structure and the coffee goes stale quickly. Gases are released, moisture and oils evaporate. In addition, people do not thaw coffee properly after freezing & moisture from the condensation will also cause damage to the bean. There are many who are totally against the freezing of coffee. On a personal note i myself do not believe it's necessary to freeze coffee for short periods of time.
Italy is said to run on coffee, and from 1600 when coffee was first released into into the Venice market, this new Venetian habit flourished and black gold became a status magnate, this luxury made you more than what you were and the masses ached for the negro nectar. Venice was said to have over 200 “coffeehouses” in the mid 1600’s! Take us to present day Italy, where the Italian government has a set price for an espresso, currently at E1.20. However this often depends upon where it is you park yourself. If you drink your coffee at the “bar” then this price is max. If you decide to sit down, the price will most definitely fluctuate. Italian “bars” are on every corner, serving espresso’s to almost every citizen of Italy! Italian coffee culture is its own unique story of this amazing coffee plant. With this incredible diversity of design, quality and craft shine. Italian coffee companies specialize in coffee pods, pads and beans for all types of brewing machines. Many coffee pods are refillable so you can use your own brand of coffee without throwing away a plastic vessel each time. The branding of all these unique coffee companies is astonishing, one just needs to visit the HOST Milano fair (every 2 years) to see almost 1000 coffee companies, all serving the italian market. Let's talk about espresso machines, invented and patented by the italian Angelo Moriondo in 1884 which started a revolution, literally. With major brands, selling globally like Nuova Simonelli, La Marzocco, De’Longhi, La Cimbali, Astoria, Bezzera, Elektra, Carimali, Faema, La Spaziale, Victoria Arduino, Orchestrale, Rancilio, La Pavoni, Arte Caffe, Sanremo and CaffItaly. We have not listed all the espresso machine companies that exist in Italy and we humbly apologize to these companies, as they are all important. With coffee credentials like these one can easily believe, Italy is Europe’s coffee powerhouse!
SOME INTERESTING FACTS ABOUT COFFEE……
Like Tea, Coffee has a long history & folklore, from medicinal & spiritual use in the ancient Middle East to the modern day office coffee break. From ancient times the Middle east region, specifically Yemen traders controlled the cultivation of coffee plants. The coffee beverage was largely associated with islamic rites, rituals and healing. Controlled by islamic leaders and preachers the trading of coffee was protected and the outside world viewed this black liquid with suspicion and foreignness. The Arabic word Quwwa means power or energy and Kaffa is the ancient kingdom of Ethiopia where the coffee plant is believed to have been exported to the Arabic world. Arabs controlled coffee production until Dutch traders brought us the word Koffie in the 1500’s. So the english language owes The Netherlands a THANK YOU. The race to supply the new “coffeehouses” of Europe was met head on with the Dutch merchant and agent for the Dutch (British) East Indies Trading Company, Pieter van den Broeke who secured some coffee plants from Mocha Yemen in the early 1600’s. It is easy to make these statements, however the actual business of procuring closely guarded coffee plants and seeds, leaves one to wonder how this was done. Basically to do this under the radar, it had to be a cloak and dagger operation - procured by cunning, bribery and deception.
By all accounts this was a 100% success as no written evidence has ever been discovered that such a crime ever took place. The seedlings then sailed to Amsterdam, The Netherlands and thrived under the care of the Amsterdam botanical gardens best botanists. These plants were cloned many times and then brought to Dutch colonies in Asia, Ceylon & Java and in South America, Surinam. This dramatically changed coffee production and by the late 1600’s, the Dutch were in a position to supply Europe’s popular coffee commodity and introduce it to other parts of the world. Meanwhile, thanks to the British East India Company, England became a coffee power house boasting over 3000 coffee establishments in the late 1600’s. These “coffeehouses” became a common gathering place for political and religious discussions which of course threatened the political and religious leaders. Many of Europe's “coffeehouses” allowed both men and women to frequent these establishments. Charles II in 1675 literally tried to undermine and close the coffeehouses, labelling them as subversive elements in society. Many proclaimed that Coffee's medicinal properties was reason enough for keeping these establishments open and thriving. Present day Coffee culture is deeply rooted in all of Europe. Almost all the world's top 20 coffee consuming countries are located in Europe!
COFFEE IN THE USA
Most Americans can trace their roots back to Europe. By the 1700’s coffee was a beverage most knew, Taverns turned into Tea and Coffee houses during daylight hours. As settlers moved west to colonize coffee was a big part of their journey. Giving them a lift when things were tough and something to look forward to after a long days horse and wagon ride. Then in 1773 with American settlers fed up with British taxes, the pivotal moment of US independence was declared by the Boston Tea Party. This was Coffee’s biggest moment in the mighty USA and Tea drinking became unpatriotic for a brief time and coffee consumption escalated dramatically. The 1st President of the United States George Washington was a green bean importer and his wife Martha Washington worked at learning the art of brewing coffee. They were said to have the best cup of coffee in North America. Probably why Thomas Jefferson, The 3rd President of the United States actually said that coffee would become the “Beverage of the civilized world”. Easy to say when your best friends (in the early days) wife is making killer lattes all day long!
As settlers moved west in the 1800’s to colonize coffee was a big part of their journey. Giving them a caffeinated lift when things were tough and something to look forward to after a long days horse and wagon ride. The coffee was brewed on campfires making the aroma of coffee something pleasant to the nose and always giving an uplifting feeling to the travellers. Then the Civil War came to change the face of the New America in 1861 to 1865. Coffee was one of the chief food items which was included in daily rations, on both sides! Cooking the coffee on huge kettles was a morale booster and gave wary soldiers a well deserved lift during a tragic time of USA’s history. The military leaders realized to keep soldiers focused and enthusiastic about mundane drills and marches, that coffee was needed!
Now coffee’s reputation and use was undeniable throughout America and many believe it was the Civil War that launched it mainstream appeal. During the 1930’s the Great Depression stifled America and soup kitchens across the United States served free meals along with and sometimes only, coffee and donuts. This forever impacted these 2 things and nowdays is synonymous with the USA. Police officers eating donuts and siping coffee is probably the biggest cliche that originated from this 1930’s era.
By 1940 coffee was once again endorsed by another President, Theodore Roosevelt, whose famous words “its good to the last drop” live on to this day. World War II changed coffee in America, with soldiers, once again tired of fighting required coffee caffeine for alertness, focusing and general well being. They consumed 1000’s of pounds of coffee each day! Coffee was rationed by the US government and only 1 pound of coffee could be consumed in a 5 week period. This was solely to make sure that American GI’s could get a cup of coffee whenever they could. Companies focused on easy to brew coffee which is why we have freeze dried instant coffee on our supermarket shelves to this very day! Maxwell house was the biggest brand at this time of history and have been riding this instant coffee wave ever since!
Today we know coffee contains antioxidants that prevent free radicals from causing cell damage. Coffee beans also supply caffeine, through decaffeination, Pharmaceuticals, beverages (sodas) and cosmetics all need their coffee! Spiritual use remains, as we all know a cup of coffee will lift the spirit!
Many of us do not consciously realize the amount of coffee that is consumed daily around the world, from North & South America, The middle East, Africa, Europe and Asia. As the 3rd most consumed beverage globally, after water and tea, and coffee being served on every corner in cities around the world, coffee beans are the 2nd most traded commodity on our planet!!! Expected coffee consumption Worldwide in 2018 is 152 Million 60 kilogram bags of coffee will be produced and used!!! Below are some of the countries consuming the most amount of coffee.
TOP 20 COFFEE CONSUMING COUNTRIES
Amounts indicate per person use in each country.
1. Finland - 12kg
2. Norway - 9.9kg
3. Iceland - 9kg
4. Denmark - 8.7kg
5. Netherlands - 8.4kg
6. Sweden - 8.2kg
7. Switzerland - 7.9kg
8. Belgium - 6.8kg
9. Luxembourg - 6.5kg
10. Canada - 6.2kg
11. Bosnia and Herzegovina - 6.1kg
12. Austria - 5.9kg
13. Italy - 5.8kg
14. Slovenia - 5.8kg
15. Brazil - 5.5kg
16. Germany - 5kg
17. Greece - 5.4kg
18. France - 5.1kg
19. Croatia - 4.9kg
20. Cyprus - 4.8kg
TOP 50 COFFEE PRODUCING COUNTRIES
2. Vietnam
3. Colombia
5. Ethiopia
6. Honduras
8. Uganda
10. Guatemala
11. Peru
12. Nicaragua
14. Ivory Coast
15. Costa Rica
17. Papua New Guinea
18. Tanzania
19. El Salvador
20. Ecuador
21. Cameroon
24. Gabon
25. Thailand
26. Venezuela
27. Dominican Republic
28. Haiti
29. Democratic Republic of the Congo
30. Rwanda
31. Burundi
32. Philippines
33. Togo
34. Guinea
35. Yemen
36. Cuba
37. Panama
38. Bolivia
39. Timor Leste
42. Ghana
43. Sierra Leone
44. Angola
45. Jamaica
46. Paraguay
47. Malawi
48. Trinidad and Toba
49. Zimbabwe
50. Liberia
|
cc/2020-05/en_middle_0032.json.gz/line8345
|
__label__wiki
| 0.707998
| 0.707998
|
Posts Tagged With: Maine lighthouse challenge
Two Maine Museums
From The Museums of Old York;
Museum Opens June 4 for 112th Season
New Exhibit Highlighted
We are pleased to announce the opening of our season with a new exhibit at the Visitor Center Gallery in Remick Barn, 3 Lindsay Road. The display features over 200 objects including rare surviving weapons, furnishings, and trade items. Common household objects include the 18th century mousetrap pictured above, borrowed from collector Hollis Brodrick. Thanks to loans from local historical institutions and private collectors, visitors will have a chance to view many artifacts from private collections that you will not be able to anywhere else. Visitors can also tour nine historic buildings, including favorites: the Old Gaol, Elizabeth Perkins House, Emerson-Wilcox House, Jefferd’s Tavern and John Hancock Wharf. The museum will be open Monday-Saturday, 9:30 a.m. -4:00 p.m. For more information, please call the Visitor Center 207-363-1756 or visit our website.
Museums of Old York Programs
21 Muskets, Swords, & Powder Horns
Observe Armed Forces Day at Old York. Back in 2011 after being received with great interest in 2010, this program will give enthusiasts of all ages the opportunity to view uniforms and weaponry from Old York’s collections. Certain items will be available to handle (with white curatorial gloves). Weapons from the 18th – 20th centuries will be featured. 2:00 p.m. at Remick Barn.
2 History Challenge Game Show
Test your knowledge of our past. Put together a team of two to four people and register to participate in this fun, and challenging “Jeopardy”-style history game show. Answer questions correctly to gain points. The team with the most points at the end of the game wins cash! $5 per person to play, $1 suggested donation to be in the audience. Email rbowen@oldyork.org to register your team. 7:00 p.m. at Remick Barn.
4 Museum Opening Day and New Exhibit at Remick Barn
See information above.
12 Lost York: The History that Nature Has Reclaimed
Join Old York staff and local historian Ron Nowell as we head into the woods to find long-abandoned homesteads, cellar holes, stone walls and graveyards in an area of York settled around 1800 but abandoned by 1910. Listen to the stories of the individuals who lived round Mt. A making a living off basket-making and other traditional crafts. Discover Franklin’s Tomb and hear how he dug it for himself only to be buried in the pauper cemetery upon his death. Call 207-363-4974 or email rbowen@oldyork.org to let us know you’ll be coming and find out where to meet. 2:00 p.m. Free.
23 History Brought to Life
Watch the history of the Old Gaol come to life as amateur actors portray the prisoners kept under lock and key. Listen to stories of thievery, debt, embezzlement, murder and escape! Meet the Gaol keeper responsible for keeping these scofflaws locked away and his wife who cooked for and fed them. Meet at the Old Gaol. Program ongoing from 5:30 -7:30 p.m. Members free and nominal fee for non-members. Family rates.
For a complete and up-to-date calendar of Museums of Old York programs see our website.
From the Penobscot marine Museum;
Diamond Anniversary Year to Open with New Exhibits, Free Reception
Maine’s oldest marine museum will open the doors on its 75th year on May 27 (the Friday of Memorial Day weekend) at 10 a.m. Be among the first to view our wonderful new exhibits, “75 for 75” and “The Art of the Boat.” (See following articles for details.)
At 5:30 p.m. on Opening Day, we will hold a free reception in the Main Street Gallery, where “The Art of the Boat” will be on display. Come enjoy refreshments, meet our new executive director, Liz Lodge, and mingle with some of the exhibiting artists.
75 for 75: the Museum on Exhibit
This year’s signature exhibit, “75 for 75” will showcase 75 artifacts from our first 75 years. Ranging from marine paintings and ship models to full-size boats and 19th-century domestic artifacts, “75 for 75” is spread across several of the museum’s 13 buildings. “It’s kind of a capsule history of the museum which is, itself, an ongoing record of Maine’s and Searsport’s maritime histories,” says Curator Ben Fuller. The show runs for the entire exhibit year: May 27 through October 23.
We are still seeking individual and business sponsors for this high-visibility exhibit, with opportunities starting at just $175. Contact Liz Lodge: 207-548-2529.
The Boat as Art
Boat enthusiasts – and that includes more than a few of our readers – will be fascinated, intrigued and challenged by “The Art of the Boat”:
a juried exhibit of works by more than 50 contemporary artists exploring the themes of the boat as a work of art and the boatbuilder as artist.
“We asked artists to balance the art that is in the boat with their own artistic vision,” said Curator Ben Fuller. The jury, consisting of an art writer and critic, a yacht designer, an artist, and an art collector, selected works for the exhibit from more than 300 submitted in all media.
On display will be paintings, drawings, photographs and sculptures — some literal and representational, others symbolic and abstract — all expressing a unique appreciation of the artistry inherent in the boat’s functional form. The exhibit is presented to honor the memory of George S. Wasson, a Maine artist, author, and boatbuilder who was one of the museum’s spiritual founders 75 years ago. It will run from May 27 through October 23.
More Events and Exhibits
Opening Day and Reception
Penobscot Marine Museum opens for its 75th year with exhibits for all ages. See articles above. 5/27, 10 am – 5 pm (exhibits); 5:30 – 7 pm (reception)
Antique Auto Display
Members of the Antique Auto Club of America will visit the museum with dozens of cars dating to 1915 and earlier. 6/30, 3-4 pm
Midcoast Maine Lighthouse Challenge
PMM is a “bonus” site on this self-guided driving tour that includes several lighthouses and lighthouse-related museums. More information. 6/25-26, all day
Searsport Lobsterboat Races and Antique Power Day
A town-wide day of activities: Lobsterboat races, antique engine and lobsterboat exhibit, radio-control model racing, crafts for children, rowing race, craft sale and more. 7/9, all day
Categories: antiques, Art Exhibit, articles, events, historic buildings, historical societies, history, lighthouses, Maine, Maine things to do, museum news, Museums of Old York, Penobscot Marine Museum, preservation, restoration, Uncategorized | Tags: antique auto display, art exhibits, boat as art, exhibits, history challenge, lobsterboat races, Lost York, Maine, Maine events, Maine lighthouse challenge, museum openings, muskets, powder horn, Remick Barn, Searsport, swords, York's Old Gaol | Leave a comment
|
cc/2020-05/en_middle_0032.json.gz/line8351
|
__label__cc
| 0.567432
| 0.432568
|
Theresa May’s secretive plans to replace NHS in England with private US healthcare system Kaiser Permanente
May, NHS, privatisation
UPDATE: We now have no less than Professor Stephen Hawking expressing public concern about the threat to the NHS by Kaiser Permanente – see here.
Kaiser Permanente is a private healthcare organisation based in California.
But unlike many other private healthcare companies in the US, Kaiser provides a complete model of integrated pre-paid insurance along with healthcare which is supposedly provided free at the point of need.
This is a system much like our own NHS but with three major differences – Kaiser’s healthcare provision is much more expensive than the NHS, the healthcare provision side is run for profit and unlike the NHS its cover isn’t comprehensive – it only covers those people who are in work.
Despite that, Secretary of State for Health Jeremy Hunt seems to love Kaiser. He and other ministers have personally visited the company at its California headquarters – several times in fact:
And Kaiser’s own website lists other recent visitors from the UK, including many NHS hospitals and NHS trusts as well as HM Treasury and the Ministry of Health itself (click to enlarge):
We have already seen that US firms are looking to capitalise as the NHS becomes increasingly privatised, including Kaiser Permanente Foundation‘s senior vice president Hal Wolf who has openly called for the NHS to become “more like Kaiser Permanente“.
Alarmingly, Theresa May has specifically refused to guarantee she will not open up the NHS to US firms in a post-Brexit trade deal across the Atlantic.
Understanding the plans to replace the NHS with the Kaiser Permanente system explains why there has been a recent speeding up of the ongoing marketisation and privatisation of the NHS.
It also explains why the Tories were so desperate to push through their disastrous NHS reforms in the first place. A central plank of the NHS reforms was the formation of Clinical Commissioning Groups – which were openly based on Kaiser’s Permanente Medical Groups and which also happen to be a central plank of Kaiser’s healthcare system.
And understanding the plans to replace the NHS across England with the Kaiser Permanente system goes a long way to explaining why Theresa May has done nothing to resolve the worsening NHS crisis, which she is gambling will only make the public more keen to see changes to a system that is being deliberately broken.
If we don’t spread the word about what the Tories are doing, we can say goodbye to the NHS in England and hello to Kaiser Permanente. Permanently.
So please share …
116 thoughts on “Theresa May’s secretive plans to replace NHS in England with private US healthcare system Kaiser Permanente”
You are such a Pratt.
Stephen Slator said:
Hit the nail on the head there for sure. And don’t forget the head of NHS England, Simon Stevens’, previous role as big cheese at US conglomerate United Health
Tog said:
Reblogged this on sideshowtog.
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente | sideshowtog
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente | paulh121
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente | Jaffer's blog
Pingback: Theresa May’s secret plans to replace #NHS England with private US healthcare system Kaiser Permanente | Pride’s Purge | sdbast
jeffrey davies said:
vote may end of nhs but thats only part of it norman law will rule
Hello From GCHQ said:
Two questions: 1. Was the source of this story the voices in your head? 2.Are you another sock puppet account like @rachael_swindon, @namechangegirl and @skwawkbox Steve? Anyhow we’ll know soon enough who the person behind those accounts is. Cheerio Mr.Walker :3
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente | Pride’s Purge | Britain Isn't Eating
mikey mikey said:
@Hello from Tory pretending to be GCHQ
Thanks for letting me know about rachel swindon and namechangegirl
Well could only find Ms Swindon’s twitter account, but it is really good. Thanks again, Tory boy pretending to be GCHQ.
Pamela stepp said:
Sooner the Conservative party are out of power the better I like it .I know that health care is expensive so we need to raise taxes and most fair minded people agree and cut tax loop holes for the rich and famous if I was the Chancellor I would be taxing those with the highest earnings at 60% and if the didn’t like it go elsewhere I’d also want far greater accountability on MP’S salary and how many directorships they have and that should be taxed separately.
maurene said:
a private health company in a country where literally millions of men women and children have no health cover whatsoever……and the UK is considering big time to bring such a company over here…… I feel sick……. such politicians and the like should be ashamed……
tophattingson said:
That’s a fun conspiracy theory you have there. What if…
John Reid visited Kaiser Permanente in 2003. http://news.bbc.co.uk/1/hi/health/3207027.stm
jcobyn4jadams4eva said:
Rachael’s a bloke, just so you know poppet. Remember on the 9th of June it’s down not across, the doc’s find it awfully tricky to stitch to repair the injury when it’s done that way or you could do the NHS a favour and just take a running jump from Beachy Head. And take that awful woman abbott with you thankies ❤
Paolo said:
People who don’t realise that this is happening are blind or stupid.
“Remember on the 9th of June it’s down not across,”
Bullying and encouragement to commit suicide. Reminds me of this story:
“Ben Harris-Quinney, chair of rightwing thinktank the Bow Group, who gave evidence to the inquiry, said: “It would appear from the report that CCHQ officials were happy to overlook Mark Clarke’s track record and behaviour because he was able to deliver positive campaigning results using nefarious tactics.”
https://www.theguardian.com/politics/2016/aug/17/inquiry-into-tory-bullying-scandal-finds-13-alleged-victims-of-mark-clarke
concernedkev said:
This needs to be spread far and wide. Treachery and corruption of the worst kind. All individuals who have been on this fact finding jolly, if proven. should be drummed out and investigated for misconduct in public office. It is a collective conspiracy to defraud all UK citizens.
Well done Tom
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente | Worldtruth
mohandeer said:
Reblogged this on wgrovedotnet.
vondreassen said:
Amazing ain’t it, we are a European country- Russia is nearer to America than we are ; YET we – our leaders are obsessed with copying a way of life that has little relevance to our own;
Why are ‘they’ NOT looking at er – Scandinavia etc;
George Orwell thought it was to do with language – we are too lazy to learn – though the Scandivavians all learn English !;
Switch on the radio – LBC especiallty- and it’s yak yak about Trump – Wots going on ?
sheila jenkins said:
If this happens.go back to what Niel Kinock said don’t be old or sick if the Tories win this election.
NHS employee said:
https://centerfortotalhealth.org/tag/jeremy-hunt/
Not evidence of any privatisation. Do a bit of googling before you post!
Martin Ritchie said:
Surely such a proposal must be more expensive that the current NHS funding system as they have to add profit onto their costs and I expect their profit requirement will be significant so where will they add value?
MM said:
Or alternatively they are looking at comparable services to see if the NHS can learn from best practices much like all organisations should do.
Google words – Liam Fox Atlantic Bridge. Read a bit.
Cara Tarini said:
They could do worse than implementation of a Kaiser model.it is a not for profit HMO begun in Ca to care fore employees of various kaiser companies and they have provided me with very good medical care !
Ron Hod said:
The reasons for the majority of privatisations is to reduce the wages and conditions of the workers while increasing the money the company directors and chif execs get. At no point is it improving the lot of the general public who are just the tools to give the rich more money. The UK health system is one of the cheapest in the world, the evidence for this can be seen in the basic fact thet travel and holiday insurance including the USA is more than anywhere else in the world!
Beryl Foster said:
It is disgusting that immigration to this level has been allowed thanks to Mr.T.Blair.Some have paid into system all their lives and immigration has helped to drain us.I will support Mrs T.May as I do like her but I knew what Iwas voting for Out of EU and single market if with free movement. I do not know enough about the so called new system that may replace NHS but like me some have paid all their lives..not for foreign countries to take advantage of us.
Beryl Fosterk said:
David Williams said:
This is typical of a government that has done nothing but betray the general public which it claims to represent. Hopefully, the people of the UK will be wise enough to vote them out this time.
With the internet and mobile network it would seem to me that it is time to consider a different method of debate and passing of legislation that would involve active public opinion so that the people of the UK are truly represented and not subjected to any elected parties corrupt control. In other words a new type of government that can’t go against public opinion.
Paul Williams said:
You do realise the article you linked to when claiming they are for profit, clearly says they are non-profit?….
anubeon said:
We should never forget the Liberal Democrats role in the Health and Social Care Bill. They didn’t merely enable the Tories, if memory serves the CCGs were there contribution to the proceedings. We should remember this when they try to pass themselves off as ‘progressives’. The only progress they genuinely care about is the unending ‘progress’ of the market, public be damned. Now they are mobilising to cut Labour off at the knees, ably assisted by many a narcisistic New Labour grandee and a gaggle of useful idiots too blinded by the trauma of loosing the referendum. They’ll let the Tories in the back door, they might even hand the LibDems their favourite roll as king makers. Then the bastards will unite in shafting us all and selling off our NHS.
Pheobe jacques said:
They did the same with the tax and it all went wrong. Now it’s our health they want to gamble with.
Dirk Minter Lee said:
@Beryl Fosterk – you do understand that immigration rose massively under the Tories. Far above the levels it was at under the previous Labour administration don’t you?
If you vote Tory it means you hate my wife and every other disabled person in the country. You will be voting to have them systematically attacked in a attempt to kill them off. You will be making this choice freely and cannot deny knowledge of the consequences of your actions, because you have been informed of them before the fact. If you vote for them I, along with tens of thousands more, will hate you eternally and ultimately hope that one day you too will become disabled through a misfortunate accident and suffer at the hands of the people you helped to install, just so that you can experience the full horror of a life-limiting condition under a Tory government.
tagster01 said:
So that’s why, when May is questioned on the future of the NHS, that she says healthcare will remain free at the point of issue. Half truths and bloody minded deceit.
lallygag26 said:
If you think Tom’s blog sounds like fantasy, here is think tank Health Foundation’s blog on the same subject talking about politicians’ and senior Whitehall mandarins’ love affair with Kaiser from the point of view of the establishment. Simon Stevens, CEO of NHS England, has already introduced the first Kaiser-style Accountable Care systems, designed to be turned into Accountable Care Organisations. This change isn’t the future. It is now.
http://www.health.org.uk/blog/meeting-challenge-population-health-what-we-can-learn-kaiser-permanente
Larraine said:
NO!!!!!!!!!!!!
John Spencer-Davis said:
Will treatment leave me facing a Kaiser Bill? Sorry. J
anyvoices said:
Really enjoyed good facts well thought out. Would you consider sharing your blogs on a free website written by the public for the public. http://www.anyvoice.co.uk
Sybil Gowans said:
What about Scotland?
Kitty S Jones said:
Reblogged this on Politics and Insights.
loobitzh said:
Reblogged this on Lindas Blog.
Martin Rudland said:
Some Tory Troll comments, but do note the comments from
anubeon at 9:54 pm on April 24, 2017
Dirk Minter Lee at 3:40 am on April 25, 2017
tagster01 at 5:48 am on April 25, 2017
lallygag26 at 6:20 am on April 25, 2017
The Lib Dems must be repeatedly, publicly, very loudly and very often indicted for enabling this destruction of OUR NHS .
What mind-set do the politicians have when they say ‘free at the point of delivery’?
Do they think we’re idiots? They might be right!
Search for what Mark Britnell said to an APAC conference in New York in Oct 2010, ie he spoke of the private sector opportunities presented by the UK’s health reforms:
“The NHS will be shown no mercy and the best time to take advantage of this will be in the next couple of years,” he advised the attending companies.
Britnell was speaking a year into his job at KPMG, which he joined from the Dept of Health where he was DG i/c Commissioning. Britnell was the architect of what we see today: the privatisation of commissioning. This courtesy of http://www.spinwatch.org . AND “In future, The NHS will be a state insurance provider not a state deliverer” – c/o The Observer, 15 May 2011, “David Cameron’s adviser says health reform is a chance to make big profits”
Our future in the UK under the Tories is utterly dire!
A thought came to me that a Tory MP will set up a cloth-cap manufacturing company. Cloth-caps will be free at point of delivery and will enable regular exercise when your masters go by.
But seriously, everybody must spread the word as to how grim the future will be under Tories – it could be for ever if they win this one !
Green__Jenny said:
It was also New Labour’s plan to replace the NHS with the Kaiser Permanente system – they set up Kaiser Permanente pilots in various parts of England, including Torbay where the resulting S Devon Integrated Care Organisation recently went belly up. The Coalition and now Tory governments just continued the New Labour direction of travel. http://www.energyroyd.org.uk/archives/12788
abigdoob (@abigdoob) said:
Sybil Gowans.
There are no plans to follow this route in Scotland.
However. The amount of our own money that WM deigns to return to us in the form of Barnett, including that used to fund our NHS, is calculated as a percentage of spending in England. If England’s NHS goes…
Terry Davies said:
I predicted this would happen years ago. NHS was a convenient Quango to do the tories dirty. Its a very basic managerial technique. Shifting blame is one of the benefits but the primary reason for NHS England is to be the voicepiece for government policies minus the expectation of answering the questions. This has been the role of NHS England. Likewise the other quangos , effectively voice pieces and sources of blame at which the public can direct their anger. Hunt is the next to go after the NHS england who will each blame each other. This leaves May untouched so that the USA can cherry pick the NHS and public sector services. Remember that there is a way to avoid accountability. Avoid answering Questions and you can fool the public and horsethief minded tories have used this as a means of controlling the supply of services to UK people and supply of public services for private companies to compete for during franchise bids.
When a public service is privatised or partially privatised a ‘ gravy train’ is created and those on this train will never want to leave it.
Stupid or greedy politicians fail to see the link between these and violence and wars.
So expect the spanish cold war after the next election. Gibraltar will be blamed but spanish politicians will be in competition for sovereignty with UK. This will now be supported by other EU countries and tories be the cause of it all.
Sharon said:
Nothing better than the American system so that those dieing from cancer etc like my mum, can worry about how they will pay for treatment. Hey it takes their mind off of dying, right. I wonder how many people in the UK realise that in the US you don’t jus t book in for your appointment, you have to sit in front of a stranger while they ask you how much you can pay. My mum put $50.00 on her credit card every time the doctors or hospital asked her how much she could pay. She was poor, only had a pension and her last months of life were worrying how my dad (with dementia) would be able to pay the credit card debt. Shameful system, we don’t want this in the U.K. however I am afraid that it is probably too late…
Pingback: How Theresa May’s preferred US system to take over the NHS featured in the Nixon Watergate scandal | Pride's Purge
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente « Stop MP lies & corruption
poglejones said:
I too am terrified at the prospect of a new TTIP opening up the UK health service to these large companies. However what I would say is that the Kaiser model is a good model of integrated care and that many of the visitors will have been looking for opportunities to use the Kaiser approach to improve NHS organisations and approaches to integration around stuff like care navigation, patient advocacy and care coordination.
revdianphamilton said:
A friend from the U.S.A. wrote, ” I used to work for KP, from 2002 – 10. Up till the mid-2000s, a point of pride that was useful to us researchers was the equal access to care across membership. Around 2004, competition of cheap plans caused KP to promote plans with deductibles, and that ended it. People were offered cheap plans with high deductibles, and went into heavy debt like anywhere else when catastrophe struck. The wishful thinking was that healthy people, young people, would go for the high deductible plans, but in fact most of them were simply poor people – who weren’t health to begin with, and of course became even poorer. All this did great things for KP’s bottom line (including the non-profit side – non-profit in the US is nothing more than a tax scam anymore), and the execs took it even further with staff reductions and automation. This was once an institution to be proud of; now it’s no more than a reflection of the broken US medical care system.”
Deus Vult said:
The stupidity here is very strong.
You do realise that your own gullibility in believing this sort of rubbish is what drives these idiots on.
For God’s own sake … take a step back and THINK, then be embarrassed, and then feel anger at these people who are trying to feed you this dross for their own purposes.
Inga said:
Just watch the Great British Public declare they would pay any tax to keep the NHS, and then vote Tory in full knowledge that this will kill it off. This has been the pattern since Thatcher. Nothing better illustrates the hypocrisy, selfishness and callousness of the British voter – as does their assumption that a real leader would use nuclear weapons pre-emptively. And their hostility to overseas aid. And to refugees. And to immigrants. The list is endless.
Bryan Lee said:
So what about those not in work, disabled pensioners etc.
Pingback: Being outraged achieves nothing – More in Common
Valerie Hall said:
So my husband , 22 years post heart transplant and with multiple related health problems, will be offered affordable health care? If only!
I don’t know where you are Valerie but in the UK if the NHS gets the funding it needs you will. Don’t vote Tory that’s all. In terms of an integrated model of care he should get better healthcare. What we’re being sold at the moment is an underfunded service carrying the burden of austerity in other services. They are hiding the cuts within integrated health and social care programmes which are doomed to failure because they are unrealistic and underfunded. But the principles of integration in the model are good.
So to clarify I am just suggesting there are other reasons people can be interested in this other than replicating the financial model.
Reblogged this on Declaration Of Opinion.
Fran said:
The NHS is the jewel in our crown. It protects the most vulnerable, working class and middle class providing a non discriminate service. To vote Tory in effect means you don’t care about people in need. Imagine turning up in need of serious medical intervention for a loved family member only to be refused because your credit card is at its limit or you have been made redundant and are jobless. Is that what we really want. Be very careful what you vote for what goes around comes around. One day you might be that person in need
Stephen Barber said:
This is not new. Kaiser is a “not for profit ” organisation. This is irresponsible scare-mongering in my view. See this BBC report crom way back in 2010: http://news.bbc.co.uk/1/hi/health/8688101.stm
Pam Peterson said:
Just confirms what we already know
Neither Theresa May nor her add ons .., including Hunt give a monkeys about us, the British people, or our healthcare
“not for profit” – is it a charity then ?
Alan Taylor said:
I’m not a fan of the current Tory leadership. However, I think there is a mixture of fact and fantasy in this report. Drawing conclusions based on fantasy! Public sector should be encouraged to learn from private enterprise for ideas on improving efficiency and services. They don’t have to adopt profiteering. I don’t see the issue here.
The Porcelain Doll said:
Reblogged this on perfectlyfadeddelusions.
This is such a pile of rubbish!
Owen jones said:
Unless it’s changed a lot Kaiser were crap when i was in the states.
@vondreassen
These kind of organisations are what’s commonly known as charitable corporations. They get the tax status, they get the profits. The payout method differs, that’s all. There’s no charitable root to their operations anymore.
One of those things spent ten years destroying a friend’s charity (an actual small local one). Had 130 employees, in social, children’s and home care area. Judge returned the case three times, then got pressured by politicians. Ended up finding for the other side on a technicality, said it was incomprehensible that a national charity should embark upon a hostile takeover of a local charity, called the other side despicable. Media was on their side.
Now five years later, all profits they make locally are siphoned off to national headquarters. My friend’s charity invested all profits back into the charity – kids got new play grounds, care home got a new garden and more staff etc. Whole town is suffering as the corporate charity – still legally a charity – is closing down everything that isn’t profitable enough and charging for all their services at a premium. Now the media is waking up to this, but it’s too late, of course. Bankrupted my friend, cost 100 people their jobs, but the other side, that national charity is still going strong…
So don’t be fooled by a “not for profits” statement on their web page and look at what they actually do – cost the taxpayer more money, pay their management huge salaries and deliver less value.
A number of points.
The U.S was 43 in the world when last the World Health Organisation did a survey.
The UK was number 18. The US pay twice as much for healthcare as other leading nations and the health of US citizens keep getting worse !!! Definitely the way to go if you want to follow in their footsteps all the way to hell while paying through the nose for the privilege.
What should be the measure of a good healthcare system? Surely people’s health should be improving not getting worse and the cost of the service should be reducing? What a revolutionary idea? Then where would there be the need for
locums at £4000 per day ? Or massively overpriced drugs ? or the PFI where changing a lightbulb costs £300?
Face it the NHS is about making money out of making people sicker and sicker !!!.
And the government facilitates corporates who feed off the NHS. Think Pharma..
Pharma and more Pharma.
Privatisation won’t stop people from getting major chronic diseases like Heart disease, Diabetes, Cancer, Dementia ,Lung, Disease , etc. Those figures will still keep rising.
Why because healthcare is about “managing” health conditions not curing people of them. So not matter what you pay you won’t get better if you rely on imported doctors or PFI financed hospitals. The NHS is there to facilitate the aims of Pharma and there is nothing you can do about it unless you are prepared to take more care of you and yours. Better nutrition, exercise, clean water, better air quality.
And no matter who you vote for you will still pay taxes to maintain the NHS even if you take the time and effort to look after health of yourself and your family.
Catherine mearns said:
If this is true then Theresa May is taking a giant backward leap into the past. The people of Britain will never accept this . By all means make the rich pay more in taxes as the poor is paying enough. The total misuse of funds by the jobs for boys brigade, their wages are enhanced by backhanders from other companies who want the contracts for providing supplies and medical instruments ” in which most are disposable” how did we ever manage before. I have recently been told that soap and disinfectant is no longer used in hospitals as it is against health and safety. One wonders how we have all managed onto old age. The NHS should recruit nurses from school leavers and train them on the floor as you would a apprentice, that is what makes a nurse , not a piece of paper from a university. How easy it is to collect a certificate but can they do practical, with a commonsense approach. People fight for what is your right.
Rosalind Dodd said:
How appalling
fergusmason said:
“Understanding the plans to replace the NHS with the Kaiser Permanente system”
Except there is no plan. You just invented it.
Capitalism innit – just wot the tories love…
Pingback: Theresa May’s secret plans to replace NHS England with private US healthcare system Kaiser Permanente « Derby People's Assembly
Gillian Reay said:
DThe NHS is an amazing healthcare system which has been left open to much abuse. Least of all by those who are in a position to either mend it or break it permanently. Don’t let this happen. Let’s fix our NHS for the good of the people who are citizens of Great Britain.
How do you know its an amazing system ? . A couple of years ago the NHS were
killing people at the rate of 130,000 a year on the Liverpool Pathway and giving bonuses to hospitals for the number of beds they freed up. Then they were caught out
and had to stop the practice which involved depriving the elderly of food and water,
which is not a nice way to die. Called NIL BY MOUTH. A good hospital system would be improving the nations health not “managing it for Pharmaceutical Co’s benefit.
This week in the Times the head of the IBPI Ms Anson said” that Pharma would move out of Britain unless they received £20 billion more a year”. That taxes should be increased to fund their innovative research”. And that lots of other countries would welcome research being done in their country.
Funny but the lead researcher of Glaxo Smith Kline said ” Our drugs don’t work on most people” what a surprise(not).
David have you read/heard communications by Public Health Specialists? Eg Prof Allyson Pollock (Inst of Health & Society Newcastle Univ; previously Prof of Public Health Research & Policy, Qu.Mary, UoL; set up & directed the Centre for International Public Health Policy, Univ.E’boro; & prior to that Head of the Public Health Policy Unit, UCL, Dir. Research & Development at UCL Hospitals NHS Trust); & by Prof.Colin Leys (with 20+ experts of Centre for Health and the Public Interest, CHPI – see https://chpi.org.uk/about-us/); & by Prof Colin Pritchard (see http://www.dailyecho.co.uk/news/10583606.The_problem_with_our_NHS/ ) .
You are of course aware of how long was spent by the Tories in preparing the Health & Social Care Bill which became an Act in Mar’12 & its contents, eg it opened up OUR NHS for Private Health Industry to get in there, & it led to £4.5bn to £10bn having to be spent by the NHS in tendering for work it used to do automatically in house! Worth finding the exact wording of Mark Britnell’s ‘talk’ to a Private Health confeence in N.York in late 2010 – basically the NHS is up for grabs in the next 2 years & have no mercy on the NHS. Britnell moved from very high up in the Civil Service Health Dept to KPMG in 2009-ish!
Do read those links & search for more detailed info.
The NHS IS AMAZING, & the people who work in it for us all leave Tory politicians looking very very sad – the Tory attitude to OUR NHS is sick .
Pingback: Political polls and propaganda: the writing on the wall – Politics and Insights
To Martin Rudland
The Times April 27th 2017
Drug Giants threaten to Leave Britain.
Unless the NHS is given £20 billion a year for research for new treatments.
Apparently the 9.9 % we spend on research is less than other countries who spend
11.3%.
So when articles appear in the newspapers insisting the NHS needs more money
was that for Doctors and Nurses? No …now we know where the money is going.
and how Pharma goes about its business threats ,bribery, fear so that the population rush out to buy toxic vaccinations, while doctors don’t? Now why might that be?
In the US they are mandating certain vaccines like Flu, using the herd immunity
nonsense. And what do these vaccines contain and are they safe? ethyl mercury, polysorbate 80, and aluminium.? Are all highly toxic . See Miller’s Review of Critical Vaccine Studies , 400 important scientific papers on vaccines.
Similarly in Australia mandating vaccines and no benefits for those families who don’t vaccinate!!.
The Flu vaccine 2 years ago had a success rate of 3%. and it appears that the usual
success of that vaccine is around 50%.
Returning to the £20 billion demand, do they make the same demands of every country? Pitching them the same story as here and threatening to leave otherwise.
Is that how Glaxo made “2 billion in the first quarter on sales of 7.4 billion. Better returns that the arms business and the banking sector, by a long shot.
lyndajanepurcell said:
Hello Tom – I’ve reblogged this post. Am shocked at how we seem to be sleepwalking into the US system of ‘healthcare’.
Pingback: Private healthcare features photos of people smiling for no apparent reason! | Lynda Jane Purcell: Freelance Mum
Pingback: Crystal ball: if Theresa May wins in June will it be ‘goodbye to the NHS and hello to Kaiser Permanente’? | Political Concern
Mr Kenneth Best said:
Theresa May wants to have this evidence removed, it shows the future of OUR NHS youtu.be/qOI7-XIbkq8 PLEASE SHARE TO ALL!
As a U.S. & CA.citizen. I’m all too well familiar with the “non profit” because there are far too many more of us who were fired and lost all in lieu health care as well any care for the many disabilities and illnesses it so deliberately caused and yes there are those who have died because of no care for their illnesses and its done with U.S. govt impunity as the targets ARE, older, female & minorities including children of these groups. It’s worth many billions of dollars, a year and its all tax free, All on states, federal & patient monies.. It’s only goal is to make money at any cost. AT ANY COST for its other non medical care activities. It’s own idea of making money is to “manage” care, it decides how much care to give which is little to none and one is far more likely to die sooner than one thinks because there is too little care for your medical condition that is needed or tell you need a treatment that you really do not need and will greatly increase your demise while you as a patient will be paying high cost premiums, one way or another. This is one of Americans biggest cons going since the 60’s, Integrated care is based on false data that IT, the managed care system created, all to deny real medical care for real illnesses such as asthma, heart disease, arthritis, back or spine injuries, pretty much everything that touches peoples lives on a daily basis. this all started TO deny injuries and illnesses that it caused it’s own employees but it’s gone further though out the U.S., Canada, & Australia. France didn’t go for it’s B.S.
Our veterans too are patients that have unnecessarily suffered because OF it’s path of the “managed” care premise, all the while pretending to be healthcare organization. Either May is totally ignorant to the “managed” care B.S. or there’s something in it for her to want to send particular classes of the working people off to get sick and die sooner.
Stay with NIH to stay alive and well..
Sam Beeton said:
Where will the Conservative party find the money to pay for very sick people unable to work and pay for private health care if Teresa May privatises the NHS? Is Teresa May intending to take us back to a time where we had no NHS and children and adults could not afford to pay for a Doctor. Back in that time children died in the arms of emotionally pained parents that couldn’t afford a Doctor for their child. Parents back then couldn’t even afford to pay the Doctor to pain relief their child while they were dying. Conservatives have and are going to damage the NHS that I believe can be the best of the Conservatives stop privatising and stop bringing in the private health to cover our lack of NHS staff. We should have enough NHS staff and relief staff if the conservatives put our money into the NHS and the NHS will be a better service for everyone that is in need of it.
The previous president wanted to help the American people by building a NHS system in America. What happened to that very good idea. There must be people in America suffering greatly from illness and can’t pay. It makes me wonder if children in America are dying without health care that they need. Why is Teresa May going to follow in the American footsteps. I thought the previous president wanted a NHS system as good as ours in the U.K. Used to be.
Pingback: An excellent critque of – Tom Pryde’s – exposure of KAISER PERMANENTE. – SUBSTRATUMS
A6er said:
Reblogged this on Britain Isn't Eating.
JEPH said:
Hardly a balanced piece of commentary and somewhat propagandist.
Sue Walsh RGN (retired) said:
Vote for Corbyn, he is our only hope for the NHS
More than likely written by the CEO of kaiser. IT’S integrated care is one big lie, there is no such thing, just another label to deny real care., as it was started, kaiser sold the idea make more money with less care and that money is their main goal as told to President Nixon in 1972, Sadly much of the health care on the U.S. models kaiser’s business model. This too, is so it can sell more tea in China. ( no joke either) among other non medical care industries. All of it snake oil salesmanship ripping off billions of tax payer& patient money for many decades as well as their many disabled workers benefits, ALL of their benefits, even the disabled workers paid into govt benefits.. like SSA/Medicare. It’s a bottomless pit of money for a false health care organization and those govt agencies & legislator’s are involved. How many ways can you steal maim and kill? Kaiser is a very profitable foundation only for those who run it. RUN, don’t walk from this boondoggle called “health care” organization. Medical care in general doesn’t exist anymore. this is all about making money while limiting necessary medical care, to complete the offing of those who have been working and living for the last 90 or so years. Kaiser is the elite’s choice all after they stole from us working class. that’s been the plan all along.
An a Harvey said:
If you vote Conservative in the election then unless you have money, you can kiss goodbgood by to the NHS.
Pingback: THERESA MAY,S EVIL PLANS TO DESTROY YOUR N H S AND REPLACE IT WITH PRIVATE US HEALTHCARE SYSTEM KAISER PERMANENTE. | circusbuoy
Paul Smyth said:
Reblogged this on The Greater Fool.
GeaVox said:
They’d best not even THINK about it… protests will cost them MILLIONS and in the end people will boycott and set up OUR OWN Healthcare Co-op and SINK THEM!
This is Britain, it is NOT the property of Coporations and soon Theresarse Mayhem will be a hasbeen looking for a job!
Pingback: Theresa May’s secretive plans to replace NHS in England with private US healthcare system Kaiser Permanente | lawrencerowntree
emmashillam said:
Can say with certainty that there is at least one ‘recent visitor’ that hasn’t existed since about 3 years ago. For this reason in particular I feel this blog post is unreliable and invalid.
Pingback: Theresa May’s secretive plans to replace NHS in England with private US healthcare system Kaiser Permanente | sideshowtog
Hilary Temple said:
This is terrifying. I can see it mobilising the population into mass demonstrations, if not general strike mode.
DEIRDRE CARDEN said:
My dad died in 2008 in a NHS hospital aged 96 He fought for this country and he would turned in his grave if the tories get in again Their greedy and minipulaters of even the voting system it sholud be one man one vote . However they will only need 24% to get in lets all make sure it never happened
Richard Kelly said:
Interesting but speculation. NHS visits etc to other countries us common, the idea is to find new ideas of management, productivity, medicine etc. I have worked within companies that interact with perceived competitors in order to gain insight.
If there were tangible facts I would react differently but this is just adding 2+2=5.
Before anyone says it….I’m not a Tory, I’m a proud Brit that wants electoral reform and a Republic.
Are you nuts?
Fact! Private healthcare is just that!
Fact! Dorset is already being managed by Virgin instead of the NHS … if their patients cant pay exhorbitent fees up front to see their GP … they have a four week wait for an NHS appointment … and there is a dramatic reduction in A&E services … so where do sick people without a large bank account go?
Then there is their paediatric services …Fact! also gone over to private healthcare … children with long term incurable conditions have been discharged and have no healthcare options amongst them there are children with chronic conditions … previously cared for by Consultant Paediatricians … children who suffered oxygen starvation either in utero or at birth … a spectrum of disorders that if not supported throws them on the rubbish heap for their short life … Autism … ADHD … cerebal palsy … special needs … Downs Syndrom … the list is long
As it is … care is disjounted in the areas of the NHS that are being privatised … there is no exchange if information … waiting times are horendous and if these operators are not paid up front … you dont get seen or treated … the NHS is a not for profit service that keeps many people alive who will not survive without it …Fact! many people have already needlessly lost their lives … the for profit organisations do not have patient safety or dignity as their guide … no profit … no treatment … and even if there is a profit the care can be non existent
By the time you finish waiting to see what happens … you will have no options left … healthcare will be private only and the NHS will be a brand name only
This is common-knowledge in the rest of the world do you not have friends who are British ex pats living overseas and informed?
We are allegedly a sovereign democracy … democracy ifs largely out the window we are heading full tilt towards becomng a tax haven for the filthy rich where unless you are one of their number … you will be left with little or nothing
If you want a Republic as your home … Iteland is the closest
K Fishburn said:
Over in Holland people have a private insurance. You pay different prices for different levels of cover. I lived there years ago & was impressed by my basic cover. The hospitals were brilliant & the dentists were more advanced than the dentists in the uk.
It was a better system. The waiting list to see a Doctor or specialist was fantastic.
The only problem is that people that don’t want to work , get away with it all yet again & pay nothing.
It’s cheaper than national insurance
That all sounds wonderful but the Government here is not looking at the Dutch System but the American which Virgin are already operating in Dorset and quietly being rolking out into various UK areas … but no reduction in the funds deducted at source from NI and tax … which if actually used to pay for healthcare … would provide the best and by far superior service worldwide
As for people who are disabled, aged, chronically ill and unable to work
What hapoens to them … in America … they are left to die having been physically removed from hospitals and dumped outside
There is no tenable alternative to the NHS offered to the British public who continue to pay for the Service … yet our healthcare is quietly and consistently privatised without disclosure consultation
We have no contribution to the decisions already made behind closed doors, much less discussion for the future
The British public really does need to wake up and inform themselves on what is happening now, at tgeir expense, and the suffering this is already delivering
stefan kursa said:
the NHS was originally brought in as a safety net; an immediate free point of care for emergencies , accidents and general illness, It was not designed for sex changes , fat removal, depression , anxiety gastric bands and other surgeries that people feel the need to have these treatment/ procedures.
if you strip all that back then the NHS would be in fine shape .
Some of the comments above are complete bollocks and people need to stop reading/believing everything they see in a redtop newspaper or in the local pub.
You tealky need to check your facts
Sadly … you are the one with no idea of what you speak
The NHS was put in place in 1948 to meet ALL our heakthcare needs includind dental, and whikst free at point of use, is to br paid for through our tax deductions
By the time you wake up and understand what is actually going on … it will be too late
Like it or not NHS services have been sold off ti Virgin who are operating in the West Country
Pippa said:
The US already has private American owned companies running parts of the NHS in the UK and they are called HCA so it’s unfortunately already happening. There already here covering what the NHS cannot do because of short staffing and charging the UK taxpayer a fortune. It’s Ridicuolous
liz said:
2 questions, no magic money pot) 1.-does the 1 perscent for nurses etc come out of tax payer money if not where 2- where does it come from for ,mps, peers etc
Laura Cook said:
this MUST be shared EVERYWHERE
Pingback: Theresa May’s secretive plans to replace NHS in England with private US healthcare system Kaiser Permanente | Richard McMellon
The first reason the lying tories should be ousted. Imagine how their tactics will effect over FIVE YEARS!?
Today’s health care is not about necessary medical care. It is about offing people for CEO & govt profit and it’s being done on, especially those that need real medical care, like the created poor, disabled, minorities, women & those that are retired, the new elderly, all making room for the newer ones who will be next. It’s all nazi & commie “health care”, profit or no profit. It’s all one big lie, now that so many need it, those who came after the last generation during the WW11 generation . It worked in WW11 AND those involved in the murdering machine laughed then too, all the way to the bank, which of course include corporate and govt execs. Kaiser goes way way back with its foulness.
Hywel Thomas said:
False news. This article is cobblers dressed up as facts.
The reason dozens of NHS Trusts have been visiting Kaiser Permanente over the past 15 years is their structural model: “Underpinning the Kaiser model is not just an integrated model of care…but “a critical cultural change − the physicians lead in population care”
Nothing to do with health insurance, nothing to do with charging at the point of delivery, instead getting rid of layers of management and letting the doctors get on with the job.
I would have thought that was something we all wanted.
kaiser permamente is false news. it’s doctors are trained NOT to give you medical care and their retirement depend on this false health care org. It’s not about medical at all, it’s about profit for itself to even more harm in other areas. Unfortunately some in US.CONGRESS bought this so employers would NOT have to pay for REAL medical care needed by their employees. It was sold to make employers even richer including itself. Kiaser is the biggest leech of American tax payer money & health care premiums and it then in the 90’s went full throttle on older, more experience and higher paid employers to cause work place injuries and illnesses and NOT pay for the medical care the employees needed and then bring in lesser educated and illegal employees ALL FOR CORPORATE PROFIT.. Our current President knows what the employers are doing but he needs to step up to the plate, stop this scourge of inhumanity and give those who disabled the benefits they were promised and get back what the employers illegally and criminally stole away. The AFL-CIO wrote up the contract and the non profit human resources was created to carry out and cover up the theft and harm that employees have faced since the latter 80’s. Kaiser created all of it at the behest of Congress for self-insured employers profit. The whole universal health care scheme generated by kaiser to cut employer cost for it’s own profit. The U.S.Congress OWES the American workers the truth of the pain and theft that kaiser was employed to do via” integrated” health care, that started in 1960 by a crackpot PH’d with others from Harvard that like Kiaser doesn’t believe in anything but making money at human costs. It’s all built on a false premise and I cannot emphasize more that the UK folks are going to be treated the same shoddy and callous way and suffice it to say, that this is just another way to deny care and let people die however that occurs with out real medical care. I swear to this GOD is my witness , to Congress and the people of the U.S.A.! That the fashcists and commies in our country are at it again, been at it, all to our govt for allowing kaiser and some who’ve been in our govt to tear it all and another way to killing American, Canadian, Australian , African and other populations off and one of the best and especially secret ways is through the MEDICAL arena. Kiaser starts from Caesar, the head of the roman empire and it’s attitudes and acts are the same.
The people of the UK NEED to research as we did for many years and we were employees who did our research on who and what kaiser really is and IT IS NOT ABOUT REAL MEDICAL CARE. IT’S A CON PERPETRATED ON THE AMERICAN PEOPLE, thanks to past president Nixon in 1971 (tapes) and that this heinous corporation is all about making disabled workers, and then killing off these AMERICAN older men & women, minorities and many who were unions members
The AFL-CIO wrote up the contract for this to happen with the SSA/Medicare, NAFTA sealed the deal,, again to save self insured employers INCLUDING employers like the SSA/MEDICARE, local, state & federal govt agencies that go into other counties to do the same and use the money for other egregious acts like war, terrorists acts, drugs and gangs all for the perpetrator’s and traitors pockets. The seditious acts should lead to charges of outright treason. Not all corporations do this but they’ve all been indoctrinated with the premise of integrated care and that employees ARE the problem and NOT the employers, who have and are causing decades of heinous acts on their own workers and there is no accountability or responsibility taken by our own govt that ignores complaints no matter whether it is the legislators, justices or agencies. ZERO response form those we pay to protect us, their constituents.
One day soon the truth will come out and I sure hope President Trump is with us to shine the vicious and ugly truth about what’s been happening for at least 57 years to the American people, those who are paying for it all. WE’VE BEEN SCAMMED, CONNED, MAIMED, INJURED, MADE ILL AND KILLED ALL FOR corporate and govt profit. A large order indeed but a crucial and necessary one to save our country and it’s people. AND we have kaiser’s own bragging rights to evidence it all.
MAY too, is a sham for factions like the faschists and communists corporations and why going global should have never happened. It did spread faschism and communism and yes mideast beliefs, that are totally contrary to what most of us believe, what is right and wrong and just. Atheists are easily fooled or are a part of this cause the Romans on down were Atheists too. Tech companies too are involved with their so called aggorythms to indoctrinate our minds on what is right wrong and just, with compassion, empathy and other positive human traits, everything to make us think that money is all what life and celebrity is really about but never reaches the workers who make our countries what they are.. Don’t be fooled anymore!
GOD bless us all because we need HIS Divine Intervention, Blessings and Miracles for and on our survival.
I didn’t mean for this comment to go on for so long but it needs to be said, The Truth and that is God given.
I apologize for my errors. It’s hard for me sometimes to think and express while typing, one, who’s been disabled by kaiser since the last day I worked in 6/92.along with hundreds of others (then) 35, years long. This is too for those who were killed, workers and patients who have no voice and who others as well as myself doing what we can to give them a voice and to stop the theft, maiming and killings.
Dina J.Padilla
|
cc/2020-05/en_middle_0032.json.gz/line8359
|
__label__cc
| 0.559485
| 0.440515
|
Magazine > Tales From the High Seas By The Luxury Channel
Tales From the High Seas By The Luxury Channel
We take a look at the best of this year’s Maxi Yacht Rolex Cup and the Rolex Swan Cup.
From the 5th to 11th and then the 13th to 19th September 2010, the toast of the sailing world flocked to Porto Cervo, Sardinia for the annual Maxi Yacht Rolex Cup followed by the Rolex Swan Cup. Despite 30-knot mistral winds gusting in to upset racing on the final day of the Swan Cup, the two weeks saw some wonderfully competitive battles.
Powerful yachts cut through the Mediterranean waters with grace and agility, whilespectators looked on from one of the most beautiful stretches of Italy’s coast.Nestling in a beautiful and perfectly sheltered harbour, Porto Cervo is one of the Mediterranean’s most welcoming ports, with seas sparkling by day and the lights of boats twinkling by night.
The beauty of the spot was not lost on the competitors themselves, who reveled in the turquoise waters and sunny skies. EnricoScerni, winner of the Club Swan 42 class and a Porto Cervo veteran, expressed what many at the event seemed to be feeling: ‘This spot is marvelous, one of the best spots to sail. It was a perfect week with marvelous weather. We had a very nice coastal race, some good competition and a lot of fun.’
A final day of great sailing brought the Maxi Yacht Rolex Cup 2010 to a close with the victory of EsimitEuropa 2 (Racing & Racing Cruising), Hetairos (Super Maxi), Ranger (Super Maxi & J Class) and Y3K (Wally) in their respective divisions. NiklasZennstrom’s Ran has been crowned Mini Maxi Rolex World Champion in the inaugural edition of the class championship.
The winners at this year’s Rolex Swan Cup were DaniloSalsi’s DSK PioneerInvestments (ITA) in the Maxi class, Peter Simon’s Monsoon Jaguar (GBR) in the Classic class, P.H.J. Bakker’s SilverenSwaen (NED) in the Grand Prix class, EnricoScerni’sKora 4 (ITA) in the Club Swan 42 class and HendrikBrandis’ Earlybird (GER).
Andrew Winch 5 minutes 33 seconds
Marie Helvin’s Tokyo 25 minutes 7 seconds
Stephen Bayley 4 minutes 42 seconds
Woolmark – Behind The Prize 20 minutes 53 seconds
Beat The Jet Lag By Alanna Lynott
Beach Babe By The Luxury Channel
Escape To Farr Estate In Scotland By Caroline Phillips
|
cc/2020-05/en_middle_0032.json.gz/line8363
|
__label__wiki
| 0.603299
| 0.603299
|
Magazine > The All-New Range Rover Sport By Victoria Macmillan Bell
The All-New Range Rover Sport By Victoria Macmillan Bell
I’m perched atop a bank, deep in the Herefordshire countryside, being guided through the next series of challenges by a man head to toe in khaki from the Land Rover Experience team at Eastnor Castle.
Placed around the new Range Rover Sport are tiny cameras that feed images back to the screen to show you what’s what. All I can see from the front cameras is a long drop and then water – no land, just water. You see, the drop is so steep, the bonnet is facing the sky and there’s absolutely no opportunity for you to make a decision on where to point the wheels without relying on the screen.
Inching forward a little, the car yaws like a see-saw and then tips its weight forth down the muddy luge. I am now looking at the cameras which are submerged, the water is cloudy from all the silt and mud I’ve just churned up. There is literally nowhere to go now other than upriver so onward we go, bow wave ever-present, like it was the most ordinary thing in the world.
My wonderment of the moment was disturbed when the phone rang, the number appearing underwater on the screen, amongst flowing reeds and small fish.
It was the Montpellier Chapter Hotel I was staying in that night, calling to confirm a spa appointment. I explained that I was in a river, that eventually I would come across another perpendicular bank up which I would gracefully climb, then across a series of fields and tracks to a gate which would throw me out onto an A road to take me straight to Cheltenham but yes, I should still make the 6.20pm appointment.
Life with a new Range Rover Sport – it is mind-boggling just how capable this luxury machine is.
Now lighter by half a ton and more agile than the outgoing model thanks to its all-aluminum construction, this latest model has raised the bar yet again to new levels of performance, fuel economy and CO2 emissions.
It would be easy to say all you need is the 3.0 litre TDV6 diesel engine because it really is all you need. It’s rapid, smooth and a long way off the sound of a regular diesel, but then you stand next to the 5.0L Supercharged V8 version when it’s fired up and the noise is so utterly fantastic, you get swept up in all that V8 cement-gargling growl.
Take your mind away from mud and ruts to smooth, runway tarmac, and the V8 will propel you from 0 – 60mph in just 5 seconds. That’s outrageous for a car of this size. A flurry of seconds later, you’ll be cruising at 155mph, the top speed with this engine. Seeing another Sport thunder down the runway whilst you watch widens the eyes somewhat. If it’s possible to look regally sporty, this does.
But, nothing makes your eyes widen more than driving up a ramp onto a cargo 747 jet to then take on an assault course for cars within, where precision, composure and balance is all. Exiting the big bird had us all leaning back trying hard to counter balance the sheer perpendicular angle of the car, upstanding on the pedals.
The styling of the Sport has had plenty of influence from its stable-mate, the Evoque, with the roofline, tailgate and side-profile being the outward clues. Inside, the car is more roomy than the current model, yes, a fraction longer and wider and sitting on a longer wheelbase, and for the first time now offers seven seats, the third row being two automatically stowing child’s perches.
This is a highly skilled machine but reflecting that the Sport is more used to providing very high levels of on-road refinement and luxury, more are sold in New York City than anywhere else in the world. That’s not to say that New Yorkers demand more sumptuousness, it’s just that they will rarely be exposed to anything more challenging than a loose drain cover and that really is a travesty.
If you own a Range Rover/Sport or in fact any product from Land Rover, I urge you to ring Eastnor Castle and book yourself and your family in for an overnight stay. The setting is utterly beautiful, but it’s what you get up to with the Land Rover Experience team that will alter your understanding and appreciation of this car, hereon in.
As we’ve experienced, our own self-preservation limits will run out far and away before that of this colossally impressive machine.
Priced from £51,550. For more information about the Range Rover Sport, click here.
The Party Guru 23 minutes 47 seconds
Zara Phillips 4 minutes 20 seconds
Fashion For Conservation 2 minutes 27 seconds
Paul Smith 7 minutes 1 second
The Sky In The Eyes By Fiona Sanderson
24 Hours In Colombo By Caroline Phillips
London Fashion Week – A Stylist’s Perspective By Tamara Cincik
|
cc/2020-05/en_middle_0032.json.gz/line8364
|
__label__cc
| 0.690452
| 0.309548
|
The workers of the world have picked their leadership, and it isn’t you.
Posted by Pointman on February 2, 2017 · 20 Comments
When I first started this blog, the intention was to provide some resistance to the overwhelming “consensus” of the then mainstream media, since renamed to the legacy media, with regard to the reality or not of global warming. Like any other blog of that vintage that raised such doubts, its effect at the time was something less than a thorn stuck in the underside of the green Goliath’s sandals. Because our efforts way out on the periphery of the internet were only read by those odd individuals madly determined to get some real answers, realistically we weren’t too much of a concern.
However, times change, and that combined with the sheer obnoxiousness of the warmist sites, meant the skeptical sites slowly accreted an audience, usually at the expense of the alarmist sites. Their evolving response to that was to develop a profile of what a climate skeptic was. Basically it was a pastiche of all their dislikes; white, male, fascist, ignorant, neo-Luddite etc etc. Calling it painting by numbers profiling would be an insult to thousands of talented daubers out there.
Yes, of course it was a ridiculously childish and offensive stereotype, but what you really need to take a note of is that when they’d tossed it around between themselves often enough and for long enough to ward off any critiques by us, they began to actually believe in it themselves.
When your opponents come up with such a facile perception of who you are and your capabilities, it’s never a notion you would wish to disabuse them of. It’s so much easier dealing with a person who misapprehends and chronically underestimates you, and to a very large extent that was the story of that part of the climate wars which were fought on the internet. We owned them in the end and they’ve now barely got a footprint left on it.
They always mounted assaults on obnoxious stereotypes that had no existence except in their fevered imagination, while we had all the time in the world to select a particular artery we could cut into, with a scapel of our own choosing and at exactly the time and place of our choice to do the maximum damage. There was at times some great arterial spray of scientific reputations all over the walls and ceilings of various blogs as prestigious papers were vivisected.
I will be returning to the effects of this erroneous profiling in a more current context, but at this point, I think it’s worth agreeing a common vocabulary, because of late certain words which could formerly be understood as rough synonyms have parted company to a subtle but real extent.
Historically you could talk about politics or people interested in them as left or right wing. Sure, there were always the political marginals knocking around like the syndicalist-anarchists, royalists and the libertines or whatever they call themselves nowadays, but left and right were the basic ways you sexed all the fowls in the chicken house.
The two words left and liberal which had been roughly equivalent, began to part linguistic company about two decades ago. The split started in the Americas but has by now spread to the rest of the English-speaking world. In the States, being called a left-winger had nearly as heavy a connotation as being called a Socialist, the emotional weight of which lay somewhere between Communist and Marxist. Anyway, being called a liberal had a nicer cachet to it. It said you were a nice and righteous person, even if you were still ill-informed enough to think Abraham Lincoln was a Democrat.
To this day, a true doctrinally-correct left-winger would rather be crucified than term themselves a liberal. In the back of their heads, they still consider themselves hard-assed bastards determined to liberate the exploited masses from the yoke of Capitalism, soldiers in the eternal class war, wheras Liberals are Yackerati airheads, Hollywood and wannabe Hollywood types, hyperactively protesting about their vaginas, other people’s viginas, or the vaginas the state should have surgically attached to them at everyone else’s expense, and even people who actually do have vaginas who think such possession is in itself a political statement.
They are all considered to be Schilli, a German elision of the two words Schicke Linke or chic left, trust fund boys and girls doing a bit of acting out until Daddy’s fund opens its floodgates, or the feckless and decadent offspring of an indulgent bourgeoisie on essentially the same trip for a few years until the right job opportunity opens up. No commitment to anything long term other than an occasional bit of hooliganism at the weekends, while all the time being perceived as being stylish. It’s a win-win for them.
But in the Left’s view, even such shallow creatures as the Yackerati have their uses in the furtherance of the class war that of course still underlies all political reality. Their systemic penetration into the mainstream media makes them a mouthpiece for a useful policy push in the right direction, even though the underlying rationale verges on the laughable at times. They don’t actually know what they want, why they want it but they do know they want it right now or a lot of toys are going to get thrown out of their prams.
The Yackerati styling themselves as liberals ran shielding interference for a few decades in which some of the pillars of capitalism took a severe eroding, but again, times change and it’s a big wave of change this time around. It’s being presented as populism by the liberal media, but it must be apparent to all by now that it’s one of those decadal but seismic changes of political sentiment that not all the spin in the world is going to stop.
The world has had enough of the two decade long experiment with liberalism and is lurching to the right. It died under a lack of real jobs for the middle class, a declining standard of living for most people in western economies, an open borders policy letting in hordes of people who weren’t even literate in their own language and consequently had nothing to contribute to our society except a rape culture and a steady stream of murderous terrorist attacks.
It was like being obliged to take into your home mad dogs whose activities, because they’d been adopted by the liberal agenda, were not only were above criticism but whose crimes and atrocities were presented as a string of unconnected one-off incidents and anyone believing otherwise was of course a racist. Suddenly the ordinary person was being profiled as a racist for having some very basic ground-zero concerns about what was obviously a bad thing happening to their country.
The word islamophobic entered the language and the law, but christianphobic has yet to be invented, in both government thinking and in terms of equality before the law, especially in the Sharia law enclaves within our societies which nobody wants to admit exist but nonetheless are handing out medieval punishments.
If that was what being a racist was, then sod it, we were all racists, but racists with a vote if only a real change candidate could be found. Sweden was ruined by uncontrolled immigration within a year and Germany is not far behind it. As a result, borders across Europe have slammed shut and there will be some interesting elections within it this year as people look aghast at what’s happened in neighbouring states.
The people who voted for Brexit and Trump and who will be going to the polls in various votes across Europe this year will be rejecting the establishment line that all of those concerns are somehow nothing to worry about, but they are of course. All the indignation, finger wagging, telling offs and pointless disruptive marches will not stop it and indeed people on the serious left are now thinking in a very realistic fashion about the transition of the liberals from what was once considered a real asset to a liability.
The Realpolitik thinking is the Right are coming into power across the world for a decade at least, and there’s simply no fighting it. However, there’s no situation that can’t be made worse and the liberals with their quite frankly pointless behaviour since the Trump inauguration look to be in danger of extending the Right’s hegemony by another five years at least.
A lot of people who voted with a certain diffidence for change in the shape of Donald Trump, now watch civil disorder in the streets, film stars on platforms behaving like foul-mouthed slatterns, the cop on the corner you know under organised attack, small businesses and livelihoods being burned and looted under the guise of political protest, ordinary people wearing a MAGA hat being attacked by what is plainly thugs – and they’re thinking “well Lordy, I think I might have just voted the right way after all.”
Coming back to erroneous profiling, the legacy media and all those people disrupting the everyday life of ordinary people are subconsciously projecting the same offensive stereotype of a Trump supporter as they did about anyone who objected to the climate disaster narrative. Yes, of course, I’m sure there are a percentage of Trump supporters conforming to the caricature, but the vast majority are ordinary people fed up with establishment politics which simply doesn’t work for them any more, and offended at being portrayed as such an obnoxious type. All they want is real change.
What the liberals don’t seem to grasp is that it wasn’t a hundred or two people who voted for Trump or Brexit, but millions. All the name calling is just going to distance your cause from them, and in all probability any chance of securing their vote, which is what democracy is all about, or has that subtle point been completely forgotten?
Liberals, welcome to what’s nowadays termed the rule of the silent majority, or what used to be called the dictatorship of the proletariat by Karl Marx and Friedrich Engels and quoted fervently by me in my youth when I’d been seduced by the Communist Manifesto. We all have to grow up some time. It’s your turn now.
Filed under Article
← Looking out of a broken window.
The right stuff. →
20 Responses to “The workers of the world have picked their leadership, and it isn’t you.”
NZPete says:
The attacks on Trump by the MSM are never ending; so much fake news.
I’ve just seen this:
Trump hangs up on Turnbull
which leads to this:
https://www.washingtonpost.com/world/national-security/no-gday-mate-on-call-with-australian-pm-trump-badgers-and-brags/2017/02/01/88a3bfb0-e8bf-11e6-80c2-30e57e57e05d_story.html?utm_term=.1212614ec156
(http://tinyurl.com/h76c2fs)
I have yet to see this bebunked as fake news, which I suspect it is.
For people wondering what Obama’s “secret refugee deal” with Australian Prime Minister Malcolm Turnbull might have been …
Obama agreed to take illegals from Papua/New Guinea in exchange for Turnbull accepting an equal number of illegal immigrants from Guatemala, Honduras and El Salvador currently being held in detention camps in Costa Rica.
Hard not to agree with Trump … it always was a “dumb deal”.
None of these people qualifies for the UNHCR’s own definition of “refugee” – that of seeking asylum and safety in the first country they reach outside of their war-torn homeland.
Most are economic migrants anyway, and ALL are “country-shoppers”, illegally buying their way into generous welfare states from criminal human-trafficking smugglers.
https://refugeeresettlementwatch.wordpress.com/tag/australia/
Turnbull’s brain-fade idea of importing Central Americans to Australia in such an exchange is beyond understanding, especially since our acceptance of Africans has been such a disaster, especially in the city of Melbourne.
Violent marauding African gangs even have their parents, who claimed to have been in fear of their lives in their homelands, are now sending their teenagers back home to Somalia and Sudan to keep them “safe” from the violence of Melbourne’s African gangs.
http://www.heraldsun.com.au/news/law-order/refugee-parents-send-children-away-from-melbournes-teen-crime-scourge/news-story/386297b5095448917593737c8b4f8836
From what we read of vicious Central American gangs, worsened since many were deported from the USA years ago, the last thing we need to import is a culture of violence the USA has been dealing with for decades.
https://en.wikipedia.org/wiki/MS-13
That’s all we need … deadly gang turf wars between the Lebanese, Africans and now the Latinos.
The bleeding-heart Yackerati remain silent on the subject.
Did you think I was exaggerating?
“About 11pm on Saturday, 40 African men turned up in cars and a terrifying brawl broke out, police told media.”
http://www.news.com.au/national/victoria/crime/guests-jump-fences-to-escape-wild-airbnb-party-gatecrashed-by-gangs/news-story/727e5e62e20d2c518a5b2e0afba4acd0
Yep, Oz has been making “dumb deals” all over the place.
They’re already here … but the Federal Police are remaining “tight-lipped” about it.
“ONE of the world’s most deadly gangs has infiltrated Australia — part of a sick plot to become the most murderous group on the planet.
There are fears the gang, Mara Salvatrucha, also known as MS-13, is already here with their graffiti tags spotted around NSW. The gang could be under a different guise and is going by the names “Tiny Devils” and “SPS-13” in Adelaide.
It is understood they’ve been targeting Australia to tap into the booming (and lucrative) drug market here.”
http://www.news.com.au/national/crime/worlds-deadliest-gang-mara-salvatrucha-begins-to-infiltrate-australia/news-story/de2eb7c396883dd975f71f0535ec4833
At least we know we’re still getting the full “mushroom treatment” … gotta protect idiot politicians from any community back-wash about their “dumb deals” dontcha know?
It is probably the 4Chan kids yanking the Yellow Stream Media’s chain again. Australia and Mexico have denied the news.
Gail, you can’t believe a word out of a corrupt Australian politician’s mouth … bare-faced lies are their stock-in-trade. As for Mexico’s denial – why would they not? The ‘dumb deal’ has nothing to do with them. Illegal Central American invaders, heading for the Mexican/USA border, have been waylaid and diverted to detention camps in Costa Rica.
It is these people that Turnbull wants to accept in return for off-loading our own illegals (currently in offshore detention camps).
Surely this qualifies as Turnbull and Obama engaging in human trafficking dontcha think?
Using human beings as bargaining chips, trading their fate in a barter exchange of political expediency is no different to illegal smugglers trading the same people for cash. At least the cash traders don’t pretend to be something else, unlike Obama and Turnbull who would sell their own grandmothers if it would further their own careers, therefore the financial gain they seek.
There’s no doubt though Gail … if the chain is pulled often enough, we’re sure to flush out the real turds in this shameful charade of phoney ‘virtue signalling’. Meanwhile your Yellow Stream Media (I like it) is busy trying to figure how to pick up a turd by the clean end.
This is *not* fake news:
Stay safe everybody. pic.twitter.com/dLeL9BP382
— Stefan Molyneux (@StefanMolyneux) February 2, 2017
geronimo says:
Do you know the feeling when you see someone who has something that you’d like for yourself and know you’ll never get it? That’s the feeling I get when I read your essays, the mixture of thought and erudition is brilliant. You have expressed, and added to, my own feelings. I was to the left in my younger days, but have long concluded that the “left” today are about as far away from the thinking of the people they claim to represent as they can possibly be. They have created a world where people who want to control immigration are “racist”, where people who express doubts about the wisdom of allowing Muslims into their country are “Islamophobic”, when a glance at the world of Islam tells any reasonable thinking person it’s a place where you don’t want to be. They have become members of a sect which has the seeds of its own, and our destruction in it, and I, for one, am glad that the little, ignored, people of all races and colours are telling them where to put their deluded beliefs.
The “Yackerati” … gotta love that! The brain-dead Glitterati have exposed themselves as being among the ranks of the Yackerati, and their vacuous fans and followers have been revealed to be even more easily led and influenced than we feared.
And yes, whether their gonads are internal or swinging externally, they all behave as “slatterns”, cheaply bought and paid for.
They denounce Trump and his supporters as ‘Nazis’ and ‘fascists’, utterly ignorant about where such insults came from or what they actually mean.
To be denounced as a Nazi is ironic considering that it’s real name is ‘National Socialist German Workers’ Party’ and yes, we’re ‘nationalists’ and ’workers’ BUT it is THEY who are the Socialists.
And it is Fascism that demands no democratic vote, control of all industry and commerce, with full legislative control of the people as a whole.
If anything, Trump is a Libertarian with plans for smaller government, less regulation of people’s lives and businesses, a return of education to local communities, and a restoration of Blind Justice. That’s what a majority of people voted for, and that’s what he’s well on the way to delivering.
And THAT is called Democracy!
Pointy, you’re taking these people apart with surgical precision. Great work!
Many think of Trump as the Stealth Tea Party Candidate. Both the Republicans and the Democrats attacked the Tea Party. The Chamber of Commerce spent $100 Million to Destroy Tea Party (Breitbart) The Republicans fielded 17 Candidates so no one would get a 51% of the delegates and they could stick us with low energy Jeb Bush. (The Democrats were less subtle and just had a large number of ‘Super Delegates’ vote as the elite of the party wished.)
Other methods used were Salem Media becoming ‘the voice’ of the Tea Party when they were actually the represented the interests of the Chamber of Commerce.
http://theconservativetreehouse.com/2015/09/03/transparently-predictable-political-maneuverings-within-msm-and-salem-communications/
Sucking the $$$ out of the organization.
How We Killed the Tea Party – POLITICO Magazine “Greedy super PACs drained the movement with endless pleas for money to support “conservative” candidates—while instead using the money to enrich themselves. I should know. I worked for one of them.”
However you can kill the organization but you can not kill the ‘Cold Anger’ that formed the Tea Party.
And we learned.
People gave $$$ direct to Trump and told the super Pacs and the Republican party collecting in Trump’s name to stick it where the sun don’t shine.
People Like me, an Independent, got out and talked people into voting and even dragged the non-voters out to get registered and then to the poles.
Now multiply my actions by the millions. We KNEW we had to beat Hitlery by a margin of at LEAST 5% to beat all the voter fraud AND WE DID!
As some put it, Trump is not our candidate, he is our WEAPON!
nzpete54 says:
That’s a fascinating explanation Gail. I’m enjoying following events now that there is a fight back. Trump may be brash, but he’s genuine IMHO.
Why do I have to log into WordPress just to tick the Like button?
Personally, I haven’t stopped laughing since watching CNN on election night in November. My sides are hurting quite a bit now, and I’ve run out of tissues with over use on tears of laughter.
Don’t make the mistake of falling into the “Nationalist” trap. Socialists will as cheerfully adopt and abuse Nationalism, as the will Communist Internationalism (relabeled as “Globalisation”, as relabeling is something Socialists like to do too). George Orwell explains why:
“Nationalism is not to be confused with patriotism. Both words are normally used in so vague a way that any definition is liable to be challenged, but one must draw a distinction between them, since two different and even opposing ideas are involved. By ‘patriotism’ I mean devotion to a particular place and a particular way of life, which one believes to be the best in the world but has no wish to force on other people. Patriotism is of its nature defensive, both militarily and culturally. Nationalism, on the other hand, is inseparable from the desire for power. The abiding purpose of every nationalist is to secure more power and more prestige, not for himself but for the nation or other unit in which he has chosen to sink his own individuality.”
Another diversionary relabeling attempt, is the word “populism” as a way of avoiding and confusing the mixing of it with Patriotism. What they really mean, is “Cult of Personality”. Socialists make so much use of Cults of Personality (actors, singers, musicians, anybody famous they can get their hands on) to endorse their message/agenda, and they are terrified that Cults of Personality will be used against them.
These deranged basket cases have such a limited and rigidly enforced playbook, that they can’t stand any of their limited tools being used against them. Remember the contact with them over aGW, when they reached the end of the playbook, and were about to return to page 1, the last comment on the last page, always included “Big Tobacco”?
These people are not very bright, can’t think on their feet,,and dare not wander off the playbook, because if they do, the heavy lifting useful disposable idiots, will see through it all, and turn on them for the deceptions and lies they have been told by them.
With all of the nonsense and stupidity going on today, I have come across two pertinent and fundamental questions. 1) Where have all the Constitutional Philosophers gone (there aren’t any around yet they are needed the most)?; and 2) Where were the Constitutional Philosophers, when the nonsense called “Socialism” was unleashed on the World?
Because I tell you this, if there had been any Constitutional Philosophers around, “Socialism” would have been laughed off the stage, within 5 minutes flat!
Apart from all the Philosophical Political Fakery and woo-woo mumbo jumbo surrounding Socialism, and it’s complete lack of intellectual foundations, there’s a simple demonstration in a single example (apart from the constant examples of continuous failure) about what happens with Socialism, with the first Pilgrim Colonies in America.
The practice of Socialism, killed around 80% of the settlers, because the Socialists that died, relied upon everyone else to do their survival for them. But the ones doing all the actual work, couldn’t do enough to keep the 80% alive. So Socialism was dropped, self reliance was enforced, and after that, the colonies thrived.
It’s not rocket science is it, so how has the World been conned by this blatant, and criminal fraud, that has killed so many millions of people, and done so much damage, for so long?
G’day Ras … good to see your words of wisdom back online.
I seem to have confused ‘nationalism’ with ‘patriotism’ but if Orwell is right and patriotism is “defensive, both militarily and culturally” then perhaps we patriots have been defensive for too long, allowing ourselves to be overrun by an ambulatory invasion force that steadily empties our Treasury for a lifetime of welfare, free housing and education. And we’re expected to apologise for our culture, or are told we haven’t got one worth bothering about.
Maybe, if Nationalists indeed want “more power, not for himself but for the nation”, then that’s what most of us want … power restored to our democratic constitutions, power returned to a citizen’s vote, power to defend our borders and the power to enforce our laws and restore order … and justice.
Yep, I’m comfy being a patriotic nationalist.
Hiya Blackswan, I hope you (and everyone else) has been keeping well.
I agree with your sentiments, but a careful eye has to be kept out, for power grabbers seeking to create and take advantage of situations, and not just the Socialist power grabbers (though they are probably the easiest danger to identify). To grab power successfully, they have to divide the Demos (defined as the population) into factions, and turn them against each other. Unfortunately there are elements that are well practiced in this. We can see the results of such people in action, on the streets of America today, and an all too long list of other places.
Ultimately it all comes down to unifying rather than dividing, and sweeping power out of reach, and keeping it out of reach.
That’s the tough bit. 🙂
By the way it has to be recognised, that the Swamps and their Denizens, are going to be drained anyway.Even self drained. This is going to happen, and sooner rather than later. Mr Trump would appear to grasp this fully, and seems prepared to give it the necessary push to get it started (the quicker it happens the better, and a lot of bloodshed may be avoided)..
Mr Fillon in France(!), a candidate for the French Presidency, has said he intends to get rid of 500,000 Public Employees over 5 years. Think on that. This is France, remember.
The Gravy Train is running out of Gravy, it’s running out of Train, and it’s rapidly running out of Track. The EU is dead and doesn’t even realise it, and those who have ignored Reality when it knocked politely, are on the verge of having Reality kick their doors in.
There’s a lot more than 500,000 Public Employees going to have to go, just in France, and I bet they will have to go a lot quicker than 5 years.
Things are on the verge of getting really, really interesting.
You are hitting on all cylinders with this post! I started out highlighting the great quotes, and found the article was almost completely highlighted!
To NZPete, while I think the WaPo exaggerated the conversation, I think it did go close to what they say (I am sure it was not as harsh as they portrayed it, but the content probably was close).
Turnbull just has not gotten the clue yet. But he will. The Brexit/Trump wave is not going to die out before it washes up on the shores of Australia as well.
Back in the mid 60s when I was in college we, the students, were given the task of a debate about the future direction of the UK. We were all on the same side – at least I thought we all were – slightly left-of-centre view. I was ‘volunteered’ to take an opposing view. How fortuitous that was.
Given 2 days to prepare I started talking to various people in the town to get their ideas. I soon realized that what makes sense now I had never even thought of. I listened politely and found my views slowly changing. These people lived in the real world, worked, paid taxes etc. and I did none of these things. I was privileged to be where I was and it was a sobering experience.
Come the debate all was well and all smiles until I began putting the other view. Within moments there was a baying mob in front of me trying to shout me down with one boy stabbing his forefinger at me like a gun. It was like a wall of hate. Shocking experience which cured me forever of leftish ideas.
I went on to read Huxley’s Brave New World, Orwell’s 1984, Animal Farm and Homage to Catalonia. I am now an implacable enemy of Socialism.
I voted Brexit and would have voted Trump had I been American. Well done Americans!
And Pointman, thanks for the great essays. I found you through your occasional posts on other blogs. They were short and pithily to the point (excellent choice of pseudonym, by the way).
Thank you Margaret, for posting. We need to hear more comments from folk like you. I feel we’re on the same wavelength.
Leave a Reply to Blackswan Cancel reply
|
cc/2020-05/en_middle_0032.json.gz/line8367
|
__label__wiki
| 0.682331
| 0.682331
|
Craft/Work
Giant Steps: Robert Therrien At Parasol Unit
Fisun Güner , November 12th, 2016 11:34
Fisun Güner is enchanted by the playful minimalism of Robert Therrien, whose Works 1975 to 1995 is currently at London's Parasol Unit
Robert Therrien, No Title, 1989, Courtesy of Panza Collection,Mendrisio. Photography by Alessandro Zambianchi - Simply. it, Milano
Californian artist Robert Therrien is not a well-known name, yet his objects are incredibly potent. In the UK, his best known work is probably No Title (Table and Four Chairs), 2003 (purchased by Tate and the National Galleries of Scotland as part of its Artist Rooms programme). Made of aluminium, steel, wood and plastic, the dining table and four chairs are painted to look like expensive, polished mahogany. But its most interesting feature is its colossal size: take a walk under that table to get the full effect – you’ll feel like you’ve been at the ‘Drink Me’ bottle.
Scaling up ordinary domestic objects to make them appear alienating, threatening or subtly anthropomorphic has become a familiar trope in contemporary art. Probably too familiar, since art abhors a cliché. A similar piece to Table and Four Chairs is Giancola Neri’s The Writer, which occupied a patch of Hampstead Heath in 2005. We might also think of Mona Hatoum’s towering kitchen utensils, or Jeff Koons and the startling verisimilitude and impressive scale of Play-Doh, though even Koons’ life-sized sculptures, such as Bear and Policeman, play with incongruities of scale.
Therrien plays with scale in earlier works, too, but the sculpture, drawings and reliefs at Parasol Unit, which take us from 1975 to 1995, have a different, fragile, more impermanent, quality. Presented on two floors, with 43 objects delightfully riffing off each other, it’s a terrifically engaging introduction to this artist if you’ve never encountered his work before, but even if you have it’s quite the revelation to see just how much more layered, allusive and intelligent his work can be beyond the sized-up furniture. This is an artist whose work is definitely not one-note.
So what do we find? Here we find a teetering plate precariously balanced on top of other objects on top of a plinth (a home-crafted take on Abstract Expressionist sculptor David Smith, perhaps); and, part of Therrien’s snowman series, an ascending arrangement of three globes, their smooth, tin-coated surfaces reflecting the light in such a way that they already look part liquid, like the quivering surface of a barely frozen lake.
We also find the motif of a bird in flight, just two arcing lines, nothing more, but which is repeated on different surfaces to intriguing effect; a bronze piece, which looks like tin, and whose shape suggests a dunce cap bent at the tip but which also makes you think of Brancusi’s soaring Bird in Space, just as those ascending globes wink at the modernist sculptor’s Endless Columns. And then there’s the artist’s cloud series: most delightfully – for this is nothing if not an exhibition full of enchantments – an aubergine-coloured cloud made of three flat, intersecting circles from which four rusty taps (once functional, now useless) sprout. You sense, like your encounter with the deliquescent snowman, that there’s more to this piece than mere playful whimsy.
Robert Therrien, No Title, 1991, Courtesy of Berlingieri Collection. Photography by Douglas M. Parker Studio
And it all looks so seductive. Much of the work looks as if it’s been reclaimed from an architectural salvage site: painted fragments, now chipped or with pleasingly distressed surfaces, from old wooden structures built long, long ago (the fairytale resonances aren’t accidental). Shapes find their echo, and among the recurring architectural motifs is a church arch and a church steeple: painted bright red, one huge panel of a church and steeple dominates one wall. Nearby is a silhouette of the same motif painted on a old round tray with a fat wooden frame – naïf, homely, unavoidably charming, giving off a Dutch homestead kind of vibe.
Everything is infused with an air of nostalgia, an air of enchantment, though you’re also aware Therrien is an artist very much grounded in American minimalism: he plays on notions of minimalist seriality and repetition – repeated modular units, à la Donald Judd, are given a delightful home-crafted twist; and he plays off the ideas of the giants of minimalism and their attachment to giantism.
You might, for instance, think of Richard Serra’s monumental steel sculptures when you see the huge Dutch door jutting out from a wall, the top section opening on its hinge at such an angle that it looks like one of Serra’s precariously balanced, two-part, big-block sculptures. And there’s a keyhole sculpture on a wall nearby, right at the entrance to the exhibition. The keyhole is a void made solid, a sculpture in bronze. Though it’s small enough to hold in your hand, it’s ridiculously big for a functional keyhole. What key would be big enough? But of course it’s not a keyhole but a solid object, just as the double-opening Dutch door is not a door but a sculpture. Ceci n'est pas une porte. And, lo, if that’s not some kind of bowler hat (a pleasing nod to Magritte, naturally) on a plinth further along.
Robert Therrien, No Title, 1985, Courtesy of Mary Patricia Anderson Pence. Photography by Douglas M. Parker Studio
And there’s something else going on too. You start noticing a Dutch theme running through the exhibition, unfolding and revealing itself in layers. The high steeple; the church arch; the work that resembles a Dutch planter; the recurring water pitcher that, now you actually think of it, reminds you of the pitcher in a Vermeer painting; the drawing with the child in a lace Dutch cap; and that keyhole again, whose shape has now been fashioned into the child wearing the Dutch cap and a traditional Dutch dress.
But Therrien’s work is not just a set of sophisticated art puzzles to decode, though much of its delight resides there. Its playfulness also tugs at something that resides deeper within – a sense of yearning for innocence and that longing to return to a state of containment, quietude and order. Just as you’ll find in those hushed interiors of 17th century Dutch painting. Mark this one up as one of this year’s exhibition highlights.
Robert Therrien: Works 1975 to 1995 at Parasol Unit until 11 December
If you love our features, news and reviews, please support what we do with a one-off or regular donation. Year-on-year, our corporate advertising is down by around 90% - a figure that threatens to sink The Quietus. Hit this link to find out more and keep on Black Sky Thinking.
Noddy Amongst The Valkyries: Martin Puryear At Parasol Unit »
Love Is A Battlefield: The Brutal Visions Of Hyon Gyon »
Palm Desert Discs: John Garcia's Favourite Albums »
Understand The Feeling: Fenriz Of Darkthrone's Favourite House Records »
New Weird Britain: Noel Gardner's 2019 Round-Up »
MORE FROM FISUN GüNER
Tree Hugger: Fondation Cartier Gets Arboreal »
Decolonising The Museum: Kader Attia At The Hayward Gallery »
A Viennese Whirl: Klimt & Schiele Go Head-to-Head »
Too Cool For School: Hopper, Hartley, Demuth At The Ashmolean »
Transitional Subjects: Hannah Black & Bonaventure »
MORE: CRAFT/WORK
Material Decay: Ryan Foerster's Accursed Share »
2019 In Art: Quietus Writers Pick The Year's Best Exhibitions »
Unknown Venuses: Renee So At The De La Warr Pavilion »
Miles Ahead: Stan Douglas In Berlin »
TV OD: Nam June Paik At The Tate Modern »
Read the choicest cuts from the Quietus archive: reviews, features and opinion
The Best From 2019
The Strange World Of:
Asha Puthli
Coke, Pepsi, Red Bull
Fizzy Pop Swallows Pop
Channeling Kathy Acker
The Lead Review:
Nick Cave's Ghosteen
A Quietus Interview:
Body Vice
Jarvis Cocker:
His Favourite LPs
Quietus Merch!
Seeking Thrills WaqWaq Kingdom
Essaka Hoisa Thirty Pounds of Bone & Philip Reeder
Still Every Year They Went Kamilya Jubran & Werner Hasler
Wa Ecco2k
E Void Hands
Split Shapes & Divisive Models
|
cc/2020-05/en_middle_0032.json.gz/line8369
|
__label__wiki
| 0.937576
| 0.937576
|
Why Man Utd need an unwearied box-to-box midfielder?
Sudarshan Venkatesan
Manchester United need a tireless box-to-box midfielder to impose solidity. At Manchester United, we can list down ‘n’ number of defensive midfielders over the last decade, starting from Darren Fletcher and Michael Carrick to Nemanja Matic. The Serb was a…
Solskjaer: Mike Phelan and Michael Carrick to take over new roles at Man Utd from next season
Mike Phelan and Michael Carrick are likely to take over new roles from next season. Manchester United, who sacked Jose Mourinho following the away loss to Liverpool in December called back their hero Ole Gunnar Solskjaer to take over the…
Michael Carrick on Fabregas: Midfielder reveals how he nearly signed for Arsenal
Rishabh Gupta
Michael Carrick on Fabregas: The former Manchester United midfielder has revealed that he almost joined Arsenal. Michael Carrick retired from football at the end of the 2017/18 season. The English midfielder won five Premier League titles, a Champions League title…
Michael Carrick on Barcelona: Carrick shares his pain after CL final loss
Michael Carrick on Barcelona: The former Manchester United midfielder shared about his sufferings after the defeat to Barca in 2009 Champions League final. Michael Carrick retired after the end of 2017/18 season as one of the most decorated midfielders for…
Manchester United release 8 players
Utkarsh Bhatla
Manchester United have announced that they have released 8 players from the squad for the 2018-19 season. The Red Devils have also provided contracts to 7 stars. Michael Carrick is the biggest name in the ‘released stars’ list as the…
Swansea City vs Manchester United: What we learned
Sitam Chaki
Manchester United returned to winning ways with a commanding performance against Swansea City. Here is what we learned from Swansea City vs Manchester United. 1) Goals Galore After scoring only one Premier League goal in the entire month of October,…
What we learned from Manchester United’s win over Zorya
Manchester United were far from their best at home against Zorya. Nevertheless, Mourinho’s boys huffed and puffed to victory in the backdrop of a fairly pedestrian performance. Here is what we learned from Manchester United’s win over Zorya. 1) Fellaini…
5 key decisions for Mourinho to make ahead of Manchester United vs Watford
It has been a tough week for Jose Mourinho’s Manchester United. After surrendering the local bragging rights to Pep Guardiola’s Manchester City, there was further disappointment in store for United. A heavily altered team lost their opening Europa League match…
Michael Carrick: The Eternal Bridesmaid
During the period 2007-09, Manchester United played breath taking football. They battered their opposition from pillar to post and dominated most matches. Behind the glitz of Rooney, Ronaldo and Tevez stood an unassuming figure. Without this person, all of United’s…
|
cc/2020-05/en_middle_0032.json.gz/line8378
|
__label__cc
| 0.591846
| 0.408154
|
Interview: Parisian Designer Frédéric Robert's Debut Shoe Collection "ME.LAND"
A vibrant brand of Italian-made shoes for men is emerging this year as one-to-watch. ME.LAND is the brainchild of Frédéric Robert, a veteran Parisian designer who toiled away at some of the most renowned companies in the world including Dior, Hermès, Kenzo and Lanvin, where he launched their first sneaker. He was most recently the director of travel and leather goods at Hermès, where he further honed his craft and design skills before he decided to embark on this latest chapter in his impressive career. As he’ll explain, he realized there was a sweet spot in men’s shoes that lacked significant penetration, that middle ground between sneaker-mania and traditional formalwear. Fresh from showing his debut collection during men’s fashion week in Paris, Frédéric spoke with TWELV to discuss why he set out on his own, his background working for fashion’s biggest brands, and some of the important lessons he’s learned along the way.
Where did you get the idea for the name of your label?
I named it ME.LAND to express opportunity and myself. The first part is “ME,” alluding to every single client who is different from one another, followed by “LAND,” referring to shoes, the earth and keeping my feet on the ground.
What prompted you to set out on your own and embark on your own footwear brand?
I was working on the commercial side at Kenzo but I really wanted to go to the creative side, which I ended up doing at Lanvin and Hermès. Having worked on both, I wanted to focus solely on the creative aspect, because for me, it’s the most exciting part. That said, I couldn’t draw exactly what I wanted at a fashion house where I had to answer to artistic directors. I wanted to do my own job. So, I used all the accounts I had in the bank and created my own collection. I chose to focus on shoes because the first item I could draw was a shoe. I called my shoe friends in Italy to help with production, whom I formed relationships with during my time working at the other brands.
What did you learn from working at companies like Dior, Hermès, and Lanvin?
I learned that large companies are looking for big quantities when you sell, as well as diversity. I also learned that you need to adapt your wishes to your needs and what you want to express to what the markets want to receive. Starting your own business allows you to decide and do things more quickly, and your plan can be drawn and readdressed every week if needed. It’s much more agile and flexible.
What’s the most impactful piece of advice you’ve ever received?
I learned from Pascale Mussard at Hermès that if you need to make a revolution, make it now. I took that personally and it’s what I believe every day. Beatrice Gouyet, also from Hermès, taught me to stay to who you are and always be yourself, which is why I’m proposing my own vision of shoes.
How would you describe ME.LAND on an aesthetic level?
In the market I see two main trends, sports and formal. And I think there’s a third casual chic offer that can be on the market. I love well-made items but always with a twist, and I think the brand reflects this. Styles are simple but rich and twisted and colorful, resulting in a cocktail for chic elegance and timeless spirit. It stems from the spirit of Montmartre, inside and out. I’ve always been fascinated by men who express their own identity in a look, particularly the Teddy Boys and their anti-establishment outlook. I always say I design for good men with rebel hearts.
How was your recent debut in Paris?
It was pretty quiet but still very good. We had many stores visiting, a few really good buyers expressed their interest, and I’m waiting to see how it plays out. Buyers from places like New York City, Paris, Tokyo, Beijing, Dubai and London all saw the collection.
What are your main sources of design influence and inspiration?
I love crazy energy whether it’s fashion or photography. I also love French music. It just has a magnetic, good feeling and Motown spirit.
Tell me about the debut campaign and the story behind these images.
In my mind, it started with one image: just a man standing on a chair over the crowd expressing himself. With so many brands in the market, I feel like you need to shout to exist. We offered up a strong, quirky, colorful, dynamic campaign that captures the tension of the body and energy of the muscles. I love the contrast expressed between formal shoes and colorful sport socks. I had French photographer Gilles Crampes shoot the campaign, and he captured the colors and tension and background contrasts very well.
What ambitions do you have for ME.LAND this year?
I have great ambitions but, as I’m just starting out, I have to be realistic. I would love to have around 10-15 good accounts globally, to be represented in big cities, and have a successful e-commerce business. The site will launch end of April or beginning of May, where I’ll start with a small series of shoes that will hopefully expand to the US after Europe. None of this would be possible without my manufacturers in Italy and the Paris showrooms to present my collections, and my photographers as well. I have a small but amazing group of people around to help me achieve my dream.
INTERVIEW BY MARIO ABAD
EDITED BY HOLLIS DE LANEY
PHOTO CREDIT: ME.LAND, Photographed by Gilles Crampes. Portraits of Frédéric Robert by KFStudio157.
NEW TYPE #35: NTTE HATS
From a small city near Milan to Downtown New York, Paolo, Designer and creater of NTTE Hatsdiscovered his passion for hats and anything vintage at a young age.
November 19, 2019 6:29 PM | People
NEW TYPE #34 : BEAU WATSON
1. As a new designer, how do you hope to distinguish yourself among other designers?
NIAN FISH INTERVIEW
Nian Fish, creative director of KCD, has been, for decades, a pivotal figure in the fashion world, assembling and producing fashion shows that have become cultural benchmarks unto themselves, such...
September 17, 2019 6:45 PM | People
CESAR LOVE ALEXANDRE INTERVIEW
Cesar Love Alexadre is a duo of visual artists formed by Isabelle Chaput and Nelson Tiberghien.They met at the Gobelins school of Photography in Paris and now based in New York where they work on...
TOM PECHEUX INTERVIEW
TWELV got a special interview from Tom Pecheux. Read as we host interviews and explore the lives of artists who shape the final product - directors, fashion designers, stylists, ...
August 20, 2019 3:17 PM | People
ANTHONY VACCARELLO INTERVIEW
Anthony Vaccarello was considered as one of the brightest new talent in fashion: he was part of this new generation of talents the whole industry has kept an eye on to see them grow, to see them...
July 24, 2019 12:03 AM | People
Why is Everyone in Hollywood Buzzing About Actress Malgosia Garnys?
Have you ever felt like you were beautiful and powerful and the universe was conspiring in your best interest, and your opportunities were endless because you’ve lost people you loved...
March 02, 2019 10:00 PM | People
INTERVIEW: Bigwig Broadway Producer, Jordan Roth and Acclaimed Choreographer, Michelle Dorrance
January 17, 2019 5:00 PM | People
R.I.P Chek Wu
We at TWELV are deeply saddened to announce the passing of talented photographer, boundless free-spirit, and our friend, Chek Wu.
November 28, 2018 12:00 PM | People
GatherNYC: Everything We Love About Church With No Weird Stuff
GatherNYC is Everything We Love About Sunday Service With None of the Weird Stuff
NEW TYPE #33: Catherine Casias Inteview
If fashion is an expression of experiences, Catherine Casias has a lot of area to cover. She has excelled as an Olympic volleyball player, a philosophy major, and a fine artist....
October 12, 2018 4:00 PM | People
Party Czar Carmen D’Alessio, Empress of the Sun and the Queen of the Night
You may not know Carmen D’Alessio by name.
October 08, 2018 10:00 PM | People
IKEMEN #39: JORDAN HENRIQUEZ
IKEMEN (ē´k´mɛn): Japanese Slang
"REALLY, REALLY, RIDICULOUSLY GOOD LOOKING PEOPLE"
IKEMEN #38: WARREN KAY
NEW TYPE #32: ALEXANDER ROYS INTERVIEW
"Introducing an innovative Men’s designer to inspire you with the visions of future and the rise of technology."
June 26, 2018 4:00 PM | People
Branding in the Worlds of Art and Commerce According to Silvia Mella
Branding is everything. For an entrepreneur, it is the difference between viability and bankruptcy. On social media, we are all our own brands.
May 21, 2018 4:00 PM | People
Interview: Jackie Yang, Creative Director of Chelsea and Walker
TWELV sat down with Jackie Yang, Creative Director of Chelsea and Walker, in the brand’s New York City...
New Type #31: Angela Mitchell – Krystal and Marilyn Lavoie Interview
We are living in the age of fast fashion, and even Europe’s most storied luxury brands have been moving their factories to Asia to reduce costs.
Ikemen #37: Dominik Halas
May 03, 2018 12:00 PM | People
New Type #30: Carolina Sarria & Bianca Allen Interview
Both Carolina Sarria and Bianca Allen knew they wanted to become fashion designers from a young age.
April 16, 2018 5:00 PM | People
Interview & Backstage: Christian Siriano Celebrates 10 Years in Fashion
After the successful launch of his book Dresses to Dream About, a decade-anniversary celebration on the runway, and a whirlwind of striking celebrity looks on the red carpet of...
March 09, 2018 11:00 AM | People
New Type #29: Jackie Astier Interview
Astier places its identity within the advanced adaptation skills of the modern New York woman.
February 24, 2018 11:00 AM | People
INTERVIEW: Meet Kiko Arai, Miss Japan-turned Face of Balmain and Zara
Kiko Arai hails from Osaka, Japan, and after winning the title of Miss Japan 2012, the now 27-year old is captivating a new audience– the fashion world.
A vibrant brand of Italian-made shoes for men is emerging this year as one-to-watch.
January 26, 2018 10:00 AM | People
New Type #28: the Design Duo Behind Maxime Hernandez Interview
The streetwear phenomenon in the fashion establishment is not slowing down anytime soon.
MICHEL NAFZIGER INTERVIEW
With a wealth of experience shooting some for some of fashion's most renowned clients (Yves Saint Laurent, Guy Laroche), ...
December 29, 2017 2:00 PM | People
IKEMEN #36: Jérôme LaMaar
Alcone 65th Anniversary @Capitale: Interview with CEO Maria Stewart
No make-up company has a more storied history firmly ensconced in New York showbiz.
Ikemen #35: Zaher Saleh
Interview: Neurosurgeon-turned-Artist Keith Kattner on the Surgery of Classical Painting
Dr. Keith Kattner does not have the typical background one would expect of a successful neurosurgeon.
New Type #27: Nika Tang Interview
San Fransisco-based designer Nika Tang has emerged as boldly committed to her ideology as to her pieces. Her namesake brand centers...
October 06, 2017 11:00 AM | People
TWELV ARCHIVE JOE McKenna INTERVIEW "Call Me Joe"
CALL ME JOE
Interview: Becky Donnelly's Fashion Creatures
Quirky girl from Dublin with a penchant for drawing fantasy creatures relocates to London after art school.
New Type #26: Herman – Raif Adelberg Interview
Authenticity.
September 29, 2017 11:00 AM | People
Kaimin Interview & S/S18 "Slut from the Future" Presentation @ the Top of the Standard
Pulsing with a heavy beat and hazy with a deep rouge glow, the Top of the Standard is as glamorous a place to be as ever. And tonight it is packed with partygoers.
Yasmina Alaoui Interview & Opera Gallery Exhibition
Yasmina Alaoui burst onto the international arts scene in 2003 with "Tales of Beauty," a collection of nude...
|
cc/2020-05/en_middle_0032.json.gz/line8380
|
__label__cc
| 0.613968
| 0.386032
|
TRUST THE WIZARDS
genre-defying, epoch-crossing musical podcast and blog
Full length podcasts
Mini podcasts
Kicker’s Monthly Mix
Official Rock Song for Every County
Campaign Launch
Popcorn Double Features
Who are the Wizards?
Live Review: The Mantawrays & The Delmars at The Go Go Cage, Cabin Club, Liverpool
Behind a non-descript doorway in Wood Street, Liverpool lies the city’s oldest club and what a treasure it is. Stubbornly ignoring the fashion for slick refurbishments that make all clubs and bars look like replicas of each other, the club known to locals as The ‘Bin has more character and feeling than most of its identikit rivals put together. If the upstairs booths’ formica tables could talk, what stories they could tell.
It’s not slick and it’s not what most people would call glamorous but it is EXACTLY the kind of place that us Wizards feel right at home. It reminded me very much of a place I spent many Saturday nights in my teenage years, indie / goth / punk / mod club Sister Ray’s in Brighton. To quote Spinal Tap, don’t look for it, it’s not there anymore.
The oldest club in Liverpool
Both venues have (or had) lots of little alcoves, nooks and crannies for surreptitious snogging or speed taking. Both had sticky carpets and some of the punters’ outfits at the gig last night were exactly what the better dressed people wore back in the 80s.
I was there with my fellow Wizard, Kicker of Elves, our gun-toting associate Texas Paul and our 3 Chinese student mates Devon, Jason and Peter (possibly not their real names!)
Gānbēi!
We’d gone along to a club night called The Go Go Cage to see their “September Surf Spectacular.”
First up were The Delmars from Blackpool, which according to Carl the MC is the surfing capital of the north west. The flyer called them “twanging reverb drenched surf instro maestros” and who am I to disagree with that.
According to their website, these guys live all over Europe and don’t play that many gigs. Very surprising to read that because they played a really tight set. Don’t know exactly what they played but I’m going to guess there was probably at least 1 song each by Dick Dale and The Ventures in there somewhere. They definitely played a song called Red Monkey which they said was by The Milkshakes. Kicker tells me that’s one of the “Medway Sound” bands led by the prolific garage genius and tash enthusiast Billy Childish. I reckon anyone who dared to go surfing on the Thames anywhere round the Medway area would probably end up a Dead Monkey.
They had 2 excellent guitarists, one of whom was wearing a beret, a brave fashion choice no matter what decade you’re in, but he was cool enough to get away with it.
Apart from the beret, accessorywise things were very much monopolised by the bass player. His stagewear included a Mardi Gras style mask, a parrot on his shoulder (not a live one) and all the way up top (he was very tall) some feathers. He also had a beard that puts 99% of all other beards to shame. It’s a pity you can’t really see any of that in this really shit photo I took of the top of some peoples heads and the drummer.
The Delmars live at The Go Go Cage, Cabin Club, Liverpool. 7th September 2013.
All the band, and in fact most of the crowd, were wearing stylish Hawaiian style shirts. As I stood there listening to this great music with its roots in California half a century ago, in a dingy basement club with an enormous rocking horse in the middle of it, surrounded by people wearing Hawaiian shirts and lei necklaces, a pretty basic but still quite psychedelic light show and with 3 Chinese lads next to me dancing around like crazy, it was sometimes difficult to remember exactly where I was! Like the panicking astronaut from The Fast Show who appears in different scenes saying “What year is this? Who’s the president?” every now and then I found myself saying “Chorizo, you’re in Liverpool and it’s 2013!”
So as mentioned above, the Chinese contingent were loving this. Peter was holding a bottle of beer in each hand and showing off some fancy footwork. In one of the more laidback twangy numbers, Texas Paul was seen to be doing the Shadows walk. And great googly moogly, I even saw Kicker of Elves dancing (if you can call it that!)
I suppose that made up for his lack of effort in the Hawaiian shirt department. The flyer for this gig said there was a prize for the best shirt but the best Kicker could manage was a plain navy blue one with some writing on the back. In fairness, there probably are people who wear shirts like that in Hawaii, the ones who work in petrol stations. As for me, I was wearing a shirt that I bought on my honeymoon in Las Vegas 8 years ago and have only worn about 3 times since because there aren’t many occasions when you can get away with a shirt like that. It’s a lively red number with the pool playing dogs from Arthur Sarnoff‘s classic painting “The Hustler” on it. I don’t know much about art but I know what I like.
The Hustler by Arthur Sarnoff
I’ve been trying to find out more about The Delmars so I could put some Youtube / TwitFace links and stuff in here but confusingly it seems that there is a Californian surf band with the same name (albeit with a space between Del and Mars). They were selling a 7″ single at the gig last night but I can’t find a link for it being sold online anywhere. Did find this webpage though, some great stuff to listen to there.
Anyway, on to the second band The Mantawrays, billed on the flyer as “tough pounding surf and frat party stompers”.
Now I have to declare an interest here because one of the bandmembers is my mate. The only time I’ve seen the band before was 10 years ago at my mate Paul’s 30th birthday party in Leytonstone in that there London. The band played a full set of completely instrumental stuff and it knocked my rocking socks off. At the end of the gig, the birthday boy himself came on and sung a couple of Elvis numbers with them, including a particular favourite of mine “Guitar Man.” I also remember that they had a pedal steel onstage which nobody played or even touched.
That party was one of the last social events I went to before I left London to move to the northwest. In the decade since then, Paul has become a fully-fledged member of the band and recently he has also moved up to Liverpool.
The Mantawrays live at The Go Go Cage, Cabin Club, Liverpool. 7th September 2013.
They kicked things off with a few very lively instrumentals performed in matching red cardies and Buddy Holly specs. This band really kick ass with drummer Stuart leading from the back. He hits em hard and (forgive my lack of technical drumming vocab) plays some killer fills (I think that’s the right word).
But things really went up a notch when Paul got up and sang. They went into “California Sun” originally by The Rivieras, but better known to me because of The Ramones’ version. (as heard on our podcast number 5)
There followed a few rock’n’roll numbers played at 500 miles an hour and all the better for that. Paul really came into his own on these. I’ve known him reasonably well for many years and I’ve never actually hard him sing apart from those 2 Elvis songs at his 30th and a couple of late night drunken acoustic guitar sessions singing Half Man Half Biscuit tunes. I knew he could sing but I had no idea that he could howl, yelp and holler like he did on some of these songs.
The Mantaways live at The Go Go Cage, Cabin Club, Liverpool. 7th September 2013.
One of the best ones was a foul-mouthed ditty called Hardy Sons of Bitches, which featured lyrics about knocking cocks on rocks and fucking bears. Paul told me after the gig that this is a song by The Pioneers. Surely not the same Pioneers who did reggae horse racing classic “Long Shot Kick De Bucket”? [Turns out the song is called ‘The Pioneers’ and it’s by The Phantom Surfers – TTW Ed.]
Incidentally, whenever the subject of bear fucking comes up (which, to be fair, is not that often) then I always think of this Ivor Cutler poem.
Later there were at least 2 Cramps songs which made Texas Paul’s night. Any mention of the Cramps still gives me the heebiejeebies following my experience seeing them live as a teenager (as discussed in podcast number 8) I’m still having nightmares about that Lux Interior guy. In the audience, you never quite knew if he wanted to fuck you or murder you. Probably both and not necessarily in that order!
Not content with taking poor quality photos on my phone, I also took some poor quality video which you can see here. Sound quality is appalling but it does give an idea of the atmosphere with everybody dancing and going wild (even me!)
My only negative is a minor one, the sax player was very under-used. Whenever she played it sounded great, but it would’ve been good to hear her on more of the songs.
It was a late one for us middle-aged Wizards but having said that, we stayed till the end which is more than can be said for our Chinese friends. Youngsters today eh.
These days, it’s not often I’m out in Liverpool or any other city centre at 2:30 in the morning and coming out of the Cabin into the heart of the city was another flashback to my teenage days in Brighton. We used to emerge sweaty and red-faced from Sister Ray’s onto the battleground of West Street. Having spent a few hours with a bunch of like-minded people in the safe haven of the club, we were now back in the real world and facing what we used to call the “Kevins and Tracys” (a.k.a. neds, casuals, townies etc). Up above Sister Ray’s was a massive club called The Pink Coconut, a ridiculous name which tells you all you need to know about the club and the people that went there. At 2 a.m both clubs would close and the 2 tribes would go to war in the kebab shops and burger places. We’d laugh at their awful hair and ludicrous clothes and they’d laugh at our awful hair and ludicrous clothes. I didn’t think it was possible but judging by the clothes being worn around Liverpool last night, mainstream fashion has actually got even worse in the last 25 years. Too many pastel colours, too much fake tan and bling. And that’s just the blokes. It made me think of the Dolly Parton line “it costs a lot of money to look this cheap”.
Maybe somebody should tell them to just slap some Brylcreem on their heads and put on a lairy shirt, there’s a party going on behind a little door just round the corner. Surf’s up, motherfuckers!
Posted by chorizogarbanzo on September 8, 2013 in Blog posts, Gig reviews and tagged brighton, cabin club, dick dale, go go cage, ivor cutler, Liverpool, misirlou, paul hickman, sister rays, surf guitar, the cramps, the delmars, the mantawrays, the milkshakes, the pioneers, the ramones, the surfaris, the ventures.
About chorizogarbanzo
One of the Wizards on the legendary Trust The Wizards podcast. www.trustthewizards.com
View all posts by chorizogarbanzo »
kickerofelves1 says:
What he said. A thoroughly enjoyable gig in the friendliest venue in town. We will definitely be going back and yes, I am likely to be throwing shapes around the place. Fill ‘er up!
Podcast number 88: Festival special – Glastonbury 1989
https://ia601504.us.archive.org/7/items/glastonburypodcast3007201919.45/Glastonbury%20Podcast%20-%2030_07_2019%2C%2019.45.m4a
Podcast number 87: Festival Special – Focus Wales & Dot to Dot
https://ia801401.us.archive.org/20/items/TTW87/TTW87.mp3
Podcast number 86: Chorizo’s favourites of 2018
https://ia801503.us.archive.org/3/items/TTW86ChorizoBestOf2018/TTW%2086%20Chorizo%20Best%20of%202018.mp3
Podcast number 85: Kicker’s favourites of 2018
https://ia601503.us.archive.org/33/items/Podcast85_201901/Podcast%2085.mp3
Wizards on:
active listener alcopop Babybird billy bragg bob dylan bruce springsteen Bruce Springsteen and the E Street Band chuck prophet circus devils darren hayman David Bowie david gedge dexys dexys midnight runners edwyn collins eels elvis costello ezra furman fruits de mer gbv gig review gruff rhys guided by voices half man half biscuit jd meatyard joe strummer johnny cash joy division Lambchop Live Gig Review live music live music review live music video live review Liverpool luke haines manchester manic street preachers mark e smith Milky Wimpshake morrissey musical advent calendar music video neil young nick cave nick cave and the bad seeds parquet courts pixies popcorn double feature pulco r.e.m. robert pollard robert wyatt robyn hitchcock scott & charlene's wedding simon love sleaford mods soft hearted scientists spare snare stephen jones super furry animals the clash the fall the handsome family the lovely eggs the replacements the smiths the thyme machine the wave pictures the wedding present They Might Be Giants tindersticks tobin sprout wreckless eric xtc
Podcast 91: Best of the Decade Special
Podcast 90: Chorizo’s Best of 2019
Chorizo’s favourite things of 2019: Part 2
Chorizo’s favourite things of 2019: Part 1 The Gigs
Podcast 89: Kicker’s Best of 2019
Kicker of Elves’ Favourite Things from 2019
Trust the Wizards on Twitter
We agree! This is our favourite: soundcloud.com/bnjmnshw/jamua… twitter.com/kickerofelves1… 17 hours ago
RT @tellum666: @NewWaveAndPunk Think I’ll just run this past you https://t.co/3K2u0RWjSe 23 hours ago
RT @assai_edinburgh: Don’t forget from 2pm tomorrow we have the fantastic @thejustjoans performing in-store!! Easily the best way to spend… 1 day ago
RT @MusicalMaps: Album Covers in Google Maps Title: The Man Artist: Elvis Costello Get more details @ musicalmaps.com.au https://t.c… 1 day ago
RT @_The_Las: 👁✨ https://t.co/GOQwNofMq4 1 day ago
Follow @trustthewizards
Trust the Wizards on Facebook
Archives Select Month January 2020 (4) December 2019 (2) September 2019 (2) August 2019 (1) June 2019 (1) May 2019 (2) April 2019 (1) February 2019 (3) January 2019 (6) December 2018 (2) November 2018 (2) August 2018 (2) July 2018 (1) June 2018 (4) May 2018 (2) April 2018 (2) February 2018 (1) January 2018 (2) December 2017 (3) November 2017 (2) September 2017 (1) August 2017 (3) July 2017 (4) June 2017 (3) May 2017 (2) April 2017 (5) March 2017 (1) February 2017 (2) January 2017 (2) December 2016 (6) November 2016 (2) October 2016 (4) September 2016 (2) August 2016 (1) July 2016 (1) June 2016 (12) May 2016 (4) April 2016 (7) March 2016 (3) February 2016 (5) January 2016 (7) December 2015 (8) November 2015 (5) October 2015 (10) September 2015 (7) August 2015 (11) July 2015 (12) June 2015 (12) May 2015 (16) April 2015 (9) March 2015 (11) February 2015 (9) January 2015 (10) December 2014 (16) November 2014 (12) October 2014 (10) September 2014 (11) August 2014 (14) July 2014 (8) June 2014 (11) May 2014 (7) April 2014 (13) March 2014 (12) February 2014 (9) January 2014 (9) December 2013 (39) November 2013 (14) October 2013 (12) September 2013 (12) August 2013 (10) July 2013 (13) June 2013 (17) May 2013 (15) April 2013 (13) March 2013 (14) February 2013 (9) January 2013 (3) December 2012 (5) November 2012 (1)
|
cc/2020-05/en_middle_0032.json.gz/line8385
|
__label__cc
| 0.637789
| 0.362211
|
COMMON INJURIES SUFFERED IN ACCIDENTS
Burn & Electrocution Injuries
Common Injuries Caused by Accidents
COPYRIGHT 2020 TRYK LAW FIRM, TRYK LAW, PC, FRESNO ACCIDENT INJURY LAWYERS, BPT INDUSTRIES, INC. .
BIG RIG TRUCK ACCIDENTS
PESTICIDE INJURIES
CIVIL RIGHTS/HATE CRIMES
Ben Tryk
America Gallardo
Joe Lopez
Rusty Garvin
FRESNO INJURY CENTER
INJURY CLAIMS PROCESS
LEGAL TERMS DEFINED
FRESNO INJURY BLOG
Chicago Police Officer Found Guilty of Second Degree Murder
Posted by tryklaw
in Civil Rights, Current Events, General Post, Pro Bono Work
VERDICTS IN THE NEWS – FRESNO INJURY LAW BLOG
Located less the two miles from Midway Airport, the Chicago Lawn neighborhood represents one of 77 community areas geographically defined within the boundaries of the third largest city in the United States. The rapidly changing neighborhood sits between two bustling thoroughfares, interstates 55 and 90. Locals refer to Chicago Lawn as “Marquette Park” in honor of the municipal park that is the cultural and natural main attraction of the community.
Racial demographic changes have dramatically altered the economic base of Chicago Lawn. During the 1960s, Martin Luther King, Jr. led a massive demonstration to promote open housing for every citizen living in the embattled community. King’s march paved the way for decades of racial unrest that boiled under the surface of a neighborhood that also faced a violent reaction to the integration of Gage Park High School. Fear of diminished housing values and the disconnection of ethnic bonds enjoyed by the Lithuanian community sowed the seeds of racial discord that boiled over on October 20, 2014.
Chicago Police Officer Found Guilty – “The Incident”
With trees turning bare and signs of frost clinging to fading grass blades, October 20, 2014 started the same way it usually does on the southwest side of Chicago. At 9:00 pm, Chicago police officer Jason Van Dyke clocked in for the graveyard shift at the Chicago Lawn District headquarters. As he and his partner departed Chicago Midway Airport shortly after 9:30 pm, Van Dyke responded to a 911 call that reported a suspect was breaking into pickup trucks parked at 41st Street and Kildare Avenue.
Officer Van Dyke and 17-year Laquan McDonald did know each other, but their lives violently intersected at the corner of 40th Street and Pulaski Road, when officer Van Dyke unholstered his police issued revolver and shot McDonald 16 times. A little more than one year passed before Van Dyke became the first Chicago police officer to be indicted on a murder charge for an on-duty shooting.
An emotionally charge trial from day one, the Van Dyke proceedings captured the attention of Americans, as well as racial equality advocates worldwide. Defense counsel presented evidence that Van Dyke defended himself from a knife-wielding McDonald, with the knife introduced into evidence early in the trial. The prosecution countered with the claim that the 16 shots fired by Van Dyke were excessive and unnecessary.
Supreme Court Drama
in Current Events, General Post, Law on Damages
SUPREME COURT DRAMA: A RECAP OF THE BRETT KAVANAUGH SUPREME COURT NOMINATION HEARING
On July 9, 2018, President Donald Trump nominated Judge Brett Kavanaugh to fill a vacant seat on the United States Supreme Court. Nearly three months to the date of his nomination, the United States senate confirmed Kavanaugh’s nomination by the slimmest of margins, 50-48.
After several weeks of questions concerning his legal philosophy and a meticulous review of his judicial record, the senate appeared to be ready to vote on the nomination of Kavanaugh.
That is, until Christine Blasey Ford stepped forward with accusations that made the allegations against Clarence Thomas in 1991 seem pale by comparison.
We had no idea when we wrote a short blog article on Supreme Court Fast Facts on July 16, 2018 that the road ahead would be so bumpy for Justice Kavanaugh. It has been a heck of a ride for him and those who followed. Below is a recap of his nomination, the hearings to follow, the accusations, the aftermath and what the future holds.
THE ALLEGATIONS AGAINST KAVANAUGH
The senate swore in Christine Blasey Ford on Thursday September 27. In testimony that left the jam packed room eerily silent for most of the morning, Ford told the Senate Judiciary Committee that she was “100 percent” sure Brett Kavanaugh assaulted her when they both attended the same high school. The tone of her testimony varied between calm measure and unbridled emotion. Her voice noticeably cracked when she went into details of the assault, which Ford claimed occurred at a suburban Washington D.C. home. Ford stated under oath that Kavanaugh pushed her into a bedroom and attempted to remove her clothing. Democratic Senator Patrick Leahy asked Ford to describe the strongest lingering memory of the incident. “Indelible in the hippocampus is the laughter,” Ford replied. “The uproarious laughter between the two, and their having fun at my expense.”
Kavanaugh provided his sworn testimony immediately following the bombshell testimony shared by Christine Blasey Ford. Under obvious duress, Kavanaugh lashed out at the Democratic members of the Senate Judiciary Committee. He emphatically stated the hearings were a disgrace to the country and at times, his voice rose in inflection to make his points. At the end of his sworn testimony, Kavanaugh was asked by a committee member if Ford’s allegations were true.
We are a Fresno Law Firm with several years of collective experience representing injured people and fighting large insurance companies or corporations responsible. If you have been injured in an accident and suffer from serious injuries, call us today to get an appointment today (559) 840-3240.
Please tell us what happened? *
Send for Free Consultation
OR TOLL FREE
(844) FRESNO1
We are located in Northeast Fresno and available to discuss your case over the telephone, in person, at your home, in the hospital or any other locale that you prefer. Attorney Tryk is available around the clock to discuss your case with you in full confidence. Call us today or drop in for a consultation without an appointment during regular business hours, Monday – Friday, 9:00 a.m. to 5:30 p.m.
COPYRIGHT 2020 TRYK LAW, P.C., TRYK LAW FIRM, FRESNO ACCIDENT INJURY ATTORNEYS ALL CONTENT RIGHTS RESERVED
|
cc/2020-05/en_middle_0032.json.gz/line8386
|
__label__wiki
| 0.538228
| 0.538228
|
UK ranks as one of the worst countries to live in the world
Lianna Brinded
Head of Yahoo Finance UK
Yahoo Finance UK 5 September 2019
Houses of Parliament in London, UK. Photo: Getty
Britain is one of the worst countries in the world to live as an expat.
That’s according to the major benchmark Expat Insider 2019 report which surveyed 20,259 expats, representing 182 nationalities and living in 187 countries or territories.
An expat is defined as an employee sent abroad on a corporate assignment or classed as a new international hire. The survey ran from 7 to 28 March. Respondents were asked to score 48 different factors — which fall into 17 subcategories — related to living abroad. Those 17 subcategories are then put into five pillars —Quality of Life, Ease of Settling In, Working Abroad, Family Life, and Personal Finance.
For a place to be ranked, there needs to be a sample size of at least 75 survey participants per destination. The only exception to this rule is the Family Life Index, where a sample size of at least 40 respondents raising children abroad is necessary.
For the 2019, 64 destinations, respectively, met these requirements, although many countries or territories the sample size exceeded by 75 or even 100 participants.
The UK scored low across the board with Brexit dragging the country down in several categories.
Chart: InterNations
Britain came in at 62nd place, out of 64 countries for personal happiness. The UK also scored low for quality of life, thanks to the current political climate — 42% of expats rated political stability negatively versus the global average of 17% of people being dissatisfied. This has hit opinion on the economy and job security.
One German expat said: “Brexit makes our future uncertain.”
The weather also had an effect on scores — 49% of people rated the climate negatively. A Lithuanian expat even adds that “the weather affects my general health and wellbeing.”
Expats moving to the UK also find it hard to settle in when comparing it to the global average.
Some 52% feel at home in the local culture versus 60% globally while 16% don’t think they will ever feel at home in the UK versus the global average of 13%. An American expat adds that “the locals are reserved and won’t go out of their way to be overly social. They may let you into their fold, but never in their inner circle.”
Britain is also an expensive place to live — the UK ranks 60th out of 64 countries in the Personal Finance Index. Only 10% of respondents are completely satisfied with their financial situation and only two in five say their disposable income is more than what they need to cover expenses. Childcare is also considered hard to afford, say 69% of expats.
Movin' on up: five dazzling dancers to watch
Sterling falls after Javid comments stoke hard Brexit fears
Wetherspoons to mark Brexit by slashing prices of beer, vodka and whisky
Johnson Stays Away From Davos to Push Populist U.K. Agenda
Global Chondroitin Sulfate Market - Forecast and Analysis 2020-2024 - ResearchAndMarkets.com
Shopping centre owner Intu's shares fall as it aims to raise up to £1bn
Dancing On Ice Fans Have A Lot Of Questions After Caprice 'Parts Ways' With Skating Partner
|
cc/2020-05/en_middle_0032.json.gz/line8389
|
__label__cc
| 0.674542
| 0.325458
|
ULSTER PR STUDENT BLOG
The Future of Public Relations in Northern Ireland
Back Like A Boomerang: 88 Days A Slave!
261 years into a 9,000-year lease
No Direction
PR Through The Lens Of TV & Film
A Quickie in Barcelona
Advertising America Author - Alex Slaine Author - Catherine Maguire Author - Charlotte Goss Author - Chloe Peoples Author - Lauren Sharkey Author - Niamh Murray Author - Shannon Quinn Beauty/Fashion Belfast Blogging Brands Case Study Celebrity Charity Christmas CIPR Coca-Cola Communication Corporate Social Responsibility Cosmetics Creativity Crisis Management Digital PR Donald Trump Environment Event Management Fake News Feminism Food/Nutrition Guinness Halloween Humour Influencers Instagram Ireland John Lewis Journalism Kardashians lifestyle Marketing Media Relations Mental Health Music Netflix Networking New York City Northern Ireland Persuasion Photography Political PR Politics PR PR Campaigns PR Careers PR Events PR Theory Publicity Publicity stunt Reputation Management Royal Family snapchat Social Media Sponsorship Sport Student Life Studying PR Stunts Thailand Travel Twitter University Life Work Placement YouTube
Tag: Burger King
Who’s winning Burger Wars – From Genius Marketing to PR Fails
So today I continue my account of ‘Burger Wars’, what is Burger Wars you might ask? Burger Wars is the competition between McDonalds and Burger King. Two giants of the burger world, battling it out for the top spot. How do they do this? Well through their PR and Marketing Campaigns of course. Often making subtle references to their competitor or not so subtle in Burger King’s case.
I wrote a post on my personal blog around a month ago, called ‘A Day Without a Whopper’ which you can find here. This detailed Burger King’s decision to stop selling their famous ‘Whopper’ burger for the day in aid of their competitor McDonald’s charity campaign. They told all their customers to go to McDonalds and instead buy a Big Mac as profits would go to charity. This came a few years after Burger King had tried to collaborate with McDonalds on the McWhopper, again for charity, but had been rejected by their competitor. Burger King just being charitable? I don’t think so, these were very clever and well thought through marketing campaigns designed to make Burger King look like the bigger person in this clash of titans.
So what’s happened since?
Well I have personally been seeing a lot on Twitter and LinkedIn about various PR and Marketing Campaigns from the giants – both good and bad. So I thought it was only fair that I summarise my findings in a blog post on the latest in this saga.
Genius Marketing
McDonalds – It’s Not the Same Without the ‘M’
This campaign in particular I have seen widely shared across LinkedIn over the past week and it’s one that stuck with me proving how successful it was. McDonalds decided to stamp their branding in some of the busiest places in the world – Airports. Removing their signature letter ‘M’ for the titles of many well-known countries and simply using the slogan ‘It’s Not the Same Without the M’. One thing I loved about this campaign was this simplicity, it’s eye catching and straight to the point, you automatically known what brand it’s for and it makes you think of McDonalds. I know after a long flight, often the first thing I want is a quick and easy meal, so I think the positioning here is great.
Burger King – The Meltdown
Burger King decided to get on board with sustainability and vowed to stop producing plastic toys in its kid’s meals, as part of an aim to save 320 tonnes of single use plastic. The fast food restaurant now also offers a service where you can bring in your old plastic toys to be melted down and the opening week of this promotion you would receive a free kid’s meal in return for doing so. In typical Burger King style, they didn’t miss the opportunity to take a jibe at McDonald’s by stating their toys where ‘especially’ welcome in their promotional video. For me this is a huge win for Burger King, climate change and sustainability are such a talked about issue at the moment and this is the type of reaction we need from big brands and corporations.
PR Fails
McDonalds – ‘Bloody Sundae’
I’m sure most people have heard about this by now as it’s been highly reported on and sensitive issue, especially in Northern Ireland. But McDonald’s were the subject of a huge PR Fail, over a Halloween promotion of their Ice Cream in their Portugal stores featuring the slogan ‘Sundae Bloody Sundae’. McDonald’s has since issued a public apology stating that the campaign was not intended to reference historical events and that they sincerely apologise for any offence caused. However, this has not stopped residents of Northern Ireland and further afield being highly and rightly upset by the campaign.
Burger King – Milkshake Tweet
Burger King came under fire with the ASA recently about a tongue and cheek tweet stating ‘Dear people of Scotland, We’re selling milkshakes all weekend. Have fun.” The tweet came as a response to McDonald’s stopping selling milkshakes at the request of the police, due to politicians such as Nigel Farage being ‘milkshaked’ (having a milkshake thrown over them in the street). The ASA stated that they considered that the ad encourages ‘anti-social behaviour’ and banned the tweet.
So who’s winning here?
In my eyes Burger King have the lead here, I love how reactive their PR and Marketing is and their constant focus on current issues. I think their constant ‘trolling’ and responding to McDonald’s is pretty humorous and clever and gives them the upper hand here.
Hannah Chambers is a final year BSc in Communication Management and Public Relations student at Ulster University. You can find her on – Twitter: @HannahC_PR and LinkedIn: Hannah Chambers
By Hannah Chambers November 13, 2019 811 Words
Burger King Tackles Bullying
When someone says the name Burger King what do you think of?
Fast food, unhealthy food, convenience? But what about anti bullying?
It is not a connection that I would have originally made myself however, as part of anti-bullying month Burger King did a PR stunt in an undisclosed restaurant in LA where hidden cameras where used and Burger King employees served beaten up Whopper Jr. hamburgers whilst at the same time paid teenage actors are physically bulling another teenage boy.
What is the spot about?
The spot is called “Bullying Jr.,” and was created in honour of National Bullying Prevention Month which took place during the month of October in the US to raise awareness that 30 % of students are bullied each year.
The stunt was to highlight the sad truth of bullying that in many cases bystanders will not get involved and in this instance it turned out to be true, with only 12% of customers reporting the bullying of the child whilst a staggering 95% of customers reported the ‘bullied’ Whopper Jr. Burger.
The campaign has been viewed more than a million times on YouTube and been retweeted hundreds of thousands of times.
Burger King partnered with US anti-bullying organisation No Bully and the CEO and Founder Nicolas Carlisle had this to say about the ad: “We know that bullying takes on many forms, physical, verbal, relational and online. But the first step to putting an end to bullying is to take a stand against it…our partnership with the Burger King brand is an example of how brands can bring positive awareness to important issues. You have to start somewhere and they chose to start within.”
Link to the video on YouTube:
Why I think it worked:
Although the ad received some criticism due the obvious product placement and the fact it only confronts one element of bullying, physical bullying, I think that the ad worked very well for a number of reasons:
It was a real life situation that any of us could find ourselves or have found ourselves in so the relatability factor had you questioning what you would do in that situation and by the end of the ad it may have you questioning what you might do in the future if you are ever in a similar situation. The fact the situation is real life reactions emphasises the figures presented at the end of the experiment.
Support Of A Recognised Charity
As the campaign is supported by an anti-bullying organisation, No Bully, this helps ensure that the message gets across without it seeming like another ploy to promote a fast food chain. It further adds authenticity to the facts and figures provided during the ad increasing the strength of the message. By partnering with an anti-bullying organisation this highlights the good that globally recognised brands can do to shine a light on important issues.
The ad is very emotive as it shows a child getting bullied in the video and that can be hard to watch. Combined by the fact very little people stand in to helps further heights how distressing bullying can be if you are in need of help but people chose to ignore your plea.
The comparison of people’s reactions to the bullying and their ‘bullied’ burger increases the emotion as it is hard to comprehend that people would be more concerned with food being bullied than a child.
The ability to involve people’s emotions and possibly draw on their own experiences is very powerful as it adds an extra dimension to the ad and helps ensure that it is memorable, thought provoking and engaging.
Burger King says it wants its position to be clear.
“The Burger King brand is known for putting the crown on everyone’s head and allowing people to have it their way. Bullying is the exact opposite of that,” the company said.
At the end of the ad when they speak to the people who intervened when the child was being bullied it was interesting to see their reasoning behind helping – many of them had been bullied as children and wished that someone would have stepped in to help them. Does this then raise the concern that ignorance is bliss? Are we living in a society that if you have not been directly affected by bullying that it is easier for you to choose to ignore it even if it is happening right in front of you? In my opinion the ad does make you consider your own actions and how you might act in the future.
In order for any campaign to be successful the message needs to be clear, memorable and with a call to action and I think that Burger King managed to do all three within this ad.
Caoimhe Fitzpatrick is a final year BSc in Communication, Advertising and Marketing student at Ulster University. She can be found on Twitter: @caoimhef_95 / LinkedIn: https://www.linkedin.com/in/caoimhe-fitzpatrick-0b8682110/
By caoimhefitzpatrick November 9, 2017 842 Words
|
cc/2020-05/en_middle_0032.json.gz/line8390
|
__label__cc
| 0.674983
| 0.325017
|
Town of Porto Ercole, Tuscany
Porto Ercole, porto ercole italy, porto ercole tuscany, tourist information porto ercole, visiting porto ercole, facts about porto ercole, information on porto ercole
Situated on the eastern coast of Monte Argentario, the small town of Porto Ercole is the second largest after Porto Santo Stefano. It is a pretty fishing town set in a bay with a shallow, natural harbour and the old town sitting on a hill above. The surrounding countryside is verdant and has an abundance of Spanish fortresses dotted over its landscape. The shoreline is rocky and indented with perfectly clear water and a great number of caves, both on the land and at sea level.
Find hotels in Porto Ercole
Looking across to the old town
Little is known about the history of Porto Ercole but, as with the rest of this area, it was occupied and greatly influenced by the Spanish in the 16th century. It was the Spanish who recognized the strategic significance of the port and subsequently built the fortresses.
As with Porto Santo Stefano, Porto Ercole has long been a popular holiday destination for Italians. The harbour and its associated seafront become the centre of the hustle and bustle in the summer and Porto Ercole certainly lives up to its reputation of being associated with pleasure and good food. The little harbour is packed with pleasure craft in the summer months which has led to the construction of a large, new purpose built marina at Cala Galera, less than a mile away. This marina is fully equipped for big boats and has bars, restaurants and shops along the edge.
The harbour - Photo: www.understandingitaly.com
The old town is very pretty and no cars are allowed up there as the streets are too narrow. It is worth making the short trip up the hill and wandering through all the little lanes and alleys. There is also a good view of the harbour from up there.
Typical street in the old town
The forts are well preserved and make an interesting day out.
Forte Stella is one of many watchtowers built by the Spanish and gets its name from the fact that it is built in the shape of star. It is quite unique and the views out to sea from here are staggering.
Forte Stella - Photo: Matteo Vinattieri
Forte Filippo was designed by the same architect and built around the same time as Forte Stella. This fort is an excellent example of Spanish military architecture.
Forte Santa Caterina is now privately owned and not as well preserved as the others.
Rocca Aldobrandesca is a large fort of a complex and irregular structure and is very well preserved.
As well as the forts the other buildings to visit in the town are the Chiesa di Sant'Erasmo (patron saint of sailors) and the Palazzo dei Governanti with its elegant and intricate facade.
In the hills, just outside Porto Ercole, is the convent of Padre Passionisti. It was founded in 1721 by Paolo Danei della Croce when he stopped at Porto Ercole and was so obsessed with the beauty and tranquility of the area that he decided to establish a hermitage there. They stayed there until 1737 when their numbers became so large they outgrew the available space founder built a convent in its place.
The Convent of Padre Passionisti
The famous Italian artist Caravaggio died in Porto Ercole on his way to receive a pardon for murder. He died of an unknown fever due to either malaria or lead poisoning and was buried in an unmarked grave.
City of Monte Argentario
Male: 6,283
Female: 6,656
Population density: 214.6 per square km
PORTO ERCOLE WEATHER
Tuscany, at your own pace.
Explore Tuscany on foot or by bike, savouring life’s simple pleasures.
Property for sale in Tuscany
Real Estate, Homes, Farmhouse, Properties, Villas, For Sale in Tuscany and Umbria
Learn Italian in Florence or Siena
The Scuola Leonardo da Vinci has schools in Florence and Siena and is officially authorized by the Italian Ministry of Education.
Flag of Tuscany
Capital: Florence
Foreste Casentinesi, Monte Falterona, and Campigna
Location of Tuscany
Provinces of Tuscany
Comunes of Tuscany
Badia Tedalda
Bucine
Capolona
Castel Focognano
Castel San Niccolò
Castelfranco di Sopra
Castiglion Fibocchi
Chitignano
Chiusi della Verna
Foiano della Chiana
Laterina
Montemignaio
Monterchi
Ortignano Raggiolo
Pian di Sco
Sestino
Barberino Val d’Elsa
Capraia e Limite
Fucecchio
Incisa in Val d’Arno
Rignano sull’Arno
Campagnatico
Castell’Azzara
Cinigiano
Magliano in Toscana
Monterotondo Marittimo
Semproniano
Campo nell’Elba
Rio nell’Elba
Casola in Lunigiana
Filattiera
Fosdinovo
Podenzana
Tresana
Zeri
Montopoli in Val d’Arno
Santa Croce sull’Arno
Chiesina Uzzanese
Monsummano Terme
Montecatini-Terme
Vernio
Casole d’Elsa
Castiglione d’Orcia
Monteroni d’Arbia
San Giovanni d’Asso
San Quirico d’Orcia
Tuscany Airports
Florence airport
Pisa airport
TuscanyWEATHER
Tuscany Climate (Florence)
Food of Tuscany
|
cc/2020-05/en_middle_0032.json.gz/line8391
|
__label__wiki
| 0.64345
| 0.64345
|
Classics and Italian (year abroad)
UCAS Code: RQH8
To include 3 subjects at HL6.
A,A,A,B
Languages, linguistics and classics
ClassicsLanguages, linguistics and classics
Classics Latin
ClassicsItalian studies
Artistic, literary and media occupations
This subject has been a mainstay of the UK university system for centuries and is still going strong! Over 1000 graduates received classics degrees in 2015 and a quarter of those went on to further study, usually a Masters, and although many stayed with Classics, or moved slightly to history or archaeology, some changed to topics like law and teaching. Half of those who did go into work found jobs in London or the South East. Common jobs included working in education, marketing and advertising, or the finance industry as advisors or even accountants. Personal contacts were particularly important for these graduates in finding their first job, so good networks may help your job search when the time comes.
This is one of the less common modern languages for students to take, but graduates from Italian courses have a lot of options available to them when they complete their degrees. About one in five graduates from 2015 got jobs overseas — often as English teachers — which is much higher than for most subjects, and higher than previous years. Nearly half of the rest went to work in London. Those who want to stay at home to work usually find jobs anywhere where good communication skills are a must — and in 2015, that included education, marketing and finance. But remember — whilst employers say they rate graduates who have more than one language, you need to have them as part of a whole package of good skills.
Classical studiesItalian studies
What's it like studying a degree in Classics
Modern Languages (Arabic and Italian) and Classical Studies (year abroad)
Italian and Classics
Classics/Italian
Classical Studies and Modern History
|
cc/2020-05/en_middle_0032.json.gz/line8393
|
__label__wiki
| 0.870038
| 0.870038
|
June 3, 2012 June 9, 2012 1 Comment African Hip HopConcrete JungleErykah BaduFemi KutiGnarls Barkely and Sean Paulkenyan hip hop musicLauryn HillLenny Kravitznew-millennium Bob MarleNiger DeltaNina SimoneNneka 2012 interviewsnneka egbunanneka featuring NASNneka magazine covers 2012nneka soul is heavynneka U.S. interview 2012nneka u.s. interviewsonlinepolitics NigeriaSoul Is Heavy nnekathe rootsTRIBES Magazineurban entertainment magazineurban magazineWarriWarri City Niger Delta
NNEKA: Soul is Heavy Interview. Watch footage of Nneka now!
Nneka Egbuna
Interview by Leslie Cunningham for TRIBES Magazine
A talented and passionate singer/songwriter and rapper, Nneka has caught the attention of TRIBES Magazine before. Appearing on the TRIBES Magazine’s Top 24 Independent Artist Tracks on Myspace in 2008, Nneka, even some four years ago was making a name for herself and contemporary Nigeria musical culture & politics in Nigeria (and around Europe) with her soulful acoustic-heavy ballads and freestyle raps on capitalism, poverty and war. Nneka remained on TRIBES Top 24 for several months that year followed by a review in our Music Tribe. Now, Nneka is back in an eagerly anticipated interview with TRIBES Magazine, to speak to the family about her musical journey from Warri to Hamburg, Africa and Europe to the U.S, and the mission she pursues through her art in this moment of global connectivity on a platform ready for voices of change and yearning for The Motherland.
Described by some as a new-millennium Bob Marley, Nneka Egbuna (meaning ‘mother is supreme’) first introduced the world to her potent brand of conscious Hip Hop in 2005. The daughter of a Nigerian father and German mother, Nneka was born and raised in Warri, a major oil city in the Niger Delta region of Nigeria that has and continues to suffer great political and social upheaval as its citizens and the world vie for access to the regions wealth of natural resources.
At age 19, Nneka swapped work in her stepmother’s restaurant in Warri for study abroad, at the University of Hamburg. In a new city, music became a means not only to finance her studies but also a means of survival as Nneka searched for her voice in a radically different cultural community. With Nigeria ever heavy on her mind, Nneka began to use music as her stage to express her love, pain and hopes for her homeland.
Nneka’s U.S. album debut, Concrete Jungle, revealed a beautiful, outspoken songbird whose message was delivered in mystical lyrics and passionate sounds with as much depth of feeling and intent as that of any other artist to hit the world stage in recent memory. With vocal talent that generates frequent comparisons to legends like Lauryn Hill, Nina Simone and Erykah Badu, Nneka’s unique blend of afrobeat, reggae, pop, and Hip Hop puts her in a class that is currently all her own. Touring stages from Atlanta to Paris, Nneka has opened for Lenny Kravitz, The Roots, Femi Kuti, Gnarls Barkely and Sean Paul among others and on Nneka’s latest album, Soul Is Heavy, released September 2011 and still making a splash around the globe, fans will once again be moved by a “raw and honest window into her beliefs on love, pain, politics and God” (nnekaworld.com).
TRIBES: How were you introduced to Hip Hop?
NNEKA: I was introduced to Hip Hop in Warri by a friend of mine who used to work in an okrika shop. These are old second hand clothes that are sent from Europe to Africa. He used to sell these clothes. Well, anyway, I used to work in a small food shop close by. So, in his lunch break time, he
used to show me some music on his old walkman. It was Hip Hop.
TRIBES: Can you tell us, how did you get started?
NNEKA: I never really thought I would become a musician. I always loved music, but it was sacred, something I hardly shared with anyone. I have never been a person who would show off with my voice. I was shy and did my thing in a shy way. It was in Germany where I finally began to gain more courage to express myself. Being far way from Nigeria caused me to do music more than ever. And, so it evolved. I wrote my thoughts and my pain down and all I saw. I met other people, including DJ FarHot from Afghanistan who is still today the main person I work with. We vibed from the beginning. He was searching for his identity within the music and I was eager to express myself. So, we became a team. I found a record company that was interested in me, YoMama Records. I played a couple of shows and invited them to see me and two months later, they offered me a record deal. YoMama was then sold to Sony. That is how I became an artist on a major record company.
READ THE FULL INTERVIEW in TRIBES Magazine’s Summer 2012 Spark Africa Issue!
Visit NNEKAWORLD.com
One thought on “NNEKA: Soul is Heavy Interview. Watch footage of Nneka now!”
Thanks for supporting Nneka & for your beautiful interview. Would like to share a remix of Nneka’s called “I’m Waiting” by Basement Freaks. The song was originally written by Bantu & Nneka.
http://soundcloud.com/bombastic-jam/bantu-feat-nneka-am-waiting
Bode , June 15, 2012 at 1:32 pm
|
cc/2020-05/en_middle_0032.json.gz/line8395
|
__label__cc
| 0.665182
| 0.334818
|
Flooring Products & Systems
Flooring Systems
Back to Flooring Products & Systems
ComfortFloor
Decodur Granite
DecoFlake
Epo-Rok
Merflex
Metallic FX
Morritex
PurCem
ComfortFloors
Epoxy Primers
ESD Coatings
Moisture/ Vapor Tolerant
Polyurethane Cement
Trowelled Mortars
Urethane UV Resistant Coatings
Flooring Requirements
Decorative Flake
Decorative Quartz
Durable Ergonomic
Electrostatic Control
Industrial & Hangar
Stone Aesthetics
Have Special Requirements?
Home/Garage Floors
Interior Finishing
Contact Us For All Your Project Needs
Wall Coating Products & Systems
Back to Wall Coating Products & Systems
Sikagard Descoglas
Sikagard Hygiene
Wall Coating Products
Sikagard 203 W
Sikagard 215
Sikafloor 422
Sika Bonding Primer
Sikagard Duroplast EE
Wall Requirements
Seamless Transitions
Wall To Ceiling
Get A Free Seamless Connections Consultation
Food & Beverage Facilities
Hospitals & Operating Rooms
Veterinary & Animal Facilities
Projects of Year 2018
Select Milk Facility
Don't See Your Building Type?
Talk To An Industry Expert
Why Sika Flooring
All About Sikafloor & Walls
Decorative Floor Options
Education & Webinars
Schedule A Lunch & Learn
Floor Magazines
Floor Guides
Wall Selection Guide
Floor Data Sheets
System Sheets
Wall Data Sheets
10 Step Guide to Selecting Food & Beverage Floors
FIND THE RIGHT FLOOR FOR YOUR ENVIRONMENT
Whether it’s a winery, packing facility, bakery or bottling operation, each food and beverage processing plant has rigorous requirements for flooring, walls and ceilings. Adding to the complexity: freezers, production lines and raw-material processing and storage areas have additional and highly individual requirements of their own. More complicated still is the realization that a multitude of surface options are available, particularly for flooring, which can make choosing the right system challenging at best. What should you think about in evaluating surfaces for your facility? The following checklist can help guide you through the decision making process.
FOOD & BEVERAGE FLOOR SELECTION CRITERIA'S
Maintenance Cost
Download your digital copy of Sika Flooring's 10 Step Guide to Selecting Food & Beverage Floors.
Food & Beverage Floor Guide
1. MATCHING UP TO INTENDED USE
Consider a slaughterhouse. It's not uncommon for heavy hooks to fall to the floor, or for heavy equipment to get knocked over. Clearly, this is not the place for a flooring system with low impact resistance. Similarly, floors with low chemical resistance not only wear down faster, but can also create "traps" where bacteria and viruses can hide. In storage areas - freezers and harborage, for example - flooring must possess adequate mechanical resistance and substrate adhesion to handle the constant wear and abrasion from frequent forklift journeys and other traffic.
Further stresses can be caused by temperature shock, either accidental - such as hot grease falling to the floor during potato chip production - or intentional, such as washdowns. Washdowns use liquids that can often reach the temperature of steam. Here the flooring system in place must be able to withstand frequent, rapid and often extremely wide temperature swings.
The take away: when evaluating floor and wall systems, do your research to ensure that they will stand up to the demands of their intended space.
2. PERSONAL SAFETY
In 2013, the National Safety Council reported that 20% of work-related injuries resulted from slips or falls, accounting for 12-15% of all workers' compensation expenses and costing employers and costing employers an average of $40,000 per incident. Slip and fall injuries tend to occur most often in areas where meat, fruit, vegetable, fats and other residues are present. While it may be impossible to keep these residues from falling to the floor in the first place, your company can choose flooring that has an optimal combination of texture and washability to keep your employees safe and your facility incident-free.
3. FOOD SAFETY AND HYGIENE
Food safety and hygiene have become increasingly top-of-mind with consumers, industry, regulators and other stakeholders. Most recently, the Food Safety Modernization Act (FSMA) has raised the bar on food safety across all segments of the industry from raw material suppliers and producers to distributors and retailers.
And for good reason, because the hazards are real:
More than 200 diseases are known to be caused or carried by food.
The World Health Organization (WHO) reports that, every year, deaths attributable to food-borne diseases run into the hundreds of thousands.
A 2010 global study reported an estimated 582,000,000 cases of food illness involving 22 different diseases and causing approximately 351,000 deaths.
As consumer preferences change, technology has for the most part kept up. For example, in response to the demand for more nutritious and better tasting food, industry has responded with a number of milder processing and preservation methods. New processes and machines have increased nutritional and sensory properties while making sure that what reaches your plate is safe to eat.
But innovation must also occur underfoot and all around. The facility itself has to be designed and constructed in ways that prevent any possibility of food contamination.
Choosing the right flooring, walls, and other surfaces can make this happen. Seamless flooring is easy to clean and sanitize works actively to remove any viruses and bacteria that might be present and denies harbor to other pests thinking of moving in.
A durable floor is one that resists deterioration and loss of performance. Durable floors feature quality materials, good design and sound workmanship throughout. The whole floor structure and each of its components (sub-base, load carrying slab, and upper protective layer) are interdependent and work together to provide the required levels of performance and durability. If the ground and sub-base fails, for example, the concrete slab may crack under heavy loads. Similarly, if the coating has limited resistance against chemicals, it may not be able to protect the slab underneath against deterioration.
The life expectancy of any surface finish is related to a combination of mechanical, chemical and thermal stresses. These must all be taken into account when designing and installing flooring that is neither under-built nor overbuilt, but ideal for the application at hand.
5. FUNCTIONALITY AND DETAILS
Durability, ease of cleaning, slip-resistance, and chemical resistance are critical functional aspects of industrial flooring, yet of equal importance is floor detailing (grills, ramps, slopes, etc.) and other attached structures.
Take floor drainage systems. Regardless of the cleaning method chosen, high quality and well-positioned drains are needed to remove chemicals and water from floor surfaces, and as such are an integral part of every cleaning and sanitation process. Consider sloping and falls, which should also be configured to minimize impacts on ergonomics, economics, hydraulics and hygiene.
Floor falls should be as simple as possible, and watertight coves joining floor edges to walls are important to facilitate cleaning. Additionally, floor joints, which typically represent the weakest parts of a floor, should be positioned away from activity areas.
6. MAINTENANCE
Many companies employ the HACCP (Hazard Analysis Critical Control Point) approach across all major areas of production. HACCP is a management system in which food safety is addressed through physical hazards from raw material production, procurement and handling, to manufacturing, distribution and consumption of the finished product. Cleaning and sanitation are key parts of HACCP. The principles are common to all food processing facilities, but the method and frequency of cleaning and sanitation will differ from one manufacturer to another depending on the type of food that is produced and handled.
Cleaning and sanitation of floors has in fact become a sub-specialty because it must take into account an expanding constellation of variables - as well as the occasional trade-off. For example, an enhanced surface profile (a rougher finish) will improve slip-resistance but may also require more frequent and vigorous cleaning than a perfectly smooth surface. Likewise, areas subject to oil and degreasing may need detergent solutions to be applied, agitated and left in contact with the floor for a specified length of time before being rinsed and removed, which can increase downtime.
The devil is often in the details. High temperature and/or high pressure hose cleaning is another popular sanitation method, but not all floor finishes are able to tolerate extreme temperatures or pressure. If aggressive cleaning agents are used instead, they may cause damage to the floor, depending on its type. While tiles are highly chemical resistant, the grout used to connect them may not be.
Synthetic resins, on the other hand, are resistant to a wide variety of chemicals, but some may suffer bleaching from prolonged exposure to certain types, such as CIP solutions. It's critical to keep in mind that, when selecting the floor that's right for your facility, the effective maintenance of the floor must also factor significantly into your decision.
7. TOTAL COST ASSESSMENT
Because flooring is one of the last items to be installed in food-plant facility construction, it runs the risk of being downsized in value and scope in favor such items as equipment, which are consider more critical. Yet of the elements in a food processing plant, flooring is arguably the most visible and one of the most vital contributors to the success of a food operation. Skimping on installing appropriate flooring because of unexpected budgetary restraints or overruns could cost the operation dearly in the long run in terms of slow processes, downtime, accidents, etc.
When calculating the capital efficiency of a floor, wall, or ceiling, it is important to separate the initial "hard" costs, including materials and installation, from ongoing maintenance costs, which over time can easily exceed original procurement and installation costs. For while a less expensive floor may save a company at the outset, it may in fact result in significant hidden costs downstream. Like production machinery, flooring should be regarded as an equal component of the life cycle cost of operating a plant.
Whether constructing or renovating, an important thing to consider is the volume of volatile organic compounds (VOCs) emitted by various floor, wall, ceiling and other finishes. Some emit more VOCs than others. Selecting flooring materials that meet or exceed low VOC emission standards helps keep your air clean, which results in safer food production and a healthier working environment for employees.
Materials should also feature low odor transfer potential and little or no smell, especially during the application process. This requirement is more important for some installations than others. Take a production plant for infant dry milk powder. In addition to using HEPA filters to purify the surrounding air, flooring will likely need to be made from certified Clean Room Suitable Materials (CSM). The ISO 14040-2006 environmental management standard for Life Cycle Assessment (LCA) is a worthy source of further information about these and other sensitive environments.
9. QUALITY ASSURANCE AND CERTIFICATION
Like most products, floor and wall coatings typically come complete with a warranty. Before purchasing, be sure to go over said warranty in detail - including all the fine print. Warranties protect you against manufacturing defects, but it's your job to make sure the company you're dealing with has the ability to back up its warranty obligations.
Then dig deeper. Find out what kind of quality management system the company has in place. ISO 9001, for example, is commonly used to assure uniformity in manufacturing and adherence to a product's published specifications. Look for relevant engineering certification. Installing flooring and hygienic wall coatings is highly specialized work that requires specific knowledge and skills. Such due diligence extends to installation. Make sure your crew has been properly trained and certified to install your particular system.
Regarding the system, look for labels indicating that the product has been independently certified to internationally recognized quality standards. Make sure the supplier has all relevant test reports available and fulfills all statutory requirements. Finally, if you're interested in extending your warranty, investigate your options.
References are a non-negotiable part of the decision making process. Every flooring supplier must be able to provide a list of satisfied customers. Call and/or visit them. There's no better confidence builder than getting a first-hand look at the quality construction and installation of the floor you're considering for your facility.
Let's Build Something Amazing
Find Your Project Type
Find Your Documents
|
cc/2020-05/en_middle_0032.json.gz/line8402
|
__label__wiki
| 0.880033
| 0.880033
|
Steve-O Popping His Disgusting Blister Cannot Be Unseen
Jun 11, 2019 at 15:16 pm UTC / Last Updated at Jun 11, 2019 at 22:52 pm UTC By TheBlast Staff
Steve-O is obviously a big fan of putting disgusting things into his body ... but now he's expelling them.
The former "Jackass" star is apparently trying to get in on the Dr. Pimple Popper craze, and shared a repulsive video where he pops a blister on his big toe.
It's unclear how Steve-O got the blister, but he was extremely excited to reveal its juicy expulsion to his girlfriend, stylist Lux Wright.
Placing his foot in a sink, Steve-O prods and wrangles with the fluid-filled bubble until the sickening green pus victoriously oozed out.
His girlfriend is less than impressed, but at least this time she didn't have to stick anything in his butt.
After the graphic demonstration, Steve-O got real and paid tribute to the late Ryan Dunn, who would have been 42-years-old today.
Steve-O's mother, who passed away in 2003, shares a birthday with Dunn, and the star said to them both, "Life is really, really good lately, and I wish so much you were here to enjoy it with me. I love and miss you both."
They definitely would have appreciated the blister pop.
Steve-O Tattooed Tekashi 6ix9ine's Face On His Friend's Leg
You Won't Believe Where Steve-O Poured Hot Sauce into His Body
Steve-O Is Engaged to Girlfriend Lux Wright: See the Ring!
|
cc/2020-05/en_middle_0032.json.gz/line8404
|
__label__cc
| 0.554975
| 0.445025
|
The Color of Character
What Is Keeping So Many Back?
By GlenShuld | September 7, 2017 | 0
It’s Complicated Racism is real. It has shadowed humanity over the ages. Blatant racism that seems to dominate or repress exists. It is deplorable and should continue to be pointed out, shamed, disavowed, and stamped out. Systemic racism is a more difficult concept to grasp, including to this writer. I can understand its existence in…
We Are Losing John Q.
By GlenShuld | May 3, 2017
When there is so much chatter on media, both social and mass, about racism, and I’m not sure where to jump in, I call on my pal John Q. Whiteman. He has made appearances in a few of my blog posts. Before I turn this entry over to him, let me remind you that I…
The Alienation Continues
By GlenShuld | December 13, 2016 | 0
The election is over, but based on the protests and editorials, it isn’t. The votes are counted, but based on the calls for recounts, and the accusations that Russia meddled in the outcome, they aren’t. The Democrats were rebuffed, but Secretary Clinton received more votes. The Republicans’ think their agenda is a winner, but polls…
Racist Label? Save it for the Real Deal
By GlenShuld | November 18, 2016 | 0
The Bloom is Off The Ivy As I suspected, the harmony during the Cubs World Series victory parade that gave me hope was dissolved by the toxicity on both sides of the recent election. But I will not despair completely because I was witness to a massive, diverse crowd aligned in enthusiasm and support –…
Acknowledging Racism
By GlenShuld | October 15, 2016 | 0
The Challenges of Being a Victim I’ve been diligently reviewing my daily Google Alerts regarding stories about racism in the media. I receive an average of about six per day. I’m noticing some recurring themes. One of those themes is the need for the “white establishment” to acknowledge that racism exists, before we can take…
Race Relations – A Candid Perspective
By GlenShuld | August 19, 2016 | 0
Some of you might remember the Pulitzer Prize winning, Chicago columnist Mike Royko. He often wrote about his alter ego, Slats Grobnik, to represent the white, working class view of life. I’m going to introduce you to John Q. Whiteman. I don’t know if he is my alter ego or not, but I do think…
Dishonoring the Noble
By GlenShuld | February 28, 2016 | 0
Three black female students at the State University of New York (SUNY) in Albany created a maelstrom, when they claimed they were the victims of a racist attack by white men and women on a bus on January 30th. Soon, the well-meaning community at SUNY held a rally in defense of the black women. The…
My Black Friends Are Conservative
By GlenShuld | November 8, 2015 | 0
It has been a relatively long time since my last post. To my legions and legions of followers (pause for laughter), my apologies. I know the world has been holding its collective breath for my thoughts. The reason for the delay is the difficulty in finding new ways to say the same thing. Although the topic…
Tough Love For You Too
I have a Google Alert set up on my email to send me notices of internet entries on “racism”. There are no shortages of material. Each day I receive a list of about six entries. I can’t imagine how many are left off the list. Judging by the variety of sources – some are familiar…
Minnesota Department of Human Wrongs
Implicit Bias. Real or Not?
Holding Moral Imperatives Hostage to the Past
Far-Left
© 2015 The Color of Character, Glen Shuld
|
cc/2020-05/en_middle_0032.json.gz/line8407
|
__label__cc
| 0.509299
| 0.490701
|
THE HONEYMOON by Dan Nielsen
The bus stopped. Bill removed Jill’s blindfold. Jill blinked and squinted out the window.
“New York City, my love.”
“I was hoping for Niagara Falls.”
“It’s okay,” Bill said, “You can see Niagara Falls perfectly well from the top of the Empire State Building.”
“You can?” Jill looked at Bill. “But it’s four hundred miles away.”
“The Empire State Building is four hundred stories tall,” Bill said. “With skyscrapers the ratio is one mile per story.”
“Where did you read that?”
“It’s common knowledge.”
On top of the Empire State Building, Jill put a quarter into the coin-operated binoculars. Bill pointed her in the correct direction.
“I can’t see anything,” Jill said. “The distance is shrouded in mist.”
“That’s spray from the falls, sweetheart,” Bill said. “You can’t see it because of what it is. I hope you aren’t too disappointed.”
Jill hated being disappointed.
“I’m not, darling. I promise.”
The time on the binoculars ran out. Bill took Jill’s hand. They walked over to the railing.
“Those people down there look like ants,” Bill said.
“Yes, they do,” Jill said. “Only much bigger.”
Bill had reserved a room at the least expensive hotel he could find that made no mention of bedbugs in the comments. There were fleabag remarks, but Bill knew the difference between infestation and metaphor.
“Well, what do you think?”
“It’s really nice,” Jill said, throwing the bedspread out the window.
“Yes, it is, isn’t it,” Bill said.
“This must be the honeymoon suite,” Jill said, burning the sheets in the bathtub.
“You’re disappointed,” Bill said, suddenly sad.
Jill hated when Bill was sad.
“Why don’t spiders wash their feet?” Jill said, giving Bill a hug.
“I don’t know,” Bill said, smiling. “Why don’t spiders wash their feet?”
“Because it never occurs to them,” Jill said.
They both laughed, but maybe it was the sprinklers coming on.
At the front desk, Bill said, “We’d like a different room.”
“A completely different room,” Jill said, doing something with her phone.
“In another hotel,” Bill said.
The hotel clerk did something on his computer.
“Are you refunding our money?” Bill asked.
“No,” the hotel clerk said. “I’m deleting the comment your wife just left.”
Bill and Jill had no idea what to do, or where to go, so they rode the subway and slept like babies, waking every few hours and crying themselves back to sleep. In the morning, their shoes and luggage were gone. Luckily, Bill still had his wallet and credit card.
Buying shoes without shoes was the hardest part. After that it was easy to get new clothes and new luggage and first-class airplane tickets to Buffalo.
“Nothing is too good for my bride,” Bill said, mentally calculating the interest, and the years it would take to pay for all of this.
“I love you so much,” Jill said.
It was an hour bus ride from the airport to Niagara Falls. Jill was ecstatic. This was her dream honeymoon.
On the observation deck, Bill put a quarter in the coin-operated binoculars. Jill pointed them back toward New York City.
“Can you see it, Bill? Can you see it?”
“Yes, I can, Jill. I can see the Empire State Building.”
Dan Nielsen drinks bourbon and plays ping pong. Old credits include Random House and University of Iowa Press anthologies. Recent work in: Jellyfish Review, Bird’s Thumb, Minor Literature[s], Storm Cellar, Cheap Pop, and Pidgeonholes. Dan has a website: Preponderous and you can follow him on Twitter@DanNielsenFIVES
|
cc/2020-05/en_middle_0032.json.gz/line8408
|
__label__wiki
| 0.514148
| 0.514148
|
contact usmain page
The GPS Coordinates .net
our database includes all countries, cities and more...
The latitude and longitude gps coordinates of Jalalabad (Afghanistan)
↓reviews about this city↓
Jalalabad is a city in Afghanistan. The city's population is 205,423. The stright distance between Jalalabad and Kabul is 73 miles (117 kilometers). Current local time in Jalalabad: January 20, 2020, 2:14 pm; Percent change from previous month (Dec 2019) by the visitors: +87%
Distance between Jalalabad (Afghanistan) and an optional place as the crow flies:
LAT: LONG: Use decimal format! e.g.: 47.4925, 19.0513
The geographical location (geolocation) of Jalalabad is on the north and east hemisphere.
The nearest cities to Jalalabad (in our database): Peshawar, Kabul, Charsadda, Kohat, Khost, Mardan, Nowshera, Mingora, Swabi, Ghazni
Were you in Jalalabad (Afghanistan)? Please leave a comment and rating:
your email address (non-public)
Select your country: Afghanistan Albania Algeria Andorra Angola Antigua and Barbuda Argentina Armenia Australia Austria Azerbaijan Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bhutan Bolivia Bosnia and Herzegovina Botswana Brazil Brunei Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Central African Republic Chad Chile China Colombia Comoros Costa Rica Croatia Cuba Cyprus Czech Republic Democratic Republic of the Congo Denmark Djibouti Dominica Dominican Republic East Timor Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Federated States of Micronesia Fiji Finland France Gabon Georgia Germany Ghana Greece Grenada Guatemala Guinea Guinea-Bissau Guyana Haiti Honduras Hungary Iceland India Indonesia Iran Iraq Israel Italy Ivory Coast Jamaica Japan Jordan Kazakhstan Kenya Kiribati Kuwait Kyrgyzstan Laos Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Mauritania Mauritius Mexico Moldova Monaco Mongolia Montenegro Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands New Zealand Nicaragua Niger Nigeria North Korea Norway Oman Pakistan Palau Palestinian territories Panama Papua New Guinea Paraguay Peru Philippines Poland Portugal Qatar Republic of Ireland Republic of Macedonia Republic of the Congo Romania Russia Rwanda Saint Kitts and Nevis Saint Lucia Saint Vincent and the Grenadines Samoa San Marino São Tomé and Príncipe Saudi Arabia Senegal Serbia Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Korea South Sudan Spain Sri Lanka Sudan Suriname Swaziland Sweden Switzerland Syria Taiwan Tajikistan Tanzania Thailand The Bahamas The Gambia Togo Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States of America Uruguay Uzbekistan Vanuatu Vatican City Venezuela Vietnam Yemen Zambia Zimbabwe
Select your gender: male female
Select your year of birth: 2010 2009 2008 2007 2006 2005 2004 2003 2002 2001 2000 1999 1998 1997 1996 1995 1994 1993 1992 1991 1990 1989 1988 1987 1986 1985 1984 1983 1982 1981 1980 1979 1978 1977 1976 1975 1974 1973 1972 1971 1970 1969 1968 1967 1966 1965 1964 1963 1962 1961 1960 1959 1958 1957 1956 1955 1954 1953 1952 1951 1950 1949 1948 1947 1946 1945 1944 1943 1942 1941 1940 1939 1938 1937 1936 1935 1934 1933 1932 1931 1930 1929 1928 1927 1926 1925 1924 1923 1922 1921 1920
your review (100-1000 characters)
Environment (e.g.: buildings, parks)
awful awesome
Public transport or road traffic
People (e.g.: kindness, helpfulness)
shabir ahmad
Country: Afghanistan
Jalalabad is one of the big city based on the population which is adjust in jalalabad are more then the area which the city been surrounded. Jalalabad is surrounded by small small villages which make the environment better. The traffic is terrificly awful. Our all Jalalabad is the best place for trade and marchandise. I have a suggestion if you provide some information regarding the villages and place sorrounded Jalalabad. Please tell wheather its located in the which side of Jalalabad. Thanks for your contributions.
4 - environment
2 - public transport or road traffic
5 - people
The most popular cities on this day (20 January 2020): Makurdi, Abuja, Manila, Athens, Umuahia, Naples, Dhaka, Paris, Dodoma, Buenos Aires
|
cc/2020-05/en_middle_0032.json.gz/line8412
|
__label__wiki
| 0.680701
| 0.680701
|
“Vote By Mail” pilot bill heads to final floor vote April 27, 2018
The bill falls short of what advocates originally hoped for, but they're celebrating a step forward nonetheless and asking Governor Ige to sign it.
Graduate students to Saiki: union-busting unacceptable from a Democrat April 27, 2018
The students protested the Speaker's decision to discharge conferees on a bill that would allow them to form a union, directly challenging the Kakaʻako–Ala Moana representative.
Hawaii could become the first state to ban chlorpyrifos April 27, 2018
Activists have been fighting for years for a comprehensive pesticide regulation bill. Now one is heading to a final floor vote after passing through conference committee.
Hawaii ties its electric utilities’ revenue to performance of key functions April 24, 2018
These include service reliability, customer satisfaction and integration of renewable energy sources.
Podium 001: Sharon Moriwaki April 24, 2018
Editor Will Caron interviews Sharon Moriwaki, a candidate for Hawaiʻi State Senate, District 12.
“Why are there no evacuation plans for us?” March 02, 2018
Hawaiʻi residents will hold public forum to discuss plans to prevent a nuclear holocaust in Hawaiʻi as the Trump Administration "gears up for imminent war with North Korea."
Women activists visit Hawaiʻi Island, draw connections between militarized Pacific places February 28, 2018
Pōhakuloa, like other important places across the Asia-Pacific region, is home to a military base with live fire training.
Everything you need to know about the Coco Palms eviction, part 2 February 23, 2018
Competing claims to the land at Wailua are rooted in an historic fraud perpetrated by a notorious swindler and facilitated by the president of the Provisional Republic, presenting challenges to the legality of the deed held by the Coco Palms Hui.
A group of Hawaiian konohiki—stewards or caretakers—works to restore the ecosystem at the mouth of the Wailua River even after a judge ordered their eviction to make way for a proposed development with problematic funding sources and a dubious claim to the land.
State should support, not persecute, Waianae puuhonua February 20, 2018
While state relief is slow-coming, if at all, Waiʻanae’s houseless are already addressing their community needs within an indigenous framework that values kuleana, family and working together toward a common good.
© 2009-2019 The Hawaii Independent Corporation
Home [in beta]
Legacy Website
|
cc/2020-05/en_middle_0032.json.gz/line8413
|
__label__wiki
| 0.580984
| 0.580984
|
Posts About "Brent Burns"
NHL 20 Player Ratings: 21-30
August 31st, 2019 On Tuesday, Aug. 27, EA Sports released their first wave of ratings for the top 50 players in NHL 20. According to the EA website, overall attributes take into account individual abilities for both skaters and goalies. Related: NHL 20 Player Ratings: 31-40 EA will be revealing the ratings for the top 50 players until the...
'Beard Brothers' Lead the San Jose Sharks
April 28th, 2019 In the opening game of the playoff series between the San Jose Sharks and Colorado Avalanche, the Sharks' iconically bearded players showed up often. One beard belongs to Norris Trophy finalist Brent Burns, the other to future Hall-of-Famer Joe Thornton. The bearded duo was in all five scores in the Sharks' 5-2 win. Burns dominated...
An Avalanche Fan Guide to the San Jose Sharks
April 26th, 2019 Fans of the Colorado Avalanche have not had much Stanley Cup playoff hockey to watch in recent seasons, and I don't expect many are too familiar with their upcoming opponent, the San Jose Sharks. For starters, they occupy different divisions and haven't met in a playoff series in ages –though they have in the distant past, even...
Fuzzy History of the NHL Playoff Beard
April 11th, 2019 With the 2019 NHL postseason upon us, it’s time to grow out those beloved playoff beards once again. Long a tradition of NHL players, the facial hair-growing frenzy has been adopted by fans in recent years. Snapchat filters, NHL sponsor commercials, and in-game giveaways have turned the playoff beard into a hockey pop culture...
2019 Norris Trophy Race
March 7th, 2019 With the trade deadline in the rear-view mirror and just a month left in the 2018-19 NHL season, all eyes have turned towards two things: the playoff picture and the individual awards races. The races are heating up down the stretch for several awards, but the closest finish could be for the Norris Memorial Trophy, an award...
NHL News & Notes: Price, NHL Stars of the Week & More
January 7th, 2019 In today's News & Notes, Carey Price will miss the all-star game, the NHL has announced their three stars of the week, David Schlemko has been placed on waivers and J.T. Miller has returned to practice in a non-contact jersey. Related: NHL News & Notes: Pageau, Benn & More Price to Miss All-Star Game Despite being named...
THW Hot Takes: Burns & Karlsson Dethroned
October 14th, 2018 Hot take: Ivan Provorov and Shayne Gostisbehere of the Philadelphia Flyers will outscore Brent Burns and Erik Karlsson of the San Jose Sharks. All eyes have been on the Sharks' super-star duo, but it's the young up-and-comers in Philly that should be getting the spotlight. Gostisbehere & Provorov Rise It's surprising how many...
3 Statistics for Peter DeBoer – Part 3
September 28th, 2018 With the San Jose Sharks days away from their Oct. 3 season opener, we continue our season preview. We've covered the team's pre-Erik Karlsson trade roster, our expectations for divisional opponents, the Sharks' greatest vulnerability and the team's X-factors. I've taken a look at important side effects of the Karlsson trade and my...
Page 2 of 471234...
|
cc/2020-05/en_middle_0032.json.gz/line8415
|
__label__wiki
| 0.724834
| 0.724834
|
ViraLuck
Entertainment Site
Adult JokesAdult Jokes
Dark JokesDark Jokes
Funny TextsFunny Texts
Jokes of the dayJokes of the day, Funny Jokes, Funny Memes, Funny Texts
TattoosCool and Beautiful Tattoos
WeirdWeird
Weird HistoryWeird History
The Term “Flying Saucer” Originated With This Infamous Sighting, Only A Few Weeks Before Roswell
Interesting, Weird History
The infamous UFO crash that occurred in 1947 in Roswell, New Mexico, is the extraterrestrial sighting that brought aliens into mainstream conversation. But the UFOs spotted just weeks before Roswell are even more fascinating, and much more carefully documented. Kenneth Arnold didn’t just experience one of the most interesting and well-researched UFO sightings of the 20th century — his sighting is ground zero for UFOs. After he saw nine unidentified crafts tearing across the sky near Mt. Rainier, Washington, in 1947, reports of UFO sightings dramatically increased, along with the now-colloquial term “flying saucers.” The world would never be the same.
Most of the people who have seen UFOs sensationalize their stories in one way or another. Either they have weird alien stories, make any manner of surrealist claims, or even spin legends about Area 51 via abduction. However, Kenneth Arnold is one person who did not. Throughout his life he stuck to the relatively subdued and original flying saucer sighting facts that he had first stated in 1947. The fact that he never changed a word of his story is enough to make you wonder what he really saw flying over Washington in 1947, and if it really was a legion of flying saucers.
Kenneth Arnold Saw Nine Ships Flying Over Mt. Rainier
On June 24, 1947, Kenneth Arnold was flying his small private plane over Mineral, Washington, near Mt. Rainier. He was looking for a downed C-46 transport airplane for which the military was offering a $5,000 reward. Suddenly, he saw nine flashes of light. Arnold said the ships that he saw were flying in a strange formation, with each one positioned diagonally to the right of its counterpart. He later reported that they were also weaving from side-to-side in their formation, somewhat “like the tail of a Chinese kite.”
Upon landing for fuel, he told the crew at the Yakima airport what he saw and they suggested that he saw missiles or maybe an experimental aircraft. Reporters were called in to interview him, but no one could shed any light on what Arnold claimed to have seen that day. Until his death in 1984 Arnold would maintain that the objects he saw over Mt. Rainier were of unknown origin.
The Military Initially Took The Report About A Possible UFO Sighting Seriously
At the time of Arnold’s initial report, the military expressed genuinely interest in what he had to say. According to articles released at the time, Arnold was treated fairly and not ostracized for what on its face seemed like a pretty bizarre claim. It probably helped that Arnold was a respected and experienced pilot whom everyone seemed to admire. Additionally, at the time, there wasn’t yet a stigma surrounding people seeing UFOs. Even though there was some incredulity from the military about Arnold’s observations, he believed it was because the media continued to report on the copycat sightings that followed his legitimate sighting. In the end, the military came to the conclusion that “a man of [his] character and apparent integrity” wouldn’t lie about seeing something.
The Objects Moved Faster Than Any Known Plane At The Time
Everything about the objects that Arnold saw defies reality, but the thing that makes the least amount of sense is the speed at which they were traveling. In 1947 he told the Chicago Tribune,
“Their speed was apparently so great I decided to clock them. I took out my watch and checked off one minutes and 42 seconds from the time they passed Mount Rainier until they reached the peak of Mount Adams . . . All told the objects remained in view slightly less than two minutes from the time I first noticed them.”
While in his plane, Arnold was able to work out how large the crafts were, how far away they were from his plane, and their speed — which worked out to about 1,700 miles per hour. In 1947 Chuck Yeager was just breaking the sound barrier which is a little over 700 mph. Whatever Arnold saw was much more advanced than what the government was working on at the time.
His mathematical calculations and knowledge about flight and piloting lent credibility to his claims, but ultimately didn’t help solve the mystery.
The Ships May Have Been Piloted Remotely
Throughout the initial phases of Kenneth Arnold’s fame he faced a number of skeptics who looked to debunk what he claimed to see. The most curious of these debunkers are the people who believe that Arnold saw crafts, but that they were piloted remotely. When interviewed by the Chicago Times, a United Airlines pilot said that he thought that the UFOs were piloted by someone on the ground. He also believed that the crafts were manmade and that they were being used in “experimental operations” by the armed forces.
To Arnold’s credit, he agreed that the crafts could have been piloted remotely, he didn’t really care if the UFOs belonged to aliens or not. The issue that stuck with his was that if the crafts were being used by the US Army, then the American people deserved to know.
Arnold Claimed He Was Misquoted About The Whole Saucer Thing
There’s a large belief in the UFO community that the idea of flying saucers came out of a misquote from Arnold’s first interview after his sighting. Different articles say that Arnold saw saucers, disks, and pie pan-like objects, but he claims that journalists misunderstood him. Arnold claims that he said that the objects moved “like a saucer” not that they were saucers. This would later be described as “one of the most significant reporter misquotes in history.” Arnold tried to take the misquote in stride, however. In 1950 he told journalist Edward Murrow:
“They misquoted me, and in the excitement of it all, one newspaper and another on got it as ensnarled up that nobody knew just exactly what they were talking about, I guess.”
He admitted, though, that regardless of the truth of what he had seen, the overall experience had given him an inexplicably “eerie feeling.”
A Month Later, Roswell Changed The Way UFOs Were Discussed And Sparked A Stigma Against Them
Even though the military didn’t fully believe Arnold’s claims, they at least treated him with respect. But then the Roswell incident occurred and people lost their minds. In early to mid-July of 1947, an unidentified flying object crashed in the Nevada desert. The military claimed that it was a weather balloon, but people began talking about the extraterrestrial bodies that were taken from the crash sight along with a mysterious metal, and the story exploded.
After Roswell, the military went out of their way to debunk every UFO story that they came across beginning with “Project Grudge.” Following the across-the-board debunking by the military, amateur investigators also started coming out of the woodwork to disprove Arnold’s story. Various investigators alternately claimed that Arnold saw a mirage, “pelicans,” or meteors.
The Flying Saucers Turned Kenneth Arnold Into A Minor Celebrity
It’s important to remember that Kenneth Arnold was a normal guy until the day he saw the nine flying saucers, but the moment his story went national he became a celebrity. Arnold claims that a preacher from Texas called him out of the blue to proselytize about the end of the world, but that wasn’t as bad as the woman who freaked out when she saw him in a cafe. He claimed that she saw him and screamed, “There’s the man who saw the men from Mars,” as she ran out of the diner.
Arnold Didn’t Want To Sensationalize His Experience
Even though Arnold’s story became sensationalized by the media and UFO-ologists in the following decade, he maintained a curiosity about the original event that followed him to his death. It’s unclear whether or not Arnold believed in extraterrestrials, but he absolutely believed that the US military was up to something that they weren’t telling the American people. In an interview with Edward Murrow in 1950, Arnold admitted that if what he saw wasn’t a set of experimental planes then it must have alien in nature. He told Murrow,
“I more or less have reserved an opinion as to what I think. Naturally, being a natural-born American, if it’s not made by our science or our Army Air Forces, I am inclined to believe it’s of an extra-terrestrial origin.”
The Media Was Really Interested In Arnold’s Sighting Because The Guy Was So Credible
One thing that’s apparent from the articles immediately following Arnold’s sighting is that the media loved Kenneth Arnold. Not only was he a nice guy, but he was a pilot and he owned his own business in Idaho. Throughout the aftermath of his experience, he provided straightforward facts, experienced flight knowledge, mathematical calculations based on his observations, and zero fantasy-based speculation. According to Borderlands: The Ultimate Exploration of the Unknown,
“[Arnold] gave the impression of being a careful observer…. These details impressed the newspapermen who interviewed him and lent credibility to his report.”
After Arnold’s Story Came Out The Pacific Northwest Went Saucer Crazy
In an issue of the Spokane Daily Chronicle from June 27, 1947, multiple reports of “flying discs”and “saucer-like objects” were made after Arnold’s story of the nine ships flying near Mt. Rainier. A Eugene, Oregon local named E.H. Sprinkle claimed to have captured photographic evidence of a flying saucer near his home, although it was later revealed to be nothing more than dust.
An article from that paper also recounts the stories of men and women from Oregon and Washington who saw various forms of flying saucers in the days following the initial sighting. Mrs. Ethel Wheelhouse even claims to have seen “whatzits” speeding across the sky near Yakima, Washington.
Tags: Interesting, Weird History
Tags:aliensWeird Facts
previousCelebrities Who’ve Really Said “Do You Know Who I Am?”
next11 Weird Sex Facts That Prove Dolphins Are DTF
Amazing Animals Bikini Pictures Celebrities Celebrity Facts Cool Fails Film Funny Funny Gifs Funny Jokes Funny Kids Funny Memes Funny People funny pics Funny Pictures Funny Signs Funny Texts Funny Tweets Funny Video Health hot girls Hottest Celebrities Instagram internet jokes Jokes of the day LGBT Lovely Ladies meme memes Memes of the day Models People Social Media Sports Tips TV Viral Articles Viral Pictures Viral Stories Weird Facts Weird History Weird Nature Weird Pictures
The Best Walking Dead Memes on the Internet
15 Famous Women Who Are Way Taller Than You Already Thought
Famous Teenage Mothers
23 Hilarious Notes from Moms and Dads
27 Dogs Who Are Terrified of Cats
43 MORE Things That Seem Horribly Unsafe
15 Oscar-Winning Movies That Got Away With Not Explaining Major Things
Celebrities Who Went to Elementary School Together
20 Hilarious Memes About Keto Dieters That Get It Just Right
The 21 Brightest Stars in the Sky
Copyright © 2020 ViraLuck. All rights reserved.
This site, like many others, uses small files called cookies to help us improve and customize your experience. Learn more about how we use cookies in our cookie policy.
|
cc/2020-05/en_middle_0032.json.gz/line8418
|
__label__cc
| 0.687771
| 0.312229
|
MY COWBOY PROMISES
Riding Out MY COWBOY PROMISES-Review & Giveaway
Hi there! Today I”m sharing my review for ZA Maxfield’s MY COWBOY PROMISES, a contemporary cowboy M/M romance. This one has a less-upbeat story, featuring a severely closeted character living with the fallout of his “out”-ing. I had a bit of heartbreak for Ryder, and was glad that his life turned around for the better. Make sure to scroll down and enter the $25 Amazon GC giveaway.
A real man needs a real love…
To become the man he’s meant to be, one cowboy will have to be the man he never wanted anyone to know he was…
Ryder Dent is a true-blue cowboy. A devoted son, husband and father, but one who is living a costly lie. When they were both young, Ryder and his closest female friend Andy thought they’d found the perfect solution to both their problems—she was single and pregnant, and he was secretly gay—so they got married and raised Jonas together.
When Ryder gets hurt at a party, his son’s new pediatrician comes to the rescue. The connection between Ryder and Dr. Declan Winters is sudden, powerful, and undeniable. Ryder loves Andy and the family they’ve created together—but they both need more. Can they pursue their hearts’ desire without destroying the life they’ve built and losing the son they love?
How about a little taste? This is the scene where Ryder is struck by a Declan lightning bolt…
The hottest guy I ever saw was playing “Pop Goes the Weasel” on the piano while fifteen cagey preschoolers circled fourteen chairs. My father-in-law’s annual Fourth of July shindig—the biggest event of the year—was a family picnic. We’d set aside a play area for the littlest kids and I’d volunteered to supervise, but the piano man blindsided me and I nearly missed an outrageous hair- pulling incident.
Like a too bright pair of headlights on a moonless night, he was all I could see.
Mayor Calder Hamilton—a cartoon bear of a man with a white handlebar mustache—snuck up on me with one of those painful backslapping man hugs.
“Ryder Dent, you son of a bitch. Which one is your boy?”
“That’s Jonas.” I pointed out my son. “Blue plaid shirt, cowboy hat. Crass determination to win?”
“I know that look, I see it every day when I look in the mirror. But how can that be him? Last time I saw him he was half that size.”
Why do people always say that? Is it some rite of passage? Am I going to be surprised kids grow someday too? “We had to buy him a new pair of cowboy boots just last week.”
“He’s a fine-looking boy. Where’s Andrea?”
“She doesn’t come to these things to hang around with me.” I glanced toward the windows. “You’ll find her wherever there’s dancing.”
“She leaves you in charge of Jonas?”
“Gosh, yeah. Andi’s the social one. She likes to kick up her heels and I don’t mind if she wants to have some fun.”
“So have you met our new doctor yet? Isn’t he something? I have never seen anyone play piano like that.”
“That’s Doctor Winters?” The doc had started playing “Pop Goes the Weasel” like a Russian folk dance, all the while yelling Hai! Hai,! Hai! Hai! The music stopped and the chaos started. Jonas ended up on another chair.
“Go, Team Jonas!” I pumped my fist like a goofball.
“Yeah. Go, boy, go!” Hamilton was already tipsy enough to be unaware he was shouting right in my ear. It didn’t matter; I was going deaf from all the kids squealing anyway. “I’d like to ask your help with something.”
“Sure thing, Mayor. Shoot.”
“I need you and your family in a campaign ad”
“My family?” Good grief. Bitterroot’s founding fathers would shit in their graves at such an idea. “I don’t think we’d make a very good ad.”
“C’mon.” He punched my arm. “You and Andrea are both attractive. Jonas is a cute kid. You had to make some tough choices in the beginning, but look where you are now.”
“Uh . . . I don’t think—”
“I need a family exactly like yours to represent my campaign to the twenty-somethings. I need them to believe they’re important to me.”
Me and Andi? My stomach did a full 360, front to back, as if I was on a Six Flags ride. Mayor Hamilton wanted some picture-frame perfect family, and we were not it. Plus, we hadn’t exactly voted for him. “I’ll ask Andi about it, but—”
“Andrea’s dad just told me he’s backing me all the way again this next election.”
“Is he?” That figures. Her dad likes politicians to owe him.
“So you just tell her you’re doing it, okay?”
“Sure, I’ll mention it, but—”
Hamilton’s wife, Sally, came up to collect him. “C’mon Cowboy. There’s someone I want you to meet.”
She grabbed his hand and, after a good-natured tug-of-war, they left together. I breathed again. Andi’s dad ran one of the most successful ranches in the area. If he wanted to see my family on a billboard, I’d have to figure a way to get out of it or learn to say “cheese.”
It was pretty hard to say no to Sterling Chandler. I’m not sure he understood the word.
The new doc managed to make “Pop Goes the Weasel” sound like a funeral dirge and the children all lurched around like little zombies. Then he turned it into a raucous honkytonk song.
Who was this guy?
Jonas got eliminated fourth from last but he wasn’t crushed by the loss. His attention shifted right away to the buffet, where the cater-waiters had installed several trays of Texas-sized cookies, all colored with red, white, and blue sugar crystals in honor of the holiday.
Musical Chairs, the Survivor edition, came down to two particularly crafty-looking femme fatales. One wore a jeans skirt, cowboy boots, and a pretty white blouse, and the other had on a daisy-printed sundress with lacy socks and jelly shoes. Lacy socks girl won by body-checking white blouse girl out of the way and pouncing on the last chair. She gripped the seat so tight with both hands no one could get her off it.
The new doc consoled the runner-up with a box of big-block Legos and gave the winner a play set with pink and purple Ponies but it seemed she thought she was getting the chair as her prize. Eventually her mom pried her up and they all wandered off to join the party outside.
Doc Winters was left to tidy up. I figured I ought to help, being family and all. Plus, it might get me out of small talk outside.
But the doc was the best looking man I had ever seen up close. I was bound to mess up and say something super stupid, and Andi was going to hear about it, and then she was going to tease me for the rest of my life, because she was just waiting for me to lose my shit over some guy.
And Doc Winters, M.D., The Yankee Doodler?
He could be the guy.
This is the fourth book in a series, but can be read as a standalone.
Ryder is a stalwart, honorable man–for 23 y/o. He’s gay, and only out to his wife, Andi. He and Andi have been friends since childhood and when she was to become an unwed mother from her pursuit of a completely unsuitable (and uninterested) man Ryder stepped in and took care of Andi and Jonas, foregoing a football scholarship that would have taken him far away from his small-town and the anti-gay prejudice. Ryder has been a faithful husband. Well, that’s not true. He’s been a monk and Andi’s been a nun. They share a bed and parental roles, but not their bodies. Ryder has always been Andi’s biggest cheerleader and encourages her to follow her dreams, even though it goes against her father’s wishes.
Meeting Dr. Declan WInters–the new town doc–is a frightening revelation for Ryder. Declan is exactly the right man to unravel Ryder’s tightly held control. Andi recognizes that Ryder is holding back and encourages him to pursue Declan–undercover.
I liked large parts of this story. I’ll be honest that the “open” marriage solution was not my fave. I know, I know, it works for some folks, but I like my romance with a heaping helping of honesty. A large part of the book was devoted to keeping Ryder’s secret, and it added to the tension, but I was a little uncomfortable with it. Yes, Ryder does come out–and it is like a nuclear bomb in his life. He’s not sure if Andi will follow her homophobic father’s advice and move out–taking his beloved Jonas away. Ryder’s father isn’t best-pleased, either, with extreme risk of both Ryder’s home and job in the balance. And there’s fallout for Dr. Winters–his small-town medical practice might be sunk.
I thought that the resolution of all this heartache was well-told. I do like to see when families heal, and deal, once the dust settles. I’d say that the exact nature of Ryder’s relationships are more honest and stable at the end of the book, and for that I was happy, but it happened more by default than design. I didn’t get the resolution I wanted between Ryder and Jonas, but only because the focus was more on Declan and Ryder, and Andi. Andi had the opportunity to really twist the knife on Ryder, especially as she was essentially destitute and with a small child without Ryder. Her financial issues could have led her to accept her father’s mandates and money. But she made good choices about that, and Ryder was clearly the best Daddy evah.
Having known teen parents quite closely, I’ve seen some of the unhealthy relationship dynamics they experience–Andi, Ryder and Jonas were some of the best emotionally adjusted characters I could have imagined. There wasn’t a lot of sexytimes, but they were good. I guess I just wish there had been more openness, that Ryder could have been open about his sexuality, which would have allowed me to experience that euphoria more. Don’t expect a lot of cowboy life–a couple trail rides is all you’ll find–though growing up and working on Andi’s family ranch, Ryder runs the ranch supply store in town.
Interested? You can find MY COWBOY PROMISES on Goodreads, Amazon, Barnes & Noble, iBooks, Kobo, and All Romance.
Be sure to check out all the books in the Cowboys Series.
Click the Rafflecopter link below for your chance to win a $25 Amazon Gift Card.
Z.A. Maxfield started writing in 2007 on a dare from her children and never looked back. Pathologically disorganized, and perennially optimistic, she writes as much as she can, reads as much as she dares, and enjoys her time with family and friends. If anyone asks her how a wife and mother of four manages to find time for a writing career, she’ll answer, “It’s amazing what you can accomplish if you give up housework.”
Her published books include Crossing Borders, Drawn Together, and the St. Nacho’s and Brothers Grime series from Loose Id, ePistols at Dawn and The Pharaoh’s Concubine from Samhain Publishing, and Notturno, Vigil, Stirring Up Trouble, and All Stirred Up from MLR Press.
Catch up with Ms. Maxfield online on her website, twitter, Facebook and Goodreads.
June 19, 2015 Veronica Rundell Cowboy Romance, Gay romance, M/M Romance, MY COWBOY PROMISES, ZA Maxfield Leave a comment
|
cc/2020-05/en_middle_0032.json.gz/line8422
|
__label__cc
| 0.692378
| 0.307622
|
K-12 & Higher Education
Police & Law Enforcement
Military & Homeland Defense
Physical Security & Surveillance
Interview Room Solutions
Solutions Customization
Product Sourcing & Design
Unlimited Technical Support
Mobile Surveillance Solutions
Implementing Surveillance Without Upsetting Employees
Today’s Waco business owners need to ensure that they do all they can to protect their business and lead it into the future. That’s not always easy, and everything from marketing to hiring the right team will have an impact on your...Read More
Video Surveillance Solutions For Government Employers
Government agencies in Waco, TX rely on their workers to remain productive throughout the day. They are assets that sell goods, provide services, and promote the company's brand. However, a recent study has revealed that government employees are...Read More
How Security Systems Create A Safer Environment For Library Patrons
If you have ever been to a public library in Waco, TX, then you are well aware of how welcoming and inviting they are when it comes to the general public. Parents often bring their children in to spend some time and pick out a few books. However,...Read More
3Aug
Keep Your School Campus Safe With The Right Security Measures
Sadly, the number of school shootings and other tragedies has not been going down, and there's no real indication that the number will drop in the near future. However, Waco schools still need to open every fall and give every child the best...Read More
Why you need to update your school's security camera's
Security cameras can make people nervous, and when they’re in schools they can make parents nervous. However, most parents are willing to accept security cameras at school because of everything that can happen on campus: ...Read More
The Benefits Of School Security Cameras And Surveillance
School shootings have become a tragic epidemic in recent years. For this reason, school districts have been prioritizing school security like never before in history, and a real focus has been placed on security cameras and surveillance...Read More
Devise A Safer Campus With School Video Surveillance
The safety of our children in their schools is something that should be absolutely paramount to any American parent. But unfortunately, we now live in an age where aside from bullying and vandalism, danger to our children can come in the...Read More
More Cities And Towns Are Adopting Video Surveillance
Cities and towns all across the United States have begun adopting video surveillance at a rapid rate in recent years. Where it may have been a rarity to see security cameras in parks or intersections in small towns as little as a decade ago, this...Read More
Security Cameras And The Safety Of City Streets
Whether walking a local street or having a relaxing evening at the park, safety is always a priority when perusing Austin, Texas. Security cameras have become a popular new addition in big and small cities all across the United States, showing drops...Read More
The Layers of Security Required for Government Buildings
Protecting government buildings is a harrowing idea. The federal government alone is comprised of over 440 departments, resides in over 3 billion square feet stretched across 900,000 buildings and structures, and this pales in comparison to all...Read More
7Jun
The Importance Of Video Surveillance In Schools
Safety is a crucial and growing concern for Waco parents with children of any age in school. Since the year 2013, there have been over 170 school shootings across the United States, making both parents and students wary about going to the...Read More
Why Dome Cameras Are Replacing Box Models
There is a current trend dominating the security system industry. More and more consumers and professionals alike are choosing dome cameras to replace traditional box style models for their safety and protection needs. There are a variety of things...Read More
5 Reasons Your School Needs a Top Notch Security System
Just turning on the news these days is frightening enough to make students want to skip school. Districts have faced countless issues over the decades that have threatened pupil and faculty safety. However, school shootings are taking place at an...Read More
Uptick In Homeowners Looking At Home Surveillance
There are a variety of different ailments that currently plague modern society. The opioid epidemic seems to be running rampant, and it shows no signs of easing, even as the government is cracking down on the problem. Students, teachers, and...Read More
9May
Understanding the Importance of Security Camera Lenses
A surveillance system is a beneficial tool for monitoring the inside of a structure, a building's perimeter, or countless other applications in Waco, TX. Home and business owners alike are turning to cameras to keep employees and family members...Read More
Network IP Security
Security Camera Technology
Excellent service and very prompt, competent answers to all questions that I had. This level of customer service is becoming rare today. When you do experience it, you really appreciate it.
David D., Nolan County Sheriff's Office
My Sales Rep was Phenomenal. After searching 3 other companies, and trying to find answers, or at least talking with reps about the products, your team was exceptional.
Curtis R., Upsala Area Schools
Contact a security expert in Waco, TX to find the right solution for your needs
Subscribe to receive offers and updates about our services.
Email Waco, TX Security Expert
Copyright © 2018 Supercircuits Waco, TX Surveillance & Tactical Gear for Government. All Rights Reserved.
|
cc/2020-05/en_middle_0032.json.gz/line8423
|
__label__cc
| 0.551612
| 0.448388
|
Condensed Matter
Medical Physics Group
Plasma Physics (CFSA)
Example case study list from REF 2014
External Staff Based in Physics
The Pendulum - Departmental Newsletter
Physics A to Z
Physics Research Providing Real World Benefits - IMPACT
Physics research at The University of Warwick leads to a range of different types of impact in industry, business, healthcare, government policies and culture. Our work goes beyond training the next generation of physicists, generating research papers and conference presentations, into areas where we make a difference in the real world. This all starts with research led from our Warwick researchers that spans academics, posdoctoral researchers and research students. This set of case studies showcases some of the impact that Warwick Research has had - it may surprise you just how much this links into the things that provide day to day benefits.
If you would like to read about a particular case study in more detail, then please follow the links on the summary information for each below.
FLIG and CHIPS
The floating low energy ion gun (FLIG) was invented by Professor Mark Dowsett in 1993, in the Physics Department at Warwick. It is now a key analytical instrument used in the development of a wide range of generic semi-conductor devices including the microprocessors in computers, mobile communications and low energy lighting.
Diamond Sensors
Professor Mark Newton's team have used combinations of electrochemical, spectroscopic and microscopic techniques to probe the electrochemical properties of doped diamond. In close collaboration with industrial partners, this has led to the development of a new types of diamond sensors for electrochemical and sensing applications, ranging from water quality measurements to electrocatalysis and high temperature analysis of gas.
Sounding Out Safety
Non-destructive testing (NDT) is used routinely in many different areas from testing aeroplane components for cracks or adhesive bond failures, to ensuring that pipework in petrochemical plants or power stations is not becoming dangerously thin through corrosion. Professor Steve Dixon and Dr Rachel Edwards lead a research group in the Department of Physics that uses ultrasound, electromagnetic and thermographic methods to perform NDT, working in collaboration with a broad range of companies.
Dr Tom Hase leads the XMaS facility from Warwick - XMaS is an EPSRC funded mid-range facility based in Grenoble, France, supporting the UK materials science communities. A wide range of sample environments allow a diverse set of experiments to be performed using energies in the 2.4 to 15 keV range, enabling scientists to develop and refine new materials for a diverse range of potential applications.
Graphene Membranes for Microscopy
Dr Neil Wilson's interest is in correlating atomic and mesoscale structure with physical properties in nanomaterials, with an emphasis on quantitative measurements. His current research is mainly on the structural, mechanical, electronic and electrical properties of graphene and other two dimensional materials (2DMs). He has been developing graphene and graphene oxide based TEM supports for high resolution imaging of molecular and macromolecular species (this has led to the graphene oxide TEM grids sold by EMResolutions).
Telephone: +44 (024) 765 23965
Email: physicsadmin@warwick.ac.uk
Alumni and Careers Information
Maps, Directions, and Accessibility
Warwick on Facebook Warwick Unviersity on Twitter
Page contact: Katherine Branch
|
cc/2020-05/en_middle_0032.json.gz/line8424
|
__label__wiki
| 0.670308
| 0.670308
|
Social Sciences School of Law
Offer holders
Parents, teachers and guardians
Visitors Programme
GAP Guidelines
Seminar Absence Form
Law and the Global Community
Outreach in Law
At Warwick Law School we aim for our student and staff population to truly reflect and represent contemporary society. We believe that in so doing, we encourage the very best talent to succeed. We look at ways in which we can assist people of all genders, all races, and from all walks of life to join us at Warwick.
Warwick Law School is committed to furthering gender equality within higher education.
Since 2014 our Self-Assessment Team has been reviewing policies and practices on gender equality in the Law School and in November 2016 we submitted our application for an Athena SWAN Bronze Gender Equality Charter Mark.
The Athena SWAN Charter was established by the Equality Challenge Unit in 2005. Initially focused on the careers of women in science, in 2015 it was expanded to recognise work undertaken in arts, humanities, social sciences, business and law. Its remit also expanded to include those in professional and support roles, and work done to support trans staff and students.
The aim of the Charter is now to recognise the advancement of gender equality more broadly – ‘representation, progression and success for all.’
The Self-Assessment Team has been led by Dr Helen Toner and she will be continuing to lead our Equality and Diversity Committee. The committee will monitor the implementation of the Action Plan and develop wider issues relating to Equality and Diversity within WLS.
If you would like to be involved or have any questions please contact Helen (H.F.Toner@warwick.ac.uk)
Athena Swan at Warwick
University Policy
Faculty Policy
Dignity at Warwick
The University is committed to ensuring a working and learning environment in which all University members (staff and students) are treated fairly and with dignity and respect.
The University is committed to promoting equality, diversity and inclusion. All colleagues are encouraged to complete an e-learning module on Diversity in the Workplace.
Wellbeing at Warwick
The University aims to promote colleagues’ well-being through support for flexible working, keeping active, healthcare schemes, parental leave and time off for dependants, Occupational Health, and counselling.
The School has agreed that as colleagues we should try to have face-to-face meetings rather than relying on email, avoid emails over the weekend wherever possible (at least ones requiring an immediate reply), and generally adhere to good email etiquette
Advice on probation, staff development, annual reviews (DPRs) and promotion can be found on our intranet. The University also runs annual ‘Demystifying Promotion’ events.
Staff leave
Policies on annual leave (including purchasing additional leave) and study leave.
Advice on maternity, paternity, adoption, and shared parental leave; baby changing facilities on campus, the University’s mentoring scheme for returning parents and the Working Parents Network.
Warwick Academic Returners Fellowship
This enables academic colleagues to be freed from teaching and administrative responsibilities upon their return from maternity leave and refocus on research
Warwick Conference Support Awards
Awards of up to £100 are available to academic, research active staff and those in appropriate support or administrative posts to help support the extra child-care costs associated with attendance at conferences.
Email: law at warwick dot ac dot uk
School of Law, University of Warwick, Coventry CV4 7AL, United Kingdom
Page contact: Law.Technology Resource
Last revised: Mon 14 May 2018
|
cc/2020-05/en_middle_0032.json.gz/line8425
|
__label__wiki
| 0.580386
| 0.580386
|
Category Archives: smoked goldeye
Our Icelandic North American Heritage: food
Posted on March 6, 2012 by william
Icelandic Canadian perogis with high bush cranberry jelly
Our Icelandic food heritage is greatly different from our Icelandic North American food heritage. How could it not be?
Ingredients in Iceland were severely limited. With one crop, grass, with meat and milk as staples, with fish that had to be preserved by drying, with no grain except what could be imported and that was nearly always rye, with even the hay crop failing sometimes because of cold summers, Icelandic women had few resources. Throw in a lack of fuel and, as a result of that, no stoves or ovens, and what Icelandic women did create bordered on the miraculous.
In the beginning, New Iceland was a food disaster. Nets too big, a lake that froze over, no cows for milk, land overgrown by thick bush, no experience hunting.
But that didn’t last long. With aboriginal help, hunting was learned, fishing under the ice was learned. Ground was cleared, root crops were planted. Grain was planted. Cows were obtained. There was lots of wood for stoves.
Right from the beginning, New Iceland wasn’t exclusively Icelandic. There were non-Icelanders already settled there. The most obvious were the local aboriginal people. There were Scots and Orkney men. They could not be expelled and the boundaries of New Iceland could not be hermetically sealed.
The first Icelandic settlers arrived in 1875, followed by the big group in 1876. In 1887 in the origins of the population were 835, Icelandic, 31 Scottish, 7 English, 1 French, 12 Scottish Metis, 1 Swedish and 1 Danish. In 1897 this dominance of Icelandic settlers would end. Icelandic immigration had fallen off and many Icelandic settlers, attracted by better land and greater opportunities elsewhere, left New Iceland. The government opened up the area to anyone. Immediately, the first Ukrainian settlers arrived and settled in the Foley and Willow Creek districts. These were followed by Poles, Ukrainians and Germans.
The first Ukrainians to settle in the New Iceland area had come a long and difficult way. Emigrants who left the village of Kopychentsi, traveled by train to Lviv. From there to Antwerp. Then to Liverpool and, after a two week crossing of the Atlantic, to Halifax, then by immigrant train to East Selkirk. From there to Gimli. Their arrival made them part of our New Iceland heritage. By the time I was born in the late 1930s, while Gimli still had an Icelandic character with Icelandic being spoken in many homes, my school mates were from all the groups mentioned and many students, like me, had one parent who wasn’t Icelandic.
My Gimli food was the smorgasbord of a new land. My meals were made of rabbit, venison, beaver tail, moose, pickerel fillets, stuffed whitefish, smoked sunfish, smoked Goldeye. I ate Ukrainian, German, Polish food. My mother cooked, not on a hearth in a stone floor but on a wood stove with an oven and every year someone brought cords of wood to stack in the back yard and, then, someone else came and sawed it and split it. Once I was big enough, it was my job to throw the wood into the basement. I took it for granted that we had a basement, that our house was made of wood, the roof shingled, instead of being made of layers of rock and turf.
Cookbooks reveal society and one of my mother’s locally made cookbooks reveals our culinary heritage. It’s made up of Mrs. T. E. Thorsteinson’s Apple Pie with crumb topping, Mrs. H. G. Hunter’s Pumpkin Pie (pumpkin was a new world food unknown in Europe), Mrs. S. Eyjolfsson,s Tomato mince meat, Marshmallow Delight by Mrs. E. Montague, Mrs. Vopni’s Green Pepper salad, and there is Strawberry Jam, Apricot Preserve, Cranberry Jelly. Mrs. A. Sigurdsson from Foam Lake, Sask makes Nine Day Cucumber Pickle while Mrs. F. Lindal makes Seven Day Sweet Mixed Pickles.
There are 128 pages. Only two pages of Icelandic Dishes. Flatbruað, Kæfa, Skyr, Mysuostur, Pönnukökur, Rúllupylsa, Fiskibollur, Lifrarpylsa, Sago Soup. Enough has changed that Mrs. B. Pell, of Leslie, Sask. felt it necessary to explain that Mysuostur is an Icelandic whey cheese.
The women nearly all have Icelandic names and those who don´t, I expect, are Icelandic but have married non-Icelanders. They’re cooking with items they could not have dreamed of having in Iceland. Lots and lots of wheat flour, canned pineapple, chicken, peppers, corn, spaghetti, apples, pears, oranges.
In our house, we ate no dried cod, no singed sheep heads, no rotted shark, no Icelandic moss, no ram’s testicles. We only ate barley in vegetable soup.
My food heritage was made of occasional Icelandic food, blood sausage, skyr, ponnokokur, vinarterta, kleinar but equally often, of perogis (although we often ate them with high bush cranberry jelly instead of sour cream), hollopchi, borscht, kubysa, poppyseed cake. It was made up of freshwater fish. Of wild game. It was made up of fruit pies (Saskatoon pie, Saskatoon pie, If I don’t get some I think I’m going to die), a wide variety of seasonal vegetables, of white bread, of green grapes and apples and oranges and, in season, plums and pears and peaches. My fondest food memories are of beef stew and dumplings, of lemon pie, of shepherd’s pie and my grandmother’s unmatchable baking powder biscuits with homemade strawberry jam.
We weren’t rich. My father was a commercial fisherman and, in the off season, a barber. But we weren’t poor, either. My Canadian food heritage has been a cornucopia from which spill out things like maple syrup, clover honey, crab apples, high bush cranberry, stuffed whitefish, morels, moss berry tarts. It includes short breads and making toffee on winter evenings, popcorn, hot chocolate after skating. Weiners roasted over an open fire, relish, mustard. Hamburgers with the works. Rolled sandwiches with Velveeta cheese and a pickle in the centre.
My food heritage, at just one level, was Canadian because the ingredients were mostly sourced in Canada. It was Canadian because it was the result of a multi-cultural mix even before the community itself had become multi-cultural, when all the contributors to my mother’s cookbook still had nearly all Icelandic names.
We tend not to think about our Icelandic Canadian food heritage but the smorgasbord of food we ate (Sam Toy’s Chinese food in the Gimli Cafe; the food we shared at Ukrainian weddings; the English, Irish and Scot’s foods we ate at the neighbours; the aboriginal foods (bannock, wild rice, blueberries) on our table are all part of that Icelandic North American heritage.
Posted in comfort food, cookbooks, ethnic food, heritage, Iopychentsi, Lviiv, New Iceland, saskatoons, smoked goldeye, Ukrainians | Leave a reply
|
cc/2020-05/en_middle_0032.json.gz/line8429
|
__label__cc
| 0.738284
| 0.261716
|
The Ultimate Guide to Veterans Disability Claims
Practical & Powerful Tips to Get The VA Compensation Benefits You Deserve!
Ask A Question Mailbox
Independent Medical Opinions & Nexus Letters
Published by SemperFiGeek on September 17, 2018 September 24, 2018
A “nexus letter” is a document prepared for a claimant by a medical professional that explicitly connects an in-service event to the current medical condition for which a claimant is seeking compensation. A claimant is not required to submit a nexus letter, but such a letter can make the difference between an award and a denial. A nexus letter can be submitted with an initial application, during claim development, or after an adverse C&P exam. Submitting a properly worded nexus letter as early as possible in the process, however, is good practice.
A nexus letter is especially important in cases where a claimant has not submitted any medical evidence and a C&P examiner concludes that there is no connection between a claimant’s condition and military service. Without a nexus letter, the claim will be denied. Even when a claimant supplies supporting medical evidence with an application, VA raters can and often do choose the opinion of the VA examiner over a private physician’s opinion for many reasons. In such a case, a “nexus letter” from a private physician is necessary to respond to the C&P examiner’s conclusion.
One reason for raters favoring VA examiner’s conclusions regarding a nexus when there are conflicting or unclear medical opinions is that VA examiners are more familiar with the terms that raters look for when deciding a claim. As described above, VA regulations require only that it be “at least as likely as not” that a condition be related to service for an award. This means that the likelihood of service connection is equal to or greater than 50% (a 50/50 chance or better).
Most medical professionals, however, are not familiar with the VA system or the VA concept of “at least as likely as not.” Physicians are generally familiar with the concept of “medical certainty,” which is a much higher standard than that required by VA. As a result, private physicians may apply the wrong standard if the VA terms are not explained to them. Even then, a private physician may be reluctant to state a conclusion regarding nexus and, if they do, may qualify their conclusion with terms such as “may,” “could,” “suggests,” or “possibly.” VA will often point to such qualifying terms as not meeting the legal standard for establishing a nexus, although the physician actually believed that the condition was more than 50% likely service connected.
To prevent such misunderstandings, a claimant should make sure that the medical professional asked to provide a nexus letter understands the importance of the letter and of using the VA “magic words” to correctly state the physician’s medical opinion. The terms “more likely than not” (meaning greater than 50% likelihood of a connection) and “at least as likely as not” (meaning equal to or greater than 50% likelihood of a connection) are important to use so that VA will have to recognize the nexus letter as supporting service-connection. Any other terms may be misunderstood or misconstrued by VA into something not supporting service-connection. Bringing the relevant C&P Examination Worksheet to the examination or providing it to the medical professional may be helpful.
Benefits, C & P Exams, How-To, Medical Records, Service Connection, Tips, VA Disability ClaimsIndependent Medical Opinion, Nexus Letter, VA Claims, VA Disability, Veterans
Applying (15)
Backpay (3)
C & P Exams (7)
Ebenefits (3)
Effective Date (2)
Intent To File (1)
Service Connection (15)
TDIU (1)
Unemployability (1)
VA Accredited Claims Agent (3)
VA Accredited Claims Agent Exam (3)
VA Appeals (13)
VA Disability Claims (38)
VA Records (1)
VA Disability Chat
Copyright © 2020 The Ultimate Guide to Veterans Disability Claims
|
cc/2020-05/en_middle_0032.json.gz/line8432
|
__label__cc
| 0.680723
| 0.319277
|
Dysrhythmias and heart failure complicating acute myocardial infarction: An emergency medicine review
William T. Davis, Tim Montrief, Alexander Koyfman, Brit Long
Introduction: Patients with acute myocardial infarction (AMI) may suffer several complications after the acute event, including dysrhythmias and heart failure (HF). These complications place patients at risk for morbidity and mortality. Objective: This narrative review evaluates literature and guideline recommendations relevant to the acute emergency department (ED) management of AMI complicated by dysrhythmia or HF, with a focus on evidence-based considerations for ED interventions. Discussion: Limited evidence exists for ED management of dysrhythmias in AMI due to relatively low prevalence and frequent exclusion of patients with active cardiac ischemia from clinical studies. Management decisions for bradycardia in the setting of AMI are determined by location of infarction, timing of the dysrhythmia, rhythm assessment, and hemodynamic status of the patient. Atrial fibrillation is common in the setting of AMI, and caution is warranted in acute rate control for rapid ventricular rate given the possibility of compensation for decreased ventricular function. Regular wide complex tachycardia in the setting of AMI should be managed as ventricular tachycardia with electrocardioversion in the majority of cases. Management directed towards HF from left ventricular dysfunction in AMI consists of noninvasive positive pressure ventilation, nitroglycerin therapy, and early cardiac catheterization. Norepinephrine is the first line vasopressor for patients with cardiogenic shock and hypoperfusion on clinical examination. Early involvement of a multi-disciplinary team is recommended when caring for patients in cardiogenic shock. Conclusions: This review discusses considerations of ED management of dysrhythmias and HF associated with AMI.
American Journal of Emergency Medicine
https://doi.org/10.1016/j.ajem.2019.04.047
Hospital Emergency Service
Ventricular Function
Positive-Pressure Respiration
Left Ventricular Dysfunction
Dysrhythmia
Davis, W. T., Montrief, T., Koyfman, A., & Long, B. (2019). Dysrhythmias and heart failure complicating acute myocardial infarction: An emergency medicine review. American Journal of Emergency Medicine. https://doi.org/10.1016/j.ajem.2019.04.047
Dysrhythmias and heart failure complicating acute myocardial infarction : An emergency medicine review. / Davis, William T.; Montrief, Tim; Koyfman, Alexander; Long, Brit.
In: American Journal of Emergency Medicine, 01.01.2019.
Davis, WT, Montrief, T, Koyfman, A & Long, B 2019, 'Dysrhythmias and heart failure complicating acute myocardial infarction: An emergency medicine review', American Journal of Emergency Medicine. https://doi.org/10.1016/j.ajem.2019.04.047
Davis WT, Montrief T, Koyfman A, Long B. Dysrhythmias and heart failure complicating acute myocardial infarction: An emergency medicine review. American Journal of Emergency Medicine. 2019 Jan 1. https://doi.org/10.1016/j.ajem.2019.04.047
Davis, William T. ; Montrief, Tim ; Koyfman, Alexander ; Long, Brit. / Dysrhythmias and heart failure complicating acute myocardial infarction : An emergency medicine review. In: American Journal of Emergency Medicine. 2019.
@article{284594f188a44d2b833e9748706b45f7,
title = "Dysrhythmias and heart failure complicating acute myocardial infarction: An emergency medicine review",
abstract = "Introduction: Patients with acute myocardial infarction (AMI) may suffer several complications after the acute event, including dysrhythmias and heart failure (HF). These complications place patients at risk for morbidity and mortality. Objective: This narrative review evaluates literature and guideline recommendations relevant to the acute emergency department (ED) management of AMI complicated by dysrhythmia or HF, with a focus on evidence-based considerations for ED interventions. Discussion: Limited evidence exists for ED management of dysrhythmias in AMI due to relatively low prevalence and frequent exclusion of patients with active cardiac ischemia from clinical studies. Management decisions for bradycardia in the setting of AMI are determined by location of infarction, timing of the dysrhythmia, rhythm assessment, and hemodynamic status of the patient. Atrial fibrillation is common in the setting of AMI, and caution is warranted in acute rate control for rapid ventricular rate given the possibility of compensation for decreased ventricular function. Regular wide complex tachycardia in the setting of AMI should be managed as ventricular tachycardia with electrocardioversion in the majority of cases. Management directed towards HF from left ventricular dysfunction in AMI consists of noninvasive positive pressure ventilation, nitroglycerin therapy, and early cardiac catheterization. Norepinephrine is the first line vasopressor for patients with cardiogenic shock and hypoperfusion on clinical examination. Early involvement of a multi-disciplinary team is recommended when caring for patients in cardiogenic shock. Conclusions: This review discusses considerations of ED management of dysrhythmias and HF associated with AMI.",
keywords = "Acute myocardial infarction, Atrial fibrillation, Bradycardia, Cardiogenic shock, Dysrhythmia, Heart block, Heart failure, Ventricular tachycardia",
author = "Davis, {William T.} and Tim Montrief and Alexander Koyfman and Brit Long",
doi = "10.1016/j.ajem.2019.04.047",
journal = "American Journal of Emergency Medicine",
T1 - Dysrhythmias and heart failure complicating acute myocardial infarction
T2 - An emergency medicine review
AU - Davis, William T.
AU - Montrief, Tim
AU - Koyfman, Alexander
AU - Long, Brit
N2 - Introduction: Patients with acute myocardial infarction (AMI) may suffer several complications after the acute event, including dysrhythmias and heart failure (HF). These complications place patients at risk for morbidity and mortality. Objective: This narrative review evaluates literature and guideline recommendations relevant to the acute emergency department (ED) management of AMI complicated by dysrhythmia or HF, with a focus on evidence-based considerations for ED interventions. Discussion: Limited evidence exists for ED management of dysrhythmias in AMI due to relatively low prevalence and frequent exclusion of patients with active cardiac ischemia from clinical studies. Management decisions for bradycardia in the setting of AMI are determined by location of infarction, timing of the dysrhythmia, rhythm assessment, and hemodynamic status of the patient. Atrial fibrillation is common in the setting of AMI, and caution is warranted in acute rate control for rapid ventricular rate given the possibility of compensation for decreased ventricular function. Regular wide complex tachycardia in the setting of AMI should be managed as ventricular tachycardia with electrocardioversion in the majority of cases. Management directed towards HF from left ventricular dysfunction in AMI consists of noninvasive positive pressure ventilation, nitroglycerin therapy, and early cardiac catheterization. Norepinephrine is the first line vasopressor for patients with cardiogenic shock and hypoperfusion on clinical examination. Early involvement of a multi-disciplinary team is recommended when caring for patients in cardiogenic shock. Conclusions: This review discusses considerations of ED management of dysrhythmias and HF associated with AMI.
AB - Introduction: Patients with acute myocardial infarction (AMI) may suffer several complications after the acute event, including dysrhythmias and heart failure (HF). These complications place patients at risk for morbidity and mortality. Objective: This narrative review evaluates literature and guideline recommendations relevant to the acute emergency department (ED) management of AMI complicated by dysrhythmia or HF, with a focus on evidence-based considerations for ED interventions. Discussion: Limited evidence exists for ED management of dysrhythmias in AMI due to relatively low prevalence and frequent exclusion of patients with active cardiac ischemia from clinical studies. Management decisions for bradycardia in the setting of AMI are determined by location of infarction, timing of the dysrhythmia, rhythm assessment, and hemodynamic status of the patient. Atrial fibrillation is common in the setting of AMI, and caution is warranted in acute rate control for rapid ventricular rate given the possibility of compensation for decreased ventricular function. Regular wide complex tachycardia in the setting of AMI should be managed as ventricular tachycardia with electrocardioversion in the majority of cases. Management directed towards HF from left ventricular dysfunction in AMI consists of noninvasive positive pressure ventilation, nitroglycerin therapy, and early cardiac catheterization. Norepinephrine is the first line vasopressor for patients with cardiogenic shock and hypoperfusion on clinical examination. Early involvement of a multi-disciplinary team is recommended when caring for patients in cardiogenic shock. Conclusions: This review discusses considerations of ED management of dysrhythmias and HF associated with AMI.
KW - Acute myocardial infarction
KW - Cardiogenic shock
KW - Dysrhythmia
KW - Ventricular tachycardia
U2 - 10.1016/j.ajem.2019.04.047
DO - 10.1016/j.ajem.2019.04.047
JO - American Journal of Emergency Medicine
JF - American Journal of Emergency Medicine
10.1016/j.ajem.2019.04.047
|
cc/2020-05/en_middle_0032.json.gz/line8436
|
__label__cc
| 0.534452
| 0.465548
|
Escape to the Movies: Maleficent - An Unusual Fairy Tale of Revenge
Pages PREV 1 2 3 4 NEXT
Xman490
36 POSTED: 30 May 2014 13:18
The second act here might not be as "weird and clunky" as it is just cliched. It's a familiar sequence of events in which a very powerful not-quite-human character learns about how good mankind can be and decides not to destroy at least part of it.
Frozengale
Ronack:
So, we should never watch your video's again because they're going to contain spoilers every, single time. >_>
Seems like it. I'm getting pretty sick of Bob not being able to actually discuss a movie without spoiling huge plot points. Probably not worth it to watch his stuff anymore.
AgDr_ODST
Uriel_Hayabusa:
Bob's review convinced me to check it out just for the hell of it. This movie sounds like such a crazy idea that I can't help but want to see it with my own eyes.
Oh, and I don't think Jafar would be the ideal candidate for a revisionist retelling; I think it could work for Scar or the villain from Frozen, though. Maybe Gaston as well.
I'm torn regarding the idea of Jafar getting his story rewritten.[1] I do think a Gaston rewrite could be excellent if it turned out that among other things, Beauty gets Stockholm Syndrome during her time with Beast who really is just a dangerous animal, and the 'castle' could either be an abandoned one that the beast moved into or a cave filled with some familiar junk that Beauty decides can talk so that the grim, depressing nature of her situation doesn't drive her insane. Gaston could be someone who has loved her since they were kids, but because of his slight social ineptness he picks on her and comes across as bully because he can't bring himself to admit his feelings.
[1] Saw a great idea but I hate the ideas of either Aladdin being the villain or Jasmine falling for Jafar.
Azhrarn-101
tdylan:
So...take my 6 year old, Disney Princess obsessed daughter to see this, or not?
Considering this is either PG-13 or higher (I have no idea what the US rating is, in Europe it's PEGI 12).
I don't think it's a good idea, unless your daughter is mentally quite mature for her age.
This is a scary, ultra-dark version of a Disney fairy tale, if she's like the average 6-year-old she'll have nightmares for weeks if you're lucky.
Sylocat
bladeofdarkness:
THEY ALREADY DID JAFAR !!!.
there is a musical called "Twisted" which wickedfy the story of Aladdin and turns Jafar into the incredibly sympathetic hero, while being a very faithful adaptation of the disney film in terms of events.
you can see the entire on Youtube.
its crazy awesome.
"All I wanted was a coat made out of puppies!"
"WHY WOULD YOU DO THAT?!"
PunkRex
O... kay, well i'm sure as hell giving it a watch.
Does anyone else cringe when Jolie tries an English accent, or is it just me?
Imrix
I think I saw a little more nuance in Maleficents time bonding with Aurora, or possibly just a different stock progression.
Her time meeting and bonding with Aurora didn't really seem like redemption through letting go of her revenge so much as narrowing the focus.
The realization that in her quest to spit Stefan's head on a goddamned pike, she dragged a beautiful soul into the mud and blood of her warpath.
Recall that when she goes to Stefan's castle, she refers to it as 'her fight'. I never really got the impression that she was going back just to save Aurora, but instead to visit revenge on Stefan the way she should have to begin with; on him, personally, not striking at him through things he cares about.
Her final confrontation with Stefan felt less like letting him go, and more like she didn't see any point in killing him. She'd already reclaimed her wings, defeated him in his own home and stolen his daughter from him. There was nothing left in him that was worth killing; just a mad, broken shell of a man.
Which is not to say it didn't have problems, but I felt its problems were more a matter of being awkward in places. It could've done with a good deal less narration for certain.
You know, I had my doubts...but this actually sounds like it could be a lot of fun. =D
2xDouble
Moral of the story: All stories are lies, no matter who is telling it.
Here's my problem:
Since when does Maleficent, of all people, need to be sympathetic? She does what she does because she felt like doing it; because she could, not because of some asshole hurt her feelings. Before she was a bold, powerful creature of pure will, completely in control of herself and her destiny (for the most part), and now she's nothing; a victim, her agency completely stripped from her first by a man she thought she loved and then by a child she didn't want. (That "implied rape" goes deeper than onscreen action, does it not? well played, Disney... I think.)
So it's perfectly fine for some men just wanting to watch the world burn, but women? no, that's to much for her. She must have been raped.
Muspelheim
Couldn't she have murdered the king and paved the way for her new, unexpected protegé? Revenge claimed, political rival removed and someone she can reason with on the throne. Should be a piece-a piss for a super-witch. But then again, babies might be magic.
Further: Glory to Jafar, the true Sultan!
Soviet Heavy:
A Jafar story in this vein would probably be set in the fucking Crusades.
Lionheart from Robin Hood better make an appearance.
tangoprime
That idea... might not be completely unwatchable.
Ghadente
Darth_Payn:
to be truthful, I tend to cringe when I learn that Jolie is even in a movie. Nothing about her or her acting appeals to me.
CelestDaer
Disney has already released a teaser for Cinderella, featuring a minute long circling shot on the glass slipper (which is less a slipper and more a nine inch high heel stripper shoe...)
I'm still very interested in actually seeing this movie, even if it is a bit muddled and bizarre.
The Rogue Wolf
Well, the effectiveness of it notwithstanding, it's nice to see Disney try something a little avant-garde and "out there" with one of their tried-and-true franchises. If only we could see more stuff like this and Kingdom Hearts, and fewer direct-to-DVD churned-out sequels.
Also, why is it that everyone assumes Bob wants to see Jafar's origin story? Maybe he wants to see the beginning of Iago's start of darkness ear-destroying unfunny comedic sidekick career.
Darmani
Diddy_Mao:
Hmm. I've never really understood the appeal of Angelina Jolie as an actor but I'll admit she has a presence in this role that at least intrigues me and I do admit I love the visual style they've gone for.
The review/critique at least gives me hope for an interesting ride if nothing else.
Andrew Siribohdi:
I'm surprised at the whole 'sympathetic villain' backlash movies like Maleficent have been getting.
I thought giving dimension to characters, through backstory and perspective change, was the way to give them depth.
It's a tricky tightrope to walk though. Staging events to make villainous actions relatable or even potentially justified is one thing and when done well they can provide an alternate take on a character that I'm more than prepared to accept.
My primary complaint with the setup to Maleficent was that I don't want to see a complete revisionist story that repaints her as the hero of the story.
What I'm more concerned with is taking an established setting and characters and revising the structure to make the villain into the hero.
Like the overgrimmed fairytales its an idea taken too far and act first had class act reasons (Macguire's output is effectivelly putting gay and nonnormal people BACK into the iconic works they feel disconnected with, Wicked is effectively an oz story for the counterculture kid of the 90s)
Also its.. well not unique anymore so with more examples we get more, embarassing realization its not sophisticated. ITs SOAP OPERA (the big complaint of OUAT, villains aren't just bad people like.. well real life)
That's it. At best you need to dirty up the good guys, which vilifies and detracts from them. And the best way is to not use fairy tales but what inspired them or do a lot of ground work to make a historically consistent context. And that's HARD WORK (to fail act see latter half of ASoIAF)
2xDouble:
The only traditionally powerful figures of women are villains or chaotic forces, UNLESS they are nurturers or just gals doing guy things. ITs why Artemis is the emblem of girl power of the greek deities NOT Athena who actually got off her ass and did shit. Because artemis is aggressively NOT tied to fulfilling a role for men and defines her boundaries.
This means the villainesses are often women's heroes, they are the ones with power, goal, sexuality, and agency stuff females who are humans have, as to the rather bland shells of heroism even where girls take the lead ala Hansel and Gretel. So if you have a woman with power you kind of have to justify why she's being awful with it and "she was hurt" is something everyone can get onboard with while "just cause" is ALWAYS interpreted as villifying female agency as female with agency is the villain and is evil just out because. ITs the you versus girls suck at math thing.
Kumagawa Misogi
Azhrarn-101:
Is it? it's only PG in the UK which is lower than any of the Marvel films.
shadowmagus
I won't go see it in theaters that's for sure, but when it comes up Netflix or something, I'll probably give it a look.
I had similar feelings about it as well, I am not sure if we're supposed to love or hate Maleficent as a character.
BloodRed Pixel
So Jolie finally learned how to act? Geez, this woman never got anything right other than looking cool or sexy, at least until real acting and character was required.
So alone for this I am intrigued.
Wow... I actually want to see this now, even though it didn't sound like MovieBob really recommended it all that much. Also, a Jafar movie? ...You know what, fine, let's do it!
MCerberus
They took an old Disney princess movie... and they gave it artistic merit beyond "it's pretty".
Well then.
Noelveiga
Jafar? Nah, next has to be Scar. Competent, ruthless politician finally gets a chance at running the country just as an unrelated natural catastrophe makes his approval rates plummet. Cue the return of the slob rich kid who has been wasting his life being high as a kite with his annoying trashy friends and sweeping the country through sheer charisma and family name recognition.
Yeah, this one's a tragedy.
Instead of just Disney animated properties why don't we expand in to anything movie wise. Imagine if the kind of madness they could create. But its just a pipe dream.
RandV80
Ickabod:
The thing that gets me about this movie is, Who is it's audience?
It's not for kids or families
It's not for teenagers
It's not for males craving CGI transformers type of action
I doubt it's going to appeal towards women (not being one I couldn't say for sure, but wife has no interest).
It's not an art house type of movie
So I'm really asking, who is this movie made for?
Well Disney/ABC currently has there TV show Once Upon a Time which is quite popular that does this sort of subversion all the time... although maybe a little less dramatic (judging by the review) and always on a TV budget. But anyways on the show we've seen things like the Evil Queen (from Snow White) join the 'good' team, and Peter Pan play a major asshole villain while Captain Hook is the good guy.
Considering it's got a 4th season on the way with no signs of stopping and even spawned a spinoff series (haven't watched that one), I'm guessing that's where the inspiration for these 'villain' movies came from, and where the core audience will come from. For some reason the Twilight movies seemed to spawn a string of 'fairy tale' like movies, so that's another massive audience that will probably carry over.
So, after seeing the trailers, I could see that this was probably not going to be more than a 3 star movie, but that if it was just Angelina Jolie as Maleficent kicking butt and being a magnificent bastard for 90 minutes it just might work. Back then I figured that trying to make her symphatetic would defeat the purpose of the character. After hearing this synopsis, I'd say I was wrong about what the film was going to be because it went into places I could not have imagined Disney willing to go.
Honestly, I feel like this might be one of the films that will leave me with a bad ending, but my curiosity is peeked, since Bob is praising the evil segments that I was looking forward to in the first place.
Noelveiga:
Don't forget gay.
That's a big thing. Sure all of Disney's male villains are foppish and effete and vain; but with scar is near canonical with him playing the role of the evil uncle in macbeth and the ONLY hand he lays on Sarabi being snapping in rage, his most devoted female follower NOT giving birth to him and the closest thing to his heir is explicitly called out as NOT his biological son...geeh that's. uhm quite a thing there.
hentropy
It seems like this and Frozen has created a new theme for Dinsey, the idea of debunking or deconstructing some of the very simplistic and, let's face it, misogynist old-world Disney fairy tales into something much more complex and nuanced. True love exists but it doesn't come quickly or easily, some people are pretty bad/evil but they're not evil for no reason and it's all relative.
I'm not entirely convinced this is even the right way to go, the target shouldn't be cynicism, at the same time I can't really say it's a horrible thing that some of the stuff that doesn't look as relevant in a modern context is being put in different contexts.
Valderis
What's this, Disney completely ruining one of their most badass characters?
Why am I not surprised. *sigh* I fucking called it.
Smurf McSmurfington
Sounds... very, very interesting.
RJ Dalton
I was expecting this to be a "Snow White and the Huntsman" style shit-fest. But your description actually sounds like it might be worth checking out. As a rental, obviously, I'm not going to pay full theater price for something like this, but a movie that's bad in an interesting way is certainly more entertaining than a film that's bad because it's just trying to be cookie-cutter blandness personified.
linforcer
Despite the apparent clunk, this sounds AWESOME. I am down to see this.
ExtraDebit
Don't listen to this review, while bob is mostly right in his other reviews, he produced a very shallow perspective on this one.
The thing that is so great about this movie is that previous disney movies or princess movies are inherently flawed and naive. They always portrait the kingdoms the princess lived in were perfect with a wise king and kind followers, but we know in history and in reality that's not how things are. Human are greedy self serving bastards, it's a hard thing to admit but we are....which was shown in the first act of the movie. Maleficient wasn't portrait as a hero, or that the humans were the bad guys, the humans were just doing what human does in medieval era and she's just refused to be bullied and defended herself.
The kid she fell in love with didn't kill her and took her wings instead because even if his ambition is more important to him, she's still his childhood friend. Is it really so hard for bob to understand it isn't easy to kill someone you known all your life? And neither can she kill him because of the same reason?
The second act makes perfect sense too, when you spend enough time with someone, even if it's someone you don't initially liked, you will grow fond of them....and Maleficient spend 15-16 years with this child. Is it so hard to grasp that you can bond with someone after spending 15 years with them?
The redemption arc DOES work, Maleficient was portrait as good in the beginning, it is just what her boyfriend did to her that turned her dark, but transformation can go both ways, where her boyfriend turned her dark, the baby she cursed returned her back to the light. For someone who was inherently good, it isn't hard to believe that their experience can reawaken the good inside of them.
This movie isn't for kids, I'm not even sure it's for some adults, it's for someone that HAD a naive view of love and awaken from it. People who never been in love, had their hearts broken or still think that true love is between a man and a woman will not fathom this movie.
In addition, if you watch this movie with too much of a literal eye you wouldn't enjoy it much. Instead try to look at it as a metaphor or poetry.
The first act can be seen as someone falling in love and think the other person is the world, a lot of us have been there and can surly empathize.
Remember how our gf/bf want to breakup with us for whatever reasons but they don't want to hurt us too much because of guilt but it hurt no less after the fact? That's the act of her getting her wings torn.
We then brood and think that life isn't fair and how can the other person be such a bitch and feel that everything is fucked, that's the act of her going dark.
After awhile we find something or someone else to occupy our time, that's the princess arc, and eventually we get over our lost love, that's the "redemption" part but I see it more as self healing act or reawaken old qualities.
The most brilliant of it all is when we realized that there is more to "true love" than lush and infatuation between a man and a woman, and they portrait it perfectly in one act.
If you've been in love and had your heart broken and gained a new perspective on "love" after you gotten over it, then this movie is absolute poetry and it's BEAUTIFUL!
Oathfish
I literally didn't have any interest in this movie until I heard him say that it felt like it had been hijacked by a lunatic. This review right here is why I'm going to go see this.
|
cc/2020-05/en_middle_0032.json.gz/line8437
|
__label__wiki
| 0.647749
| 0.647749
|
At the Cinémathèque: ‘In the Realm of the Senses’ (Nagisa Ôshima, 1976)
By Justine Peres Smith on September 2, 2016 • ( Leave a comment )
Georges Bataille theorized that eroticism lies in the meeting of sexual desire and the transgression of the forbidden. As death remains the ultimate taboo, true eroticism becomes about the transgression of the ephemeral life and entering a perverted sense of grace. No film better embodies this quest for immortality than Nagisa Ôshima’s In the Realm of the Senses, based on the true story of Sada Abe, a Japanese woman who asphyxiated her lover and then cut off his penis and testicles. As the first part of a double feature including Stanley Kubrick’s Eyes Wide Shut, the film made for a perfect end to the Cinémathèque québécoise’s History of Eroticism program.
The sexual obsession at the heart of In the Realm of the Senses works against all sense of survival. Rather than equating madly obsessed lovers as animalistic, Oshima’s narrative presents them as tangibly human. While some animals die shortly after they mate (and an outlier marsupial literally mates until it dies), the quality of sexual obsession seems to be a human pursuit. More than just the quest for pleasure, the acts depicted by Oshima transcend any physical needs and reach towards a spiritual one. Abe’s story has not only attained the status of a cautionary tale, but has integrated itself so deeply within the realms of philosophy and art that Abe has, in effect, transcended her own death.
The unsimulated sex scenes become integral to Oshima’s vision, connecting the truth of real sex to the transgression of depicting the human figure on screen. In The Realm of the Senses is not pornography, however, as the subgenre has never been a narrative form. Adult films are about performance above all else, in the sense of both representing a literal action and the act of staging something understood to be fake. The veil of artificiality lets a willing audience engage with the unsimulated sexual acts at a comfortable distance, where they are able to enjoy the material as a tool for gratification. Too much intimacy elicits more discomfort than pleasure, and as Oshima’s work engages with unsimulated acts, he intimately challenges the label of pornography. In presenting real sex, Oshima transgresses on the forbidden nature of sexuality as a private and personal experience. In the Realm of the Senses acts consciously to break down taboos to liberate the audience from their own obsessions.
Rather than reach for eroticism, however, Oshima tries to transcend it. Erotic desire connected to death not only offers a moral problem but a deeply spiritual one within his work. Unlike Bataille, who saw eroticism as a kind of human poetry, Oshima sees it as a more destructive force. The indulgence in a transgressive desire does not achieve a higher sense of being but refutes the warmth and pleasures of the mortal life. Sex itself, removed from the tangled obsessions of the erotic, becomes a symbol of life and pleasure rather than a self-effacing tool propelling us towards our own deaths. In the forbidden, Oshima reveals the fear of our own meaninglessness and our inability to face death as a certainty.
Justine Smith (@redroomrantings) lives and writes in Montreal, Quebec. She has a bachelor’s degree in Film Studies and a passionate hunger for all kinds of cinema. Along with writing for Vague Visages, she has written for Vice Canada, Cleo: A Feminist Journal and Little White Lies Magazine.
Categories: 2016 Film Essays, At The Cinémathèque by Justine A. Smith, Columns, Featured, Film Essays, Freelancer Writers, Justine A. Smith
Tagged as: 1976, 909, 912, 913, Ai no korîda, Aoi Nakajima, At The Cinémathèque by Justine A. Smith, Biography, Cinémathèque québécoise, Cinema, Drama, Eiko Matsuda, Erotica, Eroticism, Eyes Wide Shut, Film, Georges Bataille, Horror, In the Realm of the Senses, Justine A. Smith, Montreal, Nagisa Oshima, Sada Abe, Stanley Kubrick, Tatsuya Fuji, Vague Visages
Of Love and Other Demons: ‘Hardcore’ (Paul Schrader, 1979)
Two Drink Minimum: ‘David Cross: Making America Great Again!’ (Netflix)
|
cc/2020-05/en_middle_0032.json.gz/line8439
|
__label__cc
| 0.611555
| 0.388445
|
the john muir exhibit - people - george swain - famous people influenced by john muir - john muir exhibit
George Swain
George Swain was known as "Walking, Talking George" in his home town of Boron, California, where he worked as a chemist at the Borax plant for 44 years.
George had three passions, John Muir, conservation, and classical music. He was a member of the John Muir Memorial Association for over 25 years, and attended every annual dinner. He was an outgoing person, who made friends easily, even though he did not fit the common mold. He had no car; but took the train everywhere he went.
As long time friend Pat Mosley, said, "George was truly a character and those of us who knew him can only say it was a pleasure to have known him and all the joy he brought to our ordinary lives." For more about George Swain, see Pat Mosley's Tribute to George Swain (Off-site link).
Obituary by East Kern Genealogical Society - on findagrave.com
George Swain - on Wikipedia.org
Famous People John Muir Influenced
Living People John Muir Influenced
Influential People in John Muir's Life
People Important to John Muir
|
cc/2020-05/en_middle_0032.json.gz/line8443
|
__label__wiki
| 0.513086
| 0.513086
|
N.J. bill would require voting machines to leave paper trail
A person casts its vote, Tuesday, Nov. 8, 2016, in The Heights neighborhood of Jersey City, N.J. (Julio Cortez/AP Photo)
Four Democrats in the New Jersey Assembly have introduced a bill that would require voting machines to leave a paper trail of each vote cast.
Assemblyman Andrew Zwicker says previous equipment failures and programming errors have resulted in costly disputes that cast doubt on election results. Zwicker says paper records would assure voters that their ballots are counted properly
Currently, the requirement for the purchase of new voting machines or retrofitting of existing machines to produce a paper record has been suspended until funding is made available.
The bill requires that each voting machine that is purchased or leased following the bill’s effective date would be required to produce a permanent paper record.
|
cc/2020-05/en_middle_0032.json.gz/line8448
|
__label__wiki
| 0.655886
| 0.655886
|
MWS is the abbreviation for "MasterWorkSpace". OpenOffice.org knows to 2 kind of MWSs:
Development codeline which is named DEV300. This is (kind of) unstable and will never end in a release.
Release codeline which is named like its release (e.g., OOO320 for OOo 3.2.0). Every feature release has its own MWS.
When moving forward for a release then a branch off from DEV300 to a new MWS will be done. From a MWS all new ChildWorkSpaces (CWS) are branched off.
Physically the MWS corresponds to the trunk of a main HG (Mercurial) branch. If you download a Developer Snapshot or a OOo release, these builds are always created from a MWS.
The idea behind MWS/CWS is that no development is directly done on a MWS. Instead all work is performed on a copy of the respective MWS. This copy then is referred to as a CWS. Only if the CWS is at least as good as the MWS (it may contain no regressions and all newly introduced features must be fully operational) it will be merged (integrated) into the MWS. Ideally this would mean that the MWS can be released at any time as a fully working drop. However, this only works in theory. Still the concept of MWS/CWS greatly reduces the number of new issues compared with a development only and directly in the MWS.
The idea behind branching off the development codeline to a release codeline is that the developers can do both: a) to work on stabilizing the code when going forward to a new release and b) to implement new things that do not belong to the upcoming release but to future versions.
When a CWS is created for a release MWS, this CWS will be cloned and integrated into the development MWS as well. This is to ensure that all fixes for the upcoming release are put into the development codeline as well.
Retrieved from "https://wiki.openoffice.org/w/index.php?title=MWS&oldid=174136"
|
cc/2020-05/en_middle_0032.json.gz/line8452
|
__label__cc
| 0.588312
| 0.411688
|
West Wight Sports Centre Trust – Complaints Policy
Adopted on: 26th June 2014 Last reviewed: 19th March 2019
West Wight Sports Centre views complaints as an opportunity to learn and improve for the future, as well as a chance to put things right for the person who has made the complaint.
Our policy is:
To provide a fair complaints procedure which is clear and easy to use for anyone wishing to make a complaint
To publicise the existence of our complaints procedure so that people know how to contact us to make a complaint
To make sure everyone at West Wight Sports Centre knows what to do if a complaint is received
To make sure all complaints are investigated fairly and in a timely way
To make sure that complaints are, wherever possible, resolved and that relationships are repaired
To gather information which helps us to improve what we do
Definition of a Complaint
A complaint is any expression of dissatisfaction, whether justified or not, about any aspect of West Wight Sports Centre.
Where Complaints Come From
Complaints may come from any person or organisation who has a legitimate interest in West Wight Sports Centre.
A complaint can be received verbally, by phone, by email or in writing.
This policy does not cover complaints from staff, who should use West Wight Sports Centre’s Discipline and Grievance policies.
All complaint information will be handled sensitively, telling only those who need to know and following any relevant data protection requirements.
Overall responsibility for this policy and its implementation lies with the Board of Trustees.
Written complaints may be sent to:
The Manager, West Wight Sports Centre, Moa Place, Freshwater, Isle of Wight, PO40 9XH
or by e-mail to clare.griffin@westwight.org.uk
Verbal complaints may be made by phone to 01983752168 or in person to any of West Wight Sports Centre’s staff or trustees at the same address.
Receiving Complaints
Complaints may arrive through channels publicised for that purpose or through any other contact details or opportunities the complainant may have.
Complaints received by telephone or in person need to be recorded.
The person who receives a phone or in person complaint should:
Write down the facts of the complaint
Take the complainant’s name, address and telephone number
Tell the complainant that we have a complaints procedure
Tell the complainant what will happen next and how long it will take
Where appropriate, ask the complainant to send a written account by post or by email so that the complaint is recorded in the complainant’s own words.
Resolving Complaints
In many cases, a complaint is best resolved by the person responsible for the issue being complained about. If the complaint has been received by that person, they may be able to resolve it swiftly and should do so if possible and appropriate.
Whether or not the complaint has been resolved, the complaint information should be passed to Clare Griffin, Centre Manager within one week.
On receiving the complaint, Clare Griffin will record it. If it has not already been resolved, she will delegate an appropriate person to investigate it and to take appropriate action.
If the complaint relates to a specific person, that person will be informed and given a fair opportunity to respond.
Complaints will be acknowledged by the person handling the complaint within one week. The acknowledgement will say who is dealing with the complaint and when .
A copy of this complaints procedure will be attached.
If the complainant feels that the problem has not been satisfactorily resolved at Stage One, they can request that the complaint is reviewed at Trustee level. At this stage, the complaint will be passed to the West Wight Sports Centre Trusts Complaints committee.
The request for review by Trustees will be acknowledged within one week and will say who will deal with the complaint and when the complainant can expect a reply.
The person who dealt with the original complaint at Stage One will be kept informed of what is happening.
Whether the complaint is upheld or not, the reply to the complainant will describe the action taken to investigate the complaint, the conclusions from the investigation, and any action taken as a result of the complaint.
The decision taken at this stage is final, unless the Trustees decide it is appropriate to seek external assistance with resolution.
External Stage
The complainant can complain to the Charity Commission at any stage.
Information about the kind of complaints the Commission can involve itself in can be found on their website at: http://www.charitycommission.gov.uk/detailed-guidance/protecting-your-charity/complaints-about-charities-cc47
Variation of the Complaints Procedure
The Trustees may vary the procedure for good reason. This may be necessary to avoid a conflict of interest, for example, a complaint about the Chair should not also have the Chair as the person leading a Stage Two review.
Monitoring and Learning from Complaints
Complaints are reviewed annually to identify any trends which may indicate a need to take further action.
Guidance for Staff Handling Verbal Complaints
Remain calm and respectful throughout the conversation
Listen – allow the person to talk about the complaint in their own words. Sometimes a person just wants to “let off steam”
Don’t debate the facts in the first instance, especially if the person is angry
Show an interest in what is being said
Obtain details about the complaint before any personal details
Ask for clarification wherever necessary
Show that you have understood the complaint by reflecting back what you have noted down
Acknowledge the person’s feelings (even if you feel that they are being unreasonable) – you can do this without making a comment on the complaint itself or making any admission of fault on behalf of the organisatione.g “I understand that this situation is frustrating for you”
If you feel that an apology is deserved for something that was the responsibility of your organisation, then apologise
Ask the person what they would like done to resolve the issue
Be clear about what you can do, how long it will take and what it will involve.
Don’t promise things you can’t deliver
Give clear and valid reasons why requests cannot be met
Make sure that the person understands what they have been told
Wherever appropriate, inform the person about the available avenues of review or appeal
Gym & Classes
West Wight Sports
& Community Centre
Moa Place
PO40 9XH
info@westwight.org.uk
|
cc/2020-05/en_middle_0032.json.gz/line8457
|
__label__cc
| 0.708454
| 0.291546
|
Posts Tagged ‘The Society of Seekers’
Glacius and the Poles
Posted: April 3, 2014 in Brass Tacks
Tags: cold, D&D, D&D fifth edition, D&D Next, DnD, dungeons and dragons, Glacius, gold, ice, mining, North Pole, Santa, sharks, South Pole, The Explorers' Guild, The Society of Seekers, undead, world building
You ever look at the North Pole and ask yourself, “Why in the Hell would Santa want to live there?” The answer is simple – his operation is so confidential he went to the one place no one could find him. Even if you know exactly where his operation is, good luck braving the elements to get there. I feel bad for the person who has to deliver all those letters to him. Seriously, a man with the power to see us at all times of the day should have an email address.
Exploration Age has blank spots on the map beyond The Damned Lands and Verda. The harsh environments of Glacius and the North and South Poles of Canus have kept even the toughest explorers at bay.
Glacius
Map of Glacius
Just North of Findalay lies a continent about the size of Parian covered in snow and ice. Glacius is one-third frozen ocean, one-third snow-covered plains, and one-third mysterious ice-covered mountain range with the occasional volcano and aberrant ruin thrown-in.
The snow plains of Glacius are a near constant blizzard, but thanks to the Society of Seekers and The Explorers’ Guild most of the area has been mapped. For those with the stomach for it, the snow plains offer some of the most spectacular sights in all of Canus. Rare beasts, a strange aberrant ruin full of mysterious labs, and bizarre weather phenomena make Glacius unlike any other place on the planet. All of these rarities are not as strange as the seemingly abandoned tunnels dug into the frozen snow. Where exactly the tunnels lead and what their purpose was is up for debate, as no expedition deep into the tunnels has ever come back.
Glacius’ frozen ocean is the most dangerous place to get rich quick. Frozen within the ice is gold dust. Ice-breaking ships manned by all-or-nothing crews make their way through the sea, trying to find the best places to saw out blocks of ice flecked with gold. These blocks are melted aboard the ship and the gold is then harvested. Of course, the frozen ocean has many of its own hazards such as weather, thin ice, hidden icebergs, polar bears, krakens, ice pirates, and more. Boats can get stuck inside the frozen ocean if they venture too far into the ice and the sea freezes their path behind them. In this case the crew can starve and freeze or abandon ship and try to survive out on the ice – a miserable existence. Perhaps the most frightening hazard upon the frozen ocean is The Undead Miner Army. Sailors tell tales of a greedy legion of wights who met their fate mining gold on the ice. These undead are always looking to increase their ranks and horde of gold by attacking the crews of the living. There may be truth to these rumors, since destroyed mining ships have been found with all their gold removed and not a single corpse ever in the bloodstained area.
Imagine… a legion of this guy!
The Ice Ranges of Glacius are the unmapped area of the continent. The ice-covered mountains have peaks higher than 20,000 feet. As a result, no one has ever ventured beyond the outer-most mountains so what occurs within the Ice Ranges remains a mystery. Occasionally a white dragon can be seen flying toward the mountains and those with keen ears can hear thunderous booms erupting from the inner peaks through the howling blizzard winds.
Two active volcanoes live in Glacius. Mt. Steam sits on an island in the frozen ocean. Some sailors claim to have seen a massive red dragon coming from or going to Mt. Steam, but those rumors have never been corroborated. The other volcano, Mt. Hyrias sits on Glacius’ coast and seems to constantly spew ash and lava into the sea. Mad soothsayers claim that the aberrants buried a weapon beneath this lava flow long ago and are soon going to return to use it and cover Canus in ash and fire.
If Glacius is remote and dangerous than Canus’ poles are the hardest-earned suicide mission Exploration Age has to offer. Barely explored, and less often survived, few know what the poles have to offer. To some that is a reason to stay away, but for others the challenge has become a draw. The Society of Seekers and The Explorers’ Guild have a bit of an unofficial race going between them. The Society has an independent pet project of exploring the South Pole while The Guild is exploring the North. Both are hoping to prove their superiority over the other by filling in the blank spots of their pole’s map first.
While both poles are cold, icy masses of frozen ocean with treacherous terrain and more dangerous weather, each does have its own unique hazards. The North Pole’s winds are stronger than any other on Canus. Whirlwinds of snow and ice can kick up at any moment, or gusts of wind could blow so strong that a traveler without ice cleats may be lifted off of the surface of the frozen ocean and carried into the air. Flying is not an option on the North Pole for any but the most powerful creatures.
Below the surface of the North Pole swim predatory creatures known as ice-breaker sharks. These crafty beings use the bony growths upon their heads to weaken the ice in a given area then surprise their prey by either breaking through the weak spot or allowing their target to fall through it before attacking. Either way ice breaker sharks can sense footsteps through the ice from up to a mile away and will begin preparing a hunting ground with plenty of these weak spots. They often allow their prey to travel far into the hunting grounds before attacking so they can surround the victims with weak spots, giving no option for easy escape.
Who wants to snuggle?
The South Pole is just as deadly as the North Pole. Winds are not as fierce, however the snow falls so heavily here it forms massive dunes that are treacherous to climb. The snow is uneven and could collapse at any moment, burying a traveler. As if the snow and weather weren’t enough, earthquakes constantly shake The South Pole, threatening to level and reform new snow dunes constantly, not to mention bury and knock adventurers off their feet. But the worst of the worst hazards in The South Pole is The Lingering Havoc.
No one is sure of The Havoc’s origin. Some say it is an ancient remnant of aberrant societies, some say it migrated from The Damned Lands or mysterious parts of Verda, and others believe there is a darker force somewhere deep within the South Pole controlling the force. Few have seen The Lingering Havoc and lived to tell of it. Those who have their minds permanently warped. Yet all those who describe The Havoc have a similar story to tell. Either coming out of the snowy depths or rising through the broken ice, a massive creature, more than 500 feet tall by many accounts. The Lingering Havoc is a hulking mass of bones and corpses of various humanoids, animals, and monsters that have somehow formed together into one colossal engine of destruction.
Other than their ongoing competition, why would The Society of Seekers and The Explorers’ Guild continue to risk it all over two seemingly worthless hunks of ice? Because there could be profit, adventure, glory, and discovery to be found over the next snow dune. Aberrant ruins that have yet to be picked over, a new race of intelligent beings, portals to other worlds, and more endless possibilities live in the minds of adventurers and PCs. It’s my promise to deliver on those expectations, provided they survive the harsh cold… and the ice breaker sharks… and The Lingering Havoc… you get the idea.
If you like what you’re reading, please check out my podcast on The Tome Show, follow me on Twitter, tell your friends about the blog, and/or leave me a comment and let me know you think. Thanks!
|
cc/2020-05/en_middle_0032.json.gz/line8459
|
__label__wiki
| 0.677785
| 0.677785
|
Toby Keith and Cole Swindell! That's Country Bro!
posted by Michael J - Jun 6, 2019
That's a lot of people to keep straight in a live performance on national tv. Great job Toby!
"That's Country Bro"
Jimmy Rogers, Patsy Cline, we lost Hank at 29
Roy Acuff, Johnny Horton and dancin' Bill Monroe
Woodie Guthrie, Bob Wills, Spade Cooley, Kitty Wells
Jimmy Dean and Big John and ole' Hank Snow
Heard em every weekend
Opry tuned in on that AM radio
Yeah, that's country bro
Dolly Parton, Johnny Cash, Porter Wagoner and the Hag
Faron, Lefty, Roger Miller King of the Road
Loretta Lynn and Tammy Wy, Buck and Don, and Charlie Pride
Marty Robbins and the Possum, ol' George Jones
Heard em all growin' up
In daddy's ole farm truck
8-track stereo
Hey, that's country bro
Gonna be country
A little bit of somethin'
Bout the roots and the boots
And the rhinestone suits
That started this rodeo
Emmylou and Conway Twitty, mmm-Mel and Detroit City
Crystal Gayle, and Willie, Waylon, David Alan Coe
Earl Thomas, Eddy Rabbit, Shenandoah, Alabama
George Strait and Randy Travis, diggin' up bones
Saw em on Hee-Haw
Singing in their overalls
Junior was the star of the show
Bo and Luke and Daisy Duke
Smokey and the Bandit one and two
Jerry Reed and Jerry Clower
Glen Campbell's Goodtime Hour
John Wayne and Marshall Dillon
Roy Rogers, Andy Griffith
Ben and Adam, Hoss and Little Joe
And Festus
Yeah that's country bro
That's country bro yeah
{"position1": {"artist": {"bio": "", "id": 867822, "name": "Cole Swindell"}, "catalog_type": "artist", "description": "", "id": 867822, "name": "Cole Swindell", "related": [{"bio": "", "id": 707205, "name": "Thomas Rhett"}, {"bio": "", "id": 504282, "name": "Florida Georgia Line"}, {"bio": "", "id": 29083, "name": "Luke Bryan"}, {"bio": "", "id": 272271, "name": "Brantley Gilbert"}, {"bio": "", "id": 369639, "name": "Jason Aldean"}, {"bio": "", "id": 41615, "name": "Justin Moore"}, {"bio": "", "id": 117992, "name": "Jake Owen"}], "tagged": false, "type": "catalog"}}
{"position1": {"artist": {"bio": "", "id": 39801, "name": "Toby Keith"}, "catalog_type": "artist", "description": "", "id": 39801, "name": "Toby Keith", "related": [{"bio": "", "id": 69978, "name": "Alan Jackson"}, {"bio": "", "id": 58716, "name": "Zac Brown Band"}, {"bio": "", "id": 29154, "name": "Trace Adkins"}, {"bio": "", "id": 115068, "name": "Tim McGraw"}, {"bio": "", "id": 89602, "name": "Kenny Chesney"}, {"bio": "", "id": 89555, "name": "Brooks \u0026 Dunn"}, {"bio": "", "id": 58018, "name": "Blake Shelton"}], "tagged": false, "type": "catalog"}}
Want to know more about Michael J.? Get their official bio, social pages & articles on iHeartRadio! Read more
Email michaelj@iheartradio.com
|
cc/2020-05/en_middle_0032.json.gz/line8464
|
__label__cc
| 0.546133
| 0.453867
|
Tropical Storm Humberto is forecast to strengthen into a hurricane Sunday
Posted 1:55 pm, September 15, 2019, by CNN Wire
The Bahamas missed the brunt of Tropical Storm Humberto, which is expected to become a hurricane Sunday.
Humberto is moving away from the Bahamas and is about 180 miles (290 km) northwest of Great Abaco Island and 165 miles (270 km) east of Cape Canaveral, Florida, according to the National Hurricane Center.
The storm’s maximum sustained winds are 65 mph and it is moving at 7 mph, according to the center. The storm is slowly strengthening and is expected to become a hurricane Sunday, CNN Meteorologist Derek Van Dam said.
The storm is forecast to continue moving away from the Bahamas and remain well offshore of Florida’s east coast through Wednesday, the center said. The storm will generate swells that will affect the northwestern Bahamas and the US coast from east-central Florida to North Carolina during the next few days. The swells could cause life-threatening surf and rip current conditions, forecasters say.
Fears of a second storm
There was concern about what Humberto would bring to the Bahamas, where hundreds are still missing after the Category 5 Hurricane Dorian hit the Abaco Islands and Grand Bahama. The death toll currently stands at 50 but search and rescue teams are still searching through destroyed neighborhoods.
“Even if you’re just talking 2 to 4 inches (of rain), you have to remember a lot of these homes, they don’t have roofs on them. A lot of the buildings are already structurally compromised, so even a 50- or 60-mph wind can cause even more damage,” CNN meteorologist Allison Chinchar said.
The islands did get some rain, Van Dam said, but they did not get Humberto’s full impact.
“They were spared the heaviest rain and the strongest winds, which were centered north and east of the storm,” Van Dam said, adding the storm surge in the Bahamas was negligible.
Evacuees from Dorian
Many in the Bahamas are still out of their homes following the havoc Hurricane Dorian brought when it struck the islands about two weeks ago.
About 3,900 evacuees have been processed through south Florida by air and sea so far, officials said, with few being turned away.
The number includes US citizens, legal residents, Bahamians and people from other countries who evacuated the islands after the storm hit.
Palm Beach County, Florida, has begun enrolling displaced students fleeing Dorian’s damage. Backpacks loaded with school supplies are being provided to the students by the Education Foundation of Palm Beach County, which plans to open its school supply store so evacuated families can shop for free, district spokeswoman Julie Houston Trieste said.
Topics: International, Weather
Local Weather Weather Blog
Severe weather threat has ended
🏃Hour-by-hour look at Richmond Marathon forecast for Saturday
Coast-to-coast storm to hit this weekend
Thanksgiving travelers face winter weather nightmare
‘Historic’ storm to disrupt Thanksgiving travel as 20 million people face brutal weather
Two big storms could snarl Thanksgiving travel next week
Storm will bring gusty winds, coastal flooding
Semi-truck loses control, crashes in high winds in Colorado
More than 20 million Americans under tornado watch on Halloween
Tornado watch in effect until 11 p.m. amid enhanced risk of severe storms on Halloween
Post-Thanksgiving travel frustrates drivers: ‘It’s been horrible’
Monster 75-foot wave recorded off West Coast during bomb cyclone
More beneficial rain expected this week
|
cc/2020-05/en_middle_0032.json.gz/line8471
|
__label__cc
| 0.717504
| 0.282496
|
Heroin is like a box of chocolates. And it wasn't invented in Germany. And it's (technically) harmless. To make sense of all this gibberish you better read the article. A bunch of stuff you might not know about H.
BARDA, Paratek and Pull Incentives: Funding Antibiotic Research?
The Biomedical Advanced Research and Development Authority, part of HHS, just announced an award as much as $285 million to Paratek, a publicly-owned Boston-based biopharmaceutical company that focuses on infectious disease research, to develop a new antibiotic for anthrax. But, will pull incentives – rewarding companies for the successful development of new antibiotics – be enough to keep large, private companies in the field of antibiotic research? ACSH advisor Dr. David Shlaes explains.
Last year, we wrote about four prescription drugs people hate. It isn't as easy to find drugs that people love, but we came up with four, each remarkable in its own way. You may be surprised by what made this curious list.
Wake Up! There's A New Sleeping Pill
Esai Pharmaceutical just got FDA approval for a new sleeping pill called Dayvigo. Is it any good? Plus - a rant about the "addiction specialist" fools who might want to overregulate it. It's worth reading this horrendous article just for the rant.
Why 'Walmart Insulin' Can Be Dangerous
Not all insulin is created equal.
IV Tylenol As Good As Moose Urine For Post-Op Pain Control
Summary: In the mad dash to remove opioids from modern life, some researchers are willing to try anything, even Tylenol to control pain. How well does IV Tylenol work for post-operative pain from spinal surgery? Although the data are not complete, it's safe to say that it's no better than moose urine.
'New' Opioid Crisis: Dr. Vanila Singh Warns of Adulterated Street Drugs
Dr. Singh, ACSH friend and former Chief Medical Officer for the Office of the Assistant Secretary for HHS, published a paper on the adulterants found in street drugs. What was in there? A lot of junk.
Antibiotics: Innovation or Clinical Utility?
When it comes to antibiotic research, what does the word "innovation" mean? It's a bit different for antibiotics. Dr. David Shlaes argues that a difference in clinical utility is a better measure, even when a new drug or combination of drugs may be structurally similar to older drugs. This, from his blog "Antibiotics, the Perfect Storm."
Higher Drug Costs, and the Increased Use of Medications and Co-payments
The cost of pharmaceuticals is high for a number of reasons. A new study considers our out-of-pocket spending and increased use of medications, rather than more expensive surgery or hospitalization as a driver we can control.
Non-Opioid Drugs That Can Be Dangerous and Habituating. Should We Ban Them?
It's quite easy to make any drug look bad. Even those with limited intellects, such as the leaders of Physicians for Responsible Opioid Prescribing, have done a splendid job in making prescription analgesics look like the personification of death. Let's apply PROP's standards (such as they are) to some other drugs and see what that looks like.
Ohio's Opioid Overdose Deaths and Seizures of Fentanyl
Here is yet more evidence that fentanyl, rather than prescription drugs, is fueling the opioid crisis. It's time to add illegal drug cartels to the list of defendants.
Record-Time FDA Approval of Human Insulin In 1982: When Genetic Engineering Came of Age
This week marks the 37th anniversary of the approval of human insulin – the first biotech drug ever. Almost as revolutionary as the drug was its five-month approval by the FDA, which was two years less than average. Dr. Henry Miller celebrates the dawn of biotechnology. He should know. At that time he was in charge of the FDA team that reviewed it.
JAMA Spotlights Conflicts of Interest in 'Anti-Meat' Advocates. Are We Surprised?
|
cc/2020-05/en_middle_0032.json.gz/line8476
|
__label__wiki
| 0.93919
| 0.93919
|
We Never Stop Talking Baltimore Sports - WNST.net
Playing Now:
MLBNFLNCAAFBGOLFNASCARNHLNBA NCAABK
ScoreboardStatsStandingsTeamsPlayersPlayers NewsInjuriesTransactions
NCAAFB
ScoreboardStandingsTeamsLeadersPolls
LeaderboardSchedules and ScoresStatisticsEarnings
ResultsStandings StatsDrivers
Audio Vault
WNSTV
Morning Paper
Categorized | Crabs N Beer, Towson Tigers
Tags | Benimon, Charleston, College of Charleston, cougars, Jerrelle Benimon, Mike Burwell, Pat Skerry, Skerry, TD Arena, tigers, towson
Towson opens hoops season Friday at Charleston
November 08, 2012 | WNST Staff
Towson Men’s Basketball Opens 2012-13 Season at College of Charleston
Tigers Travel to Southern Conference Power Friday
CHARLESTON, S.C. – Under the guidance of second-year head coach Pat Skerry, the Towson University men’s basketball team is set to begin the 2012-13 season at the College of Charleston on Friday, Nov. 9 at 7:30 p.m.
The game is being played at TD Arena in Charleston, S.C.
Although Towson returns just three scholarship players from last year’s team, the new-look Tigers welcome a trio of BIG EAST transfers, a highly-regarded junior college transfer and a nationally recognized freshman class.
Towson will be looking to build on an impressive performance in its exhibition opener against Bloomsburg University on November 1.
All five Tiger starters scored in double figures, led by junior guard Mike Burwell’s 16 points. Classmate Jerrelle Benimon also filled the stat sheet with 12 points, seven assists and five rebounds, guiding Towson to an 87-65 win.
The offensive explosion was a welcome sight as the Tigers averaged just 47.0 points in a pair of exhibition games last season.
The Cougars present a challenge to the Tigers, who will be seeking their first regular season opening victory in four years.
Charleston, which won 19 games last season, was picked to finish second in the south division of the Southern Conference this year. The Cougars’ first year head coach Doug Wojcik spent the last seven seasons as the head coach at Tulsa.
The College of Charleston is led by senior guard Andrew Lawrence, who averaged 13.0 points and 5.5 assists per game last season. Lawrence, a member of the Great Britain National Team in the 2012 London Olympics, and junior forward Trent Wiedeman were both named to the 2012 Preseason All-Southern Conference Team.
The Cougars were victorious in their only exhibition game, topping USC Aiken, 68-52, on November 3.
The trip to Charleston will be a familiar one for Skerry, who served as an assistant coach for two seasons at the school under current Marshall head coach Tom Herrion.
The game at Charleston will be the first of 10 straight road games Towson will play to begin the 2012-13 season.
Hate to admit it but Indianapolis has been best Super Bowl site ever
Here's why we made changes at WNST.net...
A personal note for all friends, fans and supporters re: changes at WNST
Poor Start, Rangers Intimidation of Officials Dooms Caps in Game Two
A year after major changes at WNST, I'm very happy and here's why...
Mostert’s huge day leads San Francisco past Green Bay in NFC title game
Mahomes’ feet, arm lift Kansas City to Super Bowl over Tennessee
Smith scores 18 as No. 17 Maryland holds off Purdue 57-50
Harbaugh says Ravens didn’t abandon run until deficit grew too large
Yanda “to think about things” regarding future with Ravens
Examining Ravens’ 2020 class of free agents
Twelve Ravens thoughts following playoff loss to Tennessee
Ravens must endure “hard truth” until back on January stage
1550 Hart Road
info@wnst.net
Text Service
Prize Of Today
FAQ (Coming Soon)
MASN Sports
WBAL AM 1090
© 2020 WNST RADIO ALL RIGHTS RESERVED
|
cc/2020-05/en_middle_0032.json.gz/line8483
|
__label__cc
| 0.664266
| 0.335734
|
24 Hour Fitness Opens 20th Club in Washington State
New Club Celebrates Milestone with Grand Opening Event
Tacoma, WA. - Sep. 19, 2017
24 Hour Fitness is expanding its presence in Washington, with a new club in Tacoma, the second largest city in the Puget Sound area and the third largest in the state. In recent years, with development in its downtown core and the Tacoma Link light rail service, Tacoma has become one of the most livable and walkable cities in the U.S. (Prevention.com)
A grand opening event is scheduled for Saturday, September 23, 2017, 9:00 a.m. until 1:00 p.m., 24 Hour Fitness® Tacoma, 111 South 38th Street, Tacoma. The community is invited to this free celebration, which includes club tours, prize drawings, group training demonstrations, innovative GX24® studio classes and more.
With the region’s highest density of art and history museums, combined with the 2014 voter-approved bond measure to improve and grow the community park system, Tacoma offers cultural and environmental diversity for its 208,000 residents. A haven for hikers, runners and cyclists, 8 of every 10 residents has experienced outdoor recreational activities, reinforcing Tacoma and the region as a high priority for growing the 24 Hour Fitness footprint.
“Tacoma’s nickname as the “City of Destiny” fits its image, where residents not only appreciate the environment’s beauty but also embrace recreational activities no matter the season,” said Dominic Santini, General Manager. “24 Hour Fitness is thrilled to become a part of the community. Whether you’re a competitive athlete or just seek functional fitness for everyday life, you will be amazed by the variety of programs and fitness solutions we offer for every age and fitness ability.”
The modern new 40,000 square foot club features quality amenities, including:
GX24® and cycle studios with popular studio classes such as Zumba®, BodyPump®, POP Pilates, RPM® and bootybarre® included with membership
Hundreds of digital studio classes available on demand, for times when you want to take a class on your own or with friends
Personal and small group training programs, designed to elevate performance and motivation*
Rows of cardio and strength machines, plus free weights for every level of fitness
Dedicated zones for TRX® resistance training, core work, stretching, functional and sports-specific workouts
Multi-functional Olympic Training rig, used by athletes and fitness enthusiasts for both high-intensity training and Olympic lifting
Indoor lap pool for swim workouts and aqua classes
Whirlpool, steam room and sauna for relaxation and recovery
Spacious locker rooms with private showers
Pro shop for convenient access to nutritional products, snacks and workout gear
Kids’ Club for children up to age 12*
Towel Service
*Additional fees apply
24 Hour Fitness offers a network of more than 420 locations nationwide, as well as signature content and programming including:
24GO™ on-demand workouts, including discounted access to Daily Burn®, streamed to any device, anytime
Fit:Perks® Rewards program, featuring exclusive sweepstakes, deals and VIP passes
Innovative My24® app with class finder, XCapture fitness tracking and compatibility with leading fitness apps and wearables
24Life® digital magazine, packed with ideas and lifestyle advice from world-class experts and celebrities on how to think, eat, move and recover better
24 Day Smart Start™ program, created in partnership with top health and fitness coaches to help you maximize your membership and your results
To experience the new gym, download a free guest pass from 24hourfitness.com/Tacoma
About 24 Hour Fitness
As an industry leader for more than 30 years, 24 Hour Fitness changes lives every day through fitness. Conveniently located clubs, furnished with a wide variety of strength, cardio and functional training equipment, are the perfect environment for fitness professionals to deliver dynamic personal and group training programs. GX24® and cycle studios feature a popular array of live studio classes included with membership. A multitude of additional offerings engage and inspire every member to lead a full and healthy life both inside and outside of the club. Opening new clubs on average at the brisk pace of one every few weeks, 24 Hour Fitness is headquartered in San Ramon, CA and serves nearly 4 million members in over 420 clubs nationwide.
To learn more about us and to find the club nearest you, visit 24hourfitness.com.
|
cc/2020-05/en_middle_0032.json.gz/line8489
|
__label__wiki
| 0.860215
| 0.860215
|
Hitler would stop at nothing to increase his appeal to the German public including fabricating a story during his service as a messenger runner in World War I.
When Hitler Single-Handedly Captured Enemy Soldiers But Didn't
What was once a modest home in the Bavarian Alps undergoes an expansion and becomes not only a magnificent home for Hitler but the headquarters in which he could receive foreign heads of state while projecting an image of ultimate power.
Hitler's Berghof is Fit For the Leader of the World
Having spent a decade honing his image and perfecting his oratory Hitler's moment to mesmerize and galvanize his followers had arrived.
Hitler's Perfect Power Performance
Unknown to him, a sound engineer records Hitler in a private conversation with Finnish leader Carl Gustaf Mannerheim, in which he states outright lies about Soviet military strength and the Wehrmacht's exploits against it.
A Secret Recording Confirms Hitler's Fantasy World
Despite a 5-hour parade in his honor on his 50th birthday, attended by 2 million civilians, and gifts pouring in from his staff and from all over the country, Hitler feels unsatisfied because he hasn't been able to demonstrate his true genius.
Hitler's Over-the-Top 50th Birthday Celebration
Just a few hours after the failed assassination attempt at the Wolf's Lair Hitler keeps his appointments that July 20th, 1944, including meeting with Italy's fascist leader Benito Mussolini.
Hitler Escapes an Assassination Attempt and Continues With His Day's Appointments
Archaeologist Howard Carter and his team make a small yet significant discovery in their search for the tomb of Tutankhamun.
Egypt's Greatest Mysteries
The First Clue on the Way to the Discovery of the Tomb of Tutankhamun
An all-star team of sorts is created to extract and itemize all items to be found in the tomb of Tutankhamun, with specific care to be given to papyri.
Planning the Excavation of Tutankhamun's Tomb
Italian explorer Giovanni Belzoni hones in on Ramesses II's Mansion of Millions of Years during his exploration of ancient Egyptian structures.
Rameses II and His Mansion of Millions of Years
It's a race through Egypt as Belzoni attempts to salvage ancient artifacts before fellow Italian Drovetti gets his hands on them.
Belzoni Versus Drovetti at Luxor
French scholar Jean-François Champollion attempts to decipher the ancient Egyptian mystery of hieroglyphs by taking a linguistic rather than symbolic approach to the riddle.
Breaking the Code of Hieroglyphs
In 19th century Egypt Champollion discovers that nature and daily life influenced and inspired ancient hieroglyphs.
Nature Reveals Inspiration for Glyphs
As part of their plans for expansion into and domination of the Soviet Union the Nazi hierarchy create the Einsatzgruppe, death squads that are tasked with clearing territory of Jews and Communists for settlement by Germans.
Nazi Death Squads
Einsatzgruppe Creation and Strategy
During the Nuremberg Trials former SS officers explain how the Einsatzgruppen procured and employed their gas vans.
Gas Van Revelations at the Nuremberg Trials
After the defeat at Stalingrad Nazi Germany initiates Aktion 1005, an attempt to eliminate evidence of the mass killings perpetrated by the Einsatzgruppen because of concerns about the repercussions once the war was over.
The Nazi Coverup
Celebrate Military Mondays on AHC by watching your favorite shows like WWII in Color, Against the Odds, D-Day to Victory, and Air Aces.
American Heroes Channel Presents
AHC Presents Military Mondays
Veterans and footage from the invasion of Normandy provide the details as to just how treacherous the initial landings and fierce the German defenses were their with underwater mines, 88-milimeter artillery rounds and machine gun emplacements.
D-Day to Victory
Unimaginable Noise and the Hellish Defense in the Waters of Normandy
Private Hal Baumgarten and his fellow GIs are victims of a deadly German ambush as they advance inland from the beach at Normandy. As he is about to be evacuated a sniper hits him, then gets "exterminated" by an unexpected friend.
Saved By an Unexpected Friend in a Ditch in Normandy
|
cc/2020-05/en_middle_0032.json.gz/line8494
|
__label__wiki
| 0.885763
| 0.885763
|
Haley DeSart, Editor|November 20, 2017
In a crowded gym, full of hundreds of students, staff and faculty eagerly watched as the Homecoming Queen Crown was placed upon Lisbeth Magdaleno-Garcia’s head, she burst into tears. “I was excited but embarrassed,” Magdaleno-Garcia said. “I cried. I cried a lot that day.”
Homecoming Queen isn’t her only title, Magdaleno-Garcia is the National Honor Society president, president of concert band, involved in Link Crew, in Marching band, Jazz band, and the fall musical.
“I’m a leader, respectful, and outgoing,” Magdaleno-Garcia said. “I’m a people person. I’ll talk to anybody.”
When she’s not studying, organizing something for NHS or playing for the bands, you can find her watching Netflix, hanging out with friends and family, or most likely of all, working at her job as second assistant manager at McDonald’s. As someone whose activities, education, and occupation take up much of her time, sometimes the most simple things are the best to wind down.
“I like spending time in my room, in the quiet and alone,” Magdaleno-Garcia said. “I’m just in so many activities that sometimes all I want is to relax and for everything to be quiet.”
Magdaleno-Garcia draws inspiration from her siblings to continue to strive forward and work hard in both academics and activities. Giving them her all and committing to leading by example even if things become challenging.
“I’m the oldest so I want them to learn from me,” Magdaleno-Garcia said. “I want the best for them.” Continuing to look forward after high school, Magdaleno-Garcia hopes to attend either Gustavus Adolphus College, Luther College or Mankato State to major in music education.
Therese Netzer, English teacher at Albert Lea high school, puts her student’s needs before her own. She has been thinking of making cards for her st...
Para educators are significant at all levels of schools by aiding and supporting students. Through training and years of experience, paraprofessionals...
Tiger’s Roar is a talent show that goes on at Albert Lea High School every March. It allows students to show their creativity and talents three nigh...
NHS Increases Members
On Nov. 13 National Honor Society inducted around 50 new students into the organization. National Honor Society, or NHS, is a selected group of studen...
Seniors Plan for College
Suicide Prevention is Everyone’s Job
We have all heard the jokes, or even made the jokes ourselves, seen the funny comics and memes about people killing themselves. Suicide is not the sam...
Juniors Attend Career Day
International Students Come to ALHS- Pipat Buntharaksa
|
cc/2020-05/en_middle_0032.json.gz/line8495
|
__label__cc
| 0.580531
| 0.419469
|
1364 Tavern Road Alpine, CA 91901
admin@alpinefire.org
Board Room Policy
District Transparency
Administration/ Human Resources
Staff and Personnel
Emergency Medical Services (EMS)
Business Inspection Information and Forms
Codes, Laws and Policies
Defensible Space Information
Cost Recovery/Fee Schedule
Events and Pictures
Fire Apparatus & Equipment
Coloring Contest Winners
Baron "Barry" Willis
Term: 12/2018- 12/2022
Email Address: bwillis@alpinefire.org
Director Willis is a long time resident of the San Diego area and attended Patrick Henry High School and graduated with his Bachelor of Arts Degree from UC San Diego. He has been licensed for over 30 years as a broker for life and health insurance and assists clients with financial planning issues as a stock broker with the CRPC designation from the College of Financial Planning.
Director Willis was elected to the Alpine Fire Protection Board in November 2018 and serves on the Finance and Budget Committees for the District. He has been very active in the community and is a member of Alpine Kiwanis and was a Meals on Wheels volunteer for many years. As a recently elected member to the San Diego LAFCO Board he brings a unique perspective as an individual who has worked over 30 years in the private sector in Sales and Management.
Baron "Barry" WIllis Ethics Certificate
Copyright © 2020 Alpine Fire Protection District
1364 Tavern Road, Alpine CA 91901-3831
|
cc/2020-05/en_middle_0032.json.gz/line8497
|
__label__cc
| 0.546
| 0.454
|
Hamas rally commemorates resistance fighters
Around 15,000 Palestinians commemorated slain resistance fighters and protested Israel's construction of a wall along the West Bank in a Nablus rally on Friday.
During the rally Hamas threatened to end the current truce
Men, women and children gathered at the city's main football stadium to pay tribute to Jamal Mansour and Jamal Salim, killed with another six Palestinians in an Israeli attack on Thursday.
The crowd waved portraits of several resistance fighters killed over the past 34 months since the start of the intifada, and carried the green flags of Islamic group Hamas.
During the rally a Hamas leader threatenined to end the three-month suspension of anti-Israeli attacks declared by the resistance group in late June.
Truce ultimatum
"Hamas today is studying its position regarding the truce because Israel is not responsive and continues to commit crimes against Palestinians," said Adnan Asfour.
"After it (the truce) is over if Israel goes on with its violence, there will be a huge response from Hamas"
Hamas leader Adnan Asfour
"A month went by after we announced the truce. After (it is over) if Israel goes on with its violence, there will be a huge response from Hamas," he added.
The crowd were then treated to a short play depitcing a Palestinian agricultural worker being ousted from his land and beaten up by Israeli soldiers to allow for the construction of the controversial security wall.
Controversial wall
The barrier, which incorporates a network of earthworks, trenches and patrol roads, will eventually snake 900 km along the West Bank.
It does not run by Nablus, but has taken the shape of a fully-fledged wall in the nearby West Bank towns of Qalaqilya and Tulkarem.
And it has already left large swathes of Palestinian territory on the Israeli side and bisected a whole string of Palestinian communities throughout the West Bank.
Israel say the wall is necessary to protect its citizens from Palestinian attacks.
|
cc/2020-05/en_middle_0032.json.gz/line8500
|
__label__wiki
| 0.795366
| 0.795366
|
About Allianz
My Allianz
Third Party Property Damage Insurance
CTP Insurance
Caravan and Trailer Insurance
Compare Car Insurance Cover
NSW Stamp Duty Exemption
Building & Contents
Emergency Home Assistance
Multi-Trip
Rental Vehicle Excess
Compare Cover Options
Website Review & Travel Remediation
Permanently Unable to Work cover
Commercial and Corporate Insurance
Business Buildings & Contents
Business Vehicles
Injury and Sickness
Seafarers
Specialty Courses
Allianz and the Community
Allianz Pride
Motor Dealers
Retrieve Life application
Most Expensive Areas to Live in Australia
Quote in 2 Mins
Retrieve a quote »
Comprehensive Car Insurance from Allianz
Get a Comprehensive Quote in 2 mins
Home Insurance from Allianz
Choose from a range of home insurance packages as well as optional extras to protect your home.
Get a Quote in 2 Mins
Landlord Insurance from Allianz
Allianz's Landlord Insurance takes care of the property and the contents items you provide for your tenant's use.
Cover for your residential investment property
Up to $10 million legal liability cover
Travel Insurance from Allianz
Allianz Travel Insurance has a range of travel cover options.
Our emergency assistance helpline is available 24 hours a day, 365 days a year.
Comprehensive Travel Insurance add-on options include our Snow Pack, Cruise Pack, Adventure pack and Additional item limits
Up to $5M cover for personal liability with our Comprehensive Plan.*
*Sub-limits and exclusions apply. Please see the PDS for full details.
Life Insurance from Allianz
No medical or blood tests are required to apply and you can get a preliminary quote in minutes.
Up to $1.5 million total cover depending on your age1
Insure up to 2 people on the same policy
Apply online or over the phone
*Conditions apply, please see below and refer to the PDS for full details.
Cover options
Small Business Insurance from Allianz
Business insurance covers your business from financial insecurity resulting from unexpected circumstances.
Online cover for more than 2000 small business occupations
Choose from a range of covers to suit your business needs
Get a quote in minutes using our online quote tool
Get a Quote & Buy Online
Workers Compensation Insurance from Allianz
Workers compensation operates under complex state-based legislation that can make understanding your obligations and managing your claims difficult. Our expert team understands the complexities of workers compensation and will support your business and injured workers through the claims management process.
Our national network of claims and injury management specialists.
Targeted risk management advice to reduce workplace risk.
Our proven return to work record, reducing claims costs and improving employee well-being.
The security of the global Allianz Group, supporting more than 78 million people worldwide.
Home Insurance News
Tips, reports and trends for Australians
Get quote in 2 mins
There's a reason we're called the lucky country. Even taking into account the extremes in the weather, we have minimal natural disasters, a great standard of living and we produce most of what we need. We're multinational and welcome most forms of diversity. So it comes as no surprise that many people chose to live in Australia and many companies send employees to spend time here on business - but what areas are the most expensive?
If you're an expatriate living in Australia, Sydney has claim to being the most expensive Australian city, ranking 11th out of 30 of the most expensive cities in the world. Melbourne was 15th, and Perth 19th. Canberra slides in next at 23rd while Brisbane takes 24th. Adelaide sits happily at 27th. If you're curious, Tokyo is the most expensive city in the world for expatsi.
What if you're not an expat, but a true blue Australian citizen? Where are the most expensive places to buy a home?
Tamarama, also known as 'Glamarama', has taken the title of Australia's most expensive suburb (to buy property in). With an increase in median house prices of 38% over the last five years, the price is now $3.8 millionii. It is an affluent suburb, with its beach sandwiched between Bondi to the north and Bronte to the south.
Second place was given to Perth's Peppermint Grove - median house prices tipped $3.4 million. With a population of 1,600 and hugging the picturesque Swan River, it boasts services to rival the largest cities in the world.
Vaucluse, at $2.9 million, is located on a peninsula; the Tasman Sea is to the east and Sydney Harbor is on its west. Surrounded by suburbs such as Watsons Bay, Dover Heights and Rose Bay, Vaucluse has for some time had a good name amongst realtors. In 2007, one of the iconic Vaucluse properties sold for $29 million. Shortly before that sale, the record was held by a Point Piper property, sold for $28.75 millioniii. Point Piper, incidentally, suffered the worst with median unit prices falling 41%. The best performer was Moranbah - a mining town in Queensland, with an increase of 46%.
Double Bay holds its own with a median property price of $2.5 million, and then it moves to Melbourne with its exclusive Toorak suburb and equal with Double Bay at $2.5 million. Perth's Dalkeith rounds it off with $2.2 million.
Ok, what about the cost of living? Sydney and its southern cousin, Melbourne, have ranked seventh and eighth most expensive cities to live in out of 140 cities in 93 countries worldwideiv. We're only beaten by cities such as Zurich, Tokyo, Oslo and Paris.
Australia is one of the best countries in the world to live in, whether for work or pleasure. Both property and cost of living prices reflect this, putting Australia up there with the world's best cities. It really is the lucky country.
ihttp://www.news.com.au/money/cost-of-living/aussie-cities-among-worlds-most-expensive/story-fnagkbpv-1226393002975
iihttp://www.news.com.au/realestate/news/trophy-suburbs-australias-priciest-postcodes-revealed/story-fncq3gat-1226424088955
iiihttp://www.smh.com.au/news/national/topical-paradise-fetches-29m/2007/09/28/1190486569822.html
ivhttp://au.pfinance.yahoo.com/compare/credit-cards/article/-/13678618/how-to-survive-in-australias-most-expensive-cities/
Any advice here does not take into account your objectives, financial situation or needs. Terms, conditions, limits and exclusions apply. Before making a decision please consider the relevant Product Disclosure Statement (PDS)/Policy Wording, Supplementary PDS (where applicable) & PDS update (privacy notice) which are available on this website.
Allianz Australia Insurance Limited ABN 15 000 122 850 AFS Licence No. 234708 is the general insurer except in respect of life insurance, in which case Allianz Australia Life Insurance Limited ABN 27 076 033 782 AFS Licence No. 296559 is the insurer.
Copyright © 2020 Allianz Australia Limited ABN 21 000 006 226.
Domestic Travel Insurance
Rental Car Excess Insurance
Sitemap | Terms of Use | Privacy | Security | Disclaimer
|
cc/2020-05/en_middle_0032.json.gz/line8501
|
__label__cc
| 0.565192
| 0.434808
|
Famous Women Poster + Free Colouring Page
by Liska Myers | Arts & Crafts, Drawing & doodling, Social Studies, Spring, Women's History
In celebration of women’s history month, I’d like to share a free colouring page and a printable poster with you, featuring twelve famous women and their inspiring quotes.
Throughout history and across the globe, whenever women wanted to do something daring, they always had to face two kind of challenges. One challenge was naturally associated with their goal; the other was produced by prejudice against their gender.
It was never easy to be an ambitious man – to discover, to conquer, or to invent. But, at all times, it was even less easy to be an ambitious woman. That’s why the story of each woman who managed to succeed in her undertaking is filled with wonder and inspiration. It’s worth of being shared and retold. This poster does just that – in a playful comic-style, it introduces children to the topic of amazing women in history.
The first on the poster is Marie Curie, one of the most amazing women of all time who conducted pioneering research on radioactivity, discovered two new elements and won two Nobel Prizes. All of that happened while she was working in Paris, because the universities of her native Poland refused to hire a woman. Marie Curie’s words are filled with wisdom and dignity, “Nothing in life is to be feared. It is only to be understood.”
A long time before Marie Curie, in the tenth century Japan, lived a girl Murasaki Shikibu. While her brother was taught for a career in government, she listened and learned the best she could – Chinese language and Chinese literature. At that time, women were not considered capable of real intelligence, so they were not educated in the same manner. But Murasaki was smart! She was so smart that her father said, “Just my luck! What a pity she wasn’t born a man.” Indeed, she could not build herself a real career, but a thousand years later her name is remembered for the fact that Murasaki Shikibu wrote the world’s very first novel.
Amelia Earhart, on the other hand, was not the first to fly – she was not even the first woman to get a pilot’s license (the 16th in the USA, in fact). She was, however, very vocal and inspiring when it came to encouraging other women and anyone, really, to go and try new things. Her famous words are, “Adventure is worthwhile in itself!” They’re featured in the poster, and frankly, I would want both my daughter and my son to always remember them.
The stories of these women can be an inspiration to both boys and girls. If you’d like to plunge into the world of amazing women who changed the world, you can also check out Amazing Women: Guess Who Game, which is great for bringing their achievements alive, or look into our Amazing Women in History: Big Bundle, which includes several games, crafts and activities for kids to learn about the women’s history.
But if you just want something to introduce the topic of amazing women in history into your classroom or into your children’s room, this is a good place to start.
After working on the Amazing Women project for the last couple of months, I created this poster that feature twelve of them – alongside their famous inspiring words.
There is also a version of the poster in black-and-white for children to colour and make it “their own”.
By default, the poster should be printed in A3 format (11.6×16.5 inches) – or on two sheets of standard (8.5×11 inch) paper. But you can also scale it down and print on one sheet of paper.
Print it, let children colour it, read the quotes and talk about what those words mean. Ask children who inspires them most and do some more research on that woman!
You can download the poster/colouring page for free below.
Get the Free Posters!
You can also get the extended collection that includes twenty posters and twenty colouring pages. Each of them features a full-page illustration of an amazing woman from history, her date and place of birth, her quote and a short biography.
Get the Full Pack of Posters!
Learn about a selection of amazing women in history with our full Amazing Women in History bundle of printable games and educational materials! The students will play games, make paper dolls, colour posters and finish by making their own project, dedicated to a woman who inspired them.
Get free printables delivered to your mailbox!
Join our mailing list to receive the latest updates on our projects, printables and promotions. We have something fun every week!
We'll keep your email address safe, and you can easily unsubscribe any time!
adventureinabox
Artist & blogger from Canada. Creating educational games, paper crafts, shadow puppets and other toys. I love my family, books and dark chocolate.
FREE PRINTABLE PAPER DOLLS! We got our paper dolls
Busted out our Christmas books for the advent! Our
Do you like board games? Print and make Christmas
Here is a fun educational activity for Halloween.
Several of my homeschooling friends mentioned how
This is what our homeschooling looked like today.
Have you ever sobbed over a textbook? And, no, I d
FAIRY SHADOW PUPPETS Make fairy shadows flutter al
WOODEN ROBOTS WITH METAL SCRAPS Last week, we all
When I think about “crafts to make in the summer
Get This Printable Free!
Sign up for our newsletter and get the free printable!
Already a subscriber? Just put your email address in the form and get the free printable!
|
cc/2020-05/en_middle_0032.json.gz/line8503
|
__label__wiki
| 0.683145
| 0.683145
|
Women’s pilot training scholarship launched
AN Oxford based pilot training company has launched a dedicated female pilot scholarship scheme.
The launch took place at its Airline Pilot Careers Day and so far it has received more than 100 applicants.
The initiative is operated in partnership with the British Women Pilots’ Association.
The scholarship scheme will enable one trainee female pilot to win £35,000 towards the price of a full-time EASA pilot training course.
The open day at Oxford Airport, Kidlington, gave would-be female pilots a chance to tour the facilities and talk to instructors and recent graduates.
Julie Westhorp, chairman of The British Women Pilots’ Association and former commercial airline pilot and current CAA flight examiner, said: “Nearly 50 years after the first woman took the controls as a commercial pilot and despite the industry’s clear demand, the percentage of female pilots globally is still surprisingly low, at just 3 per cent.
“We are proud to be partnering with Airways Aviation to help more women and girls see the world of possibility behind the cabin doors.”
Romy Hawatt, founder and shareholder of Airways Aviation, said: “Our global scholarship programme has been hugely successful so far, and we’ve already been able to support some amazing candidates to begin their pilot training.
“We are pleased to be launching this new scholarship programme and hope that it will help to encourage more talented women to consider a career in aviation.”
Applicants for the female scholarship will need to register their interest and complete a short online application form before November 24. Airways Aviation will then invite those candidates whose application meets the initial selection criteria to its Oxford headquarters to take the industry-standard COMPASS test.
Once the test results are analysed, the top-scoring candidates will be invited to continue the process, with a presentation and panel interview at Oxford as the final stage.
For further information about Airways Aviation / BWPA Female Pilot Training Scholarship and to register online, interested applicants should visit https://airwaysaviation.com/go/female-pilot-training-scholarship/
|
cc/2020-05/en_middle_0032.json.gz/line8507
|
__label__wiki
| 0.665041
| 0.665041
|
Teenage Feminism Decades Before “Girl Power”
By Kera Lovell August 17, 2018 Comments Off on Teenage Feminism Decades Before “Girl Power”
*Editor’s Note: This week we are publishing some of our favorite BP articles. We continue with this essay by historian Kera Lovell as part of our forum on Student Activism.
Sixteen-year-old Dorinda Palmer leads marchers to City Hall but is blocked by white sheriff’s deputies and the local KKK. (Photo: Bob Fitch Photography Archives, Stanford University Libraries)
As civil disobedience in schools escalated in the postwar era, teenage girls began to assert their political identities more vociferously by joining movements for civil rights, free speech, and against the war in Vietnam. In becoming more active in civil disobedience by wearing armbands and striking from school, girls experienced unequal treatment from their young male counterparts, a realization that in turn fueled various methods of resistance.
As illuminated Tinker v. Des Moines (1969)–the Supreme Court decision regarding thirteen-year-old Mary Beth Tinker’s right to wear a black armband on campus to mourn dead soldiers–Justice Abe Fortas argued that while political fashion would be allowed, “the length of skirts or type of clothing…hair style, or deportment” were not considered “pure speech.” Students could use fashion as a silent gesture of political protest, yet the personal—sex-specific dress codes—could not be interpreted as the political. When girls began pushing for gender equality in schools, adults often dismissed their demands as immature and inconsequential rather than indicative of a pattern of girlhood sexism. As Gael Graham argues in Young Activists (2006),
The fact that the war and racism literally killed—whereas gender discrimination appeared less urgent—contributed to women’s hesitation to raise their own grievances and men’s disinclination to heed them.”
Over the past two decades, historians have blurred the lines between women’s liberation and Black Power, revealing how welfare, abortion, and the environment became coalitional issues at the same time that women of color challenged sexism within organizations devoted to racial self-determination. Examining postwar teenage feminism reveals how girls felt inspired by and estranged from the white-dominated mainstream feminist movement. Girls shaped it to speak to their intersectional identities, while also creating their own spaces to address issues of sexism in the education system—revealing the emergence of teenage feminist solidarity and intersectional discourse on girlhood decades prior to the 1990’s wave of “girl power.”
In the late 1960s and 1970s, fashion, sex education, and sex segregation were important sites for teenage feminist organizing that integrated discourses of access, self-determination, and survival. Fashion became a tool for girls to articulate their political identities. Teenage girls began to challenge skirt length requirements through collective forms of civil disobedience, including sit-ins at principals’ offices and school board meetings. At times, female students and teachers worked together to coordinate days in which all women wore pants to force the administration to change gendered dress code policies. As the fashion politics of the Black Panther Partyexpanded, African American girls used Afros and liberated threads to confront the intersections of institutionalized racism and sexism in the education system.
The People United to Save Humanity (PUSH) Choir. (Photo: Bob Fitch Photography Archive, Stanford University Libraries)
Beginning in the late 1960s, teenage feminists began to critique dress codes as an extension of Cold War sexual containment. Without access to comprehensive sex education and contraceptives, teenage girls argued that pregnancy became a visual marker of a failure to perform respectable femininity. With girls’ bodies constantly surveilled through humiliating dress code checks, the visibility of the pregnant body worked to disenfranchise girls who could be indefinitely expelled when they began to show. Many were forced to withdraw from school, give birth in a maternity home, marry their partner, or give up their child to adoption in the years before Roe v. Wade. For some girls, the guilt of teenage pregnancy long outlasted giving birth. A seventeen-year-old mother wrote to Ms. about how she longed to be as “free and liberated” as young feminists, yet felt constrained by her early pregnancy: “I want to fight battles and make changes but some nights I lie in bed too frightened to move, too crushed by my own insecurity….it seems the bonds I chained myself with are unescapable.”
Other teenage mothers sued for the right to re-enter school after giving birth, as in the case of Mississippi’s Perry v. Grenada (1969). In addition to defending the rights of pregnant teenagers, high school feminists advocated for comprehensive sex education that was sex-positive, feminist, and lesbian-inclusive, such as New York’s Student Coalition for Relevant Sex Education (also called the High School Women’s Coalition), formed in 1971. This coalition sought to unify all ninety-two New York City high schools through a feminist sex education curriculum.
Girls fought some of the most intense battles over sex-segregated schools, courses, and sports. The most widely reported account of teenage feminist protest was thirteen-year-old Alice de Rivera who sued Stuyvesant High School for refusing to let girls apply. The school was one of the top three science and math high schools in New York City that maintained its prestige by not admitting girls, yet de Rivera’s case broke the gender barrier—allowing nine girls to attend in the fall of 1969. Cases like these brought forth by teenage girls helped form the legal basis for Title IX—a subset of the 1972 Education Amendments to the 1964 Civil Rights Act that prohibited sex discrimination. Girls’ writings reveal how guidance counselors and teachers still “tracked” them by steering them away from science and math courses, colleges, and male-dominated careers that counselors argued would cause unnecessary anxiety for girls. Catherine wrote to Rat readers about the unbearable weight her parents placed on her to abide by heteronormative gender roles: “Even our parents say you better take home EC or no one will marry you.” Ridiculed at home and school, angry teenage girls looked to one another and adult feminists for tools to combat their alienation.
Cover of “High School Women’s Liberation,” FPS: A Magazine of Youth People’s Liberation. (Photo: Youth Liberation Press, 1976)
Girls sought feminist publications and consciousness-raising groups as they developed their own political identities, leaving an epistolary trail of their intersectional feminist formation within adult periodicals. 1 Although feminist consciousness raising was derided by critics as largely white, middle-class, navel gazing, many girls were drawn to adult feminism in search of intellectual frameworks for understanding their alienation as institutionalized oppression. In her widely reprinted essay, “High School Women’s Oppression,” Jennie Bull positioned adult women’s consciousness-raising groups as a good model for feminist teenagers, and outlined a series of topics girls could discuss in their own groups. Letters to adult feminist publications like Ms. illuminate how they saw their oppression as unique to their teenage girl identity—not yet an adult, not yet a citizen, yet always a woman—intersections not being addressed by the adult feminist movement. Similar to the “inbetweenness” expressed by contemporary young female activists, teenage feminists during this era understood their double consciousness of being both a disenfranchised teenager and an oppressed woman. Yet girls who were Black, queer, and poor also challenged teenage feminists who constructed girlhood as a homogenous group identity by writing about their own intersectional lived experiences.
Many adult feminist organizations, including the National Organization for Women, the National Black Feminist Organization, the Mount Vernon/New Rochelle Group, the Women’s Caucus in People Against Racism, Bread and Roses, and numerous other organizations facilitated teenage feminist classes or consciousness-raising groups. Hysteria reported that when adult members in New York’s Astoria Collective approached students as sisters not social workers, they were surprised to find teenage girls hip to rejecting housewifery and calling authority figures “Pigs.” Some teenagers felt targeted by adults who came across as feminist proselytizers—bringing their feminist consciousness-raising issues to high schools rather than assisting girls in discussing their own. One teenager, signed “POWER to UNVOCABULARIED WOMEN,” wrote to Rat about the alienation she experienced at her first women’s liberation meeting when she failed to comprehend feminist theoretical jargon. She argued that college-educated adult feminists “unknowingly intimidate[d] and oppress[ed] other women…who have been tracked and maybe dropped out of high school.” Frustrated with ageism, girls rallied together to form their own youth feminist organizations and consciousness raising materials to address their own issues, such as the High School Women’s Liberation pamphlet of the Ann Arbor Youth Liberation group.
Comparing 1970s-era feminist periodicals to new feminist youth activists reveals how teenage girls continue to write their own narratives of resistance. The recent online campaign celebrating #blackgirlmagic reveals the creative potential of young intersectional feminist consciousness raising. Young girls of color who interrogate and celebrate their intersectional identities reveal how loving one’s blackness remains a radical act. At the same time, as young girls of color use social media to challenge their displacement within broader culture, their narratives continue to be co-opted in discourses of adult women’s empowerment.
See microfilmed copies of underground feminist newspapers in the Herstory Microfilm Collection. ↩
← Previous : More Than a Song: Giving Aretha a Little R-E-S-P-E-C-T
‘Birthright Citizens’: A New Book on the History of Race and Rights : Next →
Kera Lovell
Kera Lovell is a Lecturer in American Studies at the University of Hawai‘i where she teaches about American colonialism and resistance in Hawai‘i’s past and present. Lovell earned her PhD in American Studies at Purdue University. Her dissertation, “Radical Manifest Destiny: Mapping Power over Urban Green Space in the Age of Protest, 1968-1988,” traces an undocumented method of postwar urban protest in which activists challenged police brutality and urban renewal by converting vacant lots into parks. Follow her on Twitter @keralovell.
|
cc/2020-05/en_middle_0032.json.gz/line8508
|
__label__wiki
| 0.940317
| 0.940317
|
Deadly cat poop causes rift among animal defenders in Hawaii
Audrey McAvoy
<p>A Hawaiian monk seal, an endangered species, lies on a Waikiki beach in Honolulu on Thursday, September 15, 2016. Conservationists are concerned about the number of feral cats roaming Hawaii because cat feces washing into the ocean can spread toxoplasmosis, which can be deadly for the seals. (AP Photo/Audrey McAvoy)</p>
HONOLULU (AP) — Two wildlife issues have collided in Hawaii, pitting one group of animal defenders against another in an impassioned debate. The point of contention? Deadly cat poop and the feral felines that produce it.
Federal researchers believe feces from the legions of stray cats roaming Hawaii is spreading a disease that is killing Hawaiian monk seals, some of the world's most endangered marine mammals. Some conservationists advocate euthanizing those cats that no one wants, and that has cat lovers up in arms.
"It's a very difficult, emotional issue," said state Sen. Mike Gabbard, chairman of a committee that earlier this year heard a proposal to ban the feeding of feral cats on state land. The panel abandoned the bill after an outcry.
"It struck a nerve in our community," he said.
The problem stems from a parasite common in cats that can cause toxoplasmosis, a disease that has killed at least five female Hawaiian monk seals and three males since 2001, according to the National Oceanic and Atmospheric Administration.
"While eight seals may not sound like a lot of animals, it actually has pretty large ramifications for an endangered population where there's only about 1,300 seals in existence at this point in time," said Michelle Barbieri, veterinary medical officer for NOAA's Hawaiian monk seal research program. Scientists believe monk seals become exposed by ingesting contaminated water or prey.
Stray cats, meanwhile, have no predators in Hawaii and have ballooned in numbers across the state. Some 300,000 feral cats roam Oahu alone, according to marketing research commissioned by the Hawaiian Humane Society in 2015.
Felines are the only animals that can shed Toxoplasma gondii eggs, or oocysts. The parasites enter their digestive tract through infected prey, then multiply in the small intestine and produce eggs. Cats excrete the eggs in their feces, which researchers believe washes into the ocean and accumulates in invertebrates along the sea floor.
The eggs can survive in fresh water, saltwater and soil for up to two years, and any warm-blooded animal can become infected.
California sea otters have died from toxoplasmosis, and it's one of the major reasons the Hawaiian crow, alala, is extinct in the wild. Toxoplasmosis is rarely problematic for people with healthy immune systems, but it's why doctors advise pregnant women not to handle kitty litter.
Many cities struggle with feral cats, but the problem is particularly acute in Hawaii because of its sensitive ecosystem and at-risk native species, experts say. Only two mammals are native to Hawaii: the hoary bat and the Hawaiian monk seal.
"Everything else here— deer, sheep, goats, cats, mongoose — they're all invasive. They're all introduced," said Angela Amlin, NOAA's acting Hawaiian monk seal recovery coordinator.
Marine debris, climate change, predation and human interaction all threaten the survival of Hawaiian monk seals, agile swimmers with rigid whiskers and big, round eyes. Adults grow to be about 7 feet long and weigh between 400 and 600 pounds.
Feral cats present their greatest disease concern, Amlin said.
"As conservationists, what we really have to look at is this is what Hawaii's native ecosystem includes, and cats are unfortunately not part of that," Amlin said. "When it comes to the feral cat population, there should be a program in place to bring in these animals, adopt the ones that are adoptable and humanely euthanize those that are not."
Others take offense to that notion.
Classifying animals with labels such as native and invasive creates a "hierarchy in which the protection of certain animals comes at the suffering of others," Hawaiian Humane Society President and CEO Pamela Burns wrote in a letter opposing the state Senate bill that would have banned feeding cats on state land. She contended the 300,000 figure overstates the problem because the study counted the number of outdoor cats people were feeding and might have missed instances where multiple people fed the same cat.
Those who care for stray cats advocate trapping, neutering and spaying to help control their population.
The University of Hawaii's Manoa campus, in Honolulu, started a feral cat management program — with authorized feeders trained in tasks like trapping and feces disposal — after the stench and mess from hundreds of cats prompted complaints, especially when children at a campus daycare center got flea bites, said Roxanne Adams, director of buildings and grounds.
The program started in 2011 and appears to have reduced the number of felines, she said.
Euthanizing cats is unacceptable unless they're extremely sick, said Alicia Maluafiti, board president of animal welfare group Poi Dogs and Popoki.
"I totally disagree with the ... generalization that cat people love cats more than these endangered species," Maluafiti said. "What we just don't advocate is the wholesale killing, the extermination, of one species" for another.
|
cc/2020-05/en_middle_0032.json.gz/line8509
|
__label__wiki
| 0.56339
| 0.56339
|
HMS Tiger
Author seaweed
Creation date 30 May 2017
cruisers hms tiger john browns naval history royal navy
Paul White has pulled together an archive of photographs and reminiscences of the Ship's Company of the 6“ cruiser HMS Tiger, taking the history of the ship from her keel laying in 1941, her commissioning in John Brown's yard in 1959, through her conversion to an ASW helicopter carrier from 1968 to 1972, to her retirement in 1978 and final demise in 1986. In between we see from the illustrations her worldwide service; there are walk on appearances by Harold Wilson and Princess Grace of Monaco; the elegance of flag-showing is compared with the realities of gunnery, replenishment at sea, helicopter operations and roughers.
This is an elegant souvenir for any of the thousands who served in Tiger over the years. There are also items on such RN arcana as the rum issue, Crossing the Line, Bugis Street, and Jenny's Side Party that may make the book attractive to other ex-naval people and interested members of the general public.
The book is available from the printer (peecho.com) as a landscape format 30 x 21 cm 58-page hardback @ £23 [https://www.peecho.com/print/en/237810 ]
The picture (not from the book) shows the ship floodlit in Stockholm in 1959, on her first foreign cruise to Gdynia, Stockholm, Kiel and Antwerp.
More resources from seaweed
Escort and Minesweeper Weapons of WW2
Detailed drawings accompanied by a very erudite historical introduction
Battlecruiser Repulse
A categoric depiction of the doomed battlecruiser, from original drawings.
The Last British Battleship
The story of HMS Vanguard 1944-1960
Enemy Waters
The story of British and Allied mine forces battling the Germans and Italians in WW2
U-Boots' Escape
The sagas of the U-boats who escaped to Argentina in 1945
|
cc/2020-05/en_middle_0032.json.gz/line8515
|
__label__cc
| 0.528797
| 0.471203
|
Diego VelazquezEl GrecoEugene DelacroixHenri De Toulouse-LautrecJoseph Mallord William TurnerMichelangelo BuonarrotiRaphaelClaude Oscar MonetGustav KlimtRembrandt Van RijnLeonardo Da VinciFernando BoteroJohn William WaterhousePaul CezanneWinslow HomerVincent Van GoghMore...
Ferdinand Hodler
Ferdinand Hodler Oil Paintings
Ferdinand Hodler is one of Switzerland’s greatest painters; to many - the greatest. He placed on canvas the legendary history of his country and its humble, hard-working, honest, pious people. In his poetic landscapes one can perceive the cosmic rhythms of the universe and the structure of the Earth.
Ferdinand Hodler was born in Bern on March 14, 1853. His childhood was characterized by poverty, sickness, and death. His father died soon after Hodler's birth and his mother died when he was 13; nine of her children likewise died early. Hodler's first training as an artist was in the workshop of his stepfather; in 1867 he began to study with a local landscape painter. In search of better training, he went to Geneva in 1871, where he painted signs while learning French; until 1876 he studied under Barthélémy Menn, who introduced him to the works of Camille Corot, Eugène Delacroix, and J. A. D. Ingres. Hodler was greatly impressed by the paintings of Hans Holbein the Younger, and he studied the theories of Albrecht Dürer, Leonardo da Vinci, and Vitruvius in his search for answers to the artistic analysis of nature. Hodler's artistic formation formally ended in 1878, when he went to Madrid to study the work of Peter Paul Rubens and Diego Velázquez at the Prado Museum.
Hodler's paintings of the 1880s demonstrate a dichotomy of purpose. Although he worked in an impressionist or realistic manner, he sought to impart an intellectual or emotional content that transcended visible reality. In his Prayer in the Canton Bern (1880-1881) he carefully rendered peasants caught up in fervent prayer, simultaneously representing his own spiritual crises and his desire to flee industrialized modern society and find refuge in an innocent, ideal environment.
By 1886 Hodler had begun to paint in a sharply delineated, harsh style touched with rustic awkwardness and simplicity, as in the Courageous Woman. His paintings took on a more emotional quality as they represented moods of anger, despair, or yearning. Night (1889), completed after a serious psychological crisis, marked the final break with realism; it linked him with the symbolist movement then spreading throughout Europe.Night, with its enigmatic dreamlike scene, large format, monumental figures, tendency toward flatness, and repetition of similar colors and forms—a system of composition Hodler named "parallelism"—is characteristic of all Hodler's mature works.
These mystical, antirealistic paintings depicting an escape from the bourgeois cares of modern life gained Hodler first notoriety and then popularity. In 1900 he received a Gold Medal at the Paris World's Fair, and in 1912 he was made an officer of the French Foreign Legion. In Germany he received commissions to create monumental patriotic murals, culminating in the Jena Students Entering the 1813 War of Liberation and theReformation Oath of Hanover on July 26, 1533 (1913-1914).
Hodler died on May 19, 1918, in Geneva. His formal vocabulary was too personal to act as a major influence, but his antirealistic attitude quickened the demise of naturalism and impressionism.
Living Room(2)
Symbolism(205)
Impressionism(14)
Modernism(16)
Romanticism(3)
Primitivism(5)
Famous Cities(2)
Landscapes(106)
Portraits(44)
Genre Painting(22)
Mythological(1)
Religious(1)
Sketch and Study(44)
Symbolic(26)
Most Popular Price Name
1 2 3 4 5 6 7 8 9 10 11 12 ... Next
Autumn Evening 1892
by Ferdinand Hodler
Gallery Price: $625.00
Artisoo Price: $183.00
Dents Du Midi From Champéry 1916
Josef Müller
The Shoemaker 1878
Modern Rütli 1887
The Lake Geneva From Chexbres 1898
At The Foot Of The Petit Saleve 1890
Cavalryman Striding A Horse 1908
Ahasver 1910
At The Foot Of The Salève 1890
Cherry Tree In Bloom 1905
Communication With The Infinite 1892
A Troubled Soul
A View Of Lake Brienz From Bodeli
At The Jonction
The Dream 1897
Charlet In Hilterfingen 1871
Displaying 1 to 20 (of 254 Ferdinand Hodler Paintings)
We can paint any size, we can paint any image. Can't find what you are looking for? -- Click here to Email Us.
|
cc/2020-05/en_middle_0032.json.gz/line8518
|
__label__wiki
| 0.637307
| 0.637307
|
A Misty Sunrise
Laura Knight (1877–1970)
© Royal Academy of Arts. Photo credit: Royal Academy of Arts
This image can be used for non-commercial research or private study purposes, and other UK exceptions to copyright permitted to users based in the United Kingdom under the Copyright, Designs and Patents Act 1988, as amended and revised. Any other type of use will need to be cleared with the rights holder(s).
Review the copyright credit lines that are located underneath the image, as these indicate who manages the copyright (©) within the artwork, and the photographic rights within the image.
The collection that owns the artwork may have more information on their own website about permitted uses and image licensing options.
Review our guidance pages which explain how you can reuse images, how to credit an image and how to find images in the public domain or with a Creative Commons licence available.
H 76 x W 96 cm
Things:
Branch (1,125)
Royal Academician (25,917)
You can help us tag artworks on Tagger. The tags above come from the public, and also from an image recognition project run by the Visual Geometry Group, University of Oxford.
Burlington House, Piccadilly, London, Greater London W1V 0DS England
This venue is open to the public. Not all artworks are on display. If you want to see a particular artwork, please contact the venue.
View venue
Hop-Picking – Granny Knowles Canterbury Museums and Galleries
Princess Elizabeth Opening the New Broadgate, Coventry Herbert Art Gallery & Museum
The Cornish Coast National Museum Wales, National Museum Cardiff
A Dark Pool Laing Art Gallery
Idylls of the King (Pelleas and Ettare) Nottingham Castle Museum and Art Gallery
Spring in St John's Wood, London Walker Art Gallery
Susie and the Wash Basin Harris Museum & Art Gallery
|
cc/2020-05/en_middle_0032.json.gz/line8520
|
__label__cc
| 0.614223
| 0.385777
|
Skaneateles Independent Living Communities
Retirement Community facilities near Skaneateles, NY
Use our independent living search tool to find the best options for your family - a FREE Service!
Searching for Retirement Community facilities in Skaneateles, NY?
Expert Senior Living Advisors from A Place for Mom can help direct you to Retirement Community facilities. Together, we’ll find the perfect fit for your loved one; and we’ll provide direction and support as needed. We partner with 45 Retirement Community facilities in NY and the surrounding area, so there are many options to choose from. A Place for Mom is the largest senior living referral service in North America, and we can help you make a good choice at no cost to you.
Looking for general info? Click here for more on Retirement Community in Skaneateles.
Senior housing types near Skaneateles, NY
Brookdale Summerfield
100 Summerfield Village Lane, Syracuse, NY 13215
Here you can do more of what you love. Stop worrying about the house and start planning your next adventure. Here at our independent living community, you can. With several floor plans to choose from, including one-bedroom and two-bedroom options, you’ll find just the right pet-friendly apartment to...
The Hearth at Greenpoint
150 Old Liverpool Rd, Liverpool, NY 13088
The Hearth at Greenpoint offers gracious retirement living complete with a full social calendar to allow residents with the opportunity to grow their hobbies and establish lifelong friendships. Even dining is taken care of, thanks to our Hearth-Healthy Dining. Located in Liverpool and just a short...
The Hearth on James
830 James St, Syracuse, NY 13203
Hearth Management, a small, locally-owned and operated company specializing in premier senior living options, opened The Hearth on James in 2002. Since then, The Hearth on James, overlooking the city of Syracuse, offers easy access to shopping, medical services, and cultural activities. Our...
Parkrose Estates
7251 Janus Park Drive, Liverpool, NY 13088
At Parkrose Estates, you can live the life you want to. Enjoy the convenience of restaurant-style dining, a wealth of life enrichment activities and the freedom to explore your interests within the community and around the Syracuse area. Our amenities and concierge services are designed to enhance...
Brick Corner Independent Living
1604 Grand Avenue, Savannah, NY 13146
When You Rent a Senior Apartment at Brick Corner Senior Independent Living you will have the feeling of being at home without the constant worry of being home alone, routine home maintenance, housekeeping, or meal preparation. We embrace small hometown values, integrity and joyful living. Our...
Maple Downs
7220 Genesee Street East, Fayetteville, NY 13066
Maple Downs provides a fulfilling, independent lifestyle in a welcoming environment. Enjoy our private rural setting featuring a pond and wildlife in Fayetteville, a quiet suburb of Syracuse. You'll love the convenience of being situated close to shopping, first-class healthcare and unique local...
Ashton Place Senior Living
190 Ashton Court, Clifton Springs, NY 14432
Ashton Place is an Independent and Enriched Housing community located in the quaint, historic village of Clifton Springs. We have been in service to the Clifton Springs and other surrounding communities such as Newark, Geneva, Canandaigua and Seneca Falls since 1998. We are conveniently located less...
Parkwood Heights
1340 Parkwood Dr PO Box 979, Macedon, NY 14502
With its spectacular, private location, beautiful and spacious accommodations and impressively appointed community center, Parkwood Heights offers the best in senior living. Featuring patio homes, villas and senior apartments with helpful services and amenities, Parkwood Heights offers fresh new...
Farmington Gardens
6000 Mercier Blvd, Farmington, NY 14425
At Farmington Gardens, You are in the Middle of it All! Located 15 minutes or less from: Beautiful Canandaigua Lake, Kershaw Lakeshore Park, and the Canandaigua Marina Bustling downtown Canandaigua's unique local shops, dining, and seasonal events, including the summer Farmer's Market and winter's...
Grace View Manor
80 Calvary Drive, Norwich, NY 13815
Grace View Manor is 40 unit apartment community that is dedicated to service Senior Citizens 62 years of age and older, and persons with mobility impairments. Grace View Manor is an independent living community and has proudly served the community since 1985. Located at 80 Calvary Drive, Grace View...
Legacy at Willow Pond
40 Willow Pond Way, Penfield, NY 14526
Inviting and picturesque, Legacy at Willow Pond offers a lifestyle of relaxed luxury for older adults looking for a safe and secure, family-like atmosphere in Penfield, NY. With easy access to Route 441 and the I-490 Expressway, Willow Pond enjoys the perfect balance of a beautiful neighborhood...
Solstice Senior Living at Fairport
55 Ayrault Road, Fairport, NY 14450
Solstice Senior Living of Fairport provides a fulfilling, independent lifestyle in a welcoming environment. Tucked away in a quiet corner of Fairport, you'll quickly see why our town is called the 'Crown Jewel of the Erie Canal.' We're close to shopping, healthcare, and great restaurants in a city...
Brookdale Clinton IL
99 Brookside Drive, Clinton, NY 13323
Here you can redefine your independence and do more of what you love. Here at our independent living community, you can trade home maintenance for more time to do what you want to do. Start your day with a coffee in the courtyard garden and then head over to the game room to play poker. You also...
Legacy at Grande'Vie and Village Wood
2140 Five Mile Line Rd, Penfield, NY 14526
Grande’Vie, a Legacy Senior Living Community, offers seniors a vibrant lifestyle filled with daily opportunities for fitness, fun, fellowship, life-enriching activities, and personal growth. You can rest easy knowing that we take care of all the details. Family owned and operated, Grande’Vie has...
Appleridge Senior Living
168 Miller St, Horseheads, NY 14845
Appleridge Senior Living is the premier retirement community conveniently located just off I-86, at the Southern gateway to the Finger Lakes region. The community offers 112 luxury apartments situated on 22 acres of resort style living. Residents enjoy a selection of apartment styles with a choice...
Baywinde Senior Living
100-200 Kidd Castle Way, Webster, NY 14580
Experience gracious living at Baywinde Senior Living Community and you will find the lifestyle you have been searching for. Baywinde is a vibrant, beautiful senior living community located in the Webster/Penfield area. The community is made up of 212 units that include 14 patio homes, 120...
Legacy at Clover Blossom
100 McAuley Dr, Rochester, NY 14610
Nestled in the woods near a charming residential neighborhood around the corner from Mercy High School in Brighton, NY, and moments away from I-490 and I-590 as well as the world-class arts and entertainment in Rochester, New York’s cultural district, Legacy at Clover Blossom is a premier residence...
Legacy at Cranberry Landing
300 Cranberry Landing Dr, Rochester, NY 14609
Welcome home to Legacy at Cranberry Landing, where a family atmosphere greets you as you enter our intimate, boutique-style setting. Conveniently located in East Irondequoit near Irondequoit Bay and within a mile of I-590 Exit 9 (Norton St/Bayview Rd) and Route 104, our residents enjoy the...
Pinehurst Senior Living
1000 Pine Trl, Honeoye Falls, NY 14472
Welcome to Pinehurst Senior Living Community. Our close-knit “family” is located on eight acres, nestled among the pines surrounding the village of Honeoye Falls. The beautiful country setting is just minutes south of Rochester. The historic village and peaceful falls are within easy walking...
The Gables of Brighton
2001 S Clinton Ave, Rochester, NY 14618
The Gables of Brighton is an independent living community for seniors in Rochester, New York. Rochester is a wonderful city to call home, consistently ranked as the 'most livable city' with award-winning schools, low cost of living and a low unemployment rate. Rochester hosts more than 140 festivals...
St. Ann's Community at Chapel Oaks
1550 Portland Ave, Rochester, NY 14621
Located on 14 secluded acres in Irondequoit, NY, Chapel Oaks offers luxury one- and two-bedroom apartments, a maintenance-free lifestyle, and a wide range of first-class amenities including: Newly renovated apartments; Indoor pool and fitness center; Transportation to appointments; Chef-prepared...
Legacy at Erie Station
1545 Erie Station Rd, Henrietta, NY 14467
Quiet country elegance and hospitality are the hallmarks of Legacy at Erie Station senior living community near the corner of Erie Station Road and East Henrietta Road in Henrietta, NY. Part of the Henrietta “green belt”, Legacy at Erie Station’s park-like setting, ponds, wildlife, and fountains...
The Hearth at Castle Gardens
1715 Castle Gardens Rd, Vestal, NY 13850
Our expertly trained staff is handpicked to provide the best services you wouldn't find anywhere else. At The Hearth at Castle Gardens, it is not just senior living, it is better living. Does the idea of carefree living appeal to you? How about the idea that we pay attention to the details to...
Schuyler Commons
1776 Independence Square, Utica, NY 13502
Luxury Apartment Homes for Active Adults 55+...Maintenance Free...Come experience the lifestyle at Schuyler Commons. Our property is conveniently located at the intersection of Trenton Road and Meadow Drive. Units include the following great amenities: high end features such as granite counter tops,...
Fleming Point
720 Latta Road, Rochester, NY 14612
Fleming Point provides a fulfilling, independent lifestyle in a welcoming environment. Situated on beautifully landscaped grounds on the quiet community of Greece, you'll be delighted by our friendly staff and charming facilities. Residents also appreciate the convenience of being just minutes...
Gardens at Town Center
100 Greece Center Drive, Rochester, NY 14612
The Gardens at Town Center will have 176 brand new one and two bedroom apartments for residents 55+. Each unit will provide luxurious living with a modern open floor plan, fully equipped and open kitchen complete with a dishwasher, individually controlled heating and cooling, a walk-in closet in the...
Ives Hill Retirement Community
1200 Jewell Dr, Watertown, NY 13601
Just minutes from the beautiful Thousand Islands region of the St. Lawrence River, Ives Hill Retirement Community is located in Watertown, NY. This community borders the Ives Hill golf course and is situated in a quiet, peaceful neighborhood just minutes to professional medical offices and...
Heritage at The Plains at Parish Homestead
163 Heritage Circle, Oneonta, NY 13820
We are currently updating our information about this care provider. To find out more information, or to schedule a tour, please fill out the form above.
Little Falls Garden Apts.
759 E Monroe St, Little Falls, NY 13365
Little Falls Garden Apartments is located in the beautiful Mohawk Valley Region of New York State. The complex consists of fifty (50) one-bedroom units designated for seniors 62 or over and/or persons with disabilities. The properties grounds and common areas are very well maintained and tranquility...
The Manor House Independent and Enriched Care
427 E Main St, Batavia, NY 14020
Located in the heart of Batavia, NY, The Manor House provides apartment style living for seniors who are Independent or need an assisted level of Enriched Care. The Manor House was built in 1997, with 2 additions in 2009. We are licensed and regulated by NYS Department of Health. Our privately owned...
Kingsdale Chateau
520 Kingsdale Avenue, Kingston, ON K7M 9B6
Set on 10 acres in the beautiful Cataraqui Regional Conservation Area, Kingsdale Chateau began serving Kingston families in 1999 — and we continue to offer a simplified, stress-free lifestyle that allows seniors more time to do what they love. With an enchanting, creek-side setting, you'll...
Lyons Manor
31 Pearl St, Lyons, NY 14489
Lyons Manor is an affordable 55 and over senior housing community located in historic Lyons, Wayne County, New York. The community is only a block or two from the First Lutheran Church, The Peppermint Museum, Lyons central Park, Ohman Theater, Grace Episcopal Church and the Erie Canal by the...
The Gardens (Gananda Senior Apartments)
3503 Canadaigua Road, Macedon, NY 14502
Located just off the Gananda Parkway, The Gardens enjoys the privacy of a spacious wooded lot, neighbored by farmland and Blue Heron Hills Country Club. Enjoy the serenity from your own balcony or patio, venture out to explore the surrounding trails and ponds, or even plant and tend your own plot in...
Autumn Grove
1325 E Victor Road, Victor, NY 14564
Autumn Grove senior housing community is located in the quiet town of Victor, Ontario County, New York. The area is full of mature shade trees and finely manicured lawns. Autumn Grove can be easily accessed just off of Highway 96. Nearby is Victor Hills Golf Course and Mud Creek. An ambulance...
Muldoon Gardens
443 Pennsylvania Avenue, Waverly, NY 14892
Muldoon Gardens is a senior housing community that is located in Waverly, Tioga County, New York. We are surrounded by beautiful flowers and other parts of nature that ensure our surroundings are calm, peaceful, serene and enjoyable for anyone that is here. We are extremely pleased of the location...
Ogden Gardens
20 Kingsford Lane, Ogden, NY 14559
Ogden Gardens is a 62+ senior housing community nestled in Ogden, Monroe County, New York which is just 15 minutes from Rochester. At Ogden's town center sits the quaint Spencerport Village on the Erie Canal, where your every need is met, from exquisite boutiques to hair salons, jewelers, coffee...
The Village at Unity
1471 Long Pond Road, Rochester, NY 14626
The Richmond Retirement Residence
175 North Front Street, Belleville, ON K8P 4Y8
Towne Center Retirement Resort
3900 Medical Center Dr, Fayetteville, NY 13066
St. Ann's Senior Housing Cherry Ridge
900 Cherry Ridge Blvd, Webster, NY 14580
Valley Manor
1570 East Ave, Rochester, NY 14610
Villa Capri Senior Apartments
200 Frank Dimino Way, Rochester, NY 14624
Maple Manor Residence
132 Avonlough Road, Belleville, ON K8P 5G3
Sullivan Terrace
132 N German Street, Dushore, PA 18614
The Carrington Retirement
114 Whites Road, Trenton, ON K8V 5P5
Independent Living Facilities Near Skaneateles, NY
Retirement Community in Auburn, NY
Retirement Community in Baldwinsville, NY
Retirement Community in Liverpool, NY
Retirement Community in Syracuse, NY
Retirement Community in Savannah, NY
Retirement Community in Fayetteville, NY
Retirement Community in Manlius, NY
Retirement Community in Minoa, NY
Retirement Community in Cortland, NY
Retirement Community in Geneva, NY
Retirement Community in Lyons, NY
Retirement Community in Ithaca, NY
Retirement Community in Clifton Springs, NY
Retirement Community in Vermont
Retirement Community in Connecticut
Retirement Community in Pennsylvania
Retirement Community in New Jersey
Retirement Community in New Hampshire
Retirement Community in Massachusetts
Retirement Community in Rochester, NY
Retirement Community in Kingston, ON
Retirement Community in Belleville, ON
Retirement Community in Scranton, PA
Retirement Community in Albany, NY
Skaneateles, New York
Many seniors may be physically and mentally able to live without assistance, but cost of owning a home might be a deterrent to living an independent life. Independent Living Communities offer a great alternative. Residents may live their lives as they wish while their food is prepared by a professional chef, housekeeping and laundry duties are handled by staff, and recreational activities are scheduled and organized. Along with their daily needs being met, residents can enjoy the opportunity to be among peers, in a community with others of similar ages and interests. Typically comprised of a private living space and a full kitchen, these communities offer residences with many of the amenities of apartment life but without the hassle. Guests can be invited over and entertained, and there will be more time to spend with them with the basic maintenance of daily chores out of the way. While policies vary between communities, a number of residences allow cats and dogs as well. Nursing and health care services can always be arranged for with independent care providers as desired. There are a number of expenses and advantages to balance while choosing an independent living community. It is important to determine if these services are covered in the service plan: wellness program, field trips, utilities, meals, cable TV, Waiting list deposit, parking, and housekeeping. The benefits and amenities associated with independent living include beauty salon & barber shop, golf course, fitness center & swimming pool, concierge services, community activities, healthcare center, laundry service, and transportation.
Based on gender, 52.2% are female and 47.8% are male. The median age of Skaneateles is 52 years old. In Skaneateles, 1.6% do not have health insurance, 8.7% have some form of disability, 4.2% live in poverty, and 61.1% participate in the labor force. Of the population of Skaneateles 10.8% have a high-school diploma, 65.7% have a college degree, and 32.8% have a graduate degree. Demographically, Skaneateles is 0.0% Native American, 0.0% other or not specified, 0.0% black, 0.3% Hispanic, 0.6% mixed race, 0.0% Pacific Islander or Native Hawaiian, 1.3% Asian, and 98.0% white. In Skaneateles, 10.2% of the population are veterans. Skaneateles has a population density of 676 people per square mile.
The overall cost of living can be a major influence when choosing which care option is the best fit for you or your loved one. The rent burden for Skaneateles is about 17.8% of the average monthly income. Skaneateles has a median home value of about $320,031 and the median cost of rent is $1,526 per month.
An overview of New York
There are 205 hospitals and 496 health centers that service a population of 19,493,819. The top three hospitals in the state are considered to be Hospital For Special Surgery, Albany Memorial Hospital, and And Northern Duchess Hospital. The natural beauty of New York is ranked 24th in the nation. New York is ranked 25th in quality of life and 13th in healthcare. Out of a national average of 100, New York has a cost of living index rating of 136, a grocery index rating of 115, and a housing index rating of 204.
During the latest presidential election, 37% voted for the Republican candidate while 59% voted for the Democratic candidate. Twenty-nine percent of New York residents regularly attend a religious service from one of the state's 14,110 different congregations. The top three non-Christian denominations in the state are Jewish-7%, Muslim-2%, and Buddhist-<1%, with the most common Christian denominations consisting of Evangelical Protestant-10%, Mainline Protestant-11%, and Historically Black Protestant-5%. In New York there are 72 masonic lodges. The state has a median age of 39 and 30% of its population being over the age of 55. The state of New York ranks 5th in the country for diversity and the state is considered very LGBTQ friendly.
On average, the humidity rating for New York is around 71%. The highest monthly average humidity rating is 77% in the month of December. The average temperature in the winter falls to around 25°F. The average high winter temperature is around 25°F in the month of December. The average low temperature during the winter drops to around 2°F in the month of January. The average temperature in the summer rises to around 68°F. Over the summer months the average high temperature peaks at around 86°F during the month of July. The average low summer temperature is around 48°F in the month of June. On average, New York has an air quality index rating of around 34.2 AQI. The average air quality index rating peaks in the month of May with a rating of around 44.5 AQI. On average, the state receives 3.54 inches of precipitation a month. The average amount of precipitation peaks during the month of October at around 6.10 inches. While residents of New York mostly enjoy pleasant conditions, it's important to be aware of inclement weather as well, which in New York can include floods, hurricanes, tornados, and and earthquakes (moderate).
Wildlife to be found in New York
The state of New York has a diverse array of plant and animal life. Local plant life can consist of canada anemone, sneezeweed, bluets, and smooth blue aster. While venturing throughout the state, you might see animals such as the american marten, the red fox, the moose, or the gray fox. The state animal of New York is the beaver.
|
cc/2020-05/en_middle_0032.json.gz/line8521
|
__label__cc
| 0.569577
| 0.430423
|
Cymbopogon flexuosus seeds, Lemongrass
Cymbopogon flexuosus
Cymbopogon flexuosus seeds, Indian Lemon Grass
Cymbopogon is a perennial tufted aromatic grass also known by other names such as East Indian lemon grass, Cochin grass, Malabar grass and fever grass. The plant synonyms include Flexusus, Cymbopogon travancorensis and Andropogon flexuous. The plant belongs to the genus of lemon grasses Cymbopogon and poaceae family. The indigenous form of this species can be traced back to Burma, Sri Lanka, India, Thailand and South West China where it grows for many years before being distributed to other areas of the world.
Cymbopogon flexuous have a distinctive smell and can retain its green leaves throughout the year. They grow closely together forming perennial grass which is heavily branched. Its stems can grow up to a height of 2-3 meters that occur from short thick rhizomes. The plant has parallel-veined leaves, glaucous-green, alternating with a sheath to a stem having pubescence at the divergence point. The leaves are about 1m long with citrus odour when crushed. The flowers have floral parts unequal in size arranged in terminal panicles. Each flowering unit has two yellow-brown structure referred to as glumes. In most cases, the plant is seen in fields or gardens cultivated but can sometimes escape to human-disturbed habitats.
Cymbopogon flexuosus can be useful in various ways, for instance, crucial oils can be obtained from the plant which is highly aromatic resembling the lemon flavor and aroma. The food processing industries often use the aroma to flavor foods such as baked goods, ice creams, candies, oils and chewing gums. The plant’s leaves can also be dried to be used as an aromatic herb tea. The plant can also be useful to farming planting other crops since it can use the lemongrass plants to divide the garden. It can also help to contain more invasions of crops such as sweet potato.
You're reviewing:Cymbopogon flexuosus seeds, Lemongrass
Lepidium meyenii seeds (syn peruvianum) viable Maca seeds, BLACK TYPE
Manglietia insignis seeds, Magnolia, Red Lotus Tree
seeds of Rosa corymbifera laxa
Pomaderris kumarahou, 100 seeds
Solanum sessiliflorum, Cocona seeds
seeds of Bolivian Rainbow Chili Peppers
20 seeds of Rauvolfia serpentina "Snakeroot" Rauwolfia Sarpagandha
Paulownia elongata seeds! BEST QUALITY Paulownia seeds
15 seeds Agave americana, Common aloe
seeds of Antidesma acidum
seeds of Moneymaker Heirloom Tomato seeds
20000 seeds of Scutellaria barbata, barbed scullcap
seeds of Pinus kesiya, Khasi Pine
5000 seeds Carnarygrass (Phalaris arundinacea)
seeds of Ancho Chili Peppers
seeds of Bixa orellana, Achiote
|
cc/2020-05/en_middle_0032.json.gz/line8523
|
__label__wiki
| 0.678557
| 0.678557
|
NEWS What's New Uwingu Mars Mapping Project Announces Grant to AWB
Uwingu Mars Mapping Project Announces Grant to AWB
by Mike Simmons
Uwingu, a company formed by scientists to raise funds for space exploration and education, has announced a grant to Astronomers Without Borders. The grant was generated by Uwingu's new Mars Mapping Project, an innovative program of public engagement that Uwingu hopes will raise $10 million for space research.
Based on the response to the Mars Mapping Project so far, Uwingu is off to a fast start towards reaching that goal. And Astronomers Without Borders will create programs to help reach more astronomy and space enthusiasts around the world.
Dr. Alan Stern, the CEO of Uwingu, said, "We're very proud to award the first grant from our latest project to Astronomers Without Borders, an international organization dedicated to educating the public about astronomy."
Mike Simmons, President of Astronomers Without Borders, added, "Uwingu's mission of public engagement matches ours, and we encourage our members to participate in this project to publicly fund space exploration and education.”
More announcements will be coming soon from this new and dynamic partnership as Astronomers Without Borders extends its reach to the Red Planet, taking its members along for the ride.
The complete press release is available here (PDF).
|
cc/2020-05/en_middle_0032.json.gz/line8526
|
__label__cc
| 0.613269
| 0.386731
|
ANA MILOSAVIC
#LADIESWHOHUSTLE INTERVIEW SERIES: AMBER JOLIAT
Welcome to my new interview series featuring some of the brightest and most hard-working women I know. My goal for this series is to collect stories from women in all levels of their career. The hope is that their journey and their advice will trigger something in you, and help you take the jump you need to achieve your personal level of success. Whether they are freelancers, founders of their own business, corporate employees, or students, this #LadiesWhoHustle series will showcase their unique talents and help you unveil yours.
I'm honoured to announce the next lady in my #LadiesWhoHustle series is the multi-talented, Amber Joliat. Amber is the creator of MISFITSTUDIO and the host of Be Moved, the podcast. In 2010, she created the MISFITMETHOD out of a desire to move with freedom. Connecting strength and grace, Amber inspires minds, bodies and souls to untangle from the inside. Teaching us how to feel the deeper connection to self, Amber invites everyBODY to experience a full release.
Read more about this inspiring woman and her journey to entrepreneurship below.
Amber Joliat
I am the creator of MISFITSTUDIO, a movement studio in Toronto offering classes that remind the mind/body/soul how to feel.
What inspired you to become an entrepreneur? Was this a life-long goal?
Absolutely not. I am an artist - I have danced and taught dance and painted my entire life. It is still surreal to me that I run a business, I don't see it as a business, MISFITSTUDIO is my heart, it is an extension of me.
What was your dream job at 10 years old?
To be a dancer.
If you could have anyone's job, whose job would you choose and why?
I'd love to be a gardener, growing flowers. Quiet and peaceful life.
What is one thing people outside of your industry get wrong about your job?
HA! It's challenging to narrow down to just one thing. There are SO many!!
1. Because it's a movement studio, it's easy work.
2. Because it's a mindful workplace, only peaceful and spiritual things occur all day.
3. That my job, or therefore any of my "jobs" (teaching, mentoring, running studios, creating content, building online videos, spreading the gospel that ONLY YOU CAN HEAL YOU) is not taken seriously.
How do you define success in your career?
Overcoming obstacles over and over and over. STANDING IN MY STRENGTH, GRACEFULLY EMBRACING CHANGE. Learning from every single challenge/obstacle/situation/incident. Showing up as the best version of myself every single day.
Where do you see yourself in 10 years?
Near the ocean.
What has been your biggest career struggle so far?
There have been many. Overcoming the fear of being a LEADER, learning from the most difficult moments. Relocating my studio four times! Challenges are all a part of life!
And your biggest career win?
I've had some pretty massive career highs, teaching atop a mountain for 800 people for Wanderlust. Cultivating meaningful partnerships with Goop, The Coveteur, and The Selby. Collaborating with Fortnight Lingerie and co-designing a line of dance wear! AND getting a shout out in Vogue (The Cool Girl's Guide to Toronto)!
What's the best piece of advice you've received?
A Maya Angelou quote: "I've learned that people will forget what you said, people will forget what you did, but people will never forget how you made them feel". I base everything on intuition and feeling.
What about the worst piece of career advice?
I choose not to absorb bad advice, rather see it as a reflection of the human sharing it.
What are you the most proud of?
The fact that I ran MISFITSTUDIO on my own for six years, and now the team that keeps the fire burning bright are all women, soul sisters, and family!
Who motivates you?
Leaders/voices/forces who are inspiring a positive change in the world.
What advice do you have for those looking for a career in your field?
Do the hard work it requires to get to know yourself. Find your voice, be YOU and don't be a copycat.
When do you feel the most confident?
When I am connected, tuned in, heart beat and breath slow.
Baths, painting, meditating, cooking, laughing with my gals and sharing a meal with my husband.
LIGHTNING ROUND:
Currently coveting: massive chunks of quartz.
Favourite way to sweat: the MISFITMETHOD.
Favourite book: The Four Agreements by Miguel Ruiz.
Morning bird or night owl? Both!!!
Favourite '90s jam: "I'm Every Woman" by Whitney Houston.
Favourite city: Positano.
Spirit animal: Eagle.
Dead or alive, who's your most coveted dinner guest? Buddha.
Where's your next vacation? Morocco.
Most used app: Podcast/Slack.
Get in touch with Amber:
Website: misfitstudio.com
Instagram: @misfitstudio / @theamberj
Know anyone that would be great to feature in the #LadiesWhoHustle series? Connect with me on Instagram to nominate them - or yourself!
#LADIESWHOHUSTLE INTERVIEW SERIES: MADELINE MILLER
I am excited to announce that the next #LadiesWhoHustle interview is with an author I truly connected with. I read her book Circe, a greek mythology inspired novel, and immediately fell in love with the characters and her style of writing. The second I was finished, I knew I needed more, and I need to learn more about this inspiring women.
Madeline Miller has her Masters degree in Classics and is the author of two novels, The Song of Achilles and Circe. She taught Greek Latin and Shakespeare to high school students for twenty years and also has a background in theater - she is a director of Shakespeare plays. She currently lives outside of Philadelphia, where she grew up.
Writer, teacher and director.
Empathy is one of humanity's most vital and precious abilities. And stories are a catalyst for empathy. You are learning how to live in someone else's life, how to see the world through their eyes. I feel passionately about telling the stories of those who haven't had the chance to speak.
What career would you have if you weren't a writer?
A teacher or a director! (I know that's kind of cheating, since those are actual other careers I have, but it's true. I love them both.)
What interests you most about Greek mythology and why have you decided to write about it?
The trappings of culture have changed, but human nature is the same as it ever was - we still go to war, grieve, despair, love, hope, fear... What has always moved me about these stories is how incredibly resonant they feel to modern life. Gods and monsters aside, the story of the Iliad is the story of a young man coming to terms with his own death and the death of those he loves, and the Odyssey is the story of an exhausted war veteran who is desperate to get home. I wanted to tell these stories, but from the point of view of those who haven't had the spotlight before.
What's one thing that people get wrong about Greek mythology?
We talk about Achilles and Odysseus as heroes, but the word means something different today than it did to the ancients. Today we mean someone who is morally exemplar, someone who is virtuous and altruistic. In the ancient world, heroes made terrible mistakes, had faults as big as their strengths, and often caused destruction wherever they went. I think it makes them all the more interesting to recognize those faults and complexities.
If you could be any character in your novel, which character would you be and why?
This is tough when you're talking Greek Myth, since so many of these stories have significant tragedy to them. But I think I do have to go with Circe. Magic powers and pet lions? Count me in!
What has been your biggest career win so far?
In terms of my resume, winning the Orange Prize for Fiction for The Song of Achilles. But in terms of a life change, I think it was selling The Song of Achilles in the first place. My whole life I had wanted to be a writer; I had worked on the book for ten years. Knowing that someone wanted to put it out into the world as a real book was absolutely astonishing and thrilling. I'm still grateful!
And your biggest career struggle?
Understanding that writing is filled with daily failures. The Song of Achilles took me ten years to write, and went through a lot of bad drafts, which I tortured myself over. I had to learn that those bad drafts are part of the process. I don't torture myself (much) anymore, I just get back to work.
What advice would you give to those looking to have a career as an author?
As I said, don't give up just because you don't like what you've written. Take a writing workshop, read good books, keep trying. Write the story that you are absolutely obsessed with, that you can't get out of your head. If you're passionate about it, the reader will feel that.
Take us through the process of writing a book. How is it for you?
My favourite part is getting to the final draft, and seeing everything you've worked so hard on all coming together! (And fixing those last things that haven't come together, so they do). When I get stuck, I read research on ancient myths - there's always something there that inspires me. The most important ritual I have is to work out every writing day. Moving my body helps to keep my thoughts moving too.
Have you always been a true creative, or has it taken practice to perfect?
Lots and lots of practice! But I've always wanted to write, and tell stories. When I was a child, I dreamed of writing a book.
What is your favourite genre to read and what's your favourite book?
I can't pick just one! So many favourites, old and new: The Handmaid's Tale, by Margaret Atwood, Pachinko by Min Jin Lee, Euphoria by Lily King, Fingersmith by Sarah Waters, Giovanni's Room by James Baldwin (anything by James Baldwin), Watership Down by Richard Adams, The Aeneid by Vergil. I could go on, but I won't!
When I'm walking, or in front of a classroom.
What career aspirations do you have that you still haven't fulfilled?
I'd love to get back in the director's chair! Directing for a major professional theater would be a dream. And of course, I haven't written my next book. I want there to be a next, and a next after that.
What happened to make you realize you've "made it" in your chosen career as an author?
Maybe it's the perfectionist in me, but I don't know if I'll ever think I've made it. I always want to keep working, keep improving, book by book. That said, looking out into the audience at events and seeing a packed house is incredibly exciting and gratifying.
Congratulations on Circe becoming a #1 New York Times Bestseller! how do you celebrate these kinds of wins?
I love to rock climb - I get a babysitter, and my husband and I go out for the evening to climb!
Reading, of course. Walking. Talking to friends, and hanging with my family.
Get in touch with Madeline:
Website: madelinemiller.com
Instagram: @madeline.e.miller
Twitter: @millermadeline
Know anyone that would be great to feature in the #LadiesWhoHustle series? Connect with me on Instagram to nominate them - or yourself!
#LADIESWHOHUSTLE INTERVIEW SERIES: RENÉ DENFELD
This lady needs no introduction. If you've spent any time chatting with me in the past few years, you know she is my absolute favourite author! So, I am more than pleased to introduce my next #LadiesWhoHustle interviewee, René Denfeld.
Bestselling author of The Child Finder and The Enchanted, by day, René works as an investigator, helping others. She was once the Chief Investigator at the public defenders office. René is also a longtime foster mom - over 20 years! - and has three amazing kids she adopted through foster care. Based in Portland, Oregon, she spends her time with her kids, a Great Pyrenees named Snow and three cats.
René Denfeld
Author, death row investigator, and foster mom.
I love my life! I've been an investigator for over a decade and have worked hundreds of cases. I've helped exonerate innocents, helped sex trafficking victims, done asylum cases and more. I've also been a therapeutic foster mom for over twenty years. I went into both because I wanted to help people. I know it is possible to not only survive trauma, but thrive. As I tell my kids, I love them not despite what happened to them, but including it. My justice work and parenting has inspired three novels - the third comes out next year. I love the poetry of writing, feeling I am in touch with the magic and mystery and hope of life.
What inspired you to start writing after having such a different type of career as a death row investigator?
I was leaving the death row prison one day when I heard a very distinctive, quiet voice. He said "this is an enchanted place." That voice led directly into my first novel, The Enchanted. It went on to win fancy awards and all that, but I wrote it to tell the stories of people I feel whose stories are often ignored. People with histories like mine. I had previously written poetry and short stories, but kept those mostly to myself. Writing my first novel felt like an explosion, like all this poetry came rushing out on to the page. I felt like I had found something I was meant to do.
Wow, that's a great question! And a tough one. I love getting leaders from readers. I have to say winning the French Prix meant a lot too, and who would say no to a trip to France, complete with wining and dining? Not me!
For my justice work, my greatest career win has to be exonerating several innocents, including a child I got out of prison. That poor boy had missed almost a year of school, and was in jail for something he didn't do. It felt good to get him out, but like all exonerations it also came with sadness, for all the damage that was done to his psyche, and the knowledge of all those left behind.
Of all the things I've done I'd say the most satisfying, and redemptive, has been fostering and raising my kids. I am truly a very lucky mom.
What about your biggest career struggle?
Bitterness. I think bitterness is a natural human emotion - it's part of the human condition. But for me at least bitterness is the enemy of art and hope. There's been times I've struggled with bitterness. I've been bitter at what our country does to people, at our confused, conflicted and often inhumane values. It's hard to keep up energy and hope in the face of atrocity and despair. But it's important, because bitterness can be paralyzing, and I think bitterness keeps us from connecting to the humanity of others and ourselves. For me bitterness is a battle I fight, and I tell bitterness I will win, because life is full of wonder and beauty, even in the struggle.
Plan on a day job. Seriously. Very, very few writers ever sustain themselves on writing alone. The vast majority of writers have day jobs. Teaching is common, but consider other day jobs that will feed your soul and give you a sense of purpose. I coach aspiring writers that it's not enough to want to be a writer, you have to have stories to tell. It's the life you lead when not writing that will give you those stories.
Take us through the process of writing a book.
First, I make myself a pot of coffee.... :) I think each book is different, at least mine are. My first novel I wrote outside prisons, at breaks at work, and often stayed up all night writing. The second novel came in a rush. I'm not much on outlining, but I do have a sense of where the story is going to end in my head. The voice is the most important part. Is it alive? Lyrical? Magical? Once I have that I know I can revise and it will probably still all work out. I think the most important part is to just keep working at it. It's surprising how much progress you can make within an hour of writing every day.
My favourite part? Those times when I am so absorbed in the miracle of writing I get lost in the story. My kids can come in the room, wave their hands in my face and I am just...gone.
What's your favourite genre to read?
I read voraciously and I read widely. Good reading make for good writing! I love fiction, memoir, nonfiction, you name it. I even read children's books. I just love to read.
That's a wonderful question. I have to say when I am writing. The act of creation is awe-inspiring and I feel connected to something far greater than myself.
I would like to do more work on a policy level fighting mass incarceration and other injustices.
What happened that made you realize that you've 'made it' in your chosen career as an author?
You know, I don't feel I have made it. That's a curious questions to me and I wonder what that would feel like. If someone does feel it, is it a relief, or does it impact their drive? I'd love to know, if anyone wants to reach out and tell me. I'm genuinely curious, as I've heard the phrase before and wondered.
I work out for stress relief. If I don't go to the gym my kids remind me! They like when mom comes home in a great mood and wants to make cookies or buy pizza, lol. I also love long walks and try to take one long walk every day. I love connecting with nature, even in the city. I love the active meditation of walking.
I find The Enchanted is so well written and fully immerses you in the story. What gave you the inspiration to write this story? Did you know you were writing such a captivating piece during the process?
I felt The Enchanted was very much the story of my work and life. I was telling all the truths I had experienced, and yet never seen anyone else tell in a novel. It felt like such magic to write. It was truly transporting and transformative!
You've won many awards for both The Enchanted and The Child Finder, congratulations! How do you celebrate those wins?
Usually I ask the kids, "who wants to go out to dinner?". Then we go stuff ourselves on sushi or burgers or pasta or whatever we are in the mood for. Awards are wonderful, but I want to caution aspiring writers that many fantastic books are missed in the awards process. It's not indicative of the quality of the book, so please don't let it impact your own work!
Being an author, you must hear so much feedback on your novel. How do you deal with the good and the bad?
I don't read bad reviews. The book is already written and can't be changed, so what's the point? And I don't read bad reviews for the same reason I don't write them: there's enough poison in the world. Writers pour their hearts and souls into books. Why go trampling on them? If you don't like a book, let someone else enjoy it.
As for the positive feedback, I really appreciate it. Thank you to all the amazing readers who reach out to me. It means a lot.
I'm really looking forward to your new book, The Butterfly Museum. Can you give us some insights into it?
The Butterfly Museum tells the story of a 12-year-old street girl, Celia, who survives being homeless thanks to her beliefs in the power of butterflies. It's a deeply magical, hopeful, poetic story - and it's a page turner too. For Naomi fans, she's there! The novel was inspired by my own history. I was homeless as a child.
Get in touch with René:
Website: renedenfeld.com
Instagram: @rdenfeld
Facebook: Rene Denfeld Author
Twitter: @renedenfeld
BEST NOVELS TO READ IN 2019
I'll admit it, I'm a book addict. I've loved to read all my life and really enjoy the feeling of diving deep into a novel and being transported into a different world and a different life. It's my favourite way to relax, my favourite way to learn, and my favourite way to broaden my creativity.
Currently, I'm the leader of not one, but TWO local book clubs, and I couldn't be happier. Book Klub is a fun, relaxed club I started with some past co-workers. We alternate who selects a book each month which gives us the chance to try genres and books we typically wouldn't pick up ourselves. On the other hand, The Wild Woman Book Club is an initiative started by The Ace Class. Women get together throughout Canada once a month, and we discuss the same book. The conversations are stimulating, exciting, and engaging, and the networking aspect is one of a kind.
So, if your 2019 goal is to read more, or you simply want to relax with a good book while the weather slowly warms up, then read on. I have suggestions for you:
Top 6 Books to Read:
The Enchanted - René Denfeld
This is an enchanted place. Others don't see it, but I do.
The enchanted place is an ancient stone prison, viewed through the eyes of a death row inmate who finds escape in his books and in re-imagining life around him, weaving a fantastical story of the people he observes and the world he inhabits. Fearful and reclusive, he senses what others cannot. Though bars confine him every minute of every day, he marries magical visions of golden horses running beneath the prison, heat flowing like molten metal from their backs, with the devastating violence of prison life.
Two outsiders venture here: a fallen priest, and the Lady, an investigator who searches for buried information from prisoners' pasts that can save those soon-to-be-executed. Digging into the background of a killer named York, she uncovers wrenching truths that challenge familiar notions of victim and criminal, innocence and guilt, honour and corruption-ultimately revealing shocking secrets of her own.
When people first hear that I’m a huge book worm (and self-proclaimed book addict), their first question is usually, “what’s your favourite book?”. Well, here it is. Written by a death row investigator, The Enchanted takes on a real and raw perspective of what it’s like to be on death row.
Each character is so beautifully written and really lets you sink into their emotions. I devoured this book. And for the first time ever, the second I was finished, I flipped right to the front and started again. Why? Well because I didn’t want to miss anything!
Guaranteed to leave you satisfied, I suggest diving into 2019 with some Rene Denfeld, and seeing where her story takes you.
CRAVING MORE RENÉ DENFELD? CLICK HERE FOR A FULL COLLECTION OF HER WORK.
Circe - Madeline Miller
In the house of Helios, god of the sun and mightiest of the Titans, a daughter is born. But Circe is a strange child—not powerful, like her father, nor viciously alluring like her mother. Turning to the world of mortals for companionship, she discovers that she does possess power—the power of witchcraft, which can transform rivals into monsters and menace the gods themselves.
Threatened, Zeus banishes her to a deserted island, where she hones her occult craft, tames wild beasts and crosses paths with many of the most famous figures in all of mythology, including the Minotaur, Daedalus and his doomed son Icarus, the murderous Medea, and, of course, wily Odysseus.
But there is danger, too, for a woman who stands alone, and Circe unwittingly draws the wrath of both men and gods, ultimately finding herself pitted against one of the most terrifying and vengeful of the Olympians. To protect what she loves most, Circe must summon all her strength and choose, once and for all, whether she belongs with the gods she is born from, or the mortals she has come to love.
I’m not typically drawn to books about Greek mythology, but this one caught my eye (plus, I’ve heard so many great things, I couldn’t miss out). And let me tell you, I am glad I picked it up!
Madeline Miller does a fantastic job relaying some of the most famous figures in Greek mythology, while twisting it into a novel you can’t put down. The story is captivating and leaves you wanting more. This page turner is a definite must read and will help quench your thirst for fantasy, mythology, gods and monsters.
I listened to this book on Audible, narrated by Perdita Weeks, and really enjoyed the audio version. I caught myself turning to my Audible account whenever I had a few seconds to listen, and I got through this book in lightning speed. Pick it up and transport yourself in a fantastic world unlike any you have experienced before.
CRAVING MORE MADELINE MILLER? CLICK HERE FOR A FULL COLLECTION OF HER WORK.
The Book of Essie - Meghan Maclean Weir
A debut novel of family, fame, and religion that tells the emotionally stirring, wildly captivating story of the seventeen-year-old daughter of an evangelical preacher, star of the family's hit reality show, and the secret pregnancy that threatens to blow their entire world apart.
Esther Ann Hicks--Essie--is the youngest child on Six for Hicks,a reality television phenomenon. She's grown up in the spotlight, both idolized and despised for her family's fire-and-brimstone brand of faith. When Essie's mother, Celia, discovers that Essie is pregnant, she arranges an emergency meeting with the show's producers: Do they sneak Essie out of the country for an abortion? Do they pass the child off as Celia's? Or do they try to arrange a marriage--and a ratings-blockbuster wedding? Meanwhile, Essie is quietly pairing herself up with Roarke Richards, a senior at her school with a secret of his own to protect. As the newly formed couple attempt to sell their fabricated love story to the media--through exclusive interviews with an infamously conservative reporter named Liberty Bell--Essie finds she has questions of her own: What was the real reason for her older sister leaving home? Who can she trust with the truth about her family? And how much is she willing to sacrifice to win her own freedom?
I read this book in one of my book clubs, and immediately fell in love. In our world of reality TV, and celebrities that let us into our lives, it’s really fascinating to read about a different perspective. I immediately fell in love with Essie’s character, and cheered her on through the entire novel. The twists and turns are unexpected and beautifully incorporated into the novel.
What would you do if your entire life was broadcast? If you were the best-known person, and family, in your town? Take a read and see what Essie chooses to do.
CRAVING MORE MEGHAN MACLEAN WEIR? THE BOOK OF ESSIE IS MEGHAN'S DEBUT NOVEL. I WILL POST UPDATES WITH ANY POSSIBLE FUTURE RELEASES.
Unwind - Neal Shusterman
Genre: Young Adult/Dystopian
Connor, Risa, and Lev are running for their lives.
The Second Civil War was fought over reproductive rights. The chilling resolution: Life is inviolable from the moment of conception until age thirteen. Between the ages of thirteen and eighteen, however, parents can have their child "unwound," whereby all of the child's organs are transplanted into different donors, so life doesn't technically end. Connor is too difficult for his parents to control. Risa, a ward of the state, is not enough to be kept alive. And Lev is a tithe, a child conceived and raised to be unwound. Together, they may have a chance to escape and to survive.
This is book one in Neal Shusterman’s Unwind series and let me tell you, it caught my eye right away! Another book I listened to on Audible, narrated by Luke Daniels, I couldn’t even believe it myself when I finished this book in less than 48 hours.
Neal transports us into a future world where children can be “unwound” at age thirteen, where all of their organs are transplanted into donors. The writing makes you truly believe this can be a possibility in our future, and leaves you feeling a little unsettled – in the best way possible.
I encourage you to dive into Unwind, and challenge your current thoughts. What reality do you believe lies ahead of us?
CRAVING MORE NEAL SHUSTERMAN? CLICK HERE FOR A FULL COLLECTION OF HIS WORK.
A Little Life - Hanya Yanagihara
When four classmates from a small Massachusetts college move to New York to make their way, they're broke, adrift, and buoyed only by their friendship and ambition. There is kind, handsome Willem, an aspiring actor; JB, a quick-witted, sometimes cruel Brooklyn-born painter seeking entry to the art world; Malcolm, a frustrated architect at a prominent firm; and withdrawn, brilliant, enigmatic Jude, who serves as their center of gravity.
Over the decades, their relationships deepen and darken, tinged by addiction, success, and pride. Yet their greatest challenge, each comes to realize, is Jude himself, by midlife a terrifyingly talented litigator yet an increasingly broken man, his mind and body scarred by an unspeakable childhood, and haunted by what he fears is a degree of trauma that he’ll not only be unable to overcome—but that will define his life forever.
Now, I recommend starting this book when you have the time, it’s a long read. Going on a long flight? Taking advantage of a stay-cation? Pick up A Little Life! Never before did I think that I would be as interested in a book about the lives of four classmates, but Hanya does an incredible job making you feel connected to each character.
A Little Life takes you through decades of friendship, and shows you the trials and tribulations that long friendships can go through. I’ll be honest, it really takes a toll on your emotions. You’ll feel a roller coaster of emotion, and I can guarantee it will leave you feeling.
I believe this book is an important novel for everyone to read, and shouldn’t be taken lightly. A fantastic read, I can guarantee you won’t be disappointed.
CRAVING MORE HANYA YANAGIHARA? CLICK HERE FOR A FULL COLLECTION OF HER WORK.
The Stand - Stephen King
Genre: Horror/Sci-fi
This is the way the world ends: with a nanosecond of computer error in a Defense Department laboratory and a million casual contacts that form the links in a chain letter of death. And here is the bleak new world of the day after: a world stripped of its institutions and emptied of 99 percent of its people. A world in which a handful of panicky survivors choose sides -- or are chosen.
While this genre does state horror, I would argue that this novel is definitely more sci-fi/dystopian than the true horror we all know from Stephen King (I promise, there are not clowns or red balloons).
Stephen King is a true legend. 2018 was the year I fell head over heels for Stephen King, and his twisted yet magical universes. I’ve read quite a few Stephen King novels last year, but The Stand is definitely my favourite.
Another long read, this book takes us into a time where the world population is cut down drastically because of an outbreak. It takes us through what happens with the survivors, and makes you feel like you’re amongst them.
A fresh twist on the “day after” perspective, The Stand is a book you can’t miss. Stephen King really is a legend in his own right.
CRAVING MORE STEPHEN KING? CLICK HERE FOR A FULL COLLECTION OF HIS WORK.
Interested in joining one of my book clubs, or have a book you want to suggest? Connect with me on Instagram, and let's chat novels!
#LADIESWHOHUSTLE INTERVIEW SERIES: ANDREA BROWN
I have known Andrea Brown since high school, and have been extremely proud of all she's been able to accomplish since. So there was no doubt in my mind that I had to interview her for my #LadiesWhoHustle series - as she's a hard-working, goal-oriented woman who doesn't take no for an answer.
Andrea is a 27 year old Canadian, that was raised mostly by her mother. Though they were far from being well off, ever since she was a a young girl she wanted to help people and "change the world". She had this innocence and simplistic view of the world that only kids seem to have, and she always had dreams bigger than herself and was often told that they were silly and they needed to fit in a box to be successful.
In elementary school, she was involved in numerous school functions and helped with organizing events. She loved, and still loves, being around people and getting to know their stories. She's very intrigued by how different yet similar we all are.
Growing up, though her mom cooked a lot, they still had all the convenient junk food at home. During high school, Andrea was eating McDonald's every day after school. If you told her she'd be into health and fitness now, she would have probably laughed.
She decided to do the program through CSNN on a whim when she met a grad who had completed it and completely turned her life around. During this time in her life, she was at a job she hated that made her dread going into work every day. Looking back, those were some of the darkest days but they propelled her to where she is today and to follow her passions.
So, read along and see how Andrea turned her passions into her career - and get motivated to push yourself out of the comfort zone.
Andrea Brown
I'm a Paralegal by day and also a Food Blogger and newly certified Registered Holistic Nutritionist.
I've always had a passion for cooking ever since I was about 4 years old. I would be in the kitchen with my mom and just be watching her make food from scratch, using the freshest ingredients. I never really considered a career in the health or food industry. To me, it was always just a hobby that I enjoyed doing. It was only after I started having health issues that caused me to see how my own diet changed my life, that I felt inspired to help others in this way. I love sharing that eating healthy doesn't have to be hard or expensive and that the smallest shift could do wonders on your health!
Oh boy... so many things, but I did want to be a police officer for the longest time and help catch the bad guys!
If you could have anyone's job, who's job would you choose and why?
Hmm... I would choose someone who has the national authority in buying food for various grocery stores. An easy way to get healthier food to the table and leave the "crap" out is by just not buying it. I use this rule in my home with a few products, and really if I want it, I'll go out and buy a small package and enjoy it but I don't need it to be easy and accessible. There are so many processed foods that I wouldn't even purchase for human consumption.
That Nutritionists don't eat sweets or donuts, or that we judge you when you're eating anything other than a salad!! So far from the truth.
I want to be making a difference in people's lives daily in whichever way that ends up being!
TIME! I love my sleep and know how important it is, so really trying to find the time to do it all has been a challenge.
What's the best piece of career advice you've received?
Love what you do and you'll never work a day in your life!
What about the worst piece of advice you've received?
Just deal with it... NAH!
My determination to go after what I want.
Who motivates you the most?
Everyone who has ever doubted me. We all have the ability to achieve greatness if it really matters to us, so when people shoot down your dreams and aspirations, instead of getting hurt, use that as FUEL.
Do you have any advice for those looking for a career in your field?
Connections are everything. Be genuine, be yourself, be considerate. People will remember that a lot longer than how impressive your shoes were.
When I'm dripping in sweat after I've finished a kick-ass fitness class like hot barre. It just reminds me that I can get through hard times even when I wanted to give up and thought my body would give out.
Do I relax? JK! I love listening to podcasts, journaling, binge watching shows like This is Us, and just turning off my brain for a while.
Currently coveting: A sunny getaway with 0 plans.
Favourite way to sweat: Hot barre.
Favourite book: The Secret by Rhonda Byrne.
Morning bird or night owl? Morning person.
Favourite '90s jam? Anything by Backstreet Boys - they'll never break my heart ;).
Favourite city: Florence, Italy
Spirit animal: A bird - their freedom is something I'm always in awe of.
Get in touch with Andrea:
Website: balancingandie.com
Instagram: @balancingandie
Facebook: @balancingandie
Twitter: @balancingandie
Know anyone that would be great to feature in the #LadiesWhoHustle series? Connect with me on Instagram to nominate them - or yourself!
#LadiesWhoHustle
|
cc/2020-05/en_middle_0032.json.gz/line8528
|
__label__wiki
| 0.664522
| 0.664522
|
Android News / Mobile Events News / CES / Google Brought Its Assistant Updates A-Game To CES 2020
Google Brought Its Assistant Updates A-Game To CES 2020
Google has taken to CES 2020 to reveal a plethora of updates it expects to launch for its AI Assistant 'later this year'. The actions and features have each been laid out by the company in conjunction with the event. But most are relatively straightforward.
For instance, Google says that users will soon be able to use Scheduled Actions to do precisely what that implies just like they already do with alarms. But no routines will be needed to accomplish that once enabled.
Other features were already well-known in advance. In late December, Google decided to vastly expand the number of appliances that Google Assistant works with. The company has reiterated that, pointing to more universal support for everything from AC units and air purifiers to bathtubs, coffee makers, and vacuums. In total, the company will add 20 device categories in 2020.
What are Google's big plans for Assistant post-CES 2020?
The most impactful change coming through over the course of 2020 may, at its surface, seem to be the smallest. Namely, Google says that setting up devices to link to Assistant will soon be easier. Right now, Google forces users to go through the process of searching an app or service in the Google Home app. In the future, dedicated device apps will show a notification that "suggests" finishing setup in the Home app via Assistant.
No further credential entry would be needed at that point, with the setup already completed in the manufacturer's own app.
Smart home users who own smart TV's are getting good news this year too. To begin with, Google is enabling Far-field Android TV support beginning with Hisense and TCL sets. That means that users will be able to talk to their televisions as they would a smart hub. For clarity, the television should be interactive in almost exactly the same way as Google or Nest Home speakers.
Falling in line with that, Samsung Smart TVs that pack in voice-features will gain the same feature via direct Google Assistant integration. That's applicable to Samsung TVs launching in 2020.
With Google listening in more places than ever, the search giant is also making privacy easier and allowing the deletion of voice commands. Specifically, that's the ability to delete voice recordings from Google Assistant's history log. Now, users can simply tell Google to "delete everything I said to you this week" and the system will automatically complete the action. For individual accidental recordings, users can simply tell Google "that wasn't for you."
Google Assistant will soon be able to read out long-form articles and web pages in as many as 42 languages too. Speculatively, the page will scroll as it's read aloud. Users simply need to activate Assistant with "Hey" or "Okay Google" followed by the command "read this page."
Commands for smart displays are coming too
The final two feature updates slated to arrive for Google Assistant following the announcement at CES 2020 apply primarily to smart displays.
The first is a feature Google plans to add that will incorporate speed dialing into smart displays. The company indicates that a tap or voice controls will be implemented to make that possible. And it will work with a list of contacts that are frequently accessed and called from a given display. The obvious goal here is to speed up the process of making smart home hub-based calls.
Finally, Google is planning to add Smart Display Sticky Notes. Those will work just like a post-it note would but without the hassle of writing everything down and finding a good place to stick it. Instead, users can simply tell Assistant to "leave a note" followed by the intended contents of that note. The note will be displayed on-screen for household users to view when they walk past or interact with the device.
|
cc/2020-05/en_middle_0032.json.gz/line8533
|
__label__wiki
| 0.872976
| 0.872976
|
Frederick Stansfield (1892 - 1977)
Parents: Amos Stansfield and Frances
Harriet (Miles)
Born: 25 June 1892 at Darfield
Died: 19 Oct 1977 from acute congestive heart failure, myocardial infarction, and thrombosis of the coronary artery.
William Arthur born 1878
Beatrice born 1880
Ernest born 1881
Philip born 1882 died 1889
Albert born 1884
Ethel born 1886
Horace born 1888
Elsie born 1894
Marriage 19 July 1918 at the Parish Church of Portsea, Portsmouth, to Julia Elizabeth Christian (aka Barnes 1911) born 27 May 1896
Wilfrid Beevors born 1920
Mary Joan born 1922
Margery Joyce born 1924
Charles Frederick born & died 1926
Charles Arthur born 1927
Geoffrey Albert born 1933
1892 Born in Station Cottages, Darfield
31 Mar 1901 Station Cottages, Darfield
2 Apr 1911 Shanklin, Hampshire (Royal Navy)
1926 12 Dearne Street, Great Houghton
1932 & 1939 40 Brampton Terrace, Great Houghton, Yorkshire
#? Pleasant Ave, Great Houghton
village shop in Holloway, Matlock
“Ridgecot”, Lea Shaw, Holloway, Matlock
Day Tally man in colliery
Stoker in Royal Navy (see Naval History)
Royal Fleet Reserve (ditto)
Sewage Works Manager
Foreman Glass Worker
Other facts
Julia Elizabeth's residence at time of marriage was Crich, Derbyshire - just up the road from Holloway, to which they moved later in life. Her father was John Christian, a platelayer on the railways (like Amos (Frederick's father).
Her brother, John William 'Jack' Christian, was found dead in his home in South Witham on 9 June 1988, having been bludgeoned to death. His own son, John K Christian, was tried for his murder but acquitted. John K was married to Joyce E Stokes - no known relation to Margaret Stokes (Julia Elizabeth's niece) who married Charles Arthur (Charlie), despite them being first cousins. This would only have been a potential issue had they been of child-bearing age.
- Birth Certificate
- Marriage Certificate
- Death Certificate
- Father's Death Certificate
- Nat. Arch. RN Registers of Seamen's
Services, Ref. ADM 188/884/8649
- England & Wales, FreeBMD Birth Index, 1837-1915
- England & Wales, Birth Index: 1916-2005
- England & Wales Christening Records, 1530-1906
- Census 1891, 1901,1911
- 'Census' 29 Sept 1939
- England & Wales, Marriage Index: 1916-2005
- West Yorkshire, England, Marriages and Banns, 1813-1922
- West Yorkshire, England, Births and Baptisms, 1813-1910
- England & Wales, FreeBMD Marriage Index: 1837-1915
- West Yorkshire, England, Electoral Registers, 1840-1962
- England & Wales, FreeBMD Death Index, 1837-1915
- England & Wales, Death Index: 1916-2005
- England & Wales, National Probate Calendar
(Above) 25 June 1892 Frederick's Birth Certificate.
(Below) 19 July 1918 Frederick and Julia Elizabeth's Marriage Certificate.
This simply refers to the Parish Church of Portsea, but there are three Anglican churches in Portsea Parish: St Mary’s, St Wilfrid’s, and St Faith’s. It is not known which was the location of the ceremony, though St Wilfrid's seems a good bet as this was the name chosen for their first child.
(Left and below) Julia Elizabeth's passport details.
Foreign Office endorsement of Passport indicating intention to visit Gibraltar, presumably to meet up with Frederick on shore leave.
Profession: none given
DoB: 27 May 1896 Oakham
Maiden name: Christian
Hgt: 5ft 2in
Forehead: low
Nose:ordinary
Mouth: ordinary
Chin: oval
Complexion:fair
Face: oval
(Left) "Ridgecot", Lea Shaw, Holloway, nr Matlock, Derbyshire.
(Right) Julia Elizabeth with Charlie (left) and Geoff (right) in the garden at "Ridgecot".
(Above) 19 Oct 1977 Frederick's Death Certificate.
(Below) 29 Dec 1987 Julia Elizabeth's Death Certificate.
TRANSCRIPTIONS OF CENSUS RETURNS
Address: Station Cottages, Darfield, Yorkshire.
Registration District: Barnsley.
Name Age Born Occupation Where Born
Stansfield, Amos 44 1857 Foreman Platelayer Darfield, Yorks
Stansfield, Frances H. 42 1859 Wife Brighton, Sussex
Stansfield, Albert 16 1885 Stone Quarry Apprentice Billingley, Yorks
Stansfield, Horace 12 1889 Painter's Errand Boy Darfield, Yorks
Stansfield, Fred 9 1892 Darfield, Yorks
Stansfield, Elsie 6 1895 Darfield, Yorks
List of Officers, Crew, and Royal Marines on Board at midnight on Sunday, April 2nd, 1911
Name Age Condition Rank/Rating Birthplace
Frederick Stainsfield 18 Single Stoker 2nd Class, Engine Room Yorks, Barnsley
This was not a census as such. In December 1938 the government announced that, in the event of war, a National Register would be compiled; this was to list the personal details of every civilian in Great Britain and Northern Ireland. This Register was used to issue identity cards and organise rationing, among other things. Identity cards continued to be used after the war and were a legal requirement right up to 1952.
As the 1931 census returns were destroyed in an air raid on London, and the 1941 census was never taken, the National Register of 1939 remains a vital record for the family history researcher. It is only accessible as a digital record.
However, a person's records remain closed for 100 years from their date of birth or until proof of death is produced. Consequently, some household records have a number of blanked out lines, indicating closed records of individuals deemed to be still alive until advised otherwise.
Both the original record and its transcription are shown below.
ROYAL NAVY SERVICE RECORD
Enlisted: 12 Sept 1910 and served for 12 years
Height: 5ft 6 ⅟4 inches
Chest: 37 ⅟4 inches
Hair: Dark brown
Eyes: Blue
Wounds, scars or marks: Scar edge r/hand. Scar upper lip.
Date of Birth: 25 June1892
Place of birth: Barnsley, Yorkshire
Occupation: Mechanic
Ships served on
Note: Victory II was a shore-based training establishment
HMS Victory II 12 Sept 1910 to 30 Sept 1910, Stoker 2nd Class
HMS Renown 1 Oct 1910 to 21 Jan 1911, Stoker 2nd Class
(Below left and right) HMS Renown was a battleship of 12,350 tons launched in 1895 and sold for scrap in 1914. A newer incarnation was launched in 1916.
HMS Victory II 22 Jan 1911 to 14 Mar 1911, Stoker 2nd Class
HMS Hecla 15 Mar to ?, Stoker 2nd Class
HMS Hecla 13 Sep 1911 to 15 Jan 1912, Stoker 1st Class
This incarnation of the Hecla was a torpedo boat carrier/depot ship purchased in 1878, modernised in 1912, and sold in 1926.
HMS Venus 16 Jan 1912 to 11 Dec 1913. Passed educationally for Petty Officer 2 Sept 1913.
The Venus was an Eclipse-class protected cruiser built by Fairfield Shipbuilding & Engineering, built in 1895 and sold for scrap in 1921.
The Eclipse-class ships were 373 feet (113.7 m) long overall, had a beam of 53 feet 6 inches (16.31 m) and a draught of 20 feet 6 inches (6.2 m). They displaced 5,600 long tons (5,700 t) at normal load. To reduce biofouling, the hulls of the ships were sheathed with wood and copper. Their crew consisted of 450 officers and enlisted men.
During their sea trials, all of the lightly loaded ships exceeded their specifications and reached a top speed of 20 knots (37 kph; 23 mph). The ships carried five 40-calibre 6-inch guns protected by gun shields. One gun was mounted on the forecastle, two on the quarterdeck and one pair was abreast the bridge. The secondary armament consisted of six 40-calibre 4.7-inch guns, three on each side.
Defence against torpedo boats was provided by eight 12-pounder guns and six three-pounder Hotchkiss guns. Four of the 12-pounders were mounted in the sides of the hull fore and aft while the remaining four guns were interspersed between the 4.7-inch guns. The ships were also equipped with three 18-inch torpedo tubes, one submerged tube on each side and one above water in the stern. The ammunition supply consisted of 200 six-inch rounds per gun, 250 shells for each 4.7-inch gun, 300 rounds per gun for the 12-pounders and 500 for each three-pounder. Each ship also carried ten torpedoes, presumably four for each broadside tube and two for the stern tube.
(Below) HMS Venus
Between 1903 and 1905, all of the ships in the class except for HMS Eclipse had their mixed armament replaced with a more uniform armament of 11 six-inch, nine 12-pounders and seven 3-pounder guns.
HMS Woolwich 12 Dec 1913 to 19 Jan 1914, Stoker 1st Class
HMS Woolwich was a destroyer depot ship of 3,380 tons with a crew of 263, launched in 1912 and sold in 1926.
(Below) HMS Woolwich
HMS Hecla 20 Jan 1914 to 14 Jun 1914, Stoker 1st Class
HMS Victory II 10 Jul 1914 to 17 Jul 1914, Stoker 1st Class
HMS Zealandia 18 Jul 1914 to ?, Stoker 1st Class
HMS Zealandia 21 Sep 1916 to ?, Leading Stoker
HMS Zealandia 21 Mar 1917 to 19 Sept 1917, Leading Stoker
HMS New Zealand was a King Edward VII-class battleship of the Royal Navy. She was renamed HMS Zealandia in Dec 1911, the only Royal Navy ship to have carried this name. Built at Portsmouth 1903-1905 at a cost of £1,424,643 she was decommissioned 1917.
With a displacement of 16,350 tons she carried a crew of 777 and was armed with:
4 x 12in guns, 4 x 9.2in guns, 10 x 6in guns, 14 x 12-pounder guns, 14 x 3-pounder guns and 5 x torpedo tubes.
At the outbreak of World War I, the 3rd Battle Squadron including the Zealandia was assigned to the Grand Fleet and based at Rosyth, supplementing the Grand Fleet's cruisers on the Northern Patrol. During this duty, Zealandia rammed a German submarine on 10 September 1914. On 2 November 1914 the squadron was detached to reinforce the Channel Fleet and returned to Portland. It returned to the Grand Fleet on 13 November 1914. During sweeps by the fleet, she and her sister ships often steamed at the heads of divisions of the far more valuable dreadnoughts, where they could protect the dreadnoughts by watching for mines or by being the first to strike them.
(Below) HMS Zealandia at Portland in 1911 shortly after her name change.
On 6 November 1915 a division of the 3rd Battle Squadron consisting of battleships Hibernia (the flagship), Russell, Albemarle, and Zealandia was detached from the Grand Fleet to serve in the Dardanelles Campaign. Albemarle had to return for repairs after suffering severe damage on the first night of the outbound voyage, but the other three ships pressed on and arrived at the Dardanelles on 14 December 1915. In late January 1916 Zealandia and Hibernia left the eastern Mediterranean to return to the UK arriving at Portsmouth Dockyard on 6 February 1916. Zealandia underwent a refit there that lasted until March 1916 then rejoined the 3rd Battle Squadron and the Grand Fleet on 26 March 1916.
On 29 April 1916 the 3rd Battle Squadron was moved to Sheerness. The Zealandia remained there with the squadron until September 1917, undergoing a refit at Chatham Dockyard from December 1916 to June 1917.
On 20 September 1917 Zealandia left the 3rd Battle Squadron and was paid off into reserve at Portsmouth Dockyard. While in reserve, she was refitted between January and September 1918 for use as a gunnery training ship.
When Frederick was transferred to the Zealandia, she would have been in need of new stokers. On 3 Mar 1914 a number of the crew, including eight stokers, ‘mutinied’ and were subsequently court martialled and imprisoned. According to a document held by the National Archives the sentences were deemed “too severe and annulled owing to irregularities in proceedings of Court” – see “Making a mutinous assembly” ref ADM 116/1376 and the subsequent annulment ref ADM 156/77.
HMS Victory II 20 Sept 1917 to 30 Sept 1918, Leading Stoker
Note: On his Marriage Certificate, dated 19 July 1918, Frederick's residence lists HMS Zealandia, which does not tally with his official naval record.
HMS Cormorant (Donovan) 1 Oct 1918 to ?, Leading Stoker
HMS Cormorant (Donovan) 28 Aug 1919 to 28 Aug 19, Stoker 1st Class
HMS Cormorant (Clio) 29 Aug 1919 to 4 Dec 1919, Stoker 1st Class
Note: I don’t understand the additional bracketed references of these entries. The Cormorant, Donovan and Clio were all Royal Navy sloops.
HMS Victory II 5 Dec 1919 to 14 Feb 1920, Stoker 1st Class
HMS Vernon 15 Feb 1920 to 21 Mar 1922, Stoker 1st Class
Note: After the first two such-named ships, HMS Vernon was a torpedo school and the name was used to denote both an onshore training establishment and a succession of training ships.
HMS Victory II Apr 1922 to 11 Sept 1922, Stoker 1st Class
Royal Fleet Reserve: joined 12 Sep 1922
Note: Unemployment Insurance Form sent to Ministry of Labour, Register No. 23914.
|
cc/2020-05/en_middle_0032.json.gz/line8534
|
__label__wiki
| 0.879645
| 0.879645
|
Braving Britannia
Tales of Life, Love, and Adventure in Ultima Online
By: Wes Locher
Narrated by: Robert Bekuhrs
Categories: Science & Technology, Technology
Explore/Create
My Life in Pursuit of New Frontiers, Hidden Worlds, and the Creative Spark
By: Richard Garriott, David Fisher
Narrated by: Christopher Grove
An inventor, adventurer, entrepreneur, collector, and entertainer, and son of legendary scientist-astronaut Owen Garriott, Richard Garriott de Cayeux has been behind some of the most exciting undertakings of our time. A legendary pioneer of the online gaming industry - and a member of every gaming Hall of Fame - Garriott invented the multi-player online game, and coined the term "Avatar" to describe an individual's online character. In this fascinating memoir, Garriott invites listeners on the great adventure that is his life.
The Modern Day Explorer
By Elijah on 04-17-17
The Land: Founding: A LitRPG Saga
Chaos Seeds, Book 1
By: Aleron Kong
Narrated by: Nick Podehl
5 out of 5 stars 22,622
Tricked into a world of banished gods, demons, goblins, sprites and magic, Richter must learn to meet the perils of The Land and begin to forge his own kingdom. Actions have consequences across The Land, with powerful creatures and factions now hell-bent on Richter's destruction. Can Richter forge allegiances to survive this harsh and unforgiving world or will he fall to the dark denizens of this ancient and unforgiving realm? A tale to shake "The Land" itself, measuring 10/10 on the Richter scale, how will Richter's choices shape the future of The Land and all who reside in it?
Unbelievable series
By George on 04-14-19
Blood, Sweat, and Pixels
The Triumphant, Turbulent Stories Behind How Video Games Are Made
By: Jason Schreier
Narrated by: Ray Chase
Developing video games—hero's journey or fool's errand? The creative and technical logistics that go into building today's hottest games can be more harrowing and complex than the games themselves, often seeming like an endless maze or a bottomless abyss. In Blood, Sweat, and Pixels, Jason Schreier takes listeners on a fascinating odyssey behind the scenes of video game development, where the creator may be a team of 600 overworked underdogs or a solitary geek genius.
By SAMA on 11-27-17
Masters of Doom
How Two Guys Created an Empire and Transformed Pop Culture
By: David Kushner
Narrated by: Wil Wheaton
Masters of Doom is the amazing true story of the Lennon and McCartney of video games: John Carmack and John Romero. Together, they ruled big business. They transformed popular culture. And they provoked a national controversy. More than anything, they lived a unique and rollicking American Dream, escaping the broken homes of their youth to produce the most notoriously successful game franchises in history - Doom and Quake - until the games they made tore them apart. This is a story of friendship and betrayal, commerce and artistry.
How it was
By Ryan on 08-27-13
Storm Front
The Dresden Files, Book 1
By: Jim Butcher
Narrated by: James Marsters
A call from a distraught wife, and another from Lt. Murphy of the Chicago PD Special Investigation Unit makes Harry believe things are looking up, but they are about to get worse, much worse. Someone is harnessing immense supernatural forces to commit a series of grisly murders. Someone has violated the first law of magic: Thou Shalt Not Kill. Tracking that someone takes Harry into the dangerous underbelly of Chicago, from mobsters to vampires....
Excellent Story, Distracting Sound Engineering
By Tom on 05-20-10
Sega, Nintendo, and the Battle That Defined a Generation
By: Blake J. Harris
A mesmerizing, behind-the-scenes business thriller that chronicles how Sega, a small, scrappy gaming company led by an unlikely visionary and a team of rebels, took on the juggernaut Nintendo and revolutionized the video-game industry. In 1990, Nintendo had a virtual monopoly on the video-game industry. Sega, on the other hand, was just a faltering arcade company with big aspirations and even bigger personalities. But all that would change with the arrival of Tom Kalinske, a former Mattel executive who knew nothing about video games and everything about fighting uphill battles.
My Childhood: Explained
By Shane Snyder on 07-22-14
Braving Britannia is an oral history of the groundbreaking PC video game, Ultima Online, which launched in 1997 and still operates today. The audiobook features interviews with players as they share how the game affected their lives.
Official Synopsis:
Over the past two decades, millions of players have inhabited the virtual world of Britannia inside the massively multiplayer online fantasy PC game, Ultima Online. Released in 1997 by developer Origin Systems and publisher Electronic Arts, Ultima Online is known as the grandfather of MMOs.
Braving Britannia: Tales of Life, Love, and Adventure in Ultima Online collects interviews with 35 of the game's players, volunteers, and developers, revealing what they did, where they adventured, and how their lives were shaped, changed, and altered through experiences in Ultima Online's shared virtual world.
In a fantasy world of limitless potential, the only thing players seem to enjoy more than playing the game is talking about it, and yet, the true stories behind the avatars have largely gone unpublished for the past 20 years. Until now.
©2018 Wes Locher (P)2019 Wes Locher
DAVID M DONATELLI
A nostalgia filled trip down memory lane.
This book does an amazing job of capturing a truly unique time in gaming history. While listening to the book I often found myself smiling, or even laughing out loud while listening to stories of other people who's adventures(or misadventures) so closely paralleled my own experiences in the world of Ultima Online. Whether you're and old school gamer or just curious about the early days of online gaming, I think there is plenty of entertainment and history to be gleaned from this fantastic book. I can't wait for a followup!
STATE COLLEGE, PA, United States
A Great Nostalgia Trip to the World of Britannia
This book reminded me of great times and rekindled my excitement for a game I haven't played in years.
Listening to this book transported me to the first time I held an Ultima Online box in my hands. The back cover described a fantasy world where I could be anything I wanted to be, surrounded by players from around the globe all forging their own identities in Britannia. It wasn't until years later that I actually got to play the game, but it fulfilled every promise and I lived half a dozen lives through my computer screen in the world of UO.
Braving Britannia is a loving tribute the first great MMORPG, a game with a legacy that lives on to this day. It's a book about the game, but more importantly, it's a book about the people who made it the experience it was. From famous players who ran in-game taverns, to the developers that built and maintained the game, to the simple crafters and notorious player killers that made up the game's population, Locher weaves the threads of the great tapestry that was (and still is) Ultima Online.
As a player who spent most of his time on free shards, there were no stories about the players I knew personally. Given the scope of the book, Locher couldn't possibly cover every facet of the game's wider world. But if you are a veteran of the Great Lakes, Hokuto, Napa Valley, Sonoma, or Siege Perilous servers, you will find something extra to enjoy in this book as he interviews the players that shaped those realms. But even if the individual actors are different from those you lived with, you will still see the full spectrum of personalities that gave UO color. Locher interviews guild leaders, player killers, crafters, roleplayers, developers, community moderators, and more. He also throws in a few stories of his own time in the realm, including his first run in with a PK and the story of how he lucked into his first house.
Bekurhrs performance helps give the interviews life with his voice chosen for each interviewee. My only complaint is that some of the voices were a bit...stereotypical (I couldn't help but wonder if the German player really had the thick accent that Bekuhrs read his quotes with). Regardless, the narration was consistent throughout, and the voices made it easy to follow along.
The biggest endorsement I can give this book is that it made me want to play Ultima Online again, a game I haven't touched since 2005. It reminded me of the great times I had playing that game, and any book that can bottle up that sort of emotion deserves a full recommendation!
|
cc/2020-05/en_middle_0032.json.gz/line8540
|
__label__cc
| 0.655347
| 0.344653
|
Progress is never satisfied.
The all-new Audi A7 Sportback.
A true design masterpiece, the Audi A7 Sportback melds classic automotive elegance with its own distinctive contemporary edge. Captivating from any angle, the A7 Sportback draws you in from the first glance with its sweeping, coupe-like roofline, the interplay between taut surfaces and the flowing, sculpted line.
This elegance is echoed throughout the superbly crafted interior with its clean, new design language accentuating the feeling of space. Performance too is a cornerstone of the A7 Sportback experience, rewarding the driver with its combination of balance, handling and unbridled acceleration.
Dynamic light display
Integrated into the exterior design language, the rear lights, connected by a fine LED strip that spans the width of the car, create a distinctive, dynamic look to the elegant tapering rear.
The optional dynamic rear indicators move in the desired turn direction making it even clearer for other road users. The LED rear lights are also optionally available with a futuristic coming-home and leaving-home function that makes leaving and arriving a fascinating experience.
The cockpit of a new era
A revolutionary operating concept awaits you in the A7 Sportback. The high-resolution 10.1- and 8.6-inch HD touchscreens are incorporated into the dashboard seamlessly with an impressive level of detail to make every journey comfortable. The upper display provides access to the infotainment systems and the lower display provides access to air conditioning, comfort functions and text input.
The revolutionary MMI touch response offers intuitive control, by simply tapping and swiping to navigate to the desired content. Haptic and acoustic feedback when selecting a function make the process easier to use when driving, while the handwriting recognition allows for quicker entry of an address or location.
Listens to every word
The A7 Sportback features voice control for a number of different functions. This is made possible by natural-language interaction – an intelligent language assistant that also understands phrases from everyday language usage. Whether it is letting your navigation know where you want to go or changing the radio station, everything can be carried out without having to remove your hands from the steering wheel.
Superb sound quality
The optional Bang & Olufsen Advanced Sound System, with 3D sound, features 19 loudspeakers with a total output of 1820 watts creating a brilliant sound ambience for all passengers. The subtle loudspeakers in the A-pillar create a particularly spatial soundstage while the automatically extending acoustic lenses in the dashboard guarantee detailed sound reproduction.
|
cc/2020-05/en_middle_0032.json.gz/line8541
|
__label__cc
| 0.555593
| 0.444407
|
Virginia Prize
Black, Asian, Minority Ethnic Stories
Single Plays
BAME Plays
Classic Plays
Play Collections
Play Collections Black, Asian, Ethnic Minority
Play Collections by Women
Play Collections for Young People
A-Z Titles
The ScreamKipling & Trix
HomeBooksBest SellersThe Leipzig Affair
Home / Fiction / Historical Fiction / The Leipzig Affair
The Leipzig Affair
A taut thriller based in East Germany before the fall of the Berlin Wall in which a Scottish exchange student finds himself in a world of deception.
The Leipzig Affair quantity
SKU: 978-1-906582-97-5 Categories: Best Sellers, Fiction, General Fiction, Historical Fiction, Multicultural, Thrillers, Virginia Prize, Women Writers Tags: BBC adaptation, berlin wall, book at bedtime, canary wharf, east german socialism, east germany, financial collapse, john le carre, Leipzig, literary fiction, Saltire Prize, scottish writer, spy thriller, the City, Virginia Prize Product ID: 5455
by Fiona Rintoul
Winner of the Virginia Prize for Fiction, 2013
Nominated for Scottish First Book of the Year Award 2015, Saltire Society
BBC Radio 4 Book at Bedtime
A tale of love, betrayal and redemption in the dying days of the Cold War.
The year is 1985. East Germany is in the grip of communism. Magda, a brilliant but disillusioned young linguist, is desperate to flee to the West. When a black market deal brings her into contact with Robert, a young Scot studying at Leipzig University, she sees a way to realise her escape plans. But as Robert falls in love with her, he stumbles into a complex world of shifting half-truths – one that will undo them both.
Many years later, long after the Berlin Wall has been torn down, Robert returns to Leipzig in search of answers. Can he track down the elusive Magda? And will the past give up its secrets?
“a page-turner that reminds one of the horrors of the cold war and the astonishing fall of the Berlin Wall.” Margaret Drabble
“Deftly told in short, punchy chapters, the thriller is a page-turner that shifts from East to West and the dark days of the 1980s to present reunification.” The Evening Times
“Rintoul pulls the reader through her story with craft and psychological precision, while trawling a satisfyingly long way into her characters’ pasts and futures.” The Scotsman
“Beginning in 1985 and continuing after communism’s sharp decline, journalist and translator Rintoul’s engrossing tale alternates between Robert’s and Magda’s perspectives… vividly anchoring the East German experience. A tense, compelling peek behind the Berlin Wall.” Kirkus Review
“The Leipzig Affair is a gripping, complex debut that thrills through the human stories it tells of the Cold War, stories of flawed individuals caught in circumstances beyond their control, in a world in which nobody can be trusted. A hugely evocative read.” Zoë Strachan, author of Negative Space
“a hugely talented writer, The Leipzig Affair will resonate loud and clear with anyone conscious of the dangers of CCTV culture in modern Britain. A stark warning and a powerful story.” Rodge Glass, author of Bring Me the Head of Ryan Giggs
“I read this in one go, never quite sure who to trust or believe – the good or the bad. A psychologically complex story that brilliantly reflects disturbing times in a divided city and society. Its sharp, clever, sentences kept me hooked right to the end.” Linda Leatherbarrow, author of Essential Kit
“a story of betrayal only partly redeemed by love, by an author who hauntingly evokes the milieu.” Jonathan Falla, author of The Physician of Sanlucar
Fiona Rintoul is a writer and translator based in Glasgow in Scotland. She writes fiction and articles, and translates from German and French into English. Fiona’s poems and short stories have appeared in anthologies and magazines, including Mslexia and Gutter, and she is a past winner of the Gillian Purvis New Writing Award and the Sceptre Prize.
The Leipzig Affair was BBC Radio 4’s ‘Book at Bedtime’ (March 2015)
Read about Fiona’s experiences in Leipzig in 1986 which led to this novel.
Pomegranate Sky
Erik and the Gods
How Maxine Learned to Love Her Legs and Other Tales of Growing Up
Ancorathemes © 2017 All Rights Reserved
Email to go on mailing list and enter the competition.
How did you hear about The Virginia Prize?
£25 before October 2nd 2019
Title of Manuscript
Number of words in total
Has the manuscript previously won any other competitions?
Has your manuscript or any part of it been published before either online or in print?
Please submit each manuscript to the competition separately:
I have read and agree to the rules of the competition.
After pressing the "Send" button you will be automatically redirected to Paypal page.
Virginia Prize Terms and Conditions
Entries can be made by women of any nationality from any country who are aged 18 and over.
Entries should be in English (or English dialect) and should not have been published or accepted for publication elsewhere.
If more than 50% of a novel has been published elsewhere, the novel is not eligible. Self- published novels are not eligible.
Please notify us if entries are under consideration in other fiction competitions at the time of submission.
Entries should not be a translation of another author’s work.
You have to identify as a woman to enter the competition.
Your entry fee can be paid online or if required, by bank transfer.
You can withdraw your entry at any time but the entry fee will not be refunded.
You may enter online at www.aurorametro.com/VirginiaPrize. By entering the competition you agree to join the Aurora Metro mailing list.
You may enter as any novels as you like to the competition, but each submission incurs a separate fee.
All entries must be received by 23:59 GMT on October 1st 2019. The organizer accepts no responsibility for any entries that are incomplete, illegible, corrupted or fail to reach the organizer by the relevant closing date for any reason.
Do include the TITLE but do not include your name or contact details on the entry as these are registered in the online process.
Once submitted, no alterations may be made to your entry.
Your entry will not be returned, so please keep a copy.
Results are published on the Aurora Metro Books website.
We will contact only the longlisted authors who will be announced in January 2020.
Finalists will be invited to a special event in March 2020.
Novels accepted for publication may be published in the following year or later, depending on the publisher’s schedule.
The copyright of any entry remains with the author.
The publisher Aurora Metro Books has the right to publish the entries by authors selected as finalists subject to negotiation of the contract.
There is no cash prize but subject to negotiation an advance on royalties will be paid to published authors.
Aurora Metro Books also has the unrestricted right to include author name and title of entry for publicity and marketing purposes related to the competition.
In the event of unforeseen circumstances, the organizer reserves the right in exceptional circumstances to amend or foreclose the competition without notice.
What file format can I send?
Permitted file types are: .doc, docx, pdf
For large files over 20Mb, send via a file transfer service such as We Transfer to vp@www.aurorametro.com.
Do I have to send my novel extract(s) as single attachments?
Will I receive a confirmation email once I have sent my entry form?
Yes, you will be sent an automated confirmation email. If you haven’t received this email, please check your spam or email us.
What do I do if I’m unsure that my entry went through?
If you think something has gone wrong with the upload or your email hasn’t reached us, please just email us at vp@www.aurorametro.com and we’ll check for you.
I want to enter more than one novel, what do I do?
You can enter each novel separately. Once your order has completed, you can submit another entry. You will receive an order confirmation for each entry.
I’ve submitted online, do I need a cover sheet?
As long as you’ve filled out the information required in the upload form, you don’t need to also include a coversheet.
Can I submit by post?
In special circumstances such as technology failure, we will accept a submission by post. Email us at vp@www.aurorametro.com to get permission an
|
cc/2020-05/en_middle_0032.json.gz/line8543
|
__label__cc
| 0.74774
| 0.25226
|
SELECTED POETRY BOOK IV
CANTOS EPIGRAMMES THEMES
by Paul Shapshak
Selected Poetry Book II
Paul Shapshak, PhD
Selected Poetry Book I
Selected Poetry Book V
SELECTED POETRY BOOK VI
Paul Shapshak
SELECTED POETRY BOOK III
Publication Date : 6/29/2016
This is the 4th book of selected poetry by Paul Shapshak, PhD, titled: ‘Cantos Epigrammes and Themes’. There are 11 photographs of art by the poet’s father, Sir Rene Shapshak. The sections in this book include, as previously, Pastoral, Mythology, Cosmology, Theology, History, Social, Economics, The Arts, as well as two additional sections, Cybernetic Fables and Virtual Allegories. These contributions may bring rest and calm through exercised good works and right action. Perhaps also recollections of images of modest pleasantness and elusive country scenes, concatenate daydreams, reality checks, dwellings, pastures, wisps - threads, demeanor, and overtones of time and day.
Paul Shapshak, PhD commenced writing poetry at age 15, nearing graduation from the high school of Music and Art in New York City. He was a music student, playing violin, piano, and conducting. While in high school, he attended the Henry Street Settlement Music School in New York City as a scholarship student studying violin, chamber music, conducting, music history, harmony, and counterpoint. In addition, he received full summer scholarships to attend the Rhodes School to study mathematics and then the Aspen Music Summer Festival. After that, he attended Harvard College (BA), New York University Medical Center Graduate School, and Princeton University Graduate School (PhD) all with scholarships. At Harvard College, he attended an English literature course given by Professor William Alfred. In addition, he studies mathematics. His parents were Sir Rene Shapshak, sculptor, painter, and teacher and Lady Eugenie Palca-Shapshak, pianiste and teacher. He and his wife Solveig have three grown children, Mans, Helga, and Dag and grandchildren Madeleine, Sophia, Annika Renee, and Evelyn Rachel.
|
cc/2020-05/en_middle_0032.json.gz/line8547
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.