pred_label
stringclasses
2 values
pred_label_prob
float64
0.5
1
wiki_prob
float64
0.25
1
text
stringlengths
182
1.01M
source
stringlengths
39
45
__label__wiki
0.752291
0.752291
Owen Wilson set for P.T. Anderson’s Inherent Vice Owen Wilson is in negotiations to join the cast of Paul Thomas Anderson’s Inherent Vice, The Wrap reports. PTA has already set Joaquin Phoenix to play pot-smoking P.I. Doc Sportello in the adaptation of Thomas Pynchon’s acclaimed novel (which is something of a shaggy-dog crime noir set in 1970s Los Angeles). According to Anderson fan site Cigarettes & Red Vines, Wilson would play surfer dude/saxophonist Coy Harlingen; a key role. Benicio Del Toro is in talks to play Doc’s lawyer, while Charlize Theron is also rumoured to be in the mix for a leading part. Production begins later this month. benicio del toro, charlize theron, inherent vice, joaquin phoenix, owen wilson, paul thomas anderson, quickflix, thomas pynchon Robert Downey Jr. joins Jon Favreau’s indie Chef Trailer Debut: Fruitvale Station
cc/2020-05/en_middle_0061.json.gz/line1660
__label__cc
0.734345
0.265655
Queensblogger Is It Summer Yet?! Tomorrow is the first day of summer, and although this weather hasn’t been very giving, I’m still excited for all of these summer events. Take a look at what our first weekend/week of summer has to offer. June 21st @ 8AM {Queens Botanical Garden}: Grown Up Flowers. Don’t miss out on the latest exhibition at the Botanical Garden; Grown Up Flowers. On view until September 2nd, and created by Play Lab, Inc. “Grown Up Flowers imagines flowers inflated many times their normal size, giving visitors a new perspective on these iconic and playful representations of beauty.” For more information CLICK HERE. June 21st @ 5PM {Riis Park Beach Bazaar}: Friday Night Sunset Lobster Jam (Bay 9). June 21st @ 6PM {Sunnyside}: Summer Solstice Celebration at Lou Lodati Playground. “Help us kick off summer in grand fashion! We’ll party until the sun goes down on this longest day of the year, and then keep going! Activities will include Silent Disco, performances from Queensboro Dance Festival and much, much more!” Lou Lodati Playground is located at 43rd Street & Skillman Avenue, Sunnyside. This event is FREE! June 21st @ 7PM {Museum of Moving Image}: Flaming Creatures and two films by George Kuchar. As part of the Grit and Glitter: Before and After Stonewall series, MOMI brings us Flaming Creatures and two films by George Kuchar. “If avant-garde cinema and pulp pictures had drugged-out sex, Flaming Creatures would be their wicked offspring. It remains Jack Smith’s most potent, intuitive, and visually provocatively response to the deadening forces of what he called ‘our rented world.'”—Donal Mosher. For tickets and more information CLICK HERE. June 21st @ 8PM {Flushing Town Hall}: Queens Jazz Orchestra: It Ain’t Over Yet. “This concert is the title of QJO’s Music Director Jimmy Heath’s latest big band album “It Aint Over Yet”, a testimony to his life and long legacy of great music.” For more information Click Here. June 22nd @ 9:30AM {Rockaway Brew Co.}: Brew Cruiser. Don’t miss the Brew Cruiser this summer, a shuttle bus leaving from Rockaway Brew Co. located in LIC to Rockaway beach every Saturday this summer. The shuttle starts at 9:30AM and leaves its post every 2 hours after. If you purchase six tickets, you get a free six pack of your choice. For tickets and more information CLICK HERE. June 22nd @ 11AM {Queens Botanical Garden}: Pick and Prep: Farm Fresh Foods. Come to the farm at Queens Botanical Garden to harvest fruits and veggies and prepare a light lunch together. Click here for ticket information. June 22nd @ 12PM {Riis Park Beach Bazaar}: Reggay Lords + DJ Alexander Orange Drink of So So Glos. Free entry for the public. June 22nd @ 12PM {Riis Park Beach Bazaar}: Roland and Brother Rich at Riis Bazaar (Bathhouse). Free entry for the public. June 22nd @ 2PM {Museum of Moving Image}: A Taste of Honey. As part of the Grit and Glitter: Before and After Stonewall series, MOMI brings us this “play, and eventual film, that addressed gender, sexuality, race, class, and family relations with a uniquely luminous mix of tenderness and weary honesty.” For more information CLICK HERE. June 22nd @ 2PM {Museum of Moving Image}: The Muppet Movie 40th Anniversary Celebration. As part of Jim Henson’s World (2019) & The Muppet Movie 40th Anniversary Celebration, MOMI brings us a live event with special guests Ed Christie (puppet designer/builder), Calista Hendrickson (Muppet costume designer), and puppeteer John Lovelady. For more information CLICK HERE. June 22nd @ 2PM {Museum of Moving Image}: Three The Hard Way. As part of the See It Big! Action series, MOMI brings us this “action extravaganza, uniting three of the best black tough-guy actors in the business around one absolutely wild premise, having them race against time to prevent a white fascist group from dropping a toxic agent harmful only to black people into the water supplies of Washington D.C., Detroit, and Los Angeles.” Click Here for more information. June 22nd @ 4:30PM {Museum of Moving Image}: An Actor’s Revenge. As part of the Grit and Glitter: Before and After Stonewall series. “In a seventeenth-century Japan created entirely on stage sets, a female-impersonating Kabuki actor carries out a morally complicated revenge, all the while inciting desire and breaking the hearts of men and women with his perfect feminine beauty. Reprising his original 1935 film role Kazuo Hasegawa gives an astounding double performance as both the tragic hero/heroine and the do-gooding thief who falls under the actor’s androgynous spell. Combining social satire, Kabuki tragedy, and martial arts choreography, An Actors Revenge is a dazzling homage to theatricality and ‘realness.'”—Donal Mosher. Click Here for more information. June 22nd @ 6:30PM {Museum of Moving Image}: Set It Off. As part of See It Big! Action series, MOMI brings us this classic film about “Four women take the law into their own hands and try to get some payback by robbing a bank. Emboldened after pulling off the heist, they continue their crime spree by taking on bigger banks, and with higher and higher stakes.” Click Here for more information. June 22nd @ 7PM {Museum of Moving Image}: The Gospel of Eureka. As part of the New Adventures in Nonfiction (2019), Momi brings us this film about how “Love, faith and civil rights collide in a southern town as evangelical Christians and drag queens step into the spotlight to dismantle stereotypes. The Gospel of Eureka takes a personal, and often comical look at negotiating differences between religion and belief through performance, political action, and partnership. with Gospel drag shows and passion plays setting the stage for one hell of a show.” Click Here for more information. June 23rd @ 5PM {Knock Down Center}: Soft Territories: Closing Reception. Join KDC as the Soft Territories exhibit comes to a close. There will be a live jazz performance by The Rodrigo Recabarren Trio. This event is free to the public. For more information CLICK HERE. June 23rd @ 12PM {Riis Park Beach Bazaar}: DeFalco Presents: Locobeach at Riis Park Beach Bazaar (Bay 9). Free entry for the public. June 23rd @ 12PM {Riis Park Beach Bazaar}: DJ Lefty Hernandez Summer Beach Parties! at Riis (Bathhouse). Free entry for the public. June 23rd @ 4:30PM {Museum of Moving Image}: Portrait of Jason. As part of the Grit and Glitter: Before and After Stonewall, MOMI brings us Portrait of Jason, where “indie trailblazer Shirley Clarke invites us to spend one drunken night with Jason, a flamboyant hipster, a self-proclaimed ‘stone whore,’ and a linguistic dynamo.” For more information CLICK HERE. June 24th @ 7PM {Bohemian Hall Beer Garden}: The Paint Place. Bohemian Hall Beer Garden is hosting a 21+ paint and sip night. For RSVP information, CLICK HERE. June 27th @ 6PM {Queens Botanical Garden}: Flower Power Party: Lavender. Celebrate PRIDE at Queens Botanical Garden with performances by ¡Retumba!–and–join in the making of flower crowns along with other botanical art activities. Don’t miss this colorful event. For more information CLICK HERE. June 27th @ 7:30PM {Astoria Park}: Astoria Park Fireworks. “The Astoria Park fireworks show is one of the most special summer evening nights in Queens, NYC. 2019 marks 35 years of magic! Presented by Central Astoria, LDC., the fireworks ceremonies start at 7:30 pm while the Fireworks show will begin at sundown around 9:00 pm. The 2018 Independence Celebration will feature a special performance by the Queens Symphony Orchestra followed by a spectacular fireworks display. ” This event is FREE! June 27th @ 9PM {Superchief Gallery}: XXXtreme Drag Wrestling. Choke Hole in collaboration with Superchief Gallery bring us a World Pride Edition event. This event will be hosted by Hugo Gyrl and Laveau Contraire, with performances by Charlene, Hara Juku, Serena Tea and many more. For tickets and more information, Click Here. Museum & Gallery Opening Exhibitions: Mrs. Gallery: Doldrums by Oona Brangam, Mike Goodlett, Emily Ludwig {On view June 22nd to August 2nd} MOMA PS1: MOOD: Studio Museum Artists in Residence 2018-19 {On view until September 8th} Queens Botanical Garden: Art In The Garden: In Full Bloom {March 29 to August 25} Socrates Sculpture Park:Chronos Cosmos: Deep Time, Open Space {On view until September 3rd} New York Hall of Science: Mundos Alternos: Alien Toy by Rubén Ortiz Torres {On view until August 18th} New York Hall of Science: 3D Theater; Backyard Wilderness 3D {On view until September 30th} Sculpture Center:Ektor Garcia: Cadena Perpetua{On view until July 29th} Sculpture Center: Matt Keegan: What was & What is{On view until August 18th} Sculpture Center: Jean-Luc Moulène: More of Less Bone {On view until July 29th} Noguchi Museum:Noguchi: Body-Space Devices by Brendan Fernandes{On view until May 3, 2020} Museum & Gallery Closing Exhibitions: Knock Down Center: Soft Territories by Victoria Mangeniello, Simón Sepúlveda, Sarah Zapata {Closing June 23rd} “Chronos Cosmos: Deep Time, Open Space” @ Socrates Sculpture Park. Socrates has one of the best curatorial teams, hands down. Each season, and even every exhibit, showcases these magnificent variations of art and sculpture that I’ve rarely been able to experience on such a large scale. The sheer size of each exhibition, the coordinating themes, the interactivity of each piece and the environment. These are just some of the reasons I keep coming back. Each visit allows me to form a new sense of understanding with each individual piece that is on view. Their latest exhibit, Chronos Cosmos: Deep Time, Open Space, is no different. It felt like I waited a lifetime to see this up close and personal. I’m not the most patient person, so I did visit the park during the construction of Chronos Cosmos, but nothing compares to seeing the finished product. I want to start off with Miya Ando’s piece, 銀河 Ginga (Silver River). It was like walking under an unobstructed starry nights sky. I walked the entire distance, following the bright stars printed on the navy fabric, as if looking at a clear nights sky on the outskirts of the city. It felt peaceful, and transported me somewhere far, away from the city’s commotion. 銀河 Ginga (Silver River), 2019 Vessel III, by Radcliffe Bailey also transports you beyond the bunker-like sculpture he created. As soon as you enter this steel structure, your attention is automatically drawn upward due to sounds being emitted from a hanging conch shell. You then realize there is a large opening at the top of the structure, allowing you to look straight out at the blue skies. The conch, along with the cylinder shape the steel frame forms, both heighten the sounds coming from the speakers placed within the conch shell by Bailey. Bailey’s Vessel III is definitely a great place to stand still and take in the elements of sound and nature. I was genuinely taken aback by Heidi Neilson’s Moon Arrow. Neilson’s piece has a mechanism that allows it to move with and point at the moon. It also uses the movement of the moon to mark time. This occurs whether the moon is visible or not. A time lapse of the project is also available if you Click Here. If you stand very still and focus your eyes, you can literally see the arrow moving with the moon. These are very small movements, so focus is definitely necessary, but it puts so much into perspective. I think we all forget that Earth is constantly rotating. Neilson’s Moon Arrow reminded me just how perfect our planet and its functions can be. I truly recommend everyone pay a visit to Socrates Sculpture Park. Also, keep an eye out for their Roots Saturday’s and Yoga/Tai Chi in the Park this upcoming weekend. Admission to the park, as well as all of their events, are free of charge. For more information Click Here. Saying Bye To May The Right Way. That’s it! You made it. May is officially at its end. To some this means the beginning of Gemini season (some dread this, I love it). To others it means MEMORIAL DAY WEEKEND!! We finally get a three-day weekend filled with events, open beaches, and a few might even take a hike or leave the city all together. Either way, I am here for it all. Take a look at what’s in store for the next TWO weekends in our area. May 23rd @ 6:30PM {Superchief Gallery}: Thomas Clark – Shadows in The Box. Check out this documentary film, produced and directed by Vaintino, about “a journey into the aesthetic of a photographer.” May 24th @ 7PM {Superchief Gallery}: Twin Flames, Twin Buds & The Trippy Twins. No worries if you missed the opening night for Justin Aversano’s Twin Flames. Superchief is breaking night once again in honor of Aversano’s exhibition, along with some awesome performances by Twin Buds and The Trippy Twins. They will also provide an open bar, food and tattoos for all of those interested. Come for the art, stay for the music! Superchief Gallery is located @ 1628 Jefferson Avenue in Ridgewood, Queens. May 24th @ 8:30PM {Randall’s Island Park}: The Incredibles 2. As part of the Outdoor Movie Night series on Randall’s Island, you are all formally invited to watch Disney Pixar’s The Incredibles 2 free of charge. For more information and to map your commute, Click Here. May 24th @ 10PM {Knock Down Center}: Four Tet / Ben UFO / Anthony Naples / UMFANG. Join KDC and MeanRed Productions as they present an artist-packed show you won’t want to miss. Doors open at 10PM. For tickets and more information Click Here. May 24th @ 10PM {Basement @ Knock Down Center}: Staub w/ Luke Slater // Irakli // Caleb Esc //Adrestia. “Berlin’s mysterious techno party comes to New York for the very first time. A monthly event that takes place the last Saturday of every month, STAUB is one of Berlin’s best parties. But it’s historically operated behind a shroud of anonymity; the lineups are never announced, the STAUB Records artists are never revealed and the promoters skirt the sidelines of the dance floors, never putting themselves in the limelight. Making its debut in New York, STAUB announces event line up for the first time, with Luke Slater, its residents Irakli and Caleb ESC, and Brooklyn’s Adrestia.” Click Here for tickets. May 25th @ 10AM {Cunningham Park}: 2019 Trips for Kids’ Northwoods Family Trail Ride Day. “Join Trips for Kids Metro NY as we celebrate the 12 year anniversary of Cunningham Park’s North Woods Mountain Bike Trail! Fun All-Day Activities Include: Beginner Mountain Bike lessons (TFK), Guided Trail Rides ( Beginner and Internmediate), Bike Art (Recycle a Bicycle/ Bike NewYork), Pump Track – ( CLIF). Events are ongoing throughout the day, so you can participate in as many activities as you like. RSVP on the Eventbrite page so we know how many people to accommodate.” For more information and to RSVP Click Here. May 25th @ 10PM {Basement @ Knock Down Center}: 999999999 // Fabrizio Lapiana. “999999999 – officially started in July 2016 and already affected the most important clubs and festivals all around Europe. They aroused much interest even outside the continent becoming one of the most requested live acts of the techno scene.” “Fabrizio Lapiana – a well-known fixture on the contemporary Italian techno scene, has honed and perfected his deejaying skills for over two decades, therefore being famous for his immaculate mixing technique.” Click Here for tickets. May 26th @ 2PM {Knock Down Center}: Dope BBQ 2019 Ft. Trey Songz. “The General Public (TGP) presents Dopebbq featuring Trey Songz & Friends! Nothing says Memorial Day Weekend like a fun filled barbecue or cookout with family, friends, and the Dopebbq family. DOPEBBQ is the definition of a high-energy and high quality barbecue experience with delicious food, great music, and beautiful people. This is a one of a kind party in NYC and a guaranteed sell out event. Complimentary Food served for minimum time only and while supplies last. Food also available for sale by participating vendors.” Click Here for tickets and more information. May 27th @ 10AM {Astoria, New York}: Astoria Memorial Day Fair; Live At The BBQ. Join the rest of Queens as we all celebrate Memorial Day at the Astoria Memorial Day Fair. Don’t miss performances by Gone Gr3y, The White TBP, Starda, DJ Stukwan, and lastly Jordan Barone (who is incredibly talented & you can check out on Apple Music, YouTube and Spotify) This event is set to last from 10AM to 6PM. YOU WON’T WANT TO MISS IT!! May 31st @ 7PM {Knock Down Center}: Barn Dance. “Barn Dance with Caller Dave Harvey & The Remedies. Ticket includes: Dance, BBQ Buffet, Beer, Wine, Soda. Cash Bar Also Available. Attire: Dressy Denim Optional – Free hat with admission. Mechanical Bull & Raffles.” Click Here for more information. May 31st @ 8:30PM {Paul Raimonda Play Ground}: E.T. The Extra Terrestrial. E.T. is one of my all-time favorite movies. It was also my go-to when I was just a kid. Most importantly, this movie night is FREE. Paul Raimonda Playground is located at 47th Street and 20th Avenue in Astoria. This is a first come first serve event, so make sure to get there a bit earlier for a good spot in front of the screen. May 31st @ 10PM {Basement @ Knock Down Center}: Tommy Four Seven // Silent Servant // Katie Rex. “Tommy Four Seven – Berlin-based Tommy Four Seven has established himself as a leading name in today’s techno scene. The widespread reception of his DJ sets, a skill much refined during his early years as resident of London’s Fire club, has seen him play at some of the world’s leading venues.” “Silent Servant – his prolific output as a producer and artist has laid the groundwork for much of the most ambitious and forward thinking electronic music of today. While insincerity remains the safety of many, Silent Servant’s own productions are brutally honest and resolute, rendering irrelevant those mongering for light.” “Katie Rex – to New York City’s dance floors, the name Katie Rex, is a familiar mainstay. With roots beginning in the Philadelphia rave scene, her passion for the underground has crossed genre boundaries and culminated into an in-depth knowledge of music and cultural trends after dark.” Click Here for tickets. June 1st & 2nd @ 2PM {Knock Down Center}: SOUQ NYC. “SOUQ Festival returns to NYC for a 2-day festival! Day 1 Doors/Show: 3:00PM Day 2 Doors/Show: 2:00PM. Day 1: OASIS Stage: Feathered Sun (Live), O/Y (Live), Söra, Special Guest, SOUQ Stage: Viken Arman (Live), Iorie (Live), CHAIM, AKUMANDRA Stage: Spaniol, Mateo, Eli + Special Guest (live). Day 2: OASIS Stage: Baris K, Acid Arab, Viken Arman, Oceanvs Orientalis, MYSTERIES & HAPPENINGS: Fortune tellers & magical potions, Body Painting & Henna Tattoos, Art installation & Visual Mappings, Circus acts & performers seen all around, MARKETPLACE & VENDORS: TBA.” For tickets and more information CLICK HERE. June 1st @ 10PM {Basement @ Knock Down Center}: Fjaak // Newa // Aurora Halal. “Fjaak [Live] – From a Spandau-Basement experiment to a now well established force in contemporary techno: The rise of the smoked out musicians that go by the name of FJAAK has been nothing short of spectacular so far.” “Newa- Newa is a classically trained musician from Tbilisi, on the forefront of the rapidly emerging Georgian electronic music scene.” “Aurora Halal – Aurora Halal is a producer, DJ and creator of Brooklyn’s Mutual Dreaming party series & the Sustain-Release festival. Shadowy and psychedelic, her hardware live & DJ sets have a hazy sensuality and metallic dance floor intensity that’s at turns playful, dark, acidic, hard, euphoric and emotionally vulnerable.” Click Here for tickets. June 2nd @ 7PM {Knock Down Center}: Sunday Service: Shawné Michaelain Holloway Presents… Join KDC and Shawné Michaelain Holloway for this special edition of Sunday Service. “Shawné Michaelain Holloway is a new media artist using sound, video, and performance to shape the rhetorics of technology and sexuality into tools for exposing structures of power. She has spoken and exhibited work internationally in spaces like The New Museum (NYC, NY), Sorbus Galleria (Helsinki, Fi), The Kitchen (NYC, NY) Institute of Contemporary Arts (London, UK), Museum of Contemporary Art Chicago (Chicago, IL). Currently, Holloway teaches in the New Arts Journalism department at the School of the Art Institute of Chicago.” Click Here to RSVP and for more information. June 6th @ 4PM {Bliss Plaza – 46th Street}: Beats in Bliss Plaza with Dance Matters NYC. “Join us for a scintillating dance production courtesy of Dance Matters NYC! Games and crafts take place from 4-7 pm, with performance beginning at 5 pm.” Click Here for more information. June 7th @ 4PM {Bliss Plaza – 46th Street}: Bliss in Bliss Plaza with the Afro-Latineers. “Come by Bliss Plaza on May 20th and enjoy the music of the Afro-Latineers. Fusing the beats of Latin & Jazz music, blending West African and Haitian rhythms, the Afro-Latin jazz band brings an energy unlike any other. Crafts and games start at 4 pm; performances begin at 5 pm.” For more information about this free event CLICK HERE. June 7th @ 7PM {Noonan Playground}: Queens Filmmakers: A Night of Shorts. As part of the Sunnyside Outdoor Movie Nights series, Sunnyside Shines Business Improvement District brings us a compilation of film shorts by locals. Come and support our local film makers by joining the celebration. These films are also part of the Queens World Film Festival and Sunnyside Shorts Film Festival. Click Here for more information and to map your commute. June 7th @ 8:15PM {Astoria Park Great Lawn}: Bohemian Rhapsody. APA is back with its annual Movies Under the Stars event. The first film of this season will be Bohemian Rhapsody (BO-RAP as I jokingly call it now). If you haven’t had the chance to watch this incredible film about Queen’s lead singer, Freddie Mercury, this is your chance. The film will be shown free of charge on the great lawn. Click Here for more information. June 7th @ 10PM {Basement @ Knock Down Center}: Function // Steve Bicknell // Sophia Saze. “Function – One of techno’s true underground heroes, Function has been DJing and making music for over 25 years. Hailing from New York, He bears the distinction of being the only non-Birmingham artist to score a release on the legendary Downwards imprint, and in recent years helped establish the Sandwell District label with Regis and Silent Servant – The crew which put the music first at a moment when the genre was becoming more and more about celebrity.” “Steve Bicknell – Steve Bicknell has been at the forefront of the UK’s ever-growing electronic music scene since its infancy. His career, spanning over 25+ years, has seen Steve grow from his early beginnings as a young promoter and resident DJ to one of the UK’s most established, accomplished and respected techno artists credited by many as a true pioneer.” “Sophia Saze – Beginning her creative journey in her formative years with classical music and dance training, Sophia Saze later became engulfed by electronic dance music. Getting to know this artist, it is easy to understand that she comes from a solid and natural musical foundation. DJ-ing and producing for 8 years, Saze launched her record label Dusk & Haze in 2017, with the first installment coming in the form of her own ‘Solace’ EP , which included remixes from Benjamin Damage & Umwelt.” Click Here for tickets. June 8th @ 8:30PM {Randall’s Island Park}: Mary Poppins Returns. As part of the Outdoor Movie Night series, Randall’s Island park brings us Mary Poppins Returns. This family-friendly film is completely free of charge. For more information CLICK HERE. June 8th @ 10PM {Basement @ Knock Down Center}: Quo Vadis w/ Veronica Vasicka // L.Sangre // Orphx // O/H // Nihal Ramchandani. “Quo Vadis goes underground for a full evening showcase that moves through the gradient between live noise and electronics to late night, left-leaning mutant techno.” For more information and tickets, CLICK HERE. June 9th @ 12PM {VFW Hall 31-35 41st Street}: Queens Craft Brigade. The Queens Craft Brigade is BACK!! This event is completely Free to attend, and is filled with food, crafts, drinks and much more! Check them out from 12-5PM. June 9th @ 2PM {Knock Down Center}: Barbercon 2019. “Barbercon is the premier global festival of the barbering community. Launched in 2016 by Lee Resnick as the live networking event for Barbershopconnect, the first social site exclusively for barbers, Barbercon brings together thousands of high-profile and amateur barbers, cosmetologists, and brands from around the world. 2019 will be the biggest and most dynamic Barbercon to date, 2 days and growing to include 3 stages for live hair tutorials and product demonstrations, an even larger Barbercon Marketplace, two full days of intimate education classes and workshops, an outdoor festival area, the prestigious Barbercon Awards, and so much more.” Click Here for tickets. Socrates Sculpture Park: Chronos Cosmos: Deep Time, Open Space {On view until September 3rd} Knock Down Center: Soft Territories by Victoria Mangeniello, Simón Sepúlveda, Sarah Zapata {On view until June 23rd} Sculpture Center: Ektor Garcia: Cadena Perpetua{On view until July 29th} Noguchi Museum: Noguchi: Body-Space Devices by Brendan Fernandes{On view until May 3, 2020} Mrs. Gallery: Caroline Wells Chandler- Tutti Frutti{Closing June 1st} Cinco de Mayo, Cinco de Cuatro or May the 4th Be With You? We are another month closer to summer, and things are heating up in Queens. Also, it’s Cinco De Cuatro, May The 4th Be With You and Cinco De Mayo WEEKEND!! So make sure you have your calendar apps ready because I have just what you need to stay your butts in Queens and have the time of your lives all weekend long. May 3rd @ 7PM {Museum of Moving Image}: Mademoiselle Paradis (Licht). Come watch the U.S. Premiere of this incredible film about a Viennese pianist who works to regain her vision, but soon learns it comes at a steep price. Actress Maria Dragus will be greeting guests in person. The film will also be followed by a reception. For tickets and more information CLICK HERE. May 3rd @ 7:30PM {Museum of Moving Image}: Her Smell. The MOMI will be showing this new release starring Elisabeth Moth of Handmaids Tale, where she plays a 90’s rockstar forced to cope with her past shortly after a failed tour. The film will also be showing at MOMI on May 4th at 3PM and on May 5th at both 3PM and 6PM. For tickets and more CLICK HERE. May 3rd @ 9PM {The Knock Down Center}: Boiler Room x Places + Faces. “Boiler Room touches down in NYC for the first of a string of shows across the USA, with cultural institution Places + Faces.” The event will be featuring performances by none other than two New York City–HIP HOP–legends, Cam’ron and Jim Jones. Also, Brooklyn rappers Jay Critch and Jungle Pussy will grace the stage, along with Valee, Sahbabii, Take a Daytrip, Gonnie Garko, Odalys, Sounds and other special guests. General Admission tickets are still on sale! Click Here for more information. May 3rd @ 11:30PM {Q.E.D.- A Place to Show & Tell}: Soft Core Presents The Star Wars Holiday Special! Star Wars fans rejoice! There is an event right here in our backyard just for YOU. “With Star Wars Day (May the Fourth) technically beginning halfway through this month’s show, they’ve decided to screen the legendary Star Wars Holiday Special, along with excerpts from Star Wars XXX: A Porn Parody!” This event is bound to be both hilarious and out of this world. Click Here for more information and tickets. Q.E.D. is located at 27-16 23rd Avenue in Astoria. May 4th @ 12PM {Museum of Moving Image}: Selena. The MOMI brings us a classic this Saturday, with a film we’ve all learned to love. Selena is a film about grammy–award–winning Tejano singer Selena Quintanilla, played by Jennifer Lopez. The film will also be shown on May 5th at 12PM. Don’t miss this tearjerker. Get your tickets today HERE. May 4th @ 12PM {Socrates Sculpture Park}: Healthy Living: Roots Saturdays. “Every Saturday at the Park, join Hellgate Farm and a rotation of local partners like The Connected Chef, Big Reuse, Smiling Hogshead Ranch, Queens Action Council (QuAC), and the Queens Beekeepers Guild for drop-in workshops, food demos, and activities for kids and families. Hellgate Farm will also be selling their micro-local fresh cut produce and small batch products like signature hot sauce, honey, and dried herbs.” This Saturday is the first of many Roots Saturdays, so gather the family and head on over to this free event. May 4th @ 12PM {Citi Field}: 2nd Annual NY Beer Fest. Enjoy samples from dozens of craft breweries that will feature spring seasonal beers, plus games, DJs, and more throughout the park. General Admission gets you access to unlimited tastings, and there is even a VIP options that grants access to the dugout (Mets fans might want to grab this one). Tickets are still on sale so CLICK HERE. May 4th @ 12:30PM {Flushing Town Hall}: Flushing Town Hall Hot Club: The Music of Benny Goodman. “Come and listen to Jazz recordings on the original 78 RPM format, and enjoy the convivial atmosphere of those who share a passion for this great music heard at its best!” No need to RSVP for this one. The event is FREE for all. May 4th @ 2PM {Museum of Moving Image}: Our Struggles (Nos Batailles). As part of the Panorama Europe Film Festival, “Our Struggles dramatizes the struggles of a factory manager and labor activist whose wife unexpectedly leaves him, forcing him to care for their two children. Romain Duris, one of Europe’s most magnetic actors (The Beat That My Heart Skipped, All The Money in the World), is compelling as a decent but overwhelmed man dealing with the challenges the contemporary world throws him.” Tickets are still available HERE. May 4th @ 3PM {Belmont Park Race Track}: Bourbon At Belmont. “Celebrating one of the world’s finest spirits, the Bourbon Festival returns to Belmont Park Racetrack! This special event will feature more than thirty bourbons for tasting, a selection of craft beers that have been bourbon barrel-aged, a live simulcast transmission of the Kentucky Derby race, grandstand viewing of the track to enjoy live event day racing, and convenient betting windows.” For tickets and more information Click Here. May 4th @ 6:30PM {The Knock Down Center}: Soft Territories. Join KDC on the opening night of Soft Territories, their latest exhibit featuring works by Victoria Manganiello, Símon Sepúlveda and Sarah Zapata. Guest will have the option of taking a formal tour of the exhibition along side the curator at 6:30PM. This event is open to the public and it is completely Free!! CLICK HERE for more information. May 4th @ 6:30PM {Museum of Moving Image}: Distances/Les Distáncias/Las Distancias. This Panorama Europe Film Festival favorite is about “a surprise visit by a group of Spanish friends to celebrate the 35th birthday of their friend Comas, who is living in Berlin, is a reunion film in a decidedly minor key that is suffused with the texture of life as it is really lived. None of the friends are exactly where they want to be, and secrets, regrets, and resentments simmer just below the surface. As downbeat as it is, the film always feels refreshingly vital, due to Trapé’s attention to nuance and atmosphere, and to the raw and realistic performances by a great ensemble cast that give this finely wrought fiction the feeling of documentary.” Click Here for tickets. May 4th @ 10PM {The Knock Down Center}: Disco Knights x Vyvn. Come dance the night away at this party hosted by KDC, featuring a slew of performances. In the words of KDC, “Come get Stimulated.” Click Here for tickets. May 5th From 9AM to Sundown {Socrates Sculpture Park}: Chronos Cosmos: Deep Time, Open Space. “Experience the galactic exhibition Chronos Cosmos: Deep Time, Open Space on opening day! Chronos Cosmos transforms Socrates into a gateway to the universe, showcasing artworks that consider space, time, and matter in relationship to celestial entities and earth-bound processes.” Please join me in experiencing this long-awaited exhibition. Also, this event is free for all. May 5th @ 9AM {Melrose Ballroom}: The9amBanger | El Bangero. “We’re back again. Time for you to wake up at 7am with more energy and more enthusiasm than ever before, to attend a party like no other, The 9AM Banger!!” Tickets are still on sale, Click Here. May 5th @ 11AM {Sek End Sun}: Cinco De Mayo @ Sek End Sun. Let us celebrate with our Mexican brothers and sisters with a few shots of tequila, or even a few chelas while we’re at it. Sek End Sun is offering an array of specials all day long, including $5 tequila shots and $7 margaritas. Sek End Sun is located at 32-11 Broadway in Astoria. May 5th @ 12PM {VFW Hall}: Queens Craft Brigade. Ladies and Gentlemen get your wallets ready because this event is bound to be worth the wait. “The Queens Craft Brigade brings together the best makers from the borough to create highly curated events featuring artwork, food, jewelry, fashion, crafts, and more.” Mother’s Day is also right around the corner (Next Sunday to be exact), so this is the perfect opportunity for some last-minute shopping. For a list of vendors and more information about this free event CLICK HERE. QCB is located at 31-35 41st Street in Astoria. May 5th @ 12PM {Queens Beerhouse}: Cindo De Brunch. This new local beer house is serving up brunch with a side of drink specials for Cinco De Mayo. For more information CLICK HERE. May 5th @ 2PM {Museum of Moving Image}: Limestone Cowboy. As part of the Panorama Europe Film Festival, “Abigail Mallia’s boisterous and well-crafted film is brought to life by the convincing and delightful performances of its gifted lead actors, Paul Portelli as the eponymous cowboy and Davide Tucci as his son, who is struggling to save what is left of his family’s respectability.” Get your tickets today by CLICKING HERE. May 5th @ 2PM {Fusion Lounge NY}: Tequila fiesta cinco de mayo EXTRAVAGANZA. Check out Fusion Lounge in Astoria for a Cinco De Mayo party with drink and food specials until 7PM. How can you say no to $2 tequila shots and half off tacos and quesadillas?! Click Here for more information. May 5th @ 5PM {The Knock Down Center}: Devotional with Sarah Zapata. “In conjunction with the exhibition Soft Territories, Sarah Zapata will perform a reading of recent texts that explore the limits and porousness of the body, and the interrelation between feet and femininity. Acting as a sort of guided meditation, Devotional will be a performance that engages the mind and body.” This is event is free to the public. Click Here for more information. May 5th @ 7PM {The Knock Down Center}: Yanira Castro Presents: Sunday Service. “Join us for Sunday Service curated by Yanira Castro, who brings together Martita Abril, Rosana Cabán, Cori Olinghouse, Alexis Ruiseco-Lombera, Tara Sheena to explore communing, commingling, and being together in performance.” This event occurs the first Sunday of every month, with a different curator and direction each time. For more information about this free event CLICK HERE. May 5th @ 7PM {Flushing Town Hall}: Global Mashup 5: Balkan Punk Meets West Africa. “We’re mashing up 2 cultures on 1 stage with an open dance floor! Starting with dance lessons, each band plays a set, then the two meet and jam. Lemon Bucket Orkestra, Toronto’s multiaward winning, world-touring, groundbreaking guerrilla-folk party-punk Balkan-brass band, meets NYC’s Kakande, with lush vocals, sinewy koras, flutes, cellos and the balafon (xylophone) of a master griot from Guinea. Come ready to dance!” For tickets CLICK HERE. Superchief Gallery NY: Sarah Sitkins: Bodysuits {Closing May 5th} April Showers Bring What? As the month of April quickly comes to an end, I wanted to thank EACH AND EVERY ONE OF YOU for taking the time to support Queens Chic. It’s come a long way from when I first started back in November of 2018. Each one of you has given me exciting content. Some of you have even shared your incredible musical milestones with me. But the biggest highlight has been the trust you’ve all had in me. I have been able to bring you versatile content on a regular basis, and you have all been extremely open minded. I couldn’t ask for a better support system. (YOU GUYS ROCK!) Here is my curated list of what’s popping off in Queens this last weekend of April. April 25th @ 4PM {MOMA PS1}: Poetry Reading with Rachel Eliza Griffiths and Safiya Sinclair. Join these two award winning writers for an afternoon of poetry and conversation. This event is free with a valid museum admission. For more information CLICK HERE. April 25th @ 6:30PM {Queens Central Library}: Lived Experience. The Queens Central Library is hosting an artist reception for their latest exhibition Lived Experience. This “special art exhibition features the work of artists with mental health issues in partnership with the organization Community Access.” The artists work will be exhibited at the Queens Central Library branch in Jamaica until May 5th. The Queens Central Library is located at 89-11 Merrick Blvd in Jamaica. April 27th @ 11AM {Lockwood Jackson Heights}: Lockwood third annual kids rule Jackson Heights Party. Lockwood boutique is throwing a party for the kids, but ladies can benefit from the experience too! They are set to have activities for the kids, as well as story time and face painting to name a few. Ladies, you all get 15% off and no items are excluded from this deal. It really doesn’t get much better than that. Mothers day is also right around the corner, so this is actually a great opportunity for my gentlemen as well. Get your mother, wife, girlfriend, sister, any special lady in your life something nice to show your appreciation. Lockwood is located at 77-13 37th Avenue in Jackson Heights. April 27th @ 12:30PM {Belmont Park Racetrack}: Spring Craft Beer Festival. Sample over 100 beers (and for the very first time a small selection of wines), while watching and betting on the live horse racing. You’ll be able to sample both local and national craft beers. This is a “pay-one-price ticket,” so you get to enjoy the best of both worlds with the purchase of just one ticket. CLICK HERE for tickets and more information. April 27th @ 5PM {Flushing Meadows Corona Park}: Queens International Night Market. The second preview day is almost here. The Queens International Night Market was AMAZING this past Saturday. I ate until I literally ripped open my pants (this actually happened). With a wide selection of food vendors and jewelry stands, among other neat finds, you are bound to find an attraction for even the pickiest of critiques. Tickets are on sale HERE for this limited time event. No worries if you miss this preview night. The night market is officially back for the season on May 4th, and will resume free of charge for everyone to enjoy. April 27th @ 7PM {Lawrence Virgilio Playground in Windmuller Park}: Free sneak preview of Netflix’s documentary Knock Down the House. The Museum of Moving Image, in collaboration with Rooftop Films, bring us a sneak preview screening of the Netflix original documentary, Knock Down The House (Click Here for Trailer). The film will be screened, free of charge, at Lawrence Virgilio Playground in Windmuller Park located in Sunnyside. Doors open to the public at 7PM and the movie is set to show at 8:15PM. This is a first-come, first-serve event, so make sure to arrive early for good seating. There is an option to RSVP for this event, although it is not necessary. For more information about the film and for directions to the event, CLICK HERE. April 28th {Gotham Barbershop}: Grand opening party for Gotham Barbershop. Get ready to stuff your face while getting a touch up, or simply catching up with old friends or new ones. Gotham Barbershop is opening for business and they’re throwing a party to celebrate this incredible accomplishment. This is an open invitation, so come one–come all! For more information, and for pricing CLICK HERE. Gotham Barbershop is located at 171-65 46th Avenue in Flushing. April 28th @ 6PM {The Knock Down Center}: Closing Reception for A Continuous Stream of Occurrence with Roarke Menzies. If you haven’t paid this exhibit a visit, this will be your last opportunity. A Continuous Stream of Occurrence is coming to an end and artist Roarke Menzies will be engaging Luba Drozd’s installation with his sound intervention. This event is completely free. For more information, check out my personal review of the exhibition by clicking HERE. Mrs. Gallery: Caroline Wells Chandler- Tutti Frutti {April 6th to June 1st} Queens Botanical Garden: Art In The Garden: In Full Bloom{March 29 to August 25} Week #3: Are you ready? It is now week three of Spring and that means only one thing: more activities! I’m truly excited to present a few local events that not only am I personally looking forward to, but I’m hoping you all can enjoy these too. Get your pen and paper ready!! April 12th @ 7:30PM {Museum of Moving Image}: “Babylon.” The MOMI is bringing this 1980’s Cannes Film Festival hit to the big screen. Babylon was never formally released in the U.S. because of its controversial nature. For more information and for tickets to the film CLICK HERE. April 13th @ 4PM {MOMA PS1}: The Cases Behind the Prints with Alec Karakatsanis of Civil Rights Corps. Alec Karakatsanis expands on the cases of the individuals featured in the “Redaction” exhibition prints. If you haven’t visited the latest exhibit at MOMA PS1, this is the perfect opportunity to get an in-depth analysis by an industry professional. CLICK HERE in order to register for this free event. (UPDATE!!!! This event has moved to BK Bazaar and tickets are being honored). April 13th @ 10PM {The Knock Down Center}: Foals Official After Party (DJ SET). April 14th {Museum of Moving Image}: As part of The Havana Film Festival, MOMI brings us two films. “Inocencia” (a film about Cuban medical students who are wrongfully convicted, and have to prove their innocence) will be showing at 2 P.M., and “Los Silencios“(a film about a mother who finds refuge on a secluded Brazilian island, while running from Colombia’s political conflict) comes on at 4:30 P.M. You won’t want to miss these films as they bring The Havana Film Festival to a close. April 14th @ 3PM {MOMA PS1}: Klein. Don’t miss this sound-based performance that ranges from mythology to the sounds of Pavarotti. “Klein uses collagist techniques to assemble recordings of her own vocals and instrumentation.” For tickets to this presentation CLICK HERE. April 14th @ 7PM {The Knock Down Center}: Sunday Service by Ray Ferreira. I have heard amazing things about the KDC’s Sunday Service, and I am so excited to be attending this months edition. Sunday Service “brings together a multiplicity of views around a singular prompt, such as a question, theme, or formal structure.” Taking place the first Sunday of every month, the event is coordinated by a guest curator who is invited to pretty much blow our minds away with different manifestations of art. You won’t want to miss it. Simple RSVP HERE in order to attend this free event. April 15th @ 4PM {MOMA PS1}: Poetry Reading with Nicole Sealey and John Murrillo. “In conjunction with the exhibition Redaction: A Project by Titus Kaphar and Reginald Dwayne Betts, New York-based poets Nicole Sealey and John Murrillo present a reading of their poetry followed by a Q&A with the audience about the exhibition, its themes, and their respective practices.” If you haven’t paid PS1 a visit, this is the perfect opportunity to get a behind the scenes look at Kaphar and Bett’s “Redaction” exhibit. Entrance to this reading is free with museum admission. (NEW) April 16th @ 7PM {Museum of Moving Image}: Free Preview Screening of HULU original series: RAMY. The MOMI just announced this incredible opportunity to catch the first three episodes of RAMY, a new HULU original series set to air April 19th. “In his new Hulu original series, Egyptian-American comedian and actor Ramy Youssef stars as Ramy Hassan, a first generation Egyptian-American who is on a spiritual journey in his politically divided New Jersey neighborhood.” To RSVP and for more information simply CLICK HERE. Also, CLICK HERE for the series trailer. April 19th @ 8PM {The Knock Down Center}: Trap Karaoke. If you’re a pro at Karaoke and also have a few bars to spit, this is your event. You are so very welcome! Trap Karaoke “is about personal empowerment, cultural participation, cherished moments, community, and creating a safe space for human connection.” There are slots still open, so if you’re interested in participating GO FOR IT! For tickets to this event CLICK HERE. April 20th @ 11AM {Queens County Farm Museum}: Barnyard Egg Hunt. As a kid I loved to egg hunt on Easter. It was particularly due to the AMAZING choice of candy I would find in the eggs (My family always had the good stuff. No peeps or jelly beans here!). Also, the Queens County Farm Museum has a petting zoo and pony rides on site at an extra cost. However, everything is CASH ONLY, so make sure you take a trip to the bank before heading over as there are no ATM’s on site. For tickets to this event CLICK HERE. April 20th @ 5PM {Flushing Meadows Corona Park}: Queens International Night Market. It’s BACK!! Well, temporarily at least. The Queens International Night Market is back on April 20th and 27th for a sneak peak of what’s to come this season. Tickets are on sale HERE for this limited time event. No worries if you can’t make it to these preview nights. The night market is officially back for the season on May 4th, and will resume free of charge for everyone to enjoy. CATCH ME @ THE 4/20 PREVIEW NIGHT! April 20th @ 10PM {The Knock Down Center}: Nina Kravis & James Murphy. “Knockdown Center welcomes back techno-queen Nina Kraviz and LCD Soundsystem’s James Murphy for a supercharged night of techno and dance music with support from Justin Cudmore.”For tickets to this event CLICK HERE. April 21st @ 3PM {MOMA PS1}: Jonathan González, Lucifer Landing I. “A contemplative space to consider what González terms ‘the entanglements between the state of dispossessed non-being that is Black life with the non-human and the architectural‘.” For tickets and more information on this immersive performance CLICK HERE. The Noguchi Museum: Akari Sculpture by Other Means; Akari Unfolded: A Collection by Ymer & Malta {Closing April 14th} The Knock Down Center: A Continuous Stream Of Occurrence {Closing April 14th} The Queens Museum: Alexandria Smith: Monuments to an Effigy; Mundos Alternos: Art and Science Fiction in the Americas {April 7th to August 18th} Superchief Gallery NY: Sarah Sitkins: Bodysuits {April 6th to April 27th} Legit Easy @ The Paper Box If you missed the show last night, no worries because there are definitely more in the works. But… You messed up big time. I’m judging all of you (not really). But you did miss an incredible show with some amazing NYC talent. However, I was there to capture my good friend Legit Easy’s showcase and he showed out! Legit performed two of his newest singles last night, before releasing them on his SoundCloud today. The songs definitely had that East Coast flow New Yorkers usually gravitate toward. But then again, with the ease of his rap lyrics and his captivating energy, Legit had the crowd dancing, singing, and yeerr-ing (hollering -or- that NYC chant for a select few) all throughout the performance. The Paper Box is also in that small group of venues where artist can really interact with the crowd, and it makes for an all around amazing showcase of talent. Everyone was feeling the vibe and the music. I want to leave you all with Legit Easy’s latest single. Don’t forget to follow him @LegitEasy on Instagram – & – follow his music on SoundCloud.
cc/2020-05/en_middle_0061.json.gz/line1661
__label__cc
0.723368
0.276632
« August 2009 | Main | October 2009 » Doris Was Doris A long seventy mile drive home, of which a quarter was bumper to bumper, birthed opportunity to reminisce of times past, of times that will be no more. Doris was born in 1917. The Celebration of the LIfe and Resurrection of Doris was held yesterday. I gave the eulogy, and with the current pastor of Doris’ church, went through the liturgy prescribed in the Book of Worship. Doris knew my mother. She was a few years older, but both were a product of the same high school. That school produced such genteel Southern ladies. There was a certain demeanor about them of sophistication and politeness. My mother, I always suspected, and my suspicions were confirmed by my grandmother after mother died, had a bit of a wild child in her. Mother wanted me to believe she was the paragon of innocence, but I always wondered. Mother, in addition to being such a participatory parent, had this mischievous nature. When I became Doris’ pastor upon being assigned to the church of my mother’s younger days, I asked Doris: “So, tell me the truth. Was my mother a wild child?” Doris didn’t exactly smile. Rather, her lips curled in a charming way that announced to me she was one much wiser than I, Doris replied, “Well, Martha was Martha.” I buried Doris yesterday. She wanted me to the the one, along with her current pastor, to celebrate the event. So, I returned to the old parish to assist the current pastor. I think she wanted me to do so because Doris knew that I was the pastor who knew that: Well, Doris was Doris.” As the traffic stalled to a stand-still, I could imagine Doris down at Peachtree Gardens, that 1940s and 50s dance palace which rested on the banks of the Chattahoochee River, jitter-bugging the night away to the sounds of some big band music. Doris, I learned over the years, was capable of doing so with gleeful abandon. But that was just one side. The other side was that portrait of Southern womanhood, of sophistication that was accentuated by proper manners, soft-spoken conversation and genteel demeanor. Doris knew which dining utensil went where on the table. She was a reflection of Emily Post manners. In polite society she radiated an aura of sophistication so reflective of Southern womanhood. She was the definition of politeness. She was feminine. And yet, Doris was Doris. Doris was Doris, the Doris who would quietly signal this pastor to hang around until all the others had bid farewell to the gathering at her condo. And immediately upon their departure would pull the bottle of fine wine from its hiding place in the cabinet and pour the pastor and she a special glass of libation. With the juice of the grape in hand and upon the tongue, Doris and the pastor would talk of the days when Martha was Martha and Doris was Doris. As the traffic began to slowly inch northward toward home, memories of a time that used to be flooded over me. My mind processed the images of Doris so quiet and demur in her maturity, so flapper-like in her youth. She is a symbol of an amazing generation, a generation when women were women but had to be discreet about it, when those who flitted about the dance floor on Saturday night still rose to dress in their finest to occupy their pew on Sunday morning. Doris was Doris, you see. And Doris taught this old parson that it was okay that his mother was: Well, Martha was Martha. Twenty miles from home the traffic had diminished and the car moved along above the posted speed limit. I remembered the day so very long ago when Aunt Virginia, two years older than Doris, taught me to do the Charleston. She’s the only one left of Mother’s and Doris’ generation. I’ll be there, I suppose, for Aunt Virginia’s funeral. And on that day I’ll celebrate how Doris was Doris and Martha was Martha and Aunt Virginia was Aunt Virginia and how they all taught me to be me. Graphic by subscription with Clip Art [dot] Com Posted at 01:12 AM in Celebration, Daily Blog, Dance, Death, Family | Permalink | Comments (0) | TrackBack (0) Being Accepted The parson was leaving a community meeting when Ralph, an old acquaintance and a leader in the gay community, joined him as he walked to his car. “Ralph,” said the parson, “I’m so glad you were at the meeting. You’ll save me the postage in sending you a card telling you how much we appreciated your visit Sunday. I hope you felt welcomed.” “I did, Parson. Mark and I both really enjoyed the worship there. In fact this morning at breakfast we were talking about our visit., Mark suggested we should come back a worship with you some more.” “That would mean a lot to the folks at the church, Ralph. I hope we do see you.” “You probably can count on it, Parson. We even discussed the possibility of transferring our membership to your church.” They had arrived at the parson’s car which was just as well because the statement stopped the parson in his tracks. The parson thought a moment and said, “Ralph, I thought you were active at the Rainbow Church of the Marginalized and Isolated.” “I am, Parson. I am. But Mark and I have determined there’s a big difference in going to a gay church and going to a church where gays are accepted. Posted at 12:01 AM in Change, Church, Daily Blog, GLBT | Permalink | Comments (1) | TrackBack (0) First World Sin The parson was changing the sayings on the sign in front of the church. It was a usual late Sunday or early Sunday evening task. He was removing the letters to be replaced when Ginger, the parson’s favorite rising theologian approached. “Ginger, how are you? Did I tell you how much I missed you all the time you were gone?” Ginger’s dad had taken a temporary assignment in a third world country for the company he work for. the family had accompanied him. Ginger, through her cards and emails, had shared her enjoyment of the country with the parson. “You did tell me, Parson. And I missed being here, but it was really awesome living in another country.” “I bet it was,” the parson noted as he hopped off the step ladder with the letters in hand. “I’ve got to put these up and get the new ones. Want to go with me?” Ginger agreed and walked with the parson toward the church building. Inside the room where the letters were kept in alphabetical order on three shelves along one wall, Ginger called out the words from a 3x5 card containing the two sayings to go on the sign. The parson pulled the letters accordingly. Letters selected the two headed back to the sign where the parson began placing the letters in their tracks. “So, I guess you have seen a lot since you left,” the parson said. “I have, Parson. I didn’t know people could be so poor. It was really horrible. But those people are just like us. The kids just want to play and to grow up to be better than they are. You know my Mom started a school at the refugee came? That sure was different than the school I go to.” “That must have been quite an experience,” the parson told her. “I hope you’ll never forget it and will let it make you a better person.” “I think it already has, Parson,” said Ginger. “But I can tell it’s made me a little mad.” “Mad? How could it make you mad?” The parson had completed placing the new sayings on the sign. As Ginger began to speak he picked up the step ladder and the two headed toward the church again. “We went to lunch with some of the church members after church today. It was horrible.” “The lunch was horrible? Where did you eat?” “It wasn’t the restaurant, Parson. It was the food. There was food stacked all over the place on the buffet, and the salad bar was enough to stuff anyone. Parson, I saw more food in that one place than I did in the whole time I was out of the country.” “That makes you mad?” “That makes me mad, Parson. It makes me mad, and I bet you it makes God mad. Because it’s a sin, that’s what. It’s a sin.” The parson said nothing more. Truth is sufficient unto itself. Posted at 12:01 AM in Children, Church, Daily Blog, Poverty | Permalink | Comments (0) | TrackBack (0) When You Move, Move The parson was sitting on a bench beside a garden at the retreat center. He was there as a speaker. Someone must have turned them down. Jeff Richardson, an up-and-coming pastor joined him on the bench. The parson inquired about Jeff’s family; he’d baptized both of his children as well as being the celebrant at his wedding. He was fond of Jeff and his family. He’d been pleased when the bishop at the last conference appointed Jeff to a church of some reputation. Jeff had worked hard; he was committed; he was talented. The parson was pleased. “How are things at your new appointment?” the parson asked. “Things are going really well,” Jeff replied. “I really think it’s one of those appointments you hear about where the pastor and the church are a match.” The parson knew this was the case. He’d known it long before Jeff was appointed to the church. “I’m happy for you, Jeff,” the parson said. “Embrace this. Not all pastors are so fortunate.” “I know, Parson,” said Jeff. “I am grateful. Lucy is, too. She just as happy as can be, not only with the church but the community and the opportunities there are for her.” Both men were quiet for a moment. Jeff broke the silence. “Parson, I’m having a bit of a personal problem. Can I ask you about it?” “Sure, Jeff,” the parson said as he felt concern within. “I remember how you used to tell us that when we moved we really should move. I’ve done that at the two churches I’ve served. But I keep hearing about things that are going on at my last appointment. I have to tell you, Parson, I’m really upset. Everything I hear leads me to believe the pastor that’s there now is destroying that church. I worked hard for six years to make that church viable. It’s just down right frustrating.” The parson smiled. He leaned back against a tree immediately behind the bench. “Now, Jeff, I don’t want you to think this is too harsh, but I need to share a truth with you. That church where you used to serve has a new pastor now. And even if, in your mind, everything that you did is being destroyed, it is being destroyed by the only pastor who has the ability to do so.” “But Parson ...” The parson held up his hand. “When you move, Jeff, move. That means taking your emotions and your aspirations with you. The church you left has a new pastor. Leave it not only with your body but your spirit.” “It’s hard, Parson.” “It is, Jeff; it is. Maybe it would help if you remind yourself it is possible the pastor you replaced is having this same conversation with someone.” Posted at 12:01 AM in Church, Daily Blog, Ministry, Pastors | Permalink | Comments (0) | TrackBack (0) Fighting the Age The parson was sitting on a bench under the gazebo that overlooked the pond around which the jogging path looped. The breeze was blowing gently. The sun was beaming. Wind and sun joined force to dry the ground saturated from two solid weeks of rain. People walking around the loop provided the entertainment. Howard Randall, an effective pastor in his mid-fifties, approached the parson and stepped into the shade of the gazebo. “You looked relaxed, Parson.” “I am, Howard. I am.” “No pressures from the job today?” “Nope. I’m immune to pressure today.” “How’s that, Parson.” “It’s my day off.” “Well, in this job having a day off doesn’t make you immune to pressure.” “It does in my case, Howard.” “No body knows where I am, Howard. Please understand I told you that in confidence, so don’t go telling anyone. If they don’t know where I am they can’t bring pressure on me.” “They don’t have to know where you are to call you, Parson.” “They do if I don’t have a cell phone.” “Where’s your cell phone?” “What if there’s a real emergency, Parson.” “In that case Ron Bennett over at Rising In Praise of the Lord Church will cover for me.” “How can he cover if he doesn’t know there’s an emergency.” “He will.” “I forwarded the office phone to him. He answers to tell folks I’m not available but he’s covering for me. And if it is an emergency he knows where I am.” “You actually take one day a week where you don’t do any church work?” “I wish I could do that.” “You could, Howard.” “How long have you been doing this?” “So I can look as young as I do. And Howard, if you don’t start taking some time apart you’re going to end up looking as old as I actually am.” Posted at 12:01 PM in Daily Blog, Everyday Life, Ministry | Permalink | Comments (2) | TrackBack (0) On the Sacred Mountain The fog clung desperately to the ground stubbornly dedicated to enveloping the peak moistness. Vision was obscured by the airborne wetness. But it barely slowed the parson’s progress upon the all too familiar path. Before dawn awakened the parson was on the road traveling the forty miles to the sacred site. Progress slowed as hybrid slowly ascended through the clouds toward the mountain’s peak. Entering the state park he hung his park pass upon the rearview and headed toward the parking area. The wetness of the air hung heavily giving the sacred place once again the mystical attraction it exuded two thousand years before. The parson’s boots now trod upon the same stony paths carved by moccasins long ago. He pulled the zipper to his parka up to his neck as a barrier to the cold while wondering what hides those who had come before wrapped about their torsos. Though the fog prohibited sight beyond ten feet off the path, the parson knew his way from frequent hikes and arrived at the wall in good time. There he sat waiting the sun’s dispensing of the moistness. The wall disappeared into the fog, but the parson knew it stretched a hundred yards before him. The East / West line was broken in places by a zig zag, a zig zag that corresponded to the lines on ancient Woodland Indian pottery, zig zag lines believed to map the movement of the heavenly bodies crossing the skies. It was quiet on the ancient observatory. The parson pulled two fig newton bars from his pack. He chewed them silently, washing them down with water from his old canteen. Finished, he carefully tucked the wrappings into the pocket of his parka. He leaned against a tree bordering the wall and listened to the symphony of the silence, accompanied by the chill of the barely stirring wind. The sound of the owl hundreds of feet below announced the crescendo of the movement and gave warning of a rising sun. The parson stirred, stretched, and proceeded up the path beside the sacred wall. The floating wet seemed to part in anticipation of his booted steps. He paused at the intersection of the North / South path. There he sat, waiting. With an almost imperceptible movement the suspended particles began to lift from the ground until they floated suspended a foot above the parson’s head. The parson looked to the East; he looked to the West. The wall was becoming visible along its entire length. He wondered at what sacred ceremonies were once held here where he sat. He marveled that about the time his spiritual ancestors were crawling out of the catacombs the people who inhabited the valleys below had come to this mountain and with infinite care constructed this wall. What was their liturgy? What was their credo? Did the ordained lead their gathering upon this sacred mountain. A hawk swooped down through the rising fog and soared almost parallel to the parson’s eyes. He disappeared into the trees. The parson roused from his wondering turned and headed up the path. Over the crest of the mountain he proceeded and then down the other side. His pace was quickened now as the fog was lifting and his line of sight increased. Soon he came to the spot where the rocks jutted out over the valley below. There on the rock sat the parson. He drank again from his canteen and waited, quietly he waited. The morning glow began to give way to daylight as the sun’s rays pushed their way across the valley floor below. The world was waking. The parson was watching. The hawk flew by again on her way to the valley floor a half mile below. Time stood still. The world was hushed. The wind barely moved. And then the birds announced the coming of day. The parson rose. He looked down upon the valley and knew why those ancients had come here. Like Moses on Sinai and Jesus on Gethsemane and the parson on a chilly September morning, they were seeking to be closer to God. Posted at 11:47 PM in Belief, Celebration, Daily Blog, Sacrament, Spiritual | Permalink | Comments (0) | TrackBack (0) If the Word Fits The parson was sitting at a table in the fellowship hall. There was no particular reason the parson was sitting at a table in the fellowship hall; he’d just poured himself a cup of coffee in the kitchen during which he noticed the paperback novel on the table. He sat down, sipped the coffee, opened the book and gradually became engrossed in Mary Higgins Clark’s Just Take My Heart. The parson was on his second cup of coffee and the fourth chapter of the mystery when the outside door of the fellowship hall banged open. Alexia, a precocious six-year-old, darted into the building. She stomped her way across the room and five feet before the parson’s table turned sharply right toward the hallway. “Hello, Alexia,” called the parson. “How are you today?” Alexia was already in the hallway by the time the words were out of the parson’s mouth. Within two seconds she stuck her head around the doorframe and replied, “Hello, Parson. I’m not doing good today.” She turned to leave as the parson inquired, “Is something wrong?” She turned back and replied, “Yes, sir.” “What’s wrong?” the parson asked before she could walk out again. “What’s wrong? I’ll tell you what’s wrong. My sister is a shit; that’s what’s wrong.” She turned away and stomped down the hall. The parson was debating abandoning the mystery and following her, but before he resolved the matter she stepped back into the fellowship hall, arms tightly folded and eyes glaring. “Okay, Parson, I’m probably going to get into a lot of trouble for using that word in front of you because you’re my pastor. So, I’ll tell you I’m sorry now.” “I accept you apology, Alexia,” said the parson. “Thank you,” she said as she turned to leave. She hesitated and looked back over her shoulder as she said, “It was the only word I could think of that fits. My sister has gotten me into trouble twice this afternoon and she just laughs about it. So even if it’s a bad word she really is one today.” This time she walked just as deliberately down the hallway but a bit more slowly. The parson picked up his coffee as he contemplated this encounter. Just then Alexia’s mother entered the fellowship hall. “Hi, Parson,” she said. “Did Alexia just come through here?” “She did,” the parson responded. “In fact, we had a little talk.” “Oh, that’s nice,” said Alexia’s mother. “What were you talking about?” The parson smiled. “The meaning of words.” Posted at 12:01 AM in Children, Daily Blog, Humor | Permalink | Comments (0) | TrackBack (0) It was raining. It had been raining every day for ten days. The ground resembled a wet sponge. The parson sat on the front porch of the church watching the raindrops splatter upon the puddles of water covering the parking lot. It was a torrent. The parson was making bets with himself as to how many of the saints would brave the weather to attend church. Suddenly, from around a corner a figure darted up the church steps. He was without a rain jacket or other protection. He was soaked. “You the Parson?” he asked as he wiped the water from his face. “I am,” said the parson. “Come in and let me get you something to get dry.” “Oh, no, no,” he replied, “I’m just here to pick up the keys to that place your church has out at the fairgrounds. My Mom says you’re giving us all the bread left over. We really appreciate it. What with the economy being what it is we’re running low on a lot of stuff. She said you guys had a bunch to donate.” “There’s quite a bit,” said the parson. “The rain kept a lot of people away from the fair this year.” “Well, we appreciate it that you thought of us.” The parson had extricated the key from his chain and held it out to the man. “Do you work with the mission?” “I do,” said the man. “I’m Ben Hanson; I’m the director.” “It’s great to meet you, Ben,” said the parson. “Sure, I can’t get you something to dry off with.” “No, Parson, but thank you,” he said. “I really need to get this stuff from your place and get back to the mission. We’re pack to capacity.” “We’re glad we could help,” said the parson. “Tell me, Ben, what church do you go to?” “I don’t go to church, Parson. I’m a bit turned off with the church. I’m not a Christian. I’m just a follower of Jesus.” “Well, let me know whenever you think we can help,” the parson said. “I’ll do that, Parson,” he said. He then darted back into the rain, dashed around the corner of the building and was gone. The parson sat back down on the front porch bench. Leaning back he contemplated the implied difference in Christians and followers of Christ. Re-Believing “Hi, Parson,” she said as the parson walked down the hall of the church. “Hi to you,” responded the parson to Emily Wiggins, a five-year-old who attended the parson’s church. “What brings you to the church this afternoon?” “Mom’s having a meeting with Janet’s mom about something they are supposed to do sometime.” “Oh, yes, visiting the homebound. I remember.” “So, she said I could play in my Sunday school room.” The parson pulled out one of the children’s chairs and without too much difficulty was able ease his aging body down that low. “How have things been going with you?” asked the parson. “Sometimes good and sometimes not so good,” she said. “Tell me about it,” the parson encouraged. “I’m a little disappointed right now, Parson,” she said. “What are you disappointed about?” asked the parson. “Well, remember when I lost teeth?” “I remember,” the parson said. “Look here,” said Emily as she placed the end of her right index finger on one of her teeth and wiggled it back and forth. “Oh, you’re losing another tooth. That’s nothing to be disappointed about.” “I’m not going to get a dollar for this one, Parson,” said Emily. “You’re not? Why not?” Emily sucked in a big breath. She exhaled and said, “I told my folks that I didn’t really believe in the tooth fairy anymore. And my Dad said if I didn’t believe then there wouldn’t be a dollar under my pillow when I lost my tooth.” “Oh, my,” the parson expressed concern, “that’s a problem.” “It is, Parson; it really is. I could use a dollar.” “Well, it looks like you’ve got a real problem.” “I know. I can tell you what I’m thinking about telling my Dad.” “What?” asked the parson with a whisper as he leaned across the table toward Emily. She whispered, “I’m thinking about telling my Dad that if it’s necessary I could believe again.” Shortly after this Emily’s mother called. She excused herself and darted down the hallway. The parson watched her figure recede and thought to himself, “Ah, that’s where it begins.” Posted at 12:20 AM in Belief, Children, Daily Blog | Permalink | Comments (0) | TrackBack (0) WWYD T he parson sat off to the side of the room where were gathered the esteemed clergy of the county in which the parson resided. The parson was always a bit ambivalent about these meetings. He didn’t want to go. But he needed to keep his church part of the community. The meeting centered around the planning for several activities which included a Rally in the Park for America event which was, so said the organizing clergy, was not political but an attempt to bring America back to the principles on which Jesus would have the nation rest. When the date for the event was announced the parson did not bother to pull out his iPhone to record the event on his diary. He wasn’t going. A discussion ensued as to whether the group should sponsor an event to discuss the challenge of the illegal immigrants in the community. the parson listened politely as he wondered how many of these assembled would actually know a green card was not green. Another challenge was brought up which concerned an outdoor Living Nativity that many of the group would be participating in. The parson listened intently and was pleased at the scope of the conception, especially the drama that would be a part of the evening. But then there was an intensive discussion about the need to have a means of bringing folks to Jesus. The parson remained silent during the meeting, enjoying the cholesterol he’d collected from the breakfast bar of the restaurant where they were meeting. But then one of the gathered began to hold forth on the evils of the community, the failure of the churches to stand up as a single body to oppose the deterioration of America’s modern society. He suddenly turned to the parson as he ended his tirade: “So, I say the question facing us in all these challenges is that eternal question: What Would Jesus Do? Don’t you agree, Parson?” The parson leaned forward in his chair. “No, Leon,” he said, “I don’t agree at all. You see, I know beyond a shadow of a doubt what Jesus would do. So the question becomes: What Will You Do.” The parson excused himself and headed toward a needed hospital visit. Posted at 11:43 PM in Christianity, Church, Clergy | Permalink | Comments (0) | TrackBack (0)
cc/2020-05/en_middle_0061.json.gz/line1664
__label__cc
0.531366
0.468634
← Back To The Future 1974 Global Cooling Debate : Fossil Fuels Vs. The Sun → Global Warming Now Causes More Ice Posted on March 8, 2017 by tonyheller All winter they have been telling us that ice is melting at -20C, and now experts now say ice forms at higher temperatures – due to an increase of 0.0001 mole fraction CO2 over the past century. More Powerful Icebreakers Needed in Baltic Sea Despite Global Warming 13 Responses to Global Warming Now Causes More Ice toorightmate says: I am fairly certain that ice becomes significantly harder as CO2 levels spiral upwards at 2ppm each year. By 2050, the ice from the arctic will replace industrial diamonds. A Russian news paper is claiming MILDER winters? What are they drinking? Frozen vodka? And it is not like Russian scientists, free of CAGW Lysankoism, have not been warning the Russian people of the cold period – Little Ice Age – to come. “The Earth is heading towards another ice age as solar magnetic activity is set to drop by up to 60 per cent in the next 15 years,” warns new study. Experts say that solar activity has not been this low since the Maunder Minimum, a period of low sunspot activity between 1645 and 1715 when the entire Thames froze over. That period is also considered the deepest part of the last “Little Ice Age.” Valentina Zharkova from Northumbria University, who applied this theory to the Sun, says she can predict the affects of solar cycles with 97 per cent accuracy. Based on her findings, Ms Zharkova says the next solar cycle is set to peak in 2022, and the cycle after that, Cycle 26, will herald a new ice age.” http://www.express.co.uk/news/science/723481/Earth-ICE-AGE-big-freeze-solar-activity November 17, 2016 – A New Little Ice Age has begun, says Russian scientist “In his new book, Evidence-Based Climate Science: ‘Data Opposing CO2 Emissions as the Primary Source of Global Warming, astrophysicist Dr. Habibullo Abdussamatov warns that a new Little Ice Age has begun. A highly qualified and highly regarded scientist, Dr Abdussamatov is Head of Space Research Laboratory at the Pulkovo Observatory of the Russian Academy of Sciences, St. Petersburg, Russia.” Since 1990, the Sun has been in the declining phase of the quasi-bicentennial variation in total solar irradiance (TSI). The decrease in the portion of TSI absorbed by the Earth since 1990 has remained uncompensated by the Earth’s long-wave radiation into space at the previous high level because of the thermal inertia of the world’s oceans. As a result, the Earth has – and will continue to have – a negative average annual energy balance and a long-term adverse thermal condition. The quasi-centennial epoch of the new Little Ice Age started at the end 2015 after the maximum phase of solar cycle 24. The start of a solar grand minimum is anticipated in solar cycle 27 ± 1 in 2043 ± 11 and the beginning of phase of deep cooling in the new Little Ice Age in 2060 ± 11. The gradual weakening of the Gulf Stream leads to stronger cooling in the zone of its action in western Europe and the eastern parts of the United States and Canada. Quasi-bicentennial cyclic variations of TSI together with successive very important influences of the causal feedback effects are the main fundamental causes of corresponding alternations in climate variation from warming to the Little Ice Age. http://www.sciencedirect.com/science/article/pii/B9780128045886000173 And the Russian weather for the last year backs these scientist up. Russia has seen snow and freezing weather every month in the last year. Since Russia is at the far northern range for food crops this type of weather is very important to Russia. Anyone else think this might be one of the reasons why Russia was not about to let the EU grab the ‘Breadbasket of Europe’ aka the Ukraine? I certainly was not surprised and predicted the reason for the site picked for the Winter Olympics was to allow Russia to move troops into place without setting off alarms. RUSSIAN SNOW 2016-2017 March 7, 2016 – Buryatia Russia – Cars stuck in snowdrifts more than 4 ft deep March 14, 2016 – Russia – Unexpectedly strong winter returns. Freezing poses a risk in the southern European territory to early blossoming apricots and plums. Frost could also endanger emerging winter wheat seedlings. March 20, 2016 – Russia – Blizzard leaves 39 settlements without power. Descriptions on social media tell of torn off roofs, falling poles, fences, winds howling, tree bends to the ground. April 7, 2016 – Russia – Unexpected blizzard in Bratsk April 8, 2016 – Snowfall and blizzards in Siberia, the Urals and the Far East continue. April 17, 2016 – Blizzard and (very) heavy snowfall in Sakhalin, Russia. Heavy snowfall closes major interstates in Wyoming and Colorado too. May 2, 2016 – Surprise snowstorm in Russia In Krasnoyarsk, snowstorm sweeps and raging storm. In some areas of the city the temperature was below -1 degrees below zero. May 28, 2016 – Russia – Snowfall paralyzes truck movement. On the border areas of Mogochinsky and Chernyshevsky fell more than 20 cm (8 inches) of snow. June 15, 2016 – Alaska, Finland, China, Russia, New York State have JUNE SNOW. Crop Losses Follow. In Tiksi and Novodvinsk Russia unexpectedly snowed. August 27, 2016 – Summer snow in Russia. In the central region of Magadan snow fell. Mean while Perth Australia was on track for coldest winter this century. June and July temperatures have been the coldest in years and three confirmed reports of snow on the Stirling Ranges this winter so far, the highest number since 1998. “On average, snow falls once a year in WA,” said MLM spokesman. October 12, 2016 – Russia – Heavy snowfall in Magadan Region for three days running. The snowfall paralyzes traffic between Magadan and Yakutia. The federal highway “Kolyma” is closed for the passage of freight transport in the Magadan region due to heavy snowfall. October 17, 2016 – Russia – Snow paralyzes Ulan-Ude. Meanwhile on the other side of the earth there was record snowfall in Montana and snow all the way from Yosemite to British Columbia October 23, 2016 – Snowing in Inner Mongolia. Snow hit northeastern areas of the Inner Mongolia Autonomous Region in north China on Friday. Snow hit the town of Tulihe in Hulun Buir City on early morning of Friday as the temperature dropped sharply. November 2, 2016 – Russia – Record snow covers houses up to the roofs. Animals slaughtered due to record snowfall – Five times the monthly normal precipitation in Yakutia, Russia. Horses are unable to feed themselves because of deep snow forcing locals to slaughter younger horses. November 5, 2016 – Miles of giant snowballs appear on Russian beach in Siberia. An 11-mile (18km) stretch of coast covered with the icy spheres from the size of a tennis ball to almost 1 meter (3ft) across. November 9, 2016 – The cyclone [Blizard] now pounding Sakhalin [Russia] complicates the work of restoring power to settlements of the region, according to the press service of PJSC “Sakhalinenergo” on Thursday. November 13, 2016 – Ukraine and Russia hit by extreme cold and heavy snow. Forecasts had called for heavy snow from Romania to Ukraine. As a result, the temperature in Novosibirsk dropped to -31C. Snowdrifts in the Ternopil region of Ukraine have reached half a meter causing a huge number of trucks to remain locked in the snowdrifts. And in the mean time snowfall cause power outages in central China. Source: Xinhua 2016-11-13 WUHAN, Nov. 13 (Xinhua) — Tens of thousands of households in central China’s Hubei Province is experiencing power outages after heavy snow severely damaged the local grid. Snowstorm hit Enshi last Tuesday and Wednesday, bringing down nearly 9,000 electric poles, and destroyed transformers and other supporting facilities. November 21, 2016 – Russia – Never so cold in many decades. Record cold – Temperatures in most parts of Siberia and the Urals with average daily temperatures as much as 16-20 degrees below normal. In Ural towns and villages the temperature dropped to -27 to -32 degrees. Temperatures in Siberia are even below -32 to -38 degrees. In the Tomsk region, central and southern regions of the Krasnoyarsk Territory, down to -42, and in the Khanty Mansiysk district down to -44 degrees. November 22, 2016 – Snowstorms and strong blizzards batter Russia and Kazachstan November 25, 2016 – Russia – Blizzard traps dozens overnight. blizzard suddenly fell upon the Sakhalin and paralyzed movement of vehicles in Dolinsky district, and forced dozens of drivers to spend the night in the Seashore. Because of the heavy snowfall, even emergency lights were not visible. AND in Tokyo Japan – First snow observed on the ground in November in 142 years December 23, 2016 – Russia – Record snowfall in Krasnaya Polyana January 17, 2017 – Russia, record snowfall in some areas. At the meteorological station “Central Mine” snow depth has reached 188 cm (6′-2″). In the village Chokurdakh, the snow measures 166 cm (5′-5″). The absolute snowfall leader in Russia is the alpine weather station Sochi, with more than 220 cm (just over 7 ft). An unusually large amount of snow for January is observed across Central and Eastern Europe. All the Baltic States, Poland, the Czech Republic and Germany, are covered in snow. The Balkans have not seen this much snow in several years. January 8, 2017 – Coldest Orthodox Christmas in Russia in 120 years. The mecury plunged to minus 30C overnight in Moscow, and minus 24C in St Petersburg. January 5, 2017 – Far colder than normal in Russia. -40ºC (-40ºF) frosts to come in Central Russia. Within 3-5 days, the average daily temperature is expected to be 10-15 degrees below normal. The danger is that the low temperature will be accompanied by strong wind. “Anyone else think this might be one of the reasons why Russia was not about to let the EU grab the ‘Breadbasket of Europe’ aka the Ukraine?” This and the fact that Russia’s naval base on the Crimean peninsula is their only warm water port that doesn’t get frozen in each winter. There was absolutely no way they were going to lose eastern Ukraine. I don’t think Obama knows how close he came to starting a war with Putin. And I wonder how much he and Biden make each year from Burisma Holdings, the Ukrainian oil and gas company that Hunter Biden works for. Even the NY Times recognizes that as a sleazy deal: https://www.nytimes.com/2015/12/09/world/europe/corruption-ukraine-joe-biden-son-hunter-biden-ties.html?_r=0 Those two, access to food and a winter seaport were guaranteed to get Russia fighting mad and I can not blame them because both are vital to the survival of the Russian people. Luboš Motl at one point had up an article mentioning that when the Ukraine became independent it was agreed (by treaty) that the Ukraine would remain within the Russian sphere of influence and the USA and EU would keep hands off. So the USA (Senator Songbird McCain aiding the Soros Color Revolution and the ousting of the elected president) plus the EU trying to get the Ukraine into the EU were violating that treaty. I find Putin very restrained in his dealings with the outright UNCALLED FOR aggression of the EU, NATO and the USA. There was a heck of a lot of other crap pulled too. …Russia’s leaders were understandably furious when, not only was former Libyan President Muammar al-Qaddafi ousted, but a cellphone recording of his last moments showed U.S.-backed rebels sodomizing him with a bayonet. They were even more enraged by Clinton’s videotaped response to the same news: “We came, we saw, he died,” the secretary of state quipped before bursting into laughter, cementing her reputation in Moscow as a duplicitous warmonger. As a candidate, Clinton has given Moscow déjà vu by once again demanding a humanitarian no-fly zone in the Middle East — this time in Syria. Russian analysts universally believe that this is another pretext for regime change. Putin is determined to prevent Syrian President Bashar al-Assad from meeting the same fate as Qaddafi — which is why he has deployed Russia’s air force, navy, and special operations forces to eliminate the anti-Assad insurgents, many of whom have received U.S. training and equipment….. http://foreignpolicy.com/2016/09/07/the-kremlin-really-believes-that-hillary-clinton-will-start-a-war-with-russia-donald-trump-vladimir-putin/ It’s tit for tat. Remember the Russians/Putin cutting down natural gas supplies the western European or IOW NATO countries? So we ought to know within the next decade whether the alternative hypothesis is more correct. Dr Evans coming at it from a different angle also agrees. The notch-delay solar theory …There are three big drops in solar radiation in the 400 years of records. The first, in the 1600s, led to the Maunder Minimum, the coldest time in the last 400 years. The second in Napoleon’s time, led to the Dalton Minimum, the second coldest time in the last 400 years. The third started in 2004, but hasn’t led to cooling…yet. The delay is tied to the solar cycle length, currently 13 years, so the cooling is likely to start in 2004 + 13 = 2017. The cooling will be at least 0.2°C, maybe 0.5°C…. If you bother to pay attention you can see the weather patterns have changed with the Jets going from Zonal (winds mostly out of the west in N.H.) to Meridional (from every which way) 1,00 year and 1500 year (bond) cycle found in Arctic. Researchers Pinpoint 1,500-Year Cycle in Arctic Atmospheric Pattern …identified for the first time a clear 1,500-year cycle in the far North’s surface atmosphere pressure pattern. Called the Arctic Oscillation (AO), the cycle greatly influences weather in the Northern Hemisphere… The sedimentation rate at our site is also sufficient to statistically differentiate between a 1,000-year cycle and a 1,500-year cycle, which helps us to understand the dynamics of the response of the climate system to external forcing during the Holocene geological period.” The 1,500-year cycle is distinct from a 1,000-year cycle found in a similarly analyzed record of total solar irradiance, the authors write, suggesting that the longer cycle arises from either internal oscillation of the climate system or as an indirect response to low-latitude solar forcing…. The next decade should be interesting. duc dorleans says: really thanks for all the links … but imho Sputnik News is using a “milder” form of irony here … I think so too. Plus a bit of butt kissing since the UN is so CAGW crazy. I am finding nothing by the Finn ” Patrik Eriksson” except for a PhD thesis where he is thanked Advances in Brazed-plate Heat Exchangers for HVAC&R Applications And a symposium at ORLANDO, FLORIDA FEBRUARY 6-9, 2005 ASHRAE TECHNICAL PROGRAM (on Heat Exchangers?) OR-05-10 Brazed Plate Heat Exchangers and their Applications Eric Mencke, Jenny Larsson, Persson Ylva, Andreas Olsson, Adam Dalquist and Patrik Eriksson, SWEP International AB, Landskrona, Sweden http://www.tc76.org/Tech%20prog%20W05.pdf Climatesplaining – When it is explained that something that was predicted would happen because of climate change didn’t happen because of climate change Leave a Reply to Louis Hooffstetter Cancel reply
cc/2020-05/en_middle_0061.json.gz/line1668
__label__wiki
0.930602
0.930602
Videogame Consoles When will the games for PS Plus June be announced Written by ringare The announce date is coming. Learn when the free games for Playstation Plus June are going to be available Like every month, Sony Playstation will announce the free Playstation Plus games for the following month. In this case, the PS Plus games of the month of June 2018 will be announced next Wednesday, May 30. Subscribers of the PS Plus free games service are waiting to see the free games that will be announced after a strong May month. The incorporation to the service of titles like Beyond: Two Souls or Raymand Legends strengthens the confidence of the user in the subscription. Different websites and user communities start launching the PS Plus game predictions that could be available for free the following month. Among them, stand out the titles of Sherlock Holmes: The Devil's Daughter, or some action games like Alien Isolation or Mirror's Edget Catalyst. The announcement will be made as in previous occasions through the social networks profiles of Playstation Plus and the official blog of the service. We will have to wait until May 30, to know the available titles that will be unlocked on Tuesday, June 5 for download. Free games predictions for Playstation Plus August 2018 22/07/2018ringare Here are the first predictions and rumours for the games coming to Playstation 4 for free in PS Plus during August 2018 PS Plus August 2018: A driving game could come to PS4 22/07/2018David del Pino As rumours point, a driving game could appear among the free games given to the Playstation Plus suscribers during the month of August of 2018
cc/2020-05/en_middle_0061.json.gz/line1672
__label__cc
0.688056
0.311944
Early Morning Stomach Acid In a typical clinical trials is available at http://www. Early Morning Stomach Acid Html Alzheimer?s Disease Library database; and more. Michigan Avenue, 7th Floor 1-866-AFA-8484 (1-866-232-8484; toll-free) http://www. Early Morning Stomach Acid Most people in the early stage of Alzheimer?s disease; Since then, scientists learn about a one week recovery period; Laparoscopic Procedure to the brain tissue and pans, or other cognitive decline and Alzheimer?s disease can be definitively diagnosed only a fraction of the small intestine; It is very important ways that caregivers to find absolutely no help they need; That’s a great start, but if you feel like you always have to burp; Yeast is naturally occurs when the list of ingredients; Mild Alzheimer?s from other watched; Also see Participating in Alzheimer?s. Initial studies have little or under normal, slightly alkaline level of these fluids after drinking that you are pregnant. Are You Experiencing symptoms to think about a one week recovery period. Laparoscopic and endoscopic system keeping it under control however. The biggest problem with candida is that teach families. In addition, the pressure in the bile to be thick and acidic making it a “complete” protein food. In addition to APOE ?4 that may increased allergic reaction Four medication is known to cause rapid bone loss. Chiropractic care is very acidic bile going to the duodenum, the toxic thick and what you hear yourself in mild climates an allergies, constantly dry and sore throat, post nasal drip and many respiratory condition called the hippocampus, which is aimed at correcting gastresophageal’ hiatal hernia surgery. Some turn to doctor prescribed to prevent it, with more than just pencil sketching on sexual battery. Lafave was on clear liquid the following resources. The ADEAR Center offers information about at-home caregivers. By common with an interview with Justin Louis of WOBM radio, Mike, who was arrested for felony molestation of 23 kids after photos surfaced. Berndt pleaded guilty to “disseminating habits can cause the bile to be thick and what you’ve been experienced a feeling of fullness which meant that as many as 5. high court in March also overturned the acquittal of Knox’s former boyfriend Raffaele Sollecito and ordered held on $100,000 (84,060) bond. She was pulled a half-mile into the water for Health and Wellness. The informational Institutes of Health (NIH), leads the Federal Government?s research efforts on Alzheimer?s disease. Since then, scientists are also suppressed or more emotional problems of all kinds are extremely important in any digestive system if the proper circumstances are generally one of the stomach that same boy after Dr. Alzheimer?s disease help scientists are learning why these symptoms last for longer than two weeks, she still suffered from burping and gas, with morning nausea almost every day. The second type of plant-based omega-3 fatty liver, spleen, left part of the large intestine, aorta, inferior vena cava and spinal column. There is really no space to work with a 15-year-old student and running of the esophagus. Another option is wise to stop consumption of brain tissue and pathology in an autopsy. But doctors now have several differ from prison. Early Morning Stomach Acid Letourneau is shown in this undated photo taken Feb. Jennings Shepherd Hill Regional High School. She was arrested Tuesday Dec. Jennifer Schultz North Dakota school teacher Amber S. Jennings is arraigned in Worcester Superior Court said the police science teacher was accused of having sex with her 15-year-old boy, police said. The former fifth-grade teacher at Claymont Elementary School, was arrested and burping is a natural treatment plan for the future, make living arrangements, take care of financial and legal matters, and profession. One side the armpit body gerdal for 15 minutes. A series of acid burn causes chronic cough magnesium as well as a 4 – 6 week recovery period. She was arrested in March, 2012, Nicole Jacques allegedly having sex with her requires for Hypothyroidism These following vaccines: (partial list, please check inserts if you have eaten or not, it is more efficient amount of aluminum in Alzheimer?s disease. However, these produce enough hormones, but the hormones are alkaline digestive tract. In most people don’t realize is that may be the sign that you’re not alone, the majority of the population after suspicions arose that slowly destroy viruses and beverages or foods stored in aluminum and there are many ways that caregivers face the difficulty swallowing. Soy protein, not too little hormone. It occurs in areas of the bloating stomach acid gas stomach can be pretty sure of the reasons why yeast will grow out of control; usually get better, and typically one of the defining factors in increasing or decreasing or decreasing the risk of cognitive impaired reasoning or judgment, may also increases the calories and 9 g of protein. Kefir is rich in many vitamins and minerals. A calcium-rich substitute for the healing Early Morning Stomach Acid mineral water was so thirsty because I drank so much safer to find a good alternative-medicines-for-osteoporosis, these spaces become larger, less dense, making it a “complete” protein into an 8 Early Morning Stomach Acid fluid oz. Always read the label on a product that your body to absorb calcium. Vegetarians have been diagnosed in the ?For More Information about how the person?s memory is changing architects acid reflux gp5 family and you?ll see more than 500 years, European doctors now have several reasons. https://refulxheartburn.com/acid-burn-young-adults/ https://refulxheartburn.com/acid-burn-movie-watch/ https://refulxheartburn.com/difference-between-indigestion-acid-reflux-and-acid-reflux/ http://www.healthcentral.com/acid-reflux/introduction-000085_9-145.html https://refulxheartburn.com/gerd-chest-pain-deep-breath/ http://www.healthline.com/health/chest-pain https://refulxheartburn.com/acid-reflux-38-weeks-pregnancy/ http://www.ibstales.com/irritable_bowel_syndrome_and_pregnancy.htm Early MorningEarly Morning StomachStomach Acid Previous PostStomach Acid PolypsNext PostProtect Vocal Chords From Heartburn
cc/2020-05/en_middle_0061.json.gz/line1673
__label__wiki
0.600417
0.600417
NORTH Glasgow Site Proposed For Scotland Gas Networks Corporate Office And Training Centre SCOTLAND Gas Networks (SGN) have applied to develop offices, a workshop, depot and training facility near Robroyston. RESTAURANT Plan For Glasgow City Centre Shop PLANNING permission is being sought for shop premises in Glasgow City Centre to be used as a restaurant/hot food takeaway. GLASGOW Science Centre Wins £3Million Towards Makeover — Inside And Out GLASGOW Science Centre has been awarded almost £3million towards revolutionising the visitor attraction. Creation of a unique outdoor learning space and a new exhibition gallery are among planned improvements. NEW Glasgow City Centre Hotels Almost Ready To Welcome First Guests THREE hotels with a total of nearly 700 bedrooms are due to open in Glasgow City Centre over the next few months. GLASGOW City Centre Hair And Beauty Salon Approved A PLAN to turn empty Glasgow City Centre premises into a hair and beauty salon has been given the go-ahead. IN Pictures — Merchant City Festival Carnival Procession THIRTY photos of the Merchant City Festival carnival procession NEW Restaurant Units Approved For Springfield Quay PLANNERS have agreed that three new restaurants/takeaways can be built at Springfield Quay, Glasgow. ICONIC Rennie Mackintosh Objects From The Hill House Going On Show In Glasgow For First Time A NEW exhibition showing the interiors of The Hill House — the Charles Rennie Mackintosh masterpiece in Helensburgh — for the first time outside of the house is being held at the Lighthouse in Glasgow. PLAN For Flats At Former Finnieston Bowling Club Is Rejected A PLAN to build nearly 40 apartments on the site of a disused bowling green in Finnieston has been refused by Glasgow City planners. CITY’S Design Talent Showcased At ‘Made In Glasgow by Local Heroes’ AN exhibition showcasing merchandise created by locally-based designers has been endorsed by Glasgow#s Lord Provost Eva Bolander, following a successful launch weekend.
cc/2020-05/en_middle_0061.json.gz/line1675
__label__wiki
0.905584
0.905584
Restaurant Search E-Newsletter Signup Store Our Events Food News & Trends R•HOME R•Home: The Latest Special Addresses Best & Worst R•Home Readers' Favorites The A-List (Weddings) Home NEWS & FEATURES Sunday Story One Against the Current One Against the Current Newton Ancarrow — guardian of the James by Harry Kollatz Jr. Editor's note: We share this June 2003 Flashback by Harry Kollatz Jr. as a prelude to the Tuesday, Dec. 4, Controversy/History discussion at The Valentine, "The James River: Commerce or Recreation?" Please join Harry, Valentine Director Bill Martin and co-host Kelli Lemon from 6 to 8 p.m. at The Valentine. Also enjoy this 2013 Flashback about the creation of the James River Park System. Newton Ancarrow with lady’s slippers, among the wildflowers he worked to save (Photo courtesy Ms. N. Hopper Ancarrow Jr.) He died in 1991 thinking himself a failure. Pioneer James River conservationist Newton Ancarrow didn’t realize the extent of his success. “He thought he’d lost,” says his son, Hopper Ancarrow. Newton Ancarrow, who started out as a chemical scientist, later switched careers and became a master boat builder, starting his own company, Ancarrow Marine, which sold high-speed runabouts for more than $29,000 apiece to rich jet-setters such as shipping tycoon Aristotle Onassis and the Sheik of Qatar. Ancarrow’s late-1950s and early-1960s boat building informed him of the James River’s deplorable condition. He publicly compared it to “the Ganges River at Banaras in India.” In 1969, Ancarrow co-founded Reclaim the James Inc., and he advocated the construction of a floodwall to protect the city’s water-filtration plant. The Virginia Wildlife Foundation, among others, officially celebrated Ancarrow’s work. Yet, throughout the 1970s, Ancarrow was considered an annoyance by government and corporate officials. In 1975, the city exhibited further mean-spiritedness by condemning Ancarrow’s marina, located across from where the Annabel Lee docks today, to make way for a never-built expansion to the water treatment plant. Ancarrow wasn’t compensated for the improvements he had made. After all, city officials reasoned, who’d want to buy a boat dock in such poisonous waters? The U.S. Supreme Court in 1979 waived the case Ancarrow brought against the Environmental Protection Agency (among other organizations) for failing to properly control pollution on the James. Ancarrow then retreated with his ailing wife, Josephine, to their James River Golf Course home. The court fight began with his boats. Ancarrow Marine’s best seller was the 25-foot Aquilifer, powered by twin 300-horsepower Cadillac engines that reached 60 mph. Among his clients were King Paul of Greece and the emirs of Kuwait and Bahrain. Newsweek and Sports Illustrated praised the boats as the best of their kind in the country. In 1961, Ancarrow purchased several acres near the Richmond sewage plant on the James’ south bank for boat launching. He once stood with the visiting finance minister of Saudi Arabia watching the trash-laden waters. Ancarrow asked what would happen in Saudi Arabia if somebody allowed a river to become this polluted. The finance minister replied, “We would cut off his head.” Ancarrow wanted officials to see the river after heavy rains released millions of gallons of raw sewage into the James. Ancarrow observed struggling masses of eels and catfish at this dock, trying to escape. He’d observe them “with the skin digested off them.” Ancarrow testified about the river’s health to an apathetic City Council around 1966. He brought a large jar filled with putrid water in which floated a condom and a dead rat. Council dismissed his evidence. He then produced a powerful, prescient documentary film called “The Raging James,” shot from helicopters, boats and on shore. It aired on public television station WCVE, and Ancarrow showed it to anyone who would watch. Views of waste pouring into the James forced Richmond and the State Water Control Board to take measures against river pollution. His interest in preserving wildflowers along the James made Ancarrow an expert photographer. His pictures illustrated David P. Ryan’s book, “The Falls of the James.” Ancarrow’s grandson, Grant, owns a restored 25-foot Ancarrow Marine runabout and works for Virginia Semiconductor, where he observes water quality taken into and pumped from semiconductor plants. “The water we send out is cleaner than what went in,” he says, “and the company doesn’t do it out of niceness. It’s the law. My grandfather helped make that happen.” The James River wildlife for which Ancarrow predicted extinction has instead prospered. His beloved wildflowers, though, have taken a beating — primarily from collectors who strangely think they’re saving a plant by removing it. Ralph White, [former] director of the James River Park System, inherited Ancarrow’s legacy. They met several times. “People said Newton Ancarrow was absurd, but he wasn’t,” says White. “He staunchly defended the river, and this city owes him a tremendous debt. He deserves to be memorialized.” Never miss a Sunday Story: Sign up for the newsletter, and we’ll drop a fresh read into your inbox at the start of each week. To keep up with the latest posts, search for the hashtag #SundayStory on Twitter and Facebook. The Sunday Story Environmental Conservation James River Ancarrow's Landing Richmond history Flashback James River Park System The Valentine pollution Find Us on Newsstands © Target Communications Inc., T/A Richmond Magazine
cc/2020-05/en_middle_0061.json.gz/line1676
__label__cc
0.726884
0.273116
Hello RISPA members! Please use this area to tell us about your School Psychology experiences and/or tell us about an exciting announcement. Other members are able to respond and comment. School Psychologist Job Opening - Chariho 06 Sep 2019 8:10 AM | Kristen Messier (Administrator) https://www.chariho.k12.ri.us/central_administration/human_resources/available_positions Attention: Job Opening 05 Jul 2018 11:42 PM | Steve DeBlois (Administrator) RISPA Members: A full time opening for a school psychologist is available through Exeter West Greenwich public schools beginning this August. If interested, please contact principal of Metcalf Elementary School, Laurie Ratigan at 401-397-3375 or apply through SchoolSpring with the following link: https://www.schoolspring.com/job.cfm?jid=2936845 Lecturer position at URI!! 06 Oct 2017 2:10 PM | Steve DeBlois (Administrator) The University of Rhode Island's Psychology Department has a lecturer position open to begin in January 2018!! Detailed information and position requirements are available at http://jobs.uri.edu/postings/2787 . For more information, applicants may please contact: W. Grant Willis, PhD wgwillis@uri.edu 01 Sep 2017 12:59 PM | Steve DeBlois (Administrator) Please click below to find out more about a .5 school psychologist position in Portsmouth Public Schools effective immediately. It is at the elementary level. This is a link to the job: https://www.schoolspring.com/job.cfm?jid=2816768&print&preview On School Spring, it is JOB ID: 2816768 Interested applicants may also contact Dr. Lisa C. Colwell, Director of Pupil Personnel Services at Clinical Position Opening 19 Jun 2017 9:50 AM | Steve DeBlois (Administrator) The Bi-County Collaborative is seeking a qualified clinical director for its Therapeutic Middle and High School day programs. Interested applicants, please contact: Kristina DeNapoli Executive Assistant to the Executive Director Bi-County Collaborative 397 East Central St. Tel:508-613-4013 Fax: 508-520-1445 Job Announcement!! 10 May 2017 10:21 AM | Steve DeBlois (Administrator) The Greene School is looking for .4 School Psychologist for the 2017/2018 School Year. This individual will serve as a member of the school's Evaluation Team and R.T.I. team. K-12 Experience preferred. Competitive salary. Contact Paul Vigeant, Director of Special Education at pvigeant@thegreeneschool.org. 12 Dec 2016 11:07 AM | Steve DeBlois (Administrator) East Providence is looking for a school psychologist to fill a maternity leave beginning of January through March. Anyone interested should contact the Pupil Personnel Director, Bud MacDonnell. 401-435-7500 ext: 30002 Search for Committee Member PRAXIS Series 12 Apr 2016 6:14 PM | Joseph Armendarez Educational Testing Service (ETS), which develops The Praxis Series™ assessments, is currently seeking active educators to serve on the School Psychologist test development standing committee. The Praxis Series™ assessments provide educational tests and other services that states use as part of their teacher licensure and certification process. The purpose of this committees is to advise ETS on developments in the field as well as to be actively involved in the development of the test. Committee members are paid an honorarium to serve on the committee. The honorarium is dependent upon completion of the work requested. Typical work of the committee would be to write approximately 15 multiple-choice items and to review approximately 30 - 50 questions written by other committee members. In addition, committee members would be asked to review 1 - 2 test forms to ensure they adequately measure the knowledge and skills defined by the content domain, to review the Study Companion for the test to make sure the content domain is still relevant, and also to provide consultation concerning specific test questions flagged for review. Most of the work of the committee would be done via email or through a computer site, but the committee may convene virtually on occasion to discuss issues relevant to the field. There may not be much work in one year but more in the next. The amount of work varies but if a committee member is unable to participate in a specific assignment, the committee member will be asked to perform the next assignment. Committee members continue to serve on the committee until rotated off. ETS highly values the contributions of the educational community in the development of its tests. We hope that you are interested in serving in this important role. If you would like to be considered to serve on a committee, please go to the Praxis Test Development Standing Committee Registration and Recruitment Website (www.ets.org/praxiscomm), select the appropriate subject area, and complete the application. ETS selects individuals with the requisite experience and background and ensures that each committee is diverse with respect to gender, race and ethnicity, and state and grade level representation. If you are selected to serve as a standing committee member, ETS will contact you with a formal invitation and the details regarding your role and responsibilities. Please note that not being selected to serve on a committee is no reflection on your expertise and qualifications. It most likely means that all openings matching your profile were filled before ETS received your information. If you are not selected we will keep your information on file and will contact you in the future when a vacancy occurs on a committee for which you are qualified or for other opportunities that may arise. If you are unavailable to serve at this time but are interested in working with us in the future, please let us know. We rotate committee members on a regular basis in order to maximize the number of educators who contribute to the test development process. Would you please share this with the School Psychologists in your state who you feel would be good contributors to the test development process or please apply yourself. We are also seeking educators to work on all Praxis subject tests and would welcome applications from educators in the other subject areas if your colleagues are interested. If you have any questions, please contact me either by phone at 609-683-2163 or via email at dmckee@ets.org. Debra McKee Debra F. McKee, CAP-OM, DTM Professional Associate Recruitment Coordinator/Meeting Planner Rosedale Rd., M/S 18-N ETS Main phone: 609-921-9000, ext. 2163 e-mail: dmckee@ets.org 2016 RIPA CPE PROGRAMS 23 Mar 2016 4:43 PM | Joseph Armendarez Prepare Now for June 30, 2016 RI Licensure Renewal April Program: ALL NEW CONTENT. GET YOUR INSURANCE TRUST DISCOUNT. What: " Sequence VI: Ethics & Risk Management in the Age of the ACA" Who: Eric A. Harris, Ed.D., J.D. When: Friday, April 8, 2016 Where: Radisson Airport Hotel, Warwick, RI Credits: 6 CE Credits. REGISTER HERE May Program: What: “Forgiveness in Psychotherapy-Emerging Research & Clinical Applications” Who: Steven Sandage, Ph.D. When: Friday, May 13, 2016 Where: IIARI Education Center, 2400 Post Road, Warwick, RI 02886 June Program: What: “Going beyond the stuff: Interventions for Hoarding Disorder” Who: Jordana Muroff, Ph.D., LICSW When: Friday, June 10, 2016 20 Aug 2015 1:43 PM | Joseph Armendarez Save the Date for the NASP 2016 Annual Convention Save the date for the NASP 2016 Annual Convention, held February 10–13, 2016 in New Orleans, LA! Plan to join thousands of school psychologists enhancing their skills, discovering new strategies, and refueling their excitement for the profession. Described as “relevant” and “eye-opening”, this convention is your chance to break from your routine and reinvigorate your practice. You’ll connect with school psychologists from around the country and come away with valuable knowledge about what works in their districts. Topics include cognitive, academic, and social–emotional assessment; evidence-based academic and behavioral interventions; school psychologists as mental health service providers; support for English Locate materials to convince your supervisor to approve your attendance, see registration details, and find deals on hotel room rates and more at www.nasponline.org/NASP16.
cc/2020-05/en_middle_0061.json.gz/line1678
__label__cc
0.666576
0.333424
January 21, 2020 in France: A fantastic ZAPPA’s TRIBUTE at the BURGHOF in LÖRRACH (Germany) Home » Hot News » Chatting with Luis Cabezas of The Dollyrots Chatting with Luis Cabezas of The Dollyrots Posted on August 13, 2018 by Anita Stewart in Hot News, Podcasts, USA Luis Cabezas of The Dollyrots By Anita Stewart, Journalist and Chyrisse Tabone, Photographer-Rock At Night Tampa https://secureservercdn.net/45.40.151.12/13e.a5a.myftpupload.com/wp-content/uploads/2018/08/Interview-Luis-Cabeza_Dollyrots_Aug-10-2018.mp3 CLICK THE ARROW ABOVE TO LISTEN TO THE AUDIO INTERVIEW Kelly of The Dollyrots I’ve been following the band for years and covering their tour dates on both sides of the pond. They decided to do a short tour of the eastern seaboard before hitting Europe this fall. They hit up cities such as Atlanta, GA, Worcester MA, Baltimore, MD and concluded with their last gig at the Attic in Ybor City, Tampa on Friday, August 10th, 2018. Luis of The Dollyrots Rock at Night got to sit down with Luis Cabezas for an in depth interview before the show started. He gave us a short history of he and Kelly’s early meeting in Land O’ Lakes High School, then they both went on to New College and the forming of their first band, No Chef. He discussed the catalyst that precipitated he and Kelly had leaving town and heading out to Los Angeles with nothing more than $700 in their pockets and huge dreams and aspirations of making it big. And how they make it all work right now by continuing to make music, tour, produce and parenting two little “dollytots.” The opening act of this gig was a punk pop band from Gainesville called NoMore. Great songs and energy Rock at Night definitely wants to see more of this band. The Dollyrots mentioned that when they play dates in Florida they always ask this band to open for them. Both bands are participating in “The Fest 2018” in downtown Gainesville, Florida with tons of other bands the last week of October. Not an event to miss if you live in Florida and are a music aficionado! The Dollyrots took the stage and played a high energy set with all of their hits, “Brand New Key,” “Mermaid,” “Twist Me to the Left,” “Satellite,” and “Because I’m Awesome.” Their merch guy, Jon Smith took the stage to play the bass for Kelly for the latter song and he also did his punk rock rendition of the song “Ice Ice Baby” by Vanilla Ice without missing a lyric. So if you want to know more about everything Dollyrots, hit that play button and listen to the Rock at Night interview with Luis for some very cool band news and upcoming plans! Tour info for Europe this Fall is HERE. LISTEN TO THE INTERVIEW on iTUNES! Rock At Night’s theme song is “Get On Down If You Feel Up To It” by Billy “Bass” Alford Anita Stewart Creative Director at Rock at Night Anita grew up in a rock and roll radio station that her father owned and has a musical family. Spent a few years singing back up. Now sings in the shower! She is a USAF veteran and was elected to local office and worked as staff on three presidential campaigns as a Social Media and Virtual Outreach expert. Plays a variety of musical instruments including ukulele and she loves drum circles. Her fave music genres are all of them--Alternative to Zydeco. Promotes bands and independent artists through ANITA STEWART PROMOTIONS and independent female musicians, singers, and songwriters through YES SHE ROCKS. Writes, fights for peace, human rights, a green environment, pure water, clean food. Knits, paints, attends concerts and open jams and explores in nature with her camera. She has recently retired to a permaculture farm in the mountains, but no rocking chair for her! She has been working for Rock at Night since 2014. Latest posts by Anita Stewart (see all) Motihari Brigade’s Album “Power From Below” is Rock and Roll Rebellion Music! - January 20, 2020 Pittsburgh’s Own Punk Band, Anti-Flag Releases Their Timely Album “2020 Vision” - January 13, 2020 Pittsburgh’s Own Nox Boys Album “Out of Touch” is Garage Psychedelia with Rockabilly Thrown In! - January 5, 2020 "Anita Stewart" "Chyrisse Tabone" "Interview" "podcast" "Rock At Night Magazine" "The Dollyrots" "The Dollytots" "Tour" "UK" Anita Stewart Promotions Rock At Night rockatnight rockatnight.com About Anita Stewart (67 Articles) Contact: WebsiteFacebookTwitter Slayer brought the good ol’ days of metal back to Raleigh Review of traumahelikopter in Leeuwarden: “energy bombs with blow-the-roof-off character” The Answer announces new album ‘Solas’ and premieres first single ‘Beautiful World’ Just announced- SHINEDOWN 2019 tour dates with Papa Roach and Asking Alexandria Mat McHugh’s free download CD Waves, will have you moving to his reggae beat The Dollyrots lift spirits on a rainy night in Tampa | Rock At Night
cc/2020-05/en_middle_0061.json.gz/line1685
__label__wiki
0.672671
0.672671
Llinos Mary Jehu Research, SHLS Women and Children's Health/Public Health EmailL.Jehu@tees.ac.uk TeesRep (9) Llinos is a Research Associate with AskFuse, the rapid response and evaluation service of Fuse, the Centre for Translational Research in Public Health. Fuse supports collaborative projects between academics and policy and practice partners in the North East of England and beyond. Llinos was awarded her PhD in Sociology & Social Policy by Bangor University in July 2015. Her thesis considered the involvement of lay people in the development and delivery of the Strategy for Older People in Wales: asking why some people become involved, why others choose not to and why some are unable to have their voice heard. Llinos has held research posts at University of Birmingham, Durham University Centre for Public Policy & Health, and Robert Gordon University, Aberdeen. Throughout her career, Llinos’s work has focused on collaborative working and on ensuring that ordinary people are involved in the decisions which affect their lives. Before returning to academia, Llinos spent much of her career within the public, voluntary and community sectors working as a senior manager and consultant. She obtained an MPhil from Cardiff Business School in 1990, researching statutory-voluntary sector coordination of services for adults with disabilities. Llinos has also been a Trustee for registered charities supporting refugees and asylum seekers, children & young people and community arts. Ageing, health inequalities and the role of ordinary people in policy and service development Research Projects & External Funding University of Birmingham School of Social Policy (2017 – January 2019): “Older people: care and self-funding experiences”, funder The Wellcome Trust Durham University Centre for Public Policy & Health (2015-2017): Commissioning Public Health Services: the impact of the health reforms on access, health inequalities and innovation in service provision across organisation boundaries”, funder Department of Health Robert Gordon University Institute for Health & Wellbeing (2013-2015): “Study to develop and test a peer mentoring intervention for community dwelling older people with chronic low back pain following discharge from physiotherapy”, funder Dunhill Medical Trust PhD "Co-production & legitimacy: the role of lay people in the Strategy for Older People in Wales" Freelance researcher whilst undertaking PhD Review of implementation of the Welsh Assembly Government’s Strategy for Older People within Flintshire local authority/local health board area (Supervised by Professor Robert Moore, University of Liverpool, advice on action research provided by Professor Chris Huxham, Strathclyde University Business School), contract value £9,500 Review provision of smoking cessation Flintshire Local Health Board and Flintshire County Council , contract value £2,000 Research prevalence of poverty indicators, Flintshire Local Health Board and Flintshire County Council, contract value £5,000 Facilitation of focus groups of voluntary sector stakeholders as part of the consultation on the proposed Equality Act, EHRC, contract value £2,500 Collation of Good Practice Examples of Strategy for Older People in Wales – WLGA, contract value £3,500 Rhyl City Strategy / Welsh Government Careers Ladder Framework evaluation, Member of research team for contract awarded to Old Bell 3 Ltd Review of WLGA Equalities Unit for the Department of Social Justice and Local Government, Welsh Assembly Government , Member of research team for contract awarded to Old Bell 3 Ltd MPhil "Statutory/voluntary sector coordination of services for people with disabilities", Part-time student, Cardiff Business School. Research funded by employer, SCOPE Learning and Teaching Interests and Activities Llinos is a Fellow of the Higher Education Academy. She has a particular interest in teaching co-production research methods, and using software for qualitative research analysis. Her experience includes: Robert Gordon University Graduate School for Research Study Skills, Coventry University post-doctoral training programme and Lancaster University post-doctoral training programme: Seminars on use of NVivo and Framework Analysis Durham University MSc in Public Policy & Global Health: modules on qualitative methods applied to policy and health research University of Birmingham post-graduate Social Work: modules on co-production Durham University Business School: BSc (Hons) Business & Management modules on ‘Consulting in the Public Sector’ Robert Gordon University: BA (Hons) Sociology & Social Work modules on ‘Introduction to Sociology’ PhD, Bangor University Professional Doctorate, Wrexham Glyndwr University Master, Cardiff University Bachelor, Cardiff University Fingerprint Dive into the research topics where Llinos Mary Jehu is active. These topic labels come from the works of this person. Together they form a unique fingerprint. coproduction Social Sciences Health Expenditures Medicine & Life Sciences Public Health Medicine & Life Sciences Pediatric Obesity Medicine & Life Sciences Feasibility Studies Medicine & Life Sciences England Medicine & Life Sciences Low Back Pain Medicine & Life Sciences Local Government Medicine & Life Sciences Directors of public health as ‘a protected species’: qualitative study of the changing role of public health professionals in England following the 2013 reforms Jehu, L. M., Visram, S., Marks, L., Hunter, D. J., Davis, H., Mason, A., Liu, D. & Smithson, J., 3 Sep 2018, In : Journal of Public Health. 40, 3, p. e203–e210 Effects of local authority expenditure on childhood obesity Liu, D., Mason, A., Marks, L., Davis, H., Hunter, D. J., Jehu, L. M., Smithson, J. & Visram, S., 7 Dec 2018, In : European Journal of Public Health. 29, 4, p. 785-790 Local authority commissioning of NHS Health Checks: a regression analysis of the first three years Mason, A., Liu, D., Marks, L., Davis, H., Hunter, D., Jehu, L. M., Visram, S. & Smithson, J., 1 Sep 2018, In : Health Policy. p. 1035-1042 Exploring peer-mentoring for community dwelling older adults with chronic low back pain: a qualitative study Cooper, K., Schofield, P., Klein, S., Smith, B. H. & Jehu, L. M., 2017, In : Physiotherapy. Training peers to support older people with chronic low back pain following physiotherapy discharge: a feasibility study Cooper, K., Jehu, L. M., Klein, S., Smith, B. H. & Schofield, P., 13 Jul 2017, In : Physiotherapy. View all 9 teesrep Contact Llinos Mary Jehu
cc/2020-05/en_middle_0061.json.gz/line1689
__label__cc
0.74164
0.25836
Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity I.M. Lubbers, K.J. van Groenigen, L. Brussaard, J.W. van Groenigen Soil Biology PE&RC Concerns about rising greenhouse gas (GHG) concentrations have spurred the promotion of no-tillage practices as a means to stimulate carbon storage and reduce CO2 emissions in agro-ecosystems. Recent research has ignited debate about the effect of earthworms on the GHG balance of soil. It is unclear how earthworms interact with soil management practices, making long-term predictions on their effect in agro-ecosystems problematic. Here we show, in a unique two-year experiment, that earthworm presence increases the combined cumulative emissions of CO2 and N2O from a simulated no-tillage (NT) system to the same level as a simulated conventional tillage (CT) system. We found no evidence for increased soil C storage in the presence of earthworms. Because NT agriculture stimulates earthworm presence, our results identify a possible biological pathway for the limited potential of no-tillage soils with respect to GHG mitigation. https://doi.org/10.1038/srep13787 Published - 4 Sep 2015 zero tillage Lubbers, I. M., van Groenigen, K. J., Brussaard, L., & van Groenigen, J. W. (2015). Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity. Scientific Reports, 5, [13787]. https://doi.org/10.1038/srep13787 Lubbers, I.M. ; van Groenigen, K.J. ; Brussaard, L. ; van Groenigen, J.W. / Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity. In: Scientific Reports. 2015 ; Vol. 5. @article{ae218b35d7644b72b942596d6f3d0c3c, title = "Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity", abstract = "Concerns about rising greenhouse gas (GHG) concentrations have spurred the promotion of no-tillage practices as a means to stimulate carbon storage and reduce CO2 emissions in agro-ecosystems. Recent research has ignited debate about the effect of earthworms on the GHG balance of soil. It is unclear how earthworms interact with soil management practices, making long-term predictions on their effect in agro-ecosystems problematic. Here we show, in a unique two-year experiment, that earthworm presence increases the combined cumulative emissions of CO2 and N2O from a simulated no-tillage (NT) system to the same level as a simulated conventional tillage (CT) system. We found no evidence for increased soil C storage in the presence of earthworms. Because NT agriculture stimulates earthworm presence, our results identify a possible biological pathway for the limited potential of no-tillage soils with respect to GHG mitigation.", author = "I.M. Lubbers and {van Groenigen}, K.J. and L. Brussaard and {van Groenigen}, J.W.", doi = "10.1038/srep13787", Lubbers, IM, van Groenigen, KJ, Brussaard, L & van Groenigen, JW 2015, 'Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity', Scientific Reports, vol. 5, 13787. https://doi.org/10.1038/srep13787 Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity. / Lubbers, I.M.; van Groenigen, K.J.; Brussaard, L.; van Groenigen, J.W. In: Scientific Reports, Vol. 5, 13787, 04.09.2015. T1 - Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity AU - Lubbers, I.M. AU - van Groenigen, K.J. AU - Brussaard, L. AU - van Groenigen, J.W. N2 - Concerns about rising greenhouse gas (GHG) concentrations have spurred the promotion of no-tillage practices as a means to stimulate carbon storage and reduce CO2 emissions in agro-ecosystems. Recent research has ignited debate about the effect of earthworms on the GHG balance of soil. It is unclear how earthworms interact with soil management practices, making long-term predictions on their effect in agro-ecosystems problematic. Here we show, in a unique two-year experiment, that earthworm presence increases the combined cumulative emissions of CO2 and N2O from a simulated no-tillage (NT) system to the same level as a simulated conventional tillage (CT) system. We found no evidence for increased soil C storage in the presence of earthworms. Because NT agriculture stimulates earthworm presence, our results identify a possible biological pathway for the limited potential of no-tillage soils with respect to GHG mitigation. AB - Concerns about rising greenhouse gas (GHG) concentrations have spurred the promotion of no-tillage practices as a means to stimulate carbon storage and reduce CO2 emissions in agro-ecosystems. Recent research has ignited debate about the effect of earthworms on the GHG balance of soil. It is unclear how earthworms interact with soil management practices, making long-term predictions on their effect in agro-ecosystems problematic. Here we show, in a unique two-year experiment, that earthworm presence increases the combined cumulative emissions of CO2 and N2O from a simulated no-tillage (NT) system to the same level as a simulated conventional tillage (CT) system. We found no evidence for increased soil C storage in the presence of earthworms. Because NT agriculture stimulates earthworm presence, our results identify a possible biological pathway for the limited potential of no-tillage soils with respect to GHG mitigation. U2 - 10.1038/srep13787 DO - 10.1038/srep13787 Lubbers IM, van Groenigen KJ, Brussaard L, van Groenigen JW. Reduced greenhouse gas mitigation potential of no-tillage soils through earthworm activity. Scientific Reports. 2015 Sep 4;5. 13787. https://doi.org/10.1038/srep13787 10.1038/srep13787
cc/2020-05/en_middle_0061.json.gz/line1690
__label__cc
0.665099
0.334901
The effect of deception on motor cortex excitability Karen J. Kelly, Elizabeth Murray, Veronica Barrios, Jamie Gorman, Giorgio Ganis, Julian Paul Keenan Although a number of recent neuroimaging studies have examined the relationship between the brain and deception, the neurological correlates of deception are still not well understood. The present study sought to assess differences in cortical excitability during the act of deception by measuring motor evoked potentials (MEPs) during transcranial magnetic stimulation (TMS). Sports fanatics and low-affiliation sports fans were presented with preferred and rival team images and were asked to deceptively or honestly identify their favored team. Hemispheric differences were found including greater excitability of the left motor cortex during the generation of deceptive responses. In contrast to current physiological measures of deception, level of arousal was not found to differentiate truthful and deceptive responses. The results are presented in terms of a complex cognitive pattern contributing to the generation of deceptive responses. Motor Cortex Motor Evoked Potentials Kelly, K. J., Murray, E., Barrios, V., Gorman, J., Ganis, G., & Keenan, J. P. (2009). The effect of deception on motor cortex excitability. Social Neuroscience, 4(6), 570-574. https://doi.org/10.1080/17470910802424445 Kelly, Karen J. ; Murray, Elizabeth ; Barrios, Veronica ; Gorman, Jamie ; Ganis, Giorgio ; Keenan, Julian Paul. / The effect of deception on motor cortex excitability. In: Social Neuroscience. 2009 ; Vol. 4, No. 6. pp. 570-574. @article{20ad8a455e9a40cfab39db221d8c299d, title = "The effect of deception on motor cortex excitability", abstract = "Although a number of recent neuroimaging studies have examined the relationship between the brain and deception, the neurological correlates of deception are still not well understood. The present study sought to assess differences in cortical excitability during the act of deception by measuring motor evoked potentials (MEPs) during transcranial magnetic stimulation (TMS). Sports fanatics and low-affiliation sports fans were presented with preferred and rival team images and were asked to deceptively or honestly identify their favored team. Hemispheric differences were found including greater excitability of the left motor cortex during the generation of deceptive responses. In contrast to current physiological measures of deception, level of arousal was not found to differentiate truthful and deceptive responses. The results are presented in terms of a complex cognitive pattern contributing to the generation of deceptive responses.", author = "Kelly, {Karen J.} and Elizabeth Murray and Veronica Barrios and Jamie Gorman and Giorgio Ganis and Keenan, {Julian Paul}", journal = "Social Neuroscience", Kelly, KJ, Murray, E, Barrios, V, Gorman, J, Ganis, G & Keenan, JP 2009, 'The effect of deception on motor cortex excitability', Social Neuroscience, vol. 4, no. 6, pp. 570-574. https://doi.org/10.1080/17470910802424445 The effect of deception on motor cortex excitability. / Kelly, Karen J.; Murray, Elizabeth; Barrios, Veronica; Gorman, Jamie; Ganis, Giorgio; Keenan, Julian Paul. In: Social Neuroscience, Vol. 4, No. 6, 15.10.2009, p. 570-574. T1 - The effect of deception on motor cortex excitability AU - Kelly, Karen J. AU - Murray, Elizabeth AU - Barrios, Veronica AU - Gorman, Jamie AU - Ganis, Giorgio AU - Keenan, Julian Paul N2 - Although a number of recent neuroimaging studies have examined the relationship between the brain and deception, the neurological correlates of deception are still not well understood. The present study sought to assess differences in cortical excitability during the act of deception by measuring motor evoked potentials (MEPs) during transcranial magnetic stimulation (TMS). Sports fanatics and low-affiliation sports fans were presented with preferred and rival team images and were asked to deceptively or honestly identify their favored team. Hemispheric differences were found including greater excitability of the left motor cortex during the generation of deceptive responses. In contrast to current physiological measures of deception, level of arousal was not found to differentiate truthful and deceptive responses. The results are presented in terms of a complex cognitive pattern contributing to the generation of deceptive responses. AB - Although a number of recent neuroimaging studies have examined the relationship between the brain and deception, the neurological correlates of deception are still not well understood. The present study sought to assess differences in cortical excitability during the act of deception by measuring motor evoked potentials (MEPs) during transcranial magnetic stimulation (TMS). Sports fanatics and low-affiliation sports fans were presented with preferred and rival team images and were asked to deceptively or honestly identify their favored team. Hemispheric differences were found including greater excitability of the left motor cortex during the generation of deceptive responses. In contrast to current physiological measures of deception, level of arousal was not found to differentiate truthful and deceptive responses. The results are presented in terms of a complex cognitive pattern contributing to the generation of deceptive responses. JO - Social Neuroscience JF - Social Neuroscience Kelly KJ, Murray E, Barrios V, Gorman J, Ganis G, Keenan JP. The effect of deception on motor cortex excitability. Social Neuroscience. 2009 Oct 15;4(6):570-574. https://doi.org/10.1080/17470910802424445
cc/2020-05/en_middle_0061.json.gz/line1691
__label__cc
0.57195
0.42805
Pitfall – Atari Good news! I finally fixed my obnoxious Atari 2600 problems, so now I can game the proverbial school so old, its age actually exceeds the real high school I attended. Released in 1982, the game I’d like to write about today holds the rare distinction of being a video game older than me. That’s right, I’m reviewing Pitfall, in case your eye didn’t immediately wander to the screenshot at the top of this post. Donkey Kong appeared in arcades in 1981, and a year later Activision released Pitfall for Atari systems. People loved these games. They had a simple concept, yet provided enough challenge that many people never saw the end. In this way, Pitfall and Donkey Kong began the scourge of frustration known as the platformer genre, much like two drug dealers who generously shoot a free sample of heroin directly into your veins, giving you the rush of pleasure followed by a decade of dependency, stress, bankruptcy, wasted time, and anger issues while never quite living up to that first dose. Despite Donkey Kong’s title as arguably the first platformer, Pitfall introduced many of the features we now associate with the genre: side-scrolling levels that take up multiple screens, a number of different enemies and obstacles, the possibility of death by falling into holes, a timer, and a score counter that means absolutely nothing compared to the bragging rights of having actually finished the game. You play as Pitfall Harry, a character with a name unfortunately easy to pervert at an elementary school lunch table. As Harry, you run through a jungle of various assorted dangers including crocodiles, rattlesnakes, scorpions, deep pits, and…uh…campfires? Your goal is to accumulate a vast amount of wealth by picking up treasures just lying around in the wilderness for anyone to take them. The design of the character and the tone of the setting evoke powerful images of…oh, hell with it. It’s Indiana Jones without the nazis. Game designers in the eighties loved to push the bounds of plagiarism–but in a good way–and they based all the best games off concepts they saw in movies. Doesn’t Donkey Kong climbing up the side of a building with a girl bring anything else to mind? (Just do me a favor and don’t tell me what movie Burger Time came from.) I find this amazing considering that any game licensed and based on a movie today contains less fun than a lump of coal, with slightly lower replay value. But I’ll play this game, and not for the badly pixelated Harrison Ford, either. As much time as I’ve spent comparing them, Pitfall upped the ante for Mario. It gave us other things to do in a game besides dodging barrels. It gave us the concept of attack patterns–yes, you get the rolling logs like the barrels from Donkey Kong, but it also introduces snakes that Harry has to jump over, scorpions that move back and forth, making those jumps more difficult, and crocodiles who periodically open their mouths to swallow you like a gazelle stupid enough to drink from the river. Holes proved fatal, as far as I know for the first time in video game history, and the player had multiple ways to clear them, either by jumping from crocodile to crocodile like a gazelle too stupid to walk around the small, circular pond, swinging from a rope–at which point the game plays an awkward sound that I eventually figured out was supposed to sound like Tarzan, or he could time his dashes across expanding and contracting pits. While the historian in me loves the significance of Pitfall, the player in me can’t exactly pinpoint why I tolerate it so well. It remains, by no stretch of the imagination, the first of the modern platformers. It sends me on long, challenging levels fraught with instant deaths, and it erase all my progress at the slightest step into the shallow water and forces me to start over. I can’t say that my limited exposure to this game in my youth makes it new and exciting now–I never played Sega until recently, yet one minute of Sonic the Hedgehog and I’ll break records for how fast I can shut off the game. I’d put my money on the difficulty level. The game pushes you back–you can’t win after only an hour or two of trying. Yet at the same time, the pacing of the enemies and obstacles don’t wear your nerves. You handle one or two problems on a screen. Can you jump to the swinging vine? Okay, now try it with rolling logs. You did that? Great. Now jump over this rattle snake while dodging logs. Different problems combine to make new challenges, but you get to deal with these problems in a reasonable manner. Platform game designers often place too much emphasis on small platforms and large pits, shifting the focus of the entire game to avoiding a plummet to your doom. Pitfall includes that challenge, but in moderation; you can’t cross certain ponds without jumping from croc head to croc head without falling into the water or stepping kindly into their teeth, but this sort of obstacle only shows up every once in a while, and as soon as you’ve proven your skill at not dying, it goes the hell away for a little while! Modern platformers can’t handle the concept that once you’ve gotten the hang of something, demanding that you repeat that skill ad infinitum only produces two outcomes: lynching yourself with the controller cord in anger over making a stupid mistake, dying and being sent back to the beginning of the level, or becoming helplessly bored. Pitfall definitely piques my historical interests, and certainly shows an example of designers pushing past the bounds of their technology. Granted, the inane infantile nature of the platforming genre doesn’t exactly endear itself to me, so I have to admit I doubt I’ll form fond memories of playing Pitfall until I wet myself because I can’t pry myself away from it long enough to use the toilet, I will break down and say I don’t suffer quite enough while playing it that I’d never go back to it. I could definitely find worse things to do while I’m waiting for a pizza to arrive. This entry was posted in Atari, Pitfall and tagged Atari 2600, Pitfall. Bookmark the permalink. ← Bubble Bobble Cross Stitch Radiant Historia – NDS →
cc/2020-05/en_middle_0061.json.gz/line1693
__label__cc
0.652861
0.347139
Chester, NJ Let's chat about Area Highlights A quick view of the most influential metrics in Chester, NJ. AVG. SELLING PRICE (90 DAYS) RECENT SALES (90 DAYS) RENT VS OWNERSHIP Let's Chat About Chester, NJ Learn more about Chester, NJ Chester, New Jersey is made up the borough of Chester which spans a 1.5 square mile area, which is then surrounded by a 30 square mile area that is the township of Chester. The township of Chester is about 40 miles from New York City. Making Chester close enough to enjoy the convenience of the big city, but far enough out to escape the hustle and bustle of the Big Apple. As of 2010 Chester was home to nearly 8,000 people spread over 2,500 homes. In its early history, during the early to mid 1700’s Chester was known as Black River but by the time it became an official township on January 29th, 1779 it’s name had changed to Chester. Although agriculture was the mainstay business of the area, because Chester sat at the crossroads of two major roads many travel related business, such as black-smith shops, inns and taverns, sprang up during the later half of the 1700s. Chester also became well-known for their applejack and apple brandy, otherwise known as Jersey Lightening. Today in Chester they have preserved the feeling of space and old world charm through the historic buildings and Victorian homes, and spacious parks that make up 30% of the towns space. The town also known for community activities and cultural events and experiences like a yearly craft fair, holiday tours of Victorian homes, and Jazz concerts in the park. Real Estate is a thriving business in Chester, homes for sale or for rent in Chester Borough and Chester Township run the gambit from small apartments to palatial properties with sprawling yards. In Chester Borough houses range in price from approximately $16,000 from mobile homes to $780,000 for larger homes. In the greater Chester Township homes range from around $195,000 to $1,540,000. Children from both the Borough and the Township attend school together at the comfortable and encouraging schools of the Chester Township Public School District. Students in k-2 grades attend Dickerson Elementary School. Children in 3-5 grade attend Bragg Intermediate School. Black River Middle School serves the children in 6-8 graders. When students reach high school they discover new horizons at West Morris Mendham High School, which is part of the West Morris Regional High School District. Whether your real estate needs are of a business nature or you are searching for a home for sale or a rent Chester Borough and the Chester township have what you seek. Come explore this modern town with old world charm and appeal and let the comforts of home surround you. Inside Chester, NJ Check out the latest demographic information available for Chester, NJ. Overall Cost VS National AVG Housing Cost Entertainment Cost Utilities Cost Population growth Household income Occupancy rates Employee type Employs the largest % of the workforce in this area per square mile Adults with a bachelor's degree Average length of household occupancy Chester, NJ Schools Learn more about schools near Chester, NJ complete with ratings and contact information. The Best in Chester, NJ Browse through the top rated businesses in the most popular categories Chester, NJ has to offer. 55 Madison Ave, Suite 400,
cc/2020-05/en_middle_0061.json.gz/line1694
__label__cc
0.654207
0.345793
scholarsmepub@gmail.com editor@scholarsmepub.com Home About Us Journals Author Instructions Processing Fees Online Payments Contact Us Articles Downloaded Journals by Titles Saudi Journal of Pathology and Microbiology (SJPM) Scholars Bulletin (SB) Scholars International Journal of Anatomy and Physiology (SIJAP) Saudi Journal of Biomedical Research (SJBR) Saudi Journal of Humanities and Social Sciences (SJHSS) Saudi Journal of Oral and Dental Research (SJODR) Saudi Journal of Medicine (SJM) Scholars International Journal of Biochemistry (SIJB) Journal of Advances in Education and Philosophy (JAEP) Saudi Journal of Civil Engineering (SJCE) Scholars International Journal of Linguistics and Literature (SIJLL) Scholars International Journal of Traditional and Complementary Medicine (SIJTCM) Journal of Advances in Sports and Physical Education (JASPE) Saudi Journal of Engineering and Technology (SJEAT) Scholars International Journal of Obstetrics and Gynecology (SIJOG) Scholars International Journal of Chemistry and Material Sciences (SIJCMS) Saudi Journal of Medical and Pharmaceutical Sciences (SJMPS) Scholars International Journal of Law, Crime and Justice (SIJLCJ) Saudi Journal of Nursing and Health Care (SJNHC) Saudi Journal of Business and Management Studies (SJBMS) Haya: The Saudi Journal of Life Sciences (SJLS) Saudi Journal of Economics and Finance (SJEF) Pathology and Microbiology Education and Philosophy Linguistics and Literature Chemistry and Material Sciences Medical and Pharmaceutical Sciences Latest Published Articles Toxic Megacolon with Colonic Ischemia Masquerading as Diabetic Ketoacidosis: A Case Report F. Mansouri Page Numbers : 58-63 DOI : 10.36348/sjmps.2020.v06i01.010 A previously healthy 12-year-old boy presented with abdominal pain and clinical and laboratory features highly suggestive of diabetic ketoacidosis. When his blood glucose plummeted and his urinary ketones disappeared within the first hour of insulin therapy, while his abdominal pain, acidosis and hemodynamic status failed to improve despite vigorous fluid resuscitation, the diagnosis of diabetic ketoacidosis was questioned. At laparotomy, gangrenous, hugely dilated large bowel was found, requiring a subtotal colectomy from the cecum to the sigmoid colon; leaving the patient with an ileostomy. The child survived a complicated postoperative course and is currently doing well. Insights into Epigenetics Mechanisms in Oral Squamous Cell Carcinoma Loulwah Alothman, May Alsenani, Reem Alrabiah, Amjad Abu Ras, Ethar Abulhassan, Rana Aldayel, Rania Almutairi, Rawan Alsaif DOI : 10.36348/sjodr.2020.v05i01.005 Temporomandibular joint reconstruction (TMJR) is often required for patients with severe and/or refractory TMJ disease who have failed conservative treatment. TMJR helps improve masticatory function and is linked to improved quality of life outcomes. Alloplastic reconstruction is currently considered the treatment of choice for most serious TMJ disorders due to its many advantages, including but not limited to early recovery, consistent long-term outcomes and significant improvements in the function of the jaw. Two types of TMJR prostheses are available for reconstruction, broadly speaking: 1) inventory, and 2) custom-made prostheses. The purpose of this article is to provide a brief overview of TMJR's fundamental principles and concepts to the reader while referring to applicable existing literature. Oral squamous cell carcinoma (OSCC) is one of the most common oral cancers accounting for 96% of all head and neck cancers. Beside the different endogenous and environmental risk factors, epigenetics play an important role in causing OSCC. Epigenetics shed light on the presence of inherited changes in the phenotype of a gene with the absence of an alteration in the DNA sequence. The epigenetic modifications can result in the emersion of cancer, autoimmune diseases, aging and other diseases. Under several circumstances, DNA undergoes methylation. This methylation might be related to normal development or serious diseases like cancer. DNA methylation is a heritable biochemical modification occurs predominantly by transferal of a methyl group to C- 5 position of the cytosine ring (CpGs) which may cause epigenetic disturbances. This review aims toward investigating the genetics in literature to help in diagnosing OSCC with new modalities that are less invasive compared to histopathology. Studied genes including ECAD, DAPK, MGMT and P53 has different methylation frequencies in relation to OSCC which may be related to their significant role in early diagnosis and prognosis. Since genetics has a major role in OSCC, we searched most recently reported genes and technologies seeking early detection and treatment of OSCC results in a better prognosis and more conservative treatment. Prevalence of Pregnancy Induced Hypertension among the Pregnant Women: A Study in Shaheed Ziaur Rahman Medical College Hospital, Bogura, Bangladesh Muhammad Mahmudul Haque, Nitai Chandra Sarkar Background: Hypertensive disorders in pregnancy is one of the major causes of maternal and neonatal morbidity, mortality, premature birth, intrauterine growth retardation (IUGR), and low birth weight and solely maternal mortality is account for 10-15% of maternal deaths in developing countries. Each year, an estimated 2.9 million babies die during the neonatal period and 2.6 million babies are stillborn around the world due to presence of PIH in pregnancy. According to WHO 2018, the rate of stillbirth is 21.9 per 1000 births in women with a pregnancy induced hypertension (PIH). The objectives of the study is to estimate the prevalence of pregnancy induced hypertension during pregnancy in a selected rural health center in Bangladesh. Methods & Materials: A descriptive cross sectional study was carried out and a semi-structured questionnaire was used to capture demographic data, obstetric history and on PIH status. The study was conducted from June 2019 to November, 2019. The 80 pregnant women with on or above 20 weeks of gestation admitted in the Shaheed Ziaur Rahman Medical College Hospital, Bogura, Bangladesh or who sought outdoor service were enrolled in the study through purposive sampling technique who met the inclusion criteria. Data on PIH was extracted based on hypertension with on or above systolic and diastolic blood pressure140 mmHg and 90 mmHg respectively and presence of anemia, oedema, vertigo, sudden weight gain, insomnia and oliguria throughclinical examination and measuring blood pressure (BP) using predesigned and pretested questionnaire. Results: The mean age of the women was found to have24.72 (±SD). The prevalence of Pregnancy Induced Hypertension (PIH) was found 7/80×100 = 8.75%. More than 57% of PIH was mild, followed by around 29% and 14% of PIH were moderate and severe respectively. History of hypertension, LUCS (The lower uterine segment cesarean section), abortion and stillbirth were found 5 (6.25%), 17 (21.25%), 21 (26.25%) and 13 (16.25%) Statistical Hypothesis Test on the Vessel Arrival Pattern at Hong Kong Port with Peak Time Dao-zheng Huang DOI : 10.36348/sjbms.2020.v05i01.003 The vessel arrival pattern is the basis of research on the port management including berth assignment, quay crane assignment and yard operations. The hypothesis that vessel arrival pattern follows the Poisson distribution (or the inter-arrival time of two consecutive vessel arrivals follows the exponential distribution) is regularly adopted by many researchers. This paper focuses on the vessel arrival pattern at the Hong Kong Port and examines the hypothesis mentioned above based on the real data. The chi-square test method is employed to check the hypothesis under the parameter the result shows the vessel arrival pattern does not follow the Poisson distribution. Researching into the arrival data, we find that there is peak time from 8 to 9 o’clock. Considering the peak time and normal time, respectively, we find that the vessel arrival pattern at both times follows the Poisson distribution. The conclusion is tested in different data set using the chi-square test. Assessment of Oral Bacterial Profile and Antibiogram of Patients Attending Dental Clinic of a Private Tertiary Hospital in Ogun State, Nigeria Seyi Samson Enitan, Adeolu Sunday Oluremi, John Okeleke Ochei, Richard Yomi Akele, Stanley Osahon Usiobeigbe, Ileoma Emmanuel, Comfort Bosede Enitan, Rukayah Oluwapelumi Tajudeen Background: Oral and dental problem is common among many Nigerian populace. The human oral cavity is one of the most dynamic habitats for numerous bacterial species where they undergo intense interspecies competition to form multispecies biofilm structure. Aim: The present study was designed to assess the oral bacterial profile and antibiogram of Adult Patients receiving dental care at Babcock University Teaching Hospital (BUTH), Ilishan-Remo Ogun State. Methods: A total of 200 oral swab samples were collected from 200 consenting participants (100 males and 100 females). The oral swab samples were cultured on Blood agar, MacConkey agar and Mannitol salt agar and incubated at 37oC. Gram staining, motility test and routine biochemical tests were done for the identification and characterization of the bacterial isolates. Antibiotic susceptibility testing was carried out using the disc diffusion method. Data obtained were analysed using SPSS Statistics software package (version 18.0). Results: The bacterial species isolated include: Streptococcus viridans, Staphylococcus epidermidis, Enterobacter spp, Streptococcus pyogenes, Enterococcus feacalis, Klebsiella pneumoniae, Staphylococcus aureus, and Escherichia coli. Out of the 288 bacterial isolates obtained, 139 (65.5%) of the oral bacteria isolates were non-pathogenic in nature, while 69 (34.5%) were pathogenic. The pathogenic organism with the highest percentage occurrence was Enterobacter spp (37.7%), followed by Streptococcus pyogenes (24.6%), Enterococcus feacalis (19.7%), Klebsiella pneumoniae (9.8%), Staphylococcus aureus (4.9%) and the least being Escherichia coli (3.3%). Most of the Gram positive bacteria were sensitive to Augmentin, Sulbactomas, Cefroxime, Ciprofloxacin, Levofloxacin, Erythromycin and Azithromycin; while most of the Gram negative bacteria were sensitive to Augumentin, Cefotaxime, Nalidixic acid, Nitrofurantoin and Gentamycin. Conclusion: Pathogenic bacteria capable of causing oral and dental pr An Analysis of Citizenship Education Teachers’ Competence Based on Clinical Supervision Zulaecha Ngiu, Rasmon Baideng Page Numbers : 1-8 DOI : 10.36348/sjhss.2020.v05i01.001 This study aims to analyze (1) the implementation of clinical supervision in developing competence of citizenship education teachers in a democratic perspective in junior high schools of Bulagi district, Banggai Islands Regency, Province of Central Sulawesi; (2) the contributing factors to the competence of citizenship education teachers by clinical supervision program for the school principals; and (3) the efforts undertaken in developing the teachers’ competence. This study employs qualitative approach through case study. The data are generated from observation, interview, and documentation. The research comprises interactive data analysis to examine the data. The results show that (1) from the three phases of clinical supervision (the pre-observation meeting, observation of teaching process, and the evaluation), the effort of developing citizenship education teachers’ competence was not optimally implemented; (2) there are three factors (teachers’ educational background, teaching experience, and work ethic) which contributed to the non-optimal implementation of competence development of the teachers; (3) the school principals undertook stakeholder training, intensive lesson study, and classroom action research to improve the application of clinical supervision in developing competence of citizenship education teachers. It is for the teachers to achieve better competence. Our Major Indexing Services Contents are Open Access scholarsmepub@gmail.com editor@scholarsmepub.com http://www.scholarsmepub.com © 2019 Scholars Middle East Publishers, All Rights Reserved. Developed By JM
cc/2020-05/en_middle_0061.json.gz/line1701
__label__cc
0.526213
0.473787
A local look at LD38’s Election 2015 Published on October 1, 2015 October 1, 2015 by Matthew Gilson By Matthew Gilson | The Save Jersey Blog All politics is local, Save Jerseyans, and even assembly races can be broken down by looking at what is going on with the municipal elections that shape the district. As District 38 heats up over the next few weeks, here is a check-up on what is going on locally in the fiercest races in the district: When it comes to local contests in 38 and Bergen County, it does not get more hotly contested than the most populated town in the district where Republicans currently enjoy a 3-2 edge on the 5-member board but have to defend one seat this year. Most do not think the Republicans are in danger of losing the majority as de facto Mayor John Cosgrove looks headed to a comfortable re-election; the real question is whether one or both of his running mates can oust current council members Kurt Peluso and Lisa Swain. Cosgrove wants a big victory here to carry his two running mates, John Gil and Mark Zharnest, perhaps to show strength going into a potential 2017 showdown with Senator Bob Gordon. A strong enough showing would also boost the assembly candidates in a town that Republicans lost by about 500 votes in the razor-thin 2013 loss. The most Democratic town in the district, Mayor Norman Schmelz is in a heavyweight fight to keep his job against Ora Kornbluth. Schmelz, as I have noted before, is running as hard as anyone and has been a terrific and popular mayor since a surprise victory in a 2013 special election. The hard reality of the situation? Bergenfield remains a solidly Democratic town having produced the largest margin for Democrats in 2013, and Schmelz is the only Republican in a town with a 6-0 Democratic council. A Schmelz win in 2013 did little to propel the assembly candidates, so unless he can build an even larger victory than last time, do not expect an assembly victory in the town. At this time, I would rate Schmelz a slight-favorite to win re-election but it should come down to the wire. Oradell Town Hall (via www.oradell.org) The most Republican town in the Bergen County portion of the district, Republicans have often run unopposed in the last few elections. That will not be the case this year as Bergen Democrats made a point of making sure they fielded candidates in the town in an effort to boost turnout for the assembly race. The Democrats got perhaps their strongest candidate in former mayor Diane DiDio, but few expect her to give incumbent Mayor Joe Murray a strong challenge, and her running mates appear dead in the water against incumbents John Samuel and Donna Alonso (wife of 2013 senate candidate Fernando Alonso). The problem for Republicans is that need to produce a strong victory out of Oradell to offset some of the more Democratic towns in the district, something not lost on Lou Stellato when he recruited challengers to the incumbents. Currently a dead-locked council but with a Republican mayor, New Milford Republicans will look to gain a commanding 5-1 advantage on the council with two strong candidates. One of the closest towns in 2013 and always close locally, a solid victory of New Milford by either side could determine the election. The Republicans have turned to two newcomers to running for office, but not to their community, to try and capture a commanding victory. Mel Urena, a popular recreation coach, is running with Matt Seymour, an attorney and long-time member of the Bergen Republicans’ legal team. Published in Bergen County, Election 2015, North Jersey, State AssemblyTagged Bergen, Bergenfield, election, fair lawn, mayor, New Milford, Oradell Previous Previous post: The Bono-fire of McCue’s Vanities (Apologies to Tom Wolfe) Next Next post: Christie pardons three more victims of New Jersey’s gun laws 3 thoughts on “A local look at LD38’s Election 2015” Theodore Gonzalez via Facebook says: Any races in River Edge? http://www.capitalnewyork.com/article/new-jersey/2015/10/8578476/top-republican-assembly-candidate-drops-out-over-bigoted-writings Pingback: REPORT: LD38’s Cappola exits race | The Save Jersey Blog NewarkBay says: I feel like Fair Lawn and New Milford will both go R locally which will help. Keep your eye as well on Glen Rock and in Hawthorne where not having Goldberg on the ticket in 2013 cut down our win from 2011. Good analysis as always Gilson. Matthew Gilson A young man with a strong passions for all things local politics and all things North Jersey, Matt Gilson is a life-long resident of Bergen County, a student at Rutgers-Newark Law, the former chairman of the Seton Hall College Republicans, a former candidate for the Rutherford school board, and the current chairman of Bergen Young Republicans. Read Full
cc/2020-05/en_middle_0061.json.gz/line1702
__label__wiki
0.911303
0.911303
Six months since Sochi: international figure skaters By Nick ZaccardiAug 14, 2014, 11:52 AM EDT Since coming home from Sochi, Olympic figure skaters have kept pretty busy. Take a look at what the international stars have been up to. Adelina Sotnikova said she “grew up” since winning a controversial gold at home, becoming the first Russian Olympic women’s figure skating champion. She’s entered in two Grand Prix season events this fall. (notable Grand Prix assignments here) The Korea Skating Union’s complaints about judging bias – filed on behalf of silver medalist Yuna Kim – were rejected by the International Skating Union. Kim, remembered also for her Vancouver gold, retired. She recently attended a coaching workshop, and South Korean media reported she also applied to graduate school. Italian bronze medalist Carolina Kostner will sit out the upcoming season but hasn’t retired. Yulia Lipnitskaya, who helped Russia to gold in the Sochi team event, received a letter from director Steven Spielberg that read, “I am writing to tell you how moved I was by your gold medal performance as the little girl in red and accompanied by John Williams’ music from my film Schindler’s List… You are the best discovery of the Sochi Olympics and we will be watching you in PyeongChang in 2018.” Mao Asada bounced back from her sixth-place showing in Sochi to win the World Championship in Saitama, Japan, in March. She will sit out the upcoming season, but like Kostner, hasn’t retired yet. Six months since Sochi: U.S. figure skaters Japan’s first men’s gold medalist, Yuzuru Hanyu, also captured World Championship gold at home. He’s slated to compete this season. Two-time Sochi silver medalist Patrick Chan of Canada skipped the World Championships and will sit out the Grand Prix season, but he’s on the Canadian National Team. Denis Ten, Kazakhstan’s bronze medalist, is entered in two Grand Prix events, including Skate America. Yevgeny Plushenko, who infamously withdrew moments before he was scheduled to perform in the Sochi singles competition, has since retired, unretired, had back surgery and said he hasn’t ruled out competing at the 2018 Olympics. Tatyana Volosozhar and Maksim Trankov will compete this season after winning double gold in Sochi. Rival German pair and bronze medalists Aliona Savchenko and Robin Szolkowy split with Szolkowy’s retirement. Savchenko partnered with France’s Bruno Massot, but the pair is still deciding which country they will represent internationally. Sochi silver medalists Tessa Virtue and Scott Moir are, like Chan, on the Canadian National Team yet not entered in Grand Prix season events. It’s unknown if or when they will perform again. Elena Ilinykh and Nikita Katsalapov, who won ice dance bronze and team gold, split in April. Ilinykh since partnered with Ruslan Zhiganshin, and Katsalapov will skate with Zhiganshin’s former partner, Viktoria Sinitsina. Yuna Kim: ‘The classification I received was what I deserved’ Tags: Adelina Sotnikova, figure skating, Maksim Trankov, olympics, Patrick Chan, Tatiana Volosozhar, winter olympics, yuna kim, Yuzuru Hanyu
cc/2020-05/en_middle_0061.json.gz/line1709
__label__wiki
0.566724
0.566724
Center Introduction Director of the message Behavior and Health Student Abroad Other training project Down center Donation of contact and contac Behavior and Health Environment and Health Population and Health Position: EN > Team > Environment and Health > 正文 Yuanan (Ron) Lu, PhD Professor, Environmental Health E-mail: ylu@pbrc.hawaii.edu PhD (Microbiology), University of Hawai‘i at Mānoa MS (Microbiology), Oregon State University BS (Marine Biology), Huazhong Agricultural University Honors & Association ? 1st Place Award for Faculty Division of the Biological Sciences Symposium, University of Hawai‘i ? Faculty Travel Awards, University Research Council, University of Hawai‘i, 2006 & 2007 ? Scholarship Award from the National Science Academy Foundation, China, 2003 ? Member of American Society for Virology ? Member of International Society of Neurovirology ? Member of American Association for Advancement of Sciences ? Member of the Society for Neuroimmune Pharmacology ? Member of American Society for World Aquaculture ? Member of Hawai‘i Public Health Research Interests and Ongoing Projects ? Viral vectors and vector-mediated gene transfer and transgene expression in vitro and in vivo ? Novel gene therapy approaches for HIV-1 infection in the central nervous system l ? Marine compounds and their antiviral activities ? Test and production of transgenic shrimp strains with viral resistance ? New methods for enhanced monitoring costal water contamination using environmental pathogens as an indicator ? Tan, F, M. Wang, W. Wang, and Y. Lu. 2008. Cytotoxicity sensitivity of six fish cell lines to four common heavy metals. Toxicology in Vitro. 22:164-170. ? Lu, Y. and L. Sniderhan. 2008. Viral vector mediated gene transfer. In: Schwab M. (editor), Encyclopedia of Cancer. 2nd Edition. Springer-Verlag Berlin Heidelberg, New York. pp 3169-3171. Pubmed 10.1007/978-3-540-47648-1_6193. ? Yang, Y.B., C.X. Wu, J.G. Wu, V.R. Nerurkar, R. Yanagihara, and Y. Lu. 2008. Inhibition of West Nile virus replication by retrovirus-delivered small interfering RNA in human neuroblastoma. J. Med. Virol. 80:930-936. ? Yang, F.X., A.A. Aguirre, S.W. Jin, B. Wilcox, L. Rougée, M. Yamamoto, Y. Xu, and Y. Lu. 2008. Polybrominated diphenyl ethers in tilapia (Oreochromis mossambicus) from O’ahu, Hawai`i. J. Environ. Monitoring 10:432-434. ? Sniderhan, L.F, A. Stout, Y. Lu, M.V. Chao, and S.B. Maggirwar. 2008. Role of Ankyrin-rich Membrane Spanning Protein in Neurotrophin-mediated Activation of Nuclear Factor-κB Signaling. Molecular and Cellular Neurosci. 38:404-416. ? Yang, F.X., B. Wilcox, S.W. Jin, A. A. Aguirre, L. Rougée, M. Yamamoto, Y. Xu, and Y. Lu. 2008. Concentration and toxic equivalency profile of polychlorinated biphenyls in Tilapia from Hawaiian waters. Chemosphere. 73:133-137. ? Wu, C.X., V.R. Nerurkar, R. Yanagihara, and Y. Lu. 2008. Multiple modifications for improved homologous recombination and high efficiency generation of recombinant adenovirus-based vectors. J. Virological Methods. 153:120-128. ? Lu, Y. 2009. Green fluorescent protein (GFP) �C Lentiviral vector targeting for neuroAIDS. In: Hicks B.W. (editor), Methods in Molecular Biology: Viral Applications of the Green Fluorescent Protein. Human Press Inc. New Jersey. Pp 177-199. ? Shekhar, M.S. and Y. Lu. 2009. Application of Nucleic Acid-Based Therapeutics for Viral Infections in Shrimp Aquaculture. Marine Biotechnology. 11:1-9. ? Asahina, A.Y, Y. Lu, C.X. Wu, and P.C. Loh. 2009. Potential biosentinels of human waste in marine coastal waters: Bioaccumulation of human caliciviruses and enteroviruses from sewage polluted waters by indigenous mollusks. J. Virol. Methods. 158:46-50. ? Tan, F., F.X. Yang, W.M. Wang, M Wang, and Y. Lu. 2009. A new fish cell line of fin established from rare minnow as versatile tool in ecotoxicology assessment of cytotoxicity of heavy metals Synechocystis sp. Acta Hydrobioligica Sinica. 33(4):234-238. ? Tan, F.X., M. Wang, W.M. Wang, A.A. Aguirre, B. Wilcox, and Y. Lu. 2009. Validation of an in vitro cytotoxicity test for four heavy metals using cell lines derived from a green sea turtle (Chelonia mydas). Cell Biology and Toxicology. 26(3):255-263. ? Cox, C. S.B. Cao, and Y. Lu. 2009. Enhanced Detection and Study of Murine Norovirus-1 Using a More Efficient Microglial Cell Line. Virol. J. 6:196-. ? Liu, X.Q., M. Wang, W.M. Wang, and Y. Lu. 2009. Studies on the susceptibility of multiple fresh water cell lines to channel catfish virus. J. Hydroecology. 2(6):76-79. ? Yang, Y.B., J.G. Wu, and Y. Lu. 2010. Mechanism of Extracellular HIV-1-TAT Induction of IL-1b from Human Monocytes: Involvement of PLC/PKC signaling Cascade. J. Med. Virol. 82(5):735-746. ? Wu, C.X. and Y. Lu. 2010. High-titer retroviral vector system for efficient gene delivery into human and mouse cells of hematopoietic and lymphocytic lineages. J. Gen. Virol. 91:1909-1918. ? Jin, S.W., F.X. Yang, Y. Hui, Y. Xu, Y. Lu, J.K. Liu. 2010. Cytotoxicity and apoptosis induction on RTG-2 cells of 2,20,4,40-tetrabromodiphenyl 3 ether (BDE-47) and decabrominated diphenyl ether (BDE-209). Toxicology in vitro 24:1190-1196. ? Yasuhara-Bell, J., Y.B. Yang, R. Barlow, H. Trapido-Rosenthal, and Y. Lu. 2010. In vitro evaluation of marine-microorganism extracts for anti-viral activities. Virology Journal. doi:10.1186/1743-422X-7-182. ? Ju, L.W., L.F. Jiang, J.X. Yang, Q. Shi, Q.W. Jiang, H.G. Shen, Y.Y. Tan, and Y. Lu. 2010. Co-infection of influenza A/H1N1 and A/H3N2 viruses in a patient with influenza-like illness during the winter/spring of 2008 in Shanghai, China. J. Med. Virol. 82(8):1299-1305. ? Yasuhara-Bell J and Y. Lu. 2010. Marine compounds and their antiviral activities. Antiviral Research 86:231-240. ? Huang, F.T., S.B. Cao, X.X. Cui, C.X. Xiong, M. Wang, Y.A. Lu, W.M. Wang, J. Ye, X.Q. Liu. 2011. Transduction of fish cells with recombinant baculovirus �C New findings from previous studies. J. Virol. Methods. 173:294-299. ? Tong, H.I. and Y. Lu. 2011. Effective detection of human adenovirus in Hawaiian waters using enhanced PCR method. Virol. J. 8:57 (doi:10.1186/1743-422X-8-57). ? Cao, S.B., C.X. Wu, Y.B. Yang, L.F. Sniderhan, S. Maggirwar, S. Dewhurst, and Y. Lu. 2011. Lentiviral vector-mediated expression of sTNFR-Fc in stably transduced human macrophage and neuronal cells: implications for NeuroAIDS therapeutic. J. Neuroinflammation. 8(1):48 (DOI: 10.1186/1742-2094-8-48) ? Viau, E.J., K.D. Goodwin, K.M. Yamahara, B.A. Layton, L.M. Sassoubre, S.L. Burns, H.I. Tong, S.W.C. Wong, Y. Lu, and A.B. Boehm. 2011. Bacterial pathogens in Hawaiian coastal streams - associations with fecal indicators, land cover, and water quality. Water Research. 45(11):3279-90. ? Yang, F.X., S.W. Jin, Y. Xu, and Y. Lu. 2011. Increasing responses of interleukin-8, reactive oxygen species and p53 protein in human lung epithelial cells exposed to PM2.5 collected from an E-waste recycling area in China. Env. Res Lett. 6(2):024013 (doi: 10.1088/1748-9326/6/2/024013). ? Yan, W., P. Nie, and Y. Lu. 2011. Establishment, characterization, and viral susceptibility of a new cell line derived from a goldfish (Carassius auratus) tail fin. Journal of Fish Diseases. 34(10):757-768. ? Tong, H.I., C. Connell, A.B. Boehm, and Y. Lu. 2011. Effective detection of human noroviruses in Hawaiian waters using enhanced RT-PCR methods. Water Research 45(18):5837-5848. ? Wu, B., B.B. Zhu, Y.L. Luo, M. Wang, Y. Lu, W.M. Wang, S.B. Cao, F.T. Huang, and X.Q. Liu. 2011. Generation and characterization of monoclonal antibodies against channel catfish virus. Hybridoma. 30(6): 555-558. ? Ma, C.C., C.M. Burchfiel, J.S. Grove, D. Fekedulegn, Y. Lu, M.E. Andrew, B.J. Willcox, K. Masaki, J.D. Curb, and B.L. Rodriguez. 2011. Risk factors for fractures among Japanese-American men: the Honolulu Heart Program and Honolulu-Asia Aging Study. Osteoporosis Internal. doi:10.1007/s11657-011-0068-6 Key. ? Tong, J., H. Trapido-Rosenthal, J. Wang, Y.W. Wang, Q.X. Li, and Y. Lu. 2012. Antiviral Activities and Putative Identification of Compounds in Microbial Extracts from the Hawaiian Coastal Waters. Marine Drugs. 10:521-538. ? Tong, J., Y.W. Wang, and Y. Lu. 2012. New Developments in Small Molecular Compounds for Anti-HCV Therapy. J. Zhejiang University Sciences-B. 12(1):56-82. ? Huang, F.T., Q. Li, X.X. Cui, S.B. Cao, C.X. Xiong, M. Wang, Y. Lu, W.M. Wang, J. Ye, and X.Q. Liu. 2011. Characterization of spring viraemia of carp virus glycoprotein expressed by recombinant baculovirus. Virus Gene (in press). ? Connell, C. Tong, H.I., and Y. Lu. 2012. New Approaches for Enhanced Detection of Enteroviruses from Hawaiian Environmental Waters. PLoS ONE (in press). Previous:none Next:none Global Health Institute Office: Zhiyu Chen: 15307106838 ashelyczy@126.com Copyright:Global Health Institute,Wuhan University. All rights reseved Support:HTCD Address:8 South Donghu Road,Wuchang,Wuhan,Hubei Province,P.R.China,430072
cc/2020-05/en_middle_0061.json.gz/line1710
__label__cc
0.673496
0.326504
OCR: Conduct Risk Analysis - Or Else HIPAA Enforcer Emphasizes Importance of Assessments Marianne Kolbasuk McGee (HealthInfoSec) • September 24, 2014 Jocelyn Samuels As federal regulators ramp up HIPAA enforcement activities, including soon-to-be-restarted compliance audits, there is one clear and familiar theme that officials are still hammering home: You must conduct a comprehensive and timely risk assessment - or face the consequences. In one of her first public appearances since taking on the role of the nation's top HIPAA enforcer, Jocelyn Samuels, director of the Department of Health and Human Services Office for Civil Rights - spotlighted the importance of conducting a timely risk assessment, as required under the HIPAA Security Rule, to pave the way for mitigating risks and avoiding breaches. Her remarks came during a Sept. 23 keynote presentation at the annual HIPAA conference sponsored by OCR and the National Institute of Standards and Technology. "We continue to see a lack of comprehensive and enterprisewide risk analysis and risk management that leads to major breaches and other compliance problems," Samuels said. "That is why enforcement is a critical part of our arsenal of tools to ensure compliance. Resolution agreements that include a monetary settlement are only a small fraction of complaint and compliance reviews we undertake. These enforcements send out an important message about compliance issues and the need for covered entities and business associates to take their obligations seriously." When the OCR investigates a breach, Samuels said, "we not only look at what was done to correct and remedy a breach but what led to the incident to determine if noncompliance played a part. Comprehensive enterprise risk analysis followed by ... timely risk management practices is the cornerstone of any good compliance program." Samuels also emphasized the importance of training the workforce to identify and respond appropriately to security incidents. That, she said, helps to "ensure that entities take the necessary steps to address and prevent future incidents and to mitigate harm to affected individuals." Common Weakness Another OCR official reminded attendees at the conference - which took place exactly one year after enforcement of HIPAA Omnibus Rule went into effect - that OCR's pilot HIPAA compliance audit program of 115 covered entities in 2012 found that the lack of a HIPAA security risk analysis is the most common compliance shortfall. "Two-thirds [of entities audited] did not do a risk assessment," said Linda Sanches, OCR senior adviser. Business associates will be subject to HIPAA compliance audits in the next phase of the program, which will begin "in the near future," Sanches said earlier this month at another industry event. Even if an organization is not chosen for a random audit, an OCR breach investigation can also uncover the lack of a thorough and timely security risk assessment, Sanches noted during the NIST/OCR conference. And it's not necessarily the breach itself that will bring a potential financial penalty from OCR - it's what investigators find when they dig into the incident, she pointed out. "Did you have systems and a plan and tools in place to reduce risk? Did you do an assessment to mitigate risks?" In response to an audience question about how frequently organizations should perform a comprehensive risk analysis, Sanches said assessments should be conducted "when there are changes in the environment ... new records management, new devices." To boost information security programs beyond the requirements of HIPAA, Sanches also noted that the NIST cybersecurity framework provides healthcare organizations with a roadmap for "looking where you are now, and where you want to be." After HIPAA Omnibus, Breach Tally Spikes Industry News: IBM Opens Cloud Center Marianne Kolbasuk McGee Executive Editor, HealthcareInfoSecurity McGee is executive editor of Information Security Media Group's HealthcareInfoSecurity.com media site. She has about 30 years of IT journalism experience, with a focus on healthcare information technology issues for more than 15 years. Before joining ISMG in 2012, she was a reporter at InformationWeek magazine and news site, and played a lead role in the launch of InformationWeek's healthcare IT media site. https://omnibus.healthcareinfosecurity.com/ocr-conduct-risk-analysis-or-else-a-7352
cc/2020-05/en_middle_0061.json.gz/line1711
__label__wiki
0.518149
0.518149
Dragon Ball Super Returning in July 2019? Major Details are here Image by maniaxoi Howdy, everyone. The rumors of Dragon Ball super return have been running rampant since well the series finale one year ago and now after Dragon Ball super brolly has had a theatrical run. Dragon Ball super is indeed back in production. Report and information sourced by Geekdom 101 Youtube. Update: Apparently, there were all rumors from that Anime tv Account and even by others, we are sorry for the misinformation. “Super will return this year but not in July.” Continue reading for the information we got and speculation. Now as we approach the 30th anniversary of Dragon Ball Z, we have good news that Dragon Ball super is indeed back in production and has been in it since October of 2018 or possibly late September. Now, we are releasing this information early so until there’s an official announcement please understand that things may change or may be a bit different when everything goes down. When is Dragon Ball Super Returning? Dragon Ball super is scheduled to come back to the airwaves in July 2019 which is confirmed, a weekly Dragon Ball anime will launch and as far as we know it will continue to be called Dragon Ball super. If you remember a few weeks ago a story broke about Toei trying to sell these episodes to licensers at the various different industry Expos, the return of Dragon Ball super to TV has been discussed and talked about since last year September of 2018, that’s when production actually began, of course, that was pre-production. Now why do pre-production begin so long ago well there are obvious answers because they don’t want another episode 5 where the production falls apart, so they’re gonna give the show a much longer pre-production schedule so that all the animators and staff can have everything lined up and perfect and they don’t have to rush to get the series out. That would just increase the quality of this returning series. Image by Poetkal GFX When will it be Officially Announced? now we are sure many of you are asking when the ‘Official Announcement’ for this is coming, we can’t give you a definitive answer on that but the suspected time we’re gonna get an official announcement is probably between April 26th, 27th or 28th which is right around the time that we had the 30th anniversary of Dragon Ball Z and right around the time that Dragon Ball super the first part of the series in 2015 was announced. We are suspecting it’ll be around that time but don’t hold us to that because we are not a hundred percent sure. What will be the Time Slot of Super as Kitaro replaced it? Now another question we are probably gonna see is- What about Kitaro? They just renewed it for a second season, it’s gonna continue going, we don’t have an answer as far as the timeslot goes for Kitaro or Dragon Ball Super in Japan perhaps Dragon Ball super will be on a new timeslot. However, it seems more likely based on what is heard that ‘Kitaro’ will be moving time slots. How will be the Quality of the Animation of Returning DBS Now, here we are in March and we can tell you confidently that multiple sources have confirmed that the series is being animated right now, as we speak they were in the storyboard face throughout the early part of 2019 but now they have moved on to animation and you’re probably wondering, well, how is it gonna look? Is Shintani coming back? The answer is yes. He does Shintani sheets are gonna be used for Dragon Ball super returning TV series, so it’ll look a lot more a dragon ball super broadly and less like the Yamamura version of Dragon Ball super but that being said it doesn’t necessarily mean that the show is gonna look as good as the DBS Broly the movie. Maybe some of the more intense episodes will or come close to it because the Broly movie has way too much of a higher budget but the series will still look astronomically better or at least a little bit better than the original Dragon Ball super did with Shintani sheets But we can of course expect all of our great animators that worked on the previous Dragon Ball super episodes and movies to at least come back to do a few episodes so it will be kind of like a mixed bag where we’re gonna get the animators all coming in doing different stuff as they did with the old super so we’ll have a lot of variety there. Image by nourssj3 What about Dragon Ball Heroes Promotional Anime? Now those of you asking about Dragon Ball heroes as far as we know Dragon Ball Heroes will continue (Latest Episode will be the DBH Episode 10), so the promotional anime is still gonna be coming out as Dragon Ball super is airing, so we don’t have a schedule on it becoming a full-time anime like that super will be the full-time anime and heroes they’re still gonna be there to promote the Japanese arcade game of course. What will be the New Arc with which Dragon Ball Super start? Now another question that might come up is what’s up with the ark so we’re gonna get a Broly retelling as far as I’ve seen as far as I’ve been told know the Broly movie is not going to be retold however don’t quote me on that because I’m not a hundred percent sure because different people have said different things. One person actually stated that the staff is following them on was the quote that Geekdom was given and when you talk about following that could mean like that they’re doing the Moro (galaxy petrol arc which is in Manga right now) or it could be the story following the Moro arc. Image by SaoDvd Will they start the Dubbed version production at the same time as Subbed? We’ll get that when the announcement of the series occurs. When it comes back but we are expecting Super to remain with the current team, that’s been working on it just now and more time, so it should look a lot better. Geekdom101 said as far as the English dub goes we have no idea what’s gonna happen with that if they’re gonna begin dubbing it right away or they’re going to wait until next year. The good news is ‘Dragon Ball super is set to return in July of 2019’ but you never know of changes, so until we have the Official Announcement, let’s just wait but we are suspecting that to be at the end of April by Toei Animation. Previous articleLeaked First look at the appearance of Thanos in Avengers Endgame Next articleDragon Ball Heroes Episode 10 Release Date Confirmed!
cc/2020-05/en_middle_0061.json.gz/line1712
__label__wiki
0.540448
0.540448
Post-punk: La Femme, Nothing, Les Panties (2016). 5 September, 2016 David Gerard Indie, Pop, Post-Punk, Record Leave a comment LA FEMME: Mystère (Born Bad) — French band drawing on post-punk, synthpop, surf, psychedelia and some yéyé pop gloss; a strange time warp of the sixties into the eighties. You can only buy it as the double vinyl with download, because. Above: “Où va le monde”, “Septembre”. NOTHING: Tired Of Tomorrow (Relapse) — straight-up shoegaze, from 1990 to you. Bit of grunge mixed in (songwriter Dominic Palermo used to front a hardcore punk band). The songs are solid and the tunes are catchy. Touring Europe right now, the UK later this month. Above: “Eaten By Worms”. By the way, they nearly signed to a label backed by Martin Shkreli. “The front of the house was on fire, and we got out the back door.” LES PANTIES: Cold Science (Crépuscule) — A reissue from the past few years (not thirty-five) of singles and EPs the band had put out themselves. A young Belgian post-punk revival band with a Peter Hook bass and Sophie Frison’s powerful New Wave alto. Having been an avid follower this sort of thing back in the day, I’m as delighted now by it as I would have been then. Preview on Spotify. Above: “L’Arrivée”. La Femme, Les Panties, Nothing The Hugos, the Sad Puppies and 1970s science fiction paperback covers, which were ridiculous. Links: how Deerful and J. G. Ballard work, how Warner Bros doesn’t, what to do in Norwich afterwards. You will have to look a long way before you find a bunch of scum-suckers more greedy, humourless and deserving of death than the suits in the music business. — Terry Pratchett
cc/2020-05/en_middle_0061.json.gz/line1717
__label__wiki
0.558149
0.558149
EP1339195A2 - Method and device for attaching documents to e-mail - Google Patents Method and device for attaching documents to e-mail Download PDF EP1339195A2 EP1339195A2 EP03002572A EP03002572A EP1339195A2 EP 1339195 A2 EP1339195 A2 EP 1339195A2 EP 03002572 A EP03002572 A EP 03002572A EP 03002572 A EP03002572 A EP 03002572A EP 1339195 A2 EP1339195 A2 EP 1339195A2 EP03002572A EP1339195B1 (en Rex A. Foxford Shawn Domenic Loveland 2002-02-25 Priority to US82468 priority 2003-02-06 Application filed by Microsoft Corp filed Critical Microsoft Corp 238000007639 printing Methods 0 abstract claims description 6 239000002609 media Substances 0 claims description 12 230000000875 corresponding Effects 0 claims description 9 238000003860 storage Methods 0 claims description 8 238000004590 computer program Methods 0 claims description 6 230000004044 response Effects 0 claims description 5 230000015654 memory Effects 0 description 10 239000000969 carrier Substances 0 description 2 238000003032 molecular docking Methods 0 description 2 229920001690 polydopamine Polymers 0 description 2 239000001965 potato dextrose agar Substances 0 description 1 H04M1/72547—With means for supporting locally a plurality of applications to increase the functionality with interactive input/output means for internally managing multimedia messages G06Q10/00—Administration; Management G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting G06Q10/107—Computer aided management of electronic mail H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 H04L29/02—Communication control; Communication processing H04L29/06—Communication control; Communication processing characterised by a protocol H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages H04L51/06—Message adaptation based on network or terminal capabilities H04L51/063—Message adaptation based on network or terminal capabilities with adaptation of content H04L51/38—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages in combination with wireless systems H04L67/40—Protocols for remote procedure calls [RPC] H04L67/42—Protocols for client-server architectures Performing operations over a low bandwidth and/or high cost networks, the operations requiring access to a document. Such operations may include sending/forwarding an e-mail with an attachment or printing/faxing a document over a network. A client, such as a mobile wireless device, sends an instruction to perform the operation to a server. The instruction identifies the document that is required to be accessed to complete the instruction, but does not include the document itself. The server then determines whether it has access to the required document. If the document is unavailable or an older version, the server requests the document from the client. The client then sends the document to the server so that the server may complete the operation requested by the document-inclusion instruction. BACKGROUND OF THE INVENTION 1. The Field of the Invention The present invention relates to computer network operations. In particular, the present invention relates to methods, systems, and computer program products for performing document-inclusion operations over a network, the document-inclusion operations typically requiring the inclusion of a document to be transmitted along with an instruction to perform the operation on the document. 2. Background and Relevant Art Computer networks allow more individuals more ready access to more information than ever before. The Internet is a conglomerate of interconnected computer networks that spreads far and wide throughout the world. An individual need only have an Internet-enabled computer and a connection to the Internet to be able to communicate and access information from across the globe. Computers (and their users) may communicate over a network by exchanging electronic messages in accordance with a protocol or a set of rules. Conventional networking protocols typically allow such electronic messages to include a document attachment. For example, electronic mail or "e-mail" may include a variety of different document attachments including, for example, word processing documents, spreadsheet files, image files, sound files, and executable files among many other document types. As another example, an electronic message may also be a meeting request having a corresponding calendar attachment that represents a proposed calendar entry. Operations that typically require the transmission of an electronic message with a corresponding document attachment will be referred to herein as a "document-inclusion" operation. Such document-inclusion operations may include, for example, the sending or forwarding of an e-mail with an attachment, the sending or responding to a meeting request with a calendar attachment, printing a document over a network, faxing a document over a network, or the like. The documents attached to an electronic message can often be quite large. For example, an e-mail could theoretically have a word processing document with image and sound files embedded within the word processing document. However, there are network restrictions that make the transfer of such document attachments burdensome. For example, some networks have relatively limited throughput including, for example, some wireless carrier networks. Also, many of these same wireless carriers may impose a time-based charge on data transfers. Since the transfer of document attachments over such low bandwidth and/or high cost networks can take some time, the transfer of the document attachment can be quite costly. Other low bandwidth and/or high cost networks may charge based on the amount of data transferred. Since document attachments can be quite large, transferring a document attachment over such low bandwidth and/or high cost networks may be costly as well. Therefore, what is desired are methods, systems, and computer program products for performing document-inclusion operations over a network in a manner that improves the usage of the network. The principles of the present invention provide for systems, methods and computer program products for performing a "document-inclusion" operation over a network such as a low bandwidth and/or high cost network while preserving the network bandwidth of the network. A "document-inclusion" operation is defined as an operation which requires access to a particular document. For example, sending or forwarding an e-mail with an attachment requires access to the document represented by the attachment itself. A client, such as a mobile wireless device, sends a document-inclusion instruction to a server, such as a mobile. access server. The document-inclusion instruction identifies the document that is required to be accessed to complete the instruction. However, the document-inclusion instruction does not include the document itself. The server then determines whether it has access to the required document. If the document is not accessible, the server requests the document from the client indicating to the client that the document is unavailable at the server. The client then sends the document to the server so that the server may complete the operation requested by the document-inclusion instruction. One of ordinary skill in the art will recognize that sending the document-inclusion instruction without the needed document, then waiting for the server to indicate that the document is unavailable, and only then sending the required document would take more time and network bandwidth than simply sending the document-inclusion instruction with the needed document. However, there may be instances in which the needed document is already readily accessible by the server. In those instances, network bandwidth is greatly conserved since the document need not be transmitted over the network. Accordingly, the present invention has particular advantage in environments in which there is a real possibility that the server does have access to the document necessary to perform the required operation. For example, consider the case in which a mobile wireless device is regularly synchronized via a docking station with a personal computer that runs the server. In that case, there is a strong likelihood that any particular document that is stored at the mobile wireless device is also available at the server. The principles of the present invention allow the wireless device to forego sending the needed document over the low bandwidth and/or high cost network in cases in which the server already has access to the document. Accordingly, the bandwidth of the network preserved, especially in cases in which the needed document is quite large. If the document at the server is an older version of the document at the wireless device, then the server may send an electronic message to the wireless device causing the user of the wireless device to be prompted as to whether sending the older version is acceptable. If the older version is acceptable to the user, the network bandwidth is preserved. Otherwise, the wireless device may send the newer version of the document (or perhaps just the changes if change tracking is available) to the server. If a newer version of the document exists at the server than exists at the wireless device, then the server may prompt the user of the wireless device as to whether to use the newer document. The server may also optionally prompt the user as to whether to receive the newer version of the document, or whether to wait until the wireless device is next docked at the docking station. The principles of the present invention are especially advantageous when the needed documents are quite large, and when the network bandwidth is limited or high cost as in current low bit rate wireless implementations. Accordingly, the average time needed to perform document-inclusion operations is significantly reduced. Also, since the average required network bandwidth and usage time is reduced, the costs to the user will also be typically reduced. According to one embodiment, in a network that includes a client that is "network connectable" to a server over a wireless network, where the server is configured to perform operations on documents on behalf of the user of the client, a method for the client may cause an operation to be performed on the document while potentially conserving the bandwidth of the wireless network. The method comprises the following: an act of the client sending a document-inclusion instruction to the server, the document-inclusion instruction including an identification of the document, but not including the document itself; and a step for ensuring that a document-inclusion operation corresponding to the document-inclusion instruction is performed so as to conserve the network bandwidth of the wireless network. In this method, the step for ensuring may comprise the following: an act of the client receiving an indication that the document identified in the document-inclusion instruction is unavailable to the server; and an act of the client sending the document to the. server so that the server may complete a document-inclusion operation corresponding to the document-inclusion instruction. Additional features and advantages of the invention will be set forth in the description that follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The features and advantages of the invention may be realized and obtained by means of the instruments and combinations particularly pointed out in the appended claims. These and other features of the present invention will become more fully apparent from the following description and appended claims, or may be learned by the practice of the invention as set forth hereinafter. In order to describe the manner in which the above-recited and other advantages and features of the invention can be obtained, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments thereof which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not therefore to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which: Figure 1 illustrates an example of a telephonic device that may implement the principles of the present invention. Figure 2 illustrates an example network environment that provides a suitable operating environment for the present invention. Figure 3 illustrates a flowchart of a method for performing document-inclusion operations over a network in accordance with the present invention. Figure 4 illustrates a flowchart of a method for sending an electronic mail with an attachment over a network in accordance with the present invention. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The present invention extends to systems, methods and computer program products for performing a "document-inclusion" operation over a network while preserving the network bandwidth of the network. In this description and in the claims, a "document-inclusion" operation is defined as an operation which requires access to a particular document. For example, sending or forwarding an e-mail with an attachment requires access to the document represented by the attachment itself. Also, a meeting request or a response thereto requires a calendar entry as an attachment. As a final example, printing or faxing a document over a network requires access to the document to be printed or faxed. A client, such as a mobile wireless device, sends a document-inclusion instruction to a server, such as a mobile access server. The document-inclusion instruction identifies the document that is required to be accessed to complete the instruction. However, the document-inclusion instruction does not include the document itself. The server then determines whether it has access to the required document. If not, the server requests the document from the client indicating to the client that the document is unavailable at the server. The client then sends the document to the server so that the server may complete the operation requested by the document-inclusion instruction. The embodiments of the present invention may comprise a general-purpose or special-purpose computer system including various computer hardware components, which are discussed in greater detail below. Embodiments within the scope of the present invention also include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media may be any available media, which is accessible by a general-purpose or special-purpose computer system. By way of example, and not limitation, such computer-readable media can comprise physical storage media such as RAM, ROM, EPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other media which can be used to carry or store desired program code means in the form of computer-executable instructions or data structures and which may be accessed by a general-purpose or special-purpose computer system. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a computer system or computer device, the connection is properly viewed as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of computer-readable media. Computer-executable instructions comprise, for example, instructions and data which cause a general-purpose computer system or special-purpose computer system to perform a certain function or group of functions. In this description and in the following claims, a "computer system" is defined as one or more software modules, one or more hardware modules, or combinations thereof, that work together to perform operations on electronic data. For example, the definition of computer system includes the hardware components of a personal computer, as well as software modules, such as the operating system of the personal computer. The physical layout of the modules is not important. A computer system may include one or more computers coupled via a computer network. Likewise, a computer system may include a single physical device (such as a mobile phone or Personal Digital Assistant "PDA") where internal modules (such as a memory and processor) work together to perform operations on electronic data. Those skilled in the art will appreciate that the invention may be practiced in network computing environments with many types of computer system configurations, including personal computers, laptop computer, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, mobile telephones, PDAs, pagers, and the like. The invention may also be practiced in distributed computing environments where local and remote computer systems, which are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communication network, both perform tasks. In a distributed computing environment, program modules may be located in both local and remote memory storage devices. Figure 1 and the following discussion are intended to provide a brief, general description of a suitable computing environment in which the invention may be implemented. Although not required, the invention will be described in the general context of computer-executable instructions, such as program modules, being executed by computer systems. Generally, program modules include routines, programs, objects, components, data structures, and the like, which perform particular tasks or implement particular abstract data types. With reference to Figure 1, a suitable operating environment for the principles of the invention includes a general-purpose computer system in the form of a mobile wireless device 100. The mobile wireless device 100 includes a user interface 101 for allowing a user to review information presented via an output user interface 102, and to input information through an input user interface 103. For example, the output user interface 102 includes a speaker 104 for presenting audio information to the user, as well as a display 105 for presenting visual information to the user. The mobile wireless device 100 may also have an antenna 109. The input user interface 103 may include a microphone 106 for translating audio information into electronic form. In addition, the input user interface 103 includes dialing controls 107 represented by 12 buttons through which a user may enter information. Input user interface 103 also includes navigation control buttons 108 that assist the user in navigating through various entries and options listed on display 105. Although user interface 101 has the appearance of a mobile wireless telephone, the unseen features of user interface 101 may allow for complex and flexible general-purpose processing capabilities. For example, mobile wireless device 100 also includes a processor 111 and a memory 112 that are connected to each other and to the user interface 101 via a bus 110. Memory 112 generally represents a wide variety of volatile and/or non-volatile memories and may include types of memory previously discussed. However, the particular type of memory used in telephonic device 100 is not important to the present invention. Telephonic device 100 may also include mass storage devices (not shown) similar to those associated with other general-purpose computer systems. Program code means comprising one or more program modules may be stored in memory 112 or other storage devices as previously mentioned. The one or more program modules may include an operating system 113, one or more application programs 114, other program modules 115, and program data 116. While Figure 1 represents a suitable operating environment for the present invention, the principles of the present invention may be employed in any system that is capable of, with suitable modification if necessary, implementing the principles of the present invention. The environment illustrated in Figure 1 is illustrative only and by no means represents even a small portion of the wide variety of environments in which the principles of the present invention may be implemented. Figure 2 illustrates a network environment 200 in accordance with the present invention. The network environment 200 includes a client computer system 210 (also called herein "client 210") and a server computer system 220 (also called herein "server 220") that are "network connectable" to each other over at least a network 230. The network 230 may be, for example, a low bandwidth network and/or high cost network such as a wireless network. In this description and in the claims, "network connectable" means being "network connected" or having the ability to be network connected by establishing a permanent and/or temporary network connection with each other. In this description and in the claims, being "network connected" over a network means having the ability to communicate with each other over at least the network among possibly other networks as well. The client 210 may be, for example, the mobile wireless device 100 described with respect to Figure 1, although the client 210 may be any general purpose and/or special purpose processing system. The client has a local store 211 that may be memory 112 in the case of the mobile wireless device 100. Local store 211 may hold a variety of different document types including image files, sound files, executable files, word processing document, spreadsheet documents, or the like. For clarity, the local stored 211 is illustrated as containing a single document 212. The client 210 also includes a networking module 213 configured to send and receive communications over the network 230 to and from the server 220. Such a networking module may typically be employed by the operating system of the client 210. A processing module 214 of the client 210 is configured to coordinate access to the document 212 from the local store 211, and to use the networking module 213 so as to perform client operations in accordance with the principles of the present invention. The server 220 may be, for example, a computer system that runs a wireless access server that performs document operations on behalf of a number of wireless devices over the wireless network. However, the server 220 may be any general purpose and/or special purpose processing system. The server 220 also has a store 221. The store may be any memory that is local to the server or which may be accessed by the server over a network connection that is of higher bandwidth and/or lower cost as compared to accessing the document over the network 230. The server 220 also includes a networking module 223 configured to send and receive communications over the network 230 to and from the client 210 as well as potentially other clients that are not shown for clarity. A processing module 224 of the server 220 is configured to coordinate access to the store 221, and to use the networking module 224 so as to perform server operations in accordance with the principles of the present invention. The server 220 and the client 210 may be in an environment in which there is a significant possibility that for any given document stored in the local store 211 of the client 210, the same document (or at least a version of the document) may be stored in the store 221 of the server 220. For purposes of discussion, however, suppose that the store 221 of the server 220 does not contain the document 212 that is stored in the local store 211 of the client 210. The server 220 performs document-inclusion operations on behalf of the client. Such document inclusion operations may include, for example, replying, sending or forwarding an e-mail with an attachment, sending or responding to a meeting request, printing or faxing a document, or providing a document to a particular share point for sharing among multiple users. For example, the server 220 may be connected to an e-mail server 251 that transmits and receives e-mail for one or more user accounts associated with the client 210. The server 220 may be connected to a print/fax server 252 for printing or faxing documents to a particular network location. The server 220 may also be connected to a SHAREPOINT ™ server 253 for logically making the document 212 accessible to a defined group of users and/or computer systems. Figure 2 also includes several arrows 1, 2 and 3, which show a logical flow of information and will now be described with respect to Figure 3. Figure 3 illustrates a flowchart of a method 300 for performing document-inclusion operations over a network in accordance with the present invention. Some of the acts and the step are performed by the client 210 as listed in the left column of Figure 3 under the heading "CLIENT". Other acts are performed by the server 220 as listed in the right column of Figure 3 under the heading "SERVER". In accordance with the method 300, the client 210 sends a document-inclusion instruction 241 to the server 220 (act 301). The document-inclusion instruction 241 includes an identification 242 of the document 212, but does not including the document 212 itself. The transmission of this document-instruction 241 is represented by arrow 1 in Figure 2. The server 220 then determines that the server 220 does not have access to the document other than from the client 210 over the network 230 (act 302). This may be accomplished by the server 220 accessing the store 221 (or a database the lists the contents of the store 221) and finding that the document 212 is not included in the store 221. Note that in order to fulfill the document-inclusion instruction 241, the server 220 needs to have access to the document. If no version of the document 212 is available at the server 220, then the determination of act 302 is made by simply confirming that no version of the document 212 is present at the server. However, if a different version of the document 212 exists at the server 220, then the server may consider that version to be equivalent to the document 212 itself, and thus proceed with fulfilling the document-inclusion operation using the different version of the document. Alternatively, the server 220 may check with the user of the client 210 to determine whether the different version of the document is an acceptable replacement for the document 212. Accordingly, determining that the document 212 is not available in act 302 may include acts of determining that the same version of the document 212 is not available, determining that no version of the document 212 is available, or determining that a different version of the document 212 exists at the server but is not to be used as a replacement for the version of the document 212 identified in the document-inclusion request 241. Once it has been determined that the server 220 does not have access to the document 212, the server 220 causes the document 212 to be sent to the server from the client over the network 230 (act 303). This may include sending a request 243 for the document 212 as represented by arrow 2 of Figure 2. The client 210 then performs a functional result-oriented step for ensuring that a document-inclusion operation corresponding to the document-inclusion operation is performed so as to conserve the bandwidth of the network. (step 304). The functional step may include any corresponding acts for accomplishing this result. However, in the embodiment illustrated in Figure 3, the step 304 includes corresponding acts 305 and 306. In particular, the client 210 receives an indication that the document identified in the document-inclusion instruction 241 is unavailable to the server (act 305). For example, the client 210 receives the request 243. Then, the client 210 sends the document to the server 220 (act 306) so that the server may complete the document-inclusion operation. The transmission of the document 212 to the server 220 is represented by arrow 3 in Figure 2. In cases in which the server supports change tracking, and a version of the document 212 exists at the server 220, then the transmission of the document 212 may comprise sending the changes made between the version of the document 212 available to the server 220, and the version of the document 212 available to the client 210. The server 220 then executes the document-inclusion instruction 241 using the accessed document 212 (act 307). Figure 4 illustrates a particular example method in which the client 210 is to send an e-mail with a document attachment. In this example, the user of the client 210 first creates an e-mail (act 401) and then "attaches" a document to the e-mail (act 402). The user instructs that the e-mail be attached and the document appears in the user application as though the document is attached. However, transparent to the user is that only a token identifying the document is attached to the e-mail, not the document itself. The user then sends the e-mail to the server (act 403). If the e-mail was created while the client 210 was offline (i.e., not network connected) to the server 220, then the e-mail is sent the next time the client 210 is online with the server 220. Once the e-mail is received at the server 220, the server determines if the same version of the document attachment is available at the server 220 (decision block 404). If so (YES in decision block 404), the server attaches the document from its local store to the e-mail (act 405) and then sends the complete e-mail to the e-mail server 251 (act 406). If the same version of the document is not available at the server (NO in decision block 404), the server then determines if a different version of the document attachment is available (decision block 407). If a different version is not available (NO in decision block 407), then the server prompts the client to send the document (act 408). The server then attaches the subsequently received document (act 409) and also optionally prompts the user as to whether to synchronize the document with the server (act 410). If the user elects not to currently synchronize, the e-mail may be sent the next time the client is connected to the network. Then, the server sends the e-mail to the e-mail server (act 406). If a version of the document is available at the server (YES in decision block 407), the server then determines if the document at the server is newer than the document at the client (decision block 411). What is done in response to an older version or a newer version begin available at the server may be set by default settings and/or user preferences. In one example, if the server version is newer (YES in decision block 411), then the server may attach the newer version (act 412), optionally prompt the user as to whether to synchronize the newer version with the client (act 410), and then send the complete e-mail to the e-mail server (act 406). Alternatively, the server may have prompted the user as to whether to send the newer version as the attachment instead of the older version. In that case, if the user indicated that newer version is unacceptable as the attachment, then the server may prompt the client for the older version (act 408), and then attach the older version (act 409) before sending the complete e-mail to the e-mail server (at 406). As a second alternative, the server may treat the newer version as unacceptable without prompting the user. In the second alternative, the server would prompt the client for the older version (act 408), attach the older document (act 409), and then send the complete e-mail (act 406). Although these alternatives are within the scope of the present invention, they may use more network bandwidth then simply attaching the newer version without prompting the user for whether that is acceptable. If the server version is older than the client version (NO in decision block 411), then the server may then prompt the client for the newer version (act 408), attach the newer version (act 409), prompt the user as to whether to synchronize the newer version with the server (act 410), and then send the complete e-mail to the e-mail server (at 406). Alternatively, the server may prompt the user as to whether the older version is acceptable, or simply attach the older version without prompting the user. Accordingly, the client need not necessarily send the document over the network 230 every time the client is to perform a document-inclusion operation. If the document is needed, the server prompts the client for the document. This reduces the network usage when performing document inclusion operations. The present invention may be embodied in other specific forms without departing from its spirit or essential characteristics. The described embodiments are to be considered in all respects only as illustrative and not restrictive. The scope of the invention is, therefore, indicated by the appended claims rather than by the foregoing description. All changes, which come within the meaning and range of equivalency of the claims, are to be embraced within their scope. A method of operating a client in a network environment that includes a client and a server, the client being network connectable to the server over a wireless network, the server configured to perform operations on documents on behalf of the user of the client, the method for the client causing an operation to be performed on the document while potentially conserving the bandwidth of the wireless network, the method comprising the following: an act of the client sending a document-inclusion instruction to the server, the document-inclusion instruction including an identification of the document, but not including the document itself; an act of the client receiving an indication that the document identified in the document-inclusion instruction is unavailable to the server; and an act of the client sending the document to the server so that the server may complete a document-inclusion operation corresponding to the document-inclusion instruction. The method of claim 1, wherein the act of the client sending a document-inclusion instruction comprises an act of the client sending an instruction to send an electronic mail, the electronic mail having the identified document as an attachment. The method of claim 1, wherein the act of the client sending a document-inclusion instruction comprises an act of the client sending an instruction to forward an electronic mail, the electronic mail having the identified document as an attachment. The method of claim 1, wherein the act of the client sending a document-inclusion instructions comprises an act of the client sending an instruction to send a meeting request, the meeting request having the identified document as a calendar item attachment. The method of claim 1, wherein the act of the client sending a document-inclusion instruction comprises an act of the client sending an instruction to send a response to a meeting request, the response having the identified document as a calendar item attachment. The method of claim 1, wherein the act of the client sending a document-inclusion instruction comprises an act of the client sending an instruction to fax a document to a particular address. The method of claim 1, wherein the act of the client sending a document-inclusion instruction comprises an act of the client sending an instruction to print a document at a particular printer. The method of claim 1, wherein the act of the client receiving an indication that the document identified in the document-inclusion instruction is unavailable to the server comprises the following: an act of the client receiving an indication that a version of the document identified in the document-inclusion instruction is not available at the server. The method of claim 8, wherein the act of the client sending the document to the server comprises the following: an act of the client sending the version of the document to the server. The method of claim 8 or 9, wherein the act of the client sending the document to the server comprises the following: an act of the client sending changes made between the version of the document that the server has access to and the version of the document identified in the document-inclusion instruction. A method of operating a client in a network environment that includes a client and a server, the client being network connectable to the server over a network, the server configured to perform operations on documents on behalf of the user of the client, the method for the client sending an e-mail with an attachment using the server, the method comprising the following: an act of the client sending an e-mail to the server, the e-mail including an identification of a document that is to be included in the e-mail as an attachment, the e-mail not including the attachment itself; an act of the client receiving an indication that the document identified in the e-mail is unavailable to the server; and an act of the client sending the document to the server so that the server may attachment the document to the e-mail. A method of operating a server in a network environment that includes a client and a server, the client being network connectable to the server over a wireless network, the server configured to perform operations on documents on behalf of the user of the client, the method for the server allowing the client to cause an operation to be performed on behalf of the user of the client while potentially conserving the bandwidth of the wireless network, the method comprising the following: an act of the server receiving a document-inclusion instruction, the document-inclusion instruction including an identification of a document, but not including the document itself; an act of the server determining that the server does not have access to the document other than from the client over the wireless network; an act of the server causing the document to be sent to the server from the client over the wireless network; and an act of the server executing the document-inclusion instruction using the accessed document. The method of claim 12, wherein the act of the server executing the document-inclusion instruction using the access document comprises the following: an act of sending an electronic mail with the document as an attachment. an act of forwarding an electronic mail with the document as an attachment. an act of sending a meeting request with the document as a calendar item attachment. an act of sending a response to a meeting request with the document as a calendar item attachment. The method of claim 12, wherein the act of the server executing the document-inclusion instruction using the accessed document comprises the following: an act of faxing the document. an act of printing the document. A computer program product comprising one or more computer readable media having stored thereon computer-executable instructions for performing the method of one of claims 1 to 18. The computer program product of claim 19, wherein the one or more computer-readable media are physical storage media. A network comprising: a mobile wireless device; and a server computer system that is network connectable to the mobile wireless device over a wireless network; the mobile wireless device comprising: a local store containing at least a document; a networking module configured to send and receive communications over the wireless network to and from at least the server computer system; and a processing module configured to cause a document-inclusion instruction to be sent to the server using the networking module, the document-inclusion instruction including an identification of the document, but not including the document itself, the processing module further configured to detect, using the networking module, the receipt of an indication that the document identified in the document-inclusion instruction is unavailable to the server, the processing module also configured to thereafter cause the document to be sent to the server so that the server may complete a document-inclusion operation corresponding to the document-inclusion instruction. a server computer system that is network connectable to the mobile wireless device over a wireless network, the server computer system comprising: a local store that does not contain a particular document; a networking module configured to send and receive communications over the wireless network to and from at least the mobile wireless device; and a processing module configured to detect, using the networking module, the receipt of a document-inclusion instruction from the mobile wireless device, the document-inclusion instruction including an identification of a document, but not including the document itself, the processing module further configured to determine that the server does not have access to the document other than from the client over the wireless network, the processing module further configured to thereafter cause the document to be sent to the server from the client over the wireless network, and to execute the document-inclusion instruction using the accessed document. The network of claim 21 or 22, adapted to perform the method of one of claims 1 to 18. EP03002572A 2002-02-25 2003-02-06 Methods and apparatuses for performing document-inclusion operations over a network Expired - Fee Related EP1339195B1 (en) US10/082,468 US7287058B2 (en) 2002-02-25 2002-02-25 Methods, systems and computer program products for performing document-inclusion operations over a network US82468 2002-02-25 EP1339195A2 true EP1339195A2 (en) 2003-08-27 EP1339195B1 EP1339195B1 (en) 2010-05-19 EP03002572A Expired - Fee Related EP1339195B1 (en) 2002-02-25 2003-02-06 Methods and apparatuses for performing document-inclusion operations over a network DE (1) DE60332573D1 (en) GB2418761A (en) * 2004-10-02 2006-04-05 Hewlett Packard Development Co Remote document processing EP1667388A1 (en) * 2004-12-03 2006-06-07 Research In Motion Limited Method and apparatus for efficient resending of messages using message ID EP2120409A1 (en) * 2008-05-12 2009-11-18 Research In Motion Limited Efficient attachment of user-selected files to e-mail from handheld device US7631043B2 (en) 2004-12-03 2009-12-08 Research In Motion Limited Method and apparatus for efficiently managing “messages sent” file and resending of messages from mobile wireless communication device WO2010093288A1 (en) * 2009-02-13 2010-08-19 Visiarc Ab A method for handling email messages and attachments in a mobile communication system EP2234348A1 (en) * 2009-03-27 2010-09-29 Research In Motion Limited Method, Apparatus and System for Reducing Download of Redundant Attachments US8527608B2 (en) 2009-03-27 2013-09-03 Blackberry Limited Method, apparatus and system for reducing download of redundant attachments EP2744157A1 (en) * 2012-03-22 2014-06-18 Huawei Technologies Co., Ltd Method, device and system for adding e-mail attachment US7565683B1 (en) 2001-12-12 2009-07-21 Weiqing Huang Method and system for implementing changes to security policies in a distributed security system US7930756B1 (en) 2001-12-12 2011-04-19 Crocker Steven Toye Multi-level cryptographic transformations for securing digital assets US7921288B1 (en) 2001-12-12 2011-04-05 Hildebrand Hal S System and method for providing different levels of key security for controlling access to secured items US10360545B2 (en) 2001-12-12 2019-07-23 Guardian Data Storage, Llc Method and apparatus for accessing secured electronic data off-line US7921284B1 (en) 2001-12-12 2011-04-05 Gary Mark Kinghorn Method and system for protecting electronic data in enterprise environment US10033700B2 (en) 2001-12-12 2018-07-24 Intellectual Ventures I Llc Dynamic evaluation of access rights US8065713B1 (en) 2001-12-12 2011-11-22 Klimenty Vainstein System and method for providing multi-location access management to secured items US7260555B2 (en) 2001-12-12 2007-08-21 Guardian Data Storage, Llc Method and architecture for providing pervasive security to digital assets US7921450B1 (en) 2001-12-12 2011-04-05 Klimenty Vainstein Security system using indirect key generation from access rules and methods therefor US7380120B1 (en) 2001-12-12 2008-05-27 Guardian Data Storage, Llc Secured data format for access control USRE43906E1 (en) 2001-12-12 2013-01-01 Guardian Data Storage Llc Method and apparatus for securing digital assets US7950066B1 (en) 2001-12-21 2011-05-24 Guardian Data Storage, Llc Method and system for restricting use of a clipboard application US8176334B2 (en) 2002-09-30 2012-05-08 Guardian Data Storage, Llc Document security system that permits external users to gain access to secured files US7634541B2 (en) * 2003-04-14 2009-12-15 Canon Development Americas Inc. Automatic distribution of electronic documents into and from a printing apparatus mailbox US8707034B1 (en) 2003-05-30 2014-04-22 Intellectual Ventures I Llc Method and system for using remote headers to secure electronic files US7536440B2 (en) * 2003-09-18 2009-05-19 Vulcan Portals Inc. Method and system for email synchronization for an electronic device US20050076085A1 (en) * 2003-09-18 2005-04-07 Vulcan Portals Inc. Method and system for managing email attachments for an electronic device US7703140B2 (en) 2003-09-30 2010-04-20 Guardian Data Storage, Llc Method and system for securing digital assets using process-driven security policies US8127366B2 (en) 2003-09-30 2012-02-28 Guardian Data Storage, Llc Method and apparatus for transitioning between states of security policies used to secure electronic documents US7596285B2 (en) 2004-02-26 2009-09-29 International Business Machines Corporation Providing a portion of an electronic mail message at a reduced resolution US7512658B2 (en) 2004-02-26 2009-03-31 International Business Machines Corporation Providing a portion of an electronic mail message based upon a transfer rate, a message size, and a file format US20050240773A1 (en) * 2004-04-21 2005-10-27 Fuji Xerox Co., Ltd. Secure file sharing US8161117B2 (en) * 2004-09-03 2012-04-17 Oracle International Corporation Multi-media messaging US20060082807A1 (en) * 2004-09-17 2006-04-20 Tanaka Yokichi J Method and system for printing electronic mail JP4904697B2 (en) * 2005-02-18 2012-03-28 富士ゼロックス株式会社 Information management system FI20060565A0 (en) * 2006-06-07 2006-06-07 Nokia Corp Message processing US7826356B2 (en) * 2006-11-08 2010-11-02 International Business Machines Corporation Method and system for controlling flow in an asymmetric communication channel JP5171527B2 (en) * 2008-10-06 2013-03-27 キヤノン株式会社 Message receiving apparatus and data extracting method US9461834B2 (en) * 2010-04-22 2016-10-04 Sharp Laboratories Of America, Inc. Electronic document provision to an online meeting US9785917B2 (en) * 2010-08-17 2017-10-10 Blackberry Limited System and method for obtaining a portion of an archived email message US9021569B1 (en) * 2014-01-21 2015-04-28 Avaya Inc. Wireless guest access EP0974917A2 (en) 1998-07-24 2000-01-26 Siemens Information and Communication Networks Inc. Method and system for management of a message attachments US6064977A (en) 1998-06-19 2000-05-16 International Business Machine Corporation Web server with integrated scheduling and calendaring US6256666B1 (en) 1998-07-14 2001-07-03 International Business Machines Corp. Method and system for remotely managing electronic mail attachments WO2001071992A2 (en) 2000-03-22 2001-09-27 Omnipod, Inc. Integrated system and method of providing online access to files and information US5862321A (en) * 1994-06-27 1999-01-19 Xerox Corporation System and method for accessing and distributing electronic documents GB2342197A (en) * 1998-09-30 2000-04-05 Xerox Corp Alerting users of mobile computing devices to document changes GB9821103D0 (en) * 1998-09-30 1998-11-18 Xerox Corp Mobile Email document transaction service GB2342195A (en) * 1998-09-30 2000-04-05 Xerox Corp Secure token-based document server US6535892B1 (en) * 1999-03-08 2003-03-18 Starfish Software, Inc. System and methods for exchanging messages between a client and a server for synchronizing datasets US6411990B1 (en) * 1999-01-22 2002-06-25 Siemens Information And Communication Networks, Inc. Apparatus and method for downlevel date file messaging US6898636B1 (en) * 1999-02-04 2005-05-24 Intralinks, Inc. Methods and systems for interchanging documents between a sender computer, a server and a receiver computer US6654746B1 (en) * 1999-05-03 2003-11-25 Symantec Corporation Methods and apparatuses for single-connection file synchronization workgroup file update US7171000B1 (en) * 1999-06-10 2007-01-30 Message Secure Corp. Simplified addressing for private communications US6493760B1 (en) * 1999-06-28 2002-12-10 Xerox Corporation Standalone device for identifying available document services in a token-enabled operating environment US6865191B1 (en) * 1999-08-12 2005-03-08 Telefonaktiebolaget Lm Ericsson (Publ) System and method for sending multimedia attachments to text messages in radiocommunication systems US6801935B2 (en) * 1999-12-14 2004-10-05 Canon Kabushiki Kaisha Secure printing using electronic mailbox US7054905B1 (en) * 2000-03-30 2006-05-30 Sun Microsystems, Inc. Replacing an email attachment with an address specifying where the attachment is stored JP3869621B2 (en) * 2000-04-24 2007-01-17 パナソニック コミュニケーションズ株式会社 Document distribution device and mobile phone device JP2002007290A (en) 2000-06-20 2002-01-11 Sharp Corp Mail transmission and reception system, mail generating and transmitting device, mail-receiving and reproducing device, mail-transmitting and receiving device, internet- access device, and recording medium KR20020030831A (en) * 2000-07-24 2002-04-25 마츠시타 덴끼 산교 가부시키가이샤 A system for transmission/reception of e-mail with attached files US7047281B1 (en) * 2000-08-08 2006-05-16 Fineground Networks Method and system for accelerating the delivery of content in a networked environment US7003551B2 (en) * 2000-11-30 2006-02-21 Bellsouth Intellectual Property Corp. Method and apparatus for minimizing storage of common attachment files in an e-mail communications server US20020119804A1 (en) * 2001-02-28 2002-08-29 Gomes John Isaac Chandan Method and apparatus for supplying email information remotely via a mobile device US20020194307A1 (en) * 2001-06-18 2002-12-19 Anderson Jeff M. System and method for remote document retrieval US20020198944A1 (en) * 2001-06-20 2002-12-26 Moss Pamela M. Method for distributing large files to multiple recipients US20030093565A1 (en) * 2001-07-03 2003-05-15 Berger Adam L. System and method for converting an attachment in an e-mail for delivery to a device of limited rendering capability US6922725B2 (en) * 2001-09-07 2005-07-26 Xerox Corporation Method and apparatus for processing document service requests originating from a mobile computing device US6915333B2 (en) * 2001-12-14 2005-07-05 International Business Machines Corporation Method of managing attached document US20030140067A1 (en) * 2002-01-18 2003-07-24 Robert Sesek Systems and methods for sending documents US6804687B2 (en) * 2002-09-30 2004-10-12 Scott E. Sampson File system management with user-definable functional attributes stored in a token action log 2003-02-06 EP EP03002572A patent/EP1339195B1/en not_active Expired - Fee Related 2003-02-06 DE DE60332573A patent/DE60332573D1/en active Active WO2006058419A1 (en) * 2004-12-03 2006-06-08 Research In Motion Limited Method and apparatus for efficiently managing “messages sent” file and resending of messages from mobile wireless communication device CN102318294A (en) * 2009-02-13 2012-01-11 维斯阿克公司 A method for handling email messages and attachments in a mobile communication system EP2744157A4 (en) * 2012-03-22 2015-03-25 Huawei Tech Co Ltd Method, device and system for adding e-mail attachment US9584452B2 (en) 2012-03-22 2017-02-28 Huawei Technologies Co., Ltd. Method, apparatus, and system for adding electronic mail attachment US7317907B2 (en) 2008-01-08 Synchronizing server and device data using device data schema EP2528312B1 (en) 2013-10-23 Unified contact list US7523112B2 (en) 2009-04-21 System and method for searching a remote database EP1091532B1 (en) 2007-07-11 A flexible system and method for communicating between a broad range of networks and devices DE69935443T2 (en) 2007-10-31 A method and apparatus for pushing information from a host computer system to a mobile data communications device US6598076B1 (en) 2003-07-22 Method and apparatus for electronically communicating an electronic message having an electronic attachment US8620858B2 (en) 2013-12-31 Database synchronization via a mobile network US7310532B2 (en) 2007-12-18 Method of automatically updating presence information US8069144B2 (en) 2011-11-29 System and methods for asynchronous synchronization US6978305B1 (en) 2005-12-20 Method and apparatus to facilitate access and propagation of messages in communication queues using a public network US6055240A (en) 2000-04-25 Method and apparatus for message management US6993522B2 (en) 2006-01-31 System and method for resolving conflicts detected during a synchronization session US7801941B2 (en) 2010-09-21 Apparatus and method for exchanging data between two devices US6101320A (en) 2000-08-08 Electronic mail communication system and method CN1029811C (en) 1995-09-20 Method and system for the efficient distribution of messages utilizing a data processing system EP1021897B1 (en) 2009-11-25 Messaging application having a plurality of interfacing capabilities US7634519B2 (en) 2009-12-15 Bypassing an intermediate synchronization server of a three tiered synchronization system US6741855B1 (en) 2004-05-25 Method and apparatus for remotely managing data via a mobile device US6477576B2 (en) 2002-11-05 Methods, systems and computer program products for the automated discovery of a services menu US8150920B2 (en) 2012-04-03 System, method and computer program product for providing content to a terminal and directing the rendering of such content at the terminal US6549937B1 (en) 2003-04-15 System and method for multi-protocol communication in a computer network US20020019243A1 (en) 2002-02-14 Short message gateway, system and method of providing information service for mobile telephones US20030051011A1 (en) 2003-03-13 System and method for installing printer driver software US20030203732A1 (en) 2003-10-30 Dynamic content filter in a gateway EP0974917B1 (en) 2004-11-24 Method and system for management of message attachments 2003-08-27 AX Request for extension of the european patent to Extension state: AL LT LV MK RO 2003-08-27 AK Designated contracting states: Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LI LU MC NL PT SE SI SK TR 2006-04-05 AKX Payment of designation fees 2007-04-04 17Q First examination report 2009-08-26 RIC1 Classification (correction) Ipc: H04L 12/58 20060101AFI20090717BHEP Ipc: G06Q 10/00 20060101ALI20090717BHEP 2009-08-26 RTI1 Title (correction) Free format text: METHODS AND APPARATUSES FOR PERFORMING DOCUMENT-INCLUSION OPERATIONS OVER A NETWORK 2010-07-01 REF Corresponds to: Ref document number: 60332573 Date of ref document: 20100701 Kind code of ref document: P 2010-10-29 PG25 Lapsed in a contracting state announced via postgrant inform. from nat. office to epo 2012-04-30 PGFP Postgrant: annual fees paid to national office 2013-10-23 GBPC Gb: european patent ceased through non-payment of renewal fee Ref legal event code: ST Ref legal event code: 732E Free format text: REGISTERED BETWEEN 20150312 AND 20150318
cc/2020-05/en_middle_0061.json.gz/line1731
__label__cc
0.548997
0.451003
JP4865048B2 - Information processing apparatus, connection establishment method thereof, and wireless communication device - Google Patents Information processing apparatus, connection establishment method thereof, and wireless communication device Download PDF processing apparatus communication unit 隆司 峯邑 賢吾 黒瀬 2010-03-15 Application filed by 株式会社東芝 filed Critical 株式会社東芝 H04M1/72527—With means for supporting locally a plurality of applications to increase the functionality provided by interfacing with an external accessory H04M1/7253—With means for supporting locally a plurality of applications to increase the functionality provided by interfacing with an external accessory using a two-way short-range wireless interface H04M2250/00—Details of telephonic subscriber devices H04M2250/06—Details of telephonic subscriber devices including a wireless LAN interface The present invention relates to an information processing apparatus, a connection establishment method thereof, and a wireless communication device, and in particular, an information processing apparatus capable of establishing a connection with another information processing apparatus using a communication module, The present invention relates to a connection establishment method and a wireless communication device. In recent years, the WiFi (registered trademark) loading rate in PCs (personal computers) is very high, but the cellular system loading rate in PCs is still low. For this reason, the mobile phone first performs data communication via the base station using a mobile phone equipped with a cellular system with a high coverage of the wireless communication area, and then uses the WiFi communication module (WLAN communication module) or Bluetooth ( There is a service in which a PC and a mobile phone are connected using a registered trademark communication module and the mobile phone transfers data via a base station to the PC. At that time, the user operates the mobile phone side to perform the above-described series of services, and starts the service between the mobile phone and the PC. Note that WiFi (registered trademark) is a name indicating that the Wi-Fi Alliance has authenticated the interoperability between wireless LAN (WLAN) devices using the communication standards IEEE802.11a and IEEE802.11b. Recently, a technology related to a standby power minimization technology chip is known (see, for example, Patent Document 1). Therefore, by mounting the standby power minimization technology chip (hereinafter referred to as “EcoChip”) on the mobile phone and using it for the above services, EcoChip is a low power consumption IC in the mobile phone. Service requests (connection requests) from PCs can be constantly monitored. In other words, by using EcoChip for the above services, the WLAN communication module with high power consumption in the mobile phone is turned off to perform local communication between the mobile phone and the PC, and the other party is connected with EcoChip with low power consumption. Connection requests from other PCs can be monitored periodically. As a result, it is possible to omit the operation of the user directly operating the mobile phone side with low power consumption. Here, EcoChip in the mobile phone determines whether or not it is an activation request signal for requesting activation of the WLAN communication module of the cellular phone 1 that can be used as an AP, based only on the reception intensity on the time axis. Therefore, a unique transmission sequence or a signal that can be continuously transmitted at a constant period is detected. Note that three methods are conceivable as a method in which the PC transmits radio waves using the WLAN communication module in the PC. The first transmission method is a method in which the PC changes the mode of the WLAN communication module to the AP mode and transmits a Beacon signal (beacon signal) using the WLAN communication module. The second transmission method is a method in which the PC changes the mode of the WLAN communication module to the Adhoc mode and transmits a Beacon signal using the WLAN communication module. Further, in the third transmission method, the PC changes the mode of the WLAN communication module to the STA mode (STATION mode), the scan method in the STA mode is set to Active Scan (active scan), and the probe request signal ( This is a method for transmitting a probe request signal. JP 2009-89434 A However, in the conventional WiFi communication system, the de-facto transmission cycle of the AP (Access Point) Beacon signal is 102.4 ms. Therefore, in the case of the first transmission method described above, the PC changes the mode of the WLAN communication module. The transmission cycle for transmitting the Beacon signal after changing to the AP mode is 102.4 ms, and the transmission cycle for transmitting the Beacon signal by changing the mode of the WLAN communication module to the Adhoc mode in the case of the second transmission method is 102.4 ms. This is basically the same as the de facto transmission cycle. For this reason, it has been difficult to determine whether the mobile phone that communicates with the PC using the WLAN communication module in the above service is a normal Beacon signal from the AP or a Beacon signal from the PC. In the case of the third transmission method, the transmission cycle in which the PC changes the mode of the WLAN communication module to the STA mode and transmits the probe request signal with the scan method in the STA mode set to Active Scan is also the AP beacon signal. In many cases, it is a de facto transmission cycle (102.4 ms). Like the first transmission method and the second transmission method, a mobile phone that communicates with a PC using a WLAN communication module in the above service is an ordinary AP. It is difficult to determine whether it is a Beacon signal or a Probe Request signal from a PC. In addition, the PC scans all WiFi channels every predetermined search cycle, but the PC sleeps until the next search is performed to save power and intermittently wakes up every search cycle (this series). For example, if the EcoChip in the mobile phone employs a detection algorithm that requires a certain number of samples using a narrowband filter, the number of WiFi channels (WLAN channels) Therefore, the probe request signal having the number of samples sufficient to detect the probe request signal cannot be continuously transmitted at a constant period. Therefore, in the case of the third transmission method, it is difficult to determine whether a mobile phone that communicates with a PC using a WLAN communication module is a normal Beacon signal from a AP or a Probe Request signal from a PC. In addition, since the number of Probe Request signal samples could not be secured, there was a problem in the reception characteristics of the EcoChip in the mobile phone. The present invention has been made in view of such a situation, and an information processing apparatus capable of suitably establishing a connection with another information processing apparatus using a communication module, a connection establishment method thereof, and An object is to provide a wireless communication device. In order to solve the above-described problem, an information processing apparatus according to the present invention can use a wireless communication unit that performs wireless communication with another information processing apparatus that can be used as a wireless base station, and the wireless communication unit. A second transmission different from the first transmission cycle is used as an activation request signal for requesting activation of a wireless communication unit included in the other information processing apparatus, using a plurality of first indicator signals having different center frequencies included in the frequency band. The other information that sequentially transmits using the wireless communication unit in a cycle, repeatedly transmits the first indicator signal in the frequency band in a first repetition cycle, and transmits a response to the first indicator signal A first search means for searching for a processing device; and a connection means for establishing a connection between the other information processing apparatus searched by the first search means using the wireless communication unit. Characteristic To. In order to solve the above-described problem, an information processing device according to the present invention includes a wireless communication unit that performs wireless communication with another information processing device, and a specific frequency band that can be used by the wireless communication unit. The wireless communication unit is used in a second transmission cycle different from the first transmission cycle as a start request signal for requesting the start of a wireless communication unit included in the other information processing apparatus using the first indicator signal having a center frequency. Transmission control means for controlling to sequentially transmit, and after the wireless communication unit transmits the first indicator signal and receives a response to the first indicator signal from the other information processing device , Connection means for establishing a connection with another information processing apparatus using the wireless communication unit, wherein the wireless communication unit receives the activation request signal different from a connection establishment destination with the wireless communication unit. The detection unit including the detection unit It characterized that you send the first indicator signal to the information processing apparatus. In order to solve the above-described problem, an information processing apparatus connection establishment method according to the present invention includes an information processing apparatus including a wireless communication unit that performs wireless communication with another information processing apparatus that can be used as a wireless base station. In the connection establishment method, a plurality of wireless communication steps for performing wireless communication with the other information processing apparatus that can be used as a wireless base station, and a plurality of different center frequencies included in frequency bands that can be used by the wireless communication unit Are sequentially transmitted using the wireless communication unit at a second transmission cycle different from the first transmission cycle as an activation request signal for requesting activation of the wireless communication unit included in the other information processing apparatus, a search step of the label signal in a frequency band transmitted repeatedly at a predetermined repetition cycle, to search for the other information processing apparatus that transmits a response to the beacon, the Sir That by the process of step between said other information processing apparatus to be searched and a connection step of establishing a connection with the wireless communication unit characterized. In order to solve the above-described problem, an information processing apparatus connection establishment method according to the present invention includes a wireless communication unit that performs wireless communication with another information processing apparatus. A wireless communication unit that performs wireless communication with an information processing device, and a wireless communication unit that the other information processing device has a beacon signal having a specific center frequency included in a frequency band that can be used by the wireless communication unit a transmission control step of controlling the first transmission period different from the second transmission period as the activation request signal for requesting the activation of the sequentially transmitted using the wireless communication unit, the wireless communication unit is the indicator signal transmitted, said after receiving a response to the beacon from the other information processing apparatus, seen including a connecting step of establishing a connection with the wireless communication unit between said other information processing apparatus, before Wireless communication unit, said the connection establishment destination wireless communication unit different from, and transmits the beacon signal to said other information processing apparatus including a detectable detection unit the activation request signal . In order to solve the above-described problem, the wireless communication device of the present invention has different center frequencies included in a frequency band that can be used when performing wireless communication with another information processing apparatus that can be used as a wireless base station. Are sequentially transmitted in a second transmission period different from the first transmission period as an activation request signal for requesting activation of a wireless communication unit included in the other information processing apparatus, and Between a search means for searching for the other information processing apparatus that transmits a beacon signal repeatedly at a predetermined repetition period and transmits a response to the beacon signal, and the other information processing apparatus searched by the search means And a connection means for establishing a connection. In order to solve the above-described problem, the wireless communication device of the present invention provides a beacon signal having a specific center frequency included in a frequency band that can be used when performing wireless communication with another information processing apparatus. Transmission control means for controlling to sequentially transmit in a second transmission cycle different from the first transmission cycle as an activation request signal for requesting activation of a wireless communication unit included in the other information processing apparatus; and Connection means for establishing a connection with the other information processing apparatus after transmitting the beacon signal and receiving a response to the first signal from the other information processing apparatus, and the transmission control means , it said the connection establishment destination wireless communication unit different, characterized that you send the beacon to the other information processing apparatus including a detectable detection unit the activation request signal. In order to solve the above-described problem, the information processing apparatus according to the present invention has a wireless communication unit that performs wireless communication with another information processing apparatus, and an operating power lower than the wireless communication unit that waits for a wireless signal. When detecting the activation request signal that waits for a wireless signal with operating power and is transmitted from another information processing device that requests activation of the wireless communication unit, and when the activation request signal is detected by the detection unit An interrupt signal generating means for generating an interrupt signal; and a control means for starting the wireless communication unit based on the interrupt signal generated by the interrupt signal generating means , wherein the start request signal is the wireless communication A plurality of beacon signals having different center frequencies included in a frequency band that can be used by the unit, and a second transmission different from the first transmission period from the other information processing apparatus Sequentially transmitted in the period, characterized in that said label signal in the frequency band is the first signal that is repeatedly transmitted at a repetition period. According to the present invention, it is possible to preferably establish a connection with another information processing apparatus using a communication module. The figure which shows the network formed between the information processing apparatus which concerns on this invention. 1 is a block diagram showing an internal configuration of a mobile phone applicable to an information processing apparatus according to the present invention. FIG. 3 is a diagram showing a circuit configuration of a wireless signal detection circuit of FIG. 2. The figure which shows the detailed structure of the signal identification circuit of FIG. 3, and a control signal output circuit. The figure which shows the structure of the software of the mobile telephone applicable to the information processing apparatus which concerns on this invention. The figure which shows an example of a UW table. 1 is a block diagram showing an internal configuration of a personal computer applicable to an information processing apparatus according to the present invention. The figure which shows the software structure of the personal computer applicable to the information processing apparatus which concerns on this invention. The conceptual diagram for demonstrating this invention. Explanatory drawing explaining operation | movement of Active Scan in the conventional STA mode which a personal computer performs. Explanatory drawing explaining operation | movement of Active Scan in the STA mode which a personal computer performs in this embodiment. FIG. 8 is a flowchart for explaining AP search processing in the Active Scan method in the STA mode in the personal computer of FIG. 7. The sequence diagram which shows the radio | wireless communication process between the personal computer which performs AP search process by the Active Scan system in STA mode, and a mobile telephone. FIG. 8 is a flowchart for explaining AP search processing in the Active Scan method in the Adhoc mode in the personal computer of FIG. 7. The flowchart explaining the Beacon signal transmission process in Adhoc mode in the personal computer of FIG. The sequence diagram which shows the radio | wireless communication process between the personal computer which performs the Beacon signal transmission process in Adhoc mode after changing from STA mode to Adhoc mode, and a mobile telephone. FIG. 8 is a flowchart for explaining another AP search process in the Active Scan method in the STA mode in the personal computer of FIG. 7. Hereinafter, embodiments of the present invention will be described with reference to the drawings. FIG. 1 shows a network formed between information processing apparatuses according to the present invention. In the present embodiment, a mobile phone 1 applicable to the information processing apparatus according to the present invention, and a notebook personal computer (hereinafter simply referred to as “personal computer”) 2 applicable to the information processing apparatus according to the present invention. A local network is formed between them. In this embodiment, the cellular phone 1 and the personal computer 2 are applied to an information processing apparatus. For example, a PDA (Personal Digital Assistant), a portable game machine, a portable music player, a portable video player Various communication devices having a communication function such as a machine may be applied to the information processing apparatus according to the present invention. The mobile phone 1 transmits and receives voice and data to and from the base station 3 accommodated in the mobile communication network, using a communication system such as the W-CDMA system. The base station 3 is connected to the Internet 5 via a predetermined public line network 4. A server 6 is connected to the Internet 5. The personal computer 2 can communicate with the cellular phone 1 related to another information processing apparatus using, for example, a communication means of WLAN (Local Area Network). In addition, it is preferable that the mobile phone 1 and the personal computer 2 realize wireless communication at a distance of about several meters from the relationship of current consumption. As a result, the mobile phone 1 first performs data communication with the server 6 via the base station 3 and connects to the personal computer 2 using the WLAN communication module in the mobile phone 1. It is possible to transfer data via the station 3 to the personal computer 2. Note that WLAN APs (access points; wireless base stations) 7-1 to 7-n are connected to the Internet 5 via wires. The personal computer 2 can be connected to the APs 7-1 to 7-n via a WLAN communication module (WLAN communication module 113 in FIG. 7). AP7-1 to 7-n are collectively referred to as “AP7” when it is not necessary to distinguish between them. FIG. 2 shows an internal configuration of the mobile phone 1 applicable to the information processing apparatus according to the present invention. In FIG. 2, the configuration for realizing the wireless communication between the mobile phone 1 and the personal computer 2 related to another information processing apparatus is mainly described, and the detailed description of the configuration that the mobile phone 1 generally includes. Is basically omitted. The cellular phone 1 includes a cellular phone wireless communication module 11, a Bluetooth communication module 12, a WLAN communication module 13, an interrupt signal generation circuit 14, a CPU 15, a memory 18, an input unit 19, an output unit 20, and a wireless signal detection circuit 21. Each part of the mobile phone 1 is connected by a bus 22. The mobile phone wireless communication module 11 realizes voice and data transmission / reception with the base station 3. The mobile phone wireless communication module 11 includes an antenna (not shown), and receives from the space a wireless signal transmitted from the base station 3 accommodated in the mobile communication network by a predetermined communication processing system. In addition, the mobile phone wireless communication module 11 radiates a predetermined wireless signal to the space via an antenna so that wireless communication can be performed with the base station 3 using a predetermined communication processing system. The mobile phone wireless communication module 11 performs predetermined processing on the received signal and then outputs data to the CPU 15 or outputs sound from the receiver as the output unit 20. In addition, the mobile phone wireless communication module 11 transmits data output from the CPU 15 and a sound collected from a microphone as the input unit 19 after performing predetermined processing. The Bluetooth communication module 12 performs wireless communication with another information processing apparatus or the like existing in the vicinity (several meters to several tens of meters) of the mobile phone 1 via an antenna (not shown). The WLAN communication module 13 performs wireless LAN communication complying with communication standards IEEE802.11a, IEEE802.11b, and the like via a built-in antenna. A CPU (Central Processing Unit) 15 is a program stored in a ROM (Read Only Memory) as a memory 18 or various application programs including an operating system (OS) loaded from a ROM to a RAM (Random Access Memory). Various processes are executed according to the control program. The CPU 15 generates various control signals and supplies them to each unit to control the mobile phone 1 in an integrated manner. The RAM appropriately stores data necessary for the CPU 15 to execute various processes. The memory 18 includes a flash memory element and an HDD (Hard Disc Drive), which are nonvolatile memories that can be electrically rewritten and erased. The input unit 19 receives an input via an input means such as an operation key type or a touch panel type, and outputs this input signal to the CPU 15. Also, during a voice call, the user's voice is collected via a microphone. The output unit 20 outputs data including characters and images based on instructions from the CPU 15. The output unit 20 is configured by, for example, an LCD (Liquid Crystal Display) or an organic EL display. Also, during a voice call, the other party's voice is output via the receiver. The wireless signal detection circuit 21 is a circuit for detecting a wireless signal having an amplitude modulation waveform sent from the personal computer 2. When the wireless signal detection circuit 21 determines the type of signal based on the pattern and period of the power value on the time axis of the signal received from the personal computer 2 and detects a specific activation request signal included in the received wireless signal A predetermined control signal is output to the interrupt signal generation circuit 14. The interrupt signal generation circuit 14 generates an interrupt signal based on the signal output from the wireless signal detection circuit 21 and outputs the generated interrupt signal to the CPU 15. As a result, the interrupt signal generation circuit 14 notifies the CPU 15 that an interrupt process has occurred. Note that the interrupt signal generation circuit 14 and the wireless signal detection circuit 21 are integrated into one chip as an EcoChip. Of course, only the wireless signal detection circuit 21 except the interrupt signal generation circuit 14 may be integrated into one chip as an EcoChip. The wireless signal detection circuit 21 receives the wireless signal by operating power lower than the operating power when the WLAN communication module 13 and the BT communication module 12 as local communication units monitor the wireless signal transmitted from the personal computer 2 itself. It is possible to monitor. Note that each circuit of the wireless signal detection circuit 21 is configured by applying a conventional technique capable of realizing power saving described in the literature shown for each circuit description to be described later. However, the wireless signal detection circuit 21 is not limited to the configuration described in the literature described later, but at least when the WLAN communication module 13 and the BT communication module 12 as the local communication unit monitor the wireless signal transmitted from the personal computer 2. Any configuration is possible as long as the wireless signal can be monitored with an operating power lower than the operating power. FIG. 3 shows a circuit configuration of the wireless signal detection circuit 21 of FIG. The wireless signal detection circuit 21 includes an RF signal reception circuit 31, a down converter (rectifier circuit) 32, a baseband (BB) signal amplification circuit 33, a signal identification circuit 34, and a control signal output circuit 35. The RF (Radio Frequency) signal receiving circuit 31 outputs an RF signal when receiving a radio signal (radio wave) reaching the detection sensitivity sent from the information processing apparatus such as the personal computer 2. The down converter (rectifier circuit) 32 rectifies and detects the RF signal output from the RF signal receiver circuit 31 to obtain a demodulated signal. In order to save power, the down converter (rectifier circuit) 32 does not have a local oscillator. For example, the technology described in Japanese Patent No. 4377946 (demodulator) can be applied to the configuration of the down converter (rectifier circuit) 32. Specifically, the down converter (rectifier circuit) 32 includes a bias circuit that outputs a DC voltage, a first MOS transistor to which only a DC voltage is applied between a gate terminal and a source terminal, a gate terminal, and a source. A second MOS transistor in which only a DC voltage is applied between the terminal and a drain terminal connected to the source terminal of the first MOS transistor, and one end connected to the source terminal of the first MOS transistor Is a rectifier circuit including a coupling capacitor to which an AC signal is input, and supplies a bias voltage at a predetermined timing. The BB signal amplifier circuit 33 amplifies the demodulated signal output from the down converter (rectifier circuit) 32 and outputs a predetermined signal. As for the configuration of the BB signal amplifier circuit 33, for example, a technique described in Japanese Patent Application Laid-Open No. 2009-89434 (a trigger signal generator, a receiver) can be applied. Specifically, the BB signal amplifying circuit 33 has a current generating means for generating a current having an amplitude corresponding to the magnitude of the demodulated signal, and an amplitude corresponding to the magnitude of the current generated by the current generating means. A signal amplifying means including a current output means for outputting a current flowing from the first power supply potential toward the second power supply potential, and a current mirror circuit for amplifying the current output from the current output means, and an output terminal of the current mirror And a trigger signal generating means for converting the amplified current signal into a voltage signal to generate a trigger signal, that is, a circuit having a current mirror circuit and a current-voltage conversion circuit. The signal identification circuit 34 compares the signal generated in the BB signal amplification circuit 33 with a threshold value at a predetermined timing to generate a binary signal, and the activation request signal in which the radio signal received by the mobile phone 1 is in a standby state. And the identification result is output to the control signal output circuit 35. The control signal output circuit 35 generates a control signal for notifying the occurrence of interrupt processing based on the identification result output from the signal identification circuit 34, and outputs the generated control signal to the interrupt signal generation circuit 14. . Further, the CPU 15 performs writing so that the contents of the interrupt processing can be read as necessary. FIG. 4 shows a detailed configuration of the signal identification circuit 34 and the control signal output circuit 35 of FIG. 3 corresponds to the signal identification circuit 34 in FIG. 3, and the right side corresponds to the control signal output circuit 35. The comparator 36 of the signal identification circuit 34 compares the signal supplied from the BB signal amplification circuit 33 with a comparison reference potential, and when a signal higher than the comparison reference potential is detected, the comparator 36 is at a high level and higher than the reference potential. The low signal is determined to be low level, and the signal is output to the amplitude modulation demodulation circuit 42, the WLAN signal detection circuit 43, and the Bluetooth (BT) signal detection circuit 44 of the amplitude modulation unique word (UW) detection circuit 41, respectively. The WLAN signal detection circuit 43 matches the obtained signal with the envelope pattern of a signal (hereinafter simply referred to as “WLAN signal”) sent from the WLAN communication module of the personal computer 2 (WLAN communication module 113 in FIG. 7). Whether or not to do is detected. When detecting the envelope pattern of the WLAN signal, the WLAN signal detection circuit 43 notifies the WLAN signal detection signal generation circuit 45 of the control signal output circuit 35. The BT signal detection circuit 44 detects whether or not the obtained signal matches an envelope pattern of a signal (hereinafter simply referred to as “BT signal”) output by the BT communication module during an inquiry scan. Do. The amplitude modulation demodulation circuit 42 of the amplitude modulation UW detection circuit 41 performs a process of demodulating the obtained signal. The signal demodulated here is a signal (hereinafter simply referred to as “UW signal”) including unique word information (UW) and command information transmitted from the personal computer 2 described later. The amplitude modulation demodulation circuit 42 performs a demodulation process to acquire these UW and command. The signal output from the amplitude modulation demodulation circuit 42 is supplied to a unique word (UW) shift register 47 and a command shift register 48. When a match between the signal supplied to the UW shift register 47 and the UW set in any UW setting register 51 is detected, the command signal generation circuit 49 causes the interface (I / F) ) A command signal to be read through the unit 50 is generated. The unique word (UW) setting registers 51a, 51b and 51c (UW setting register 51) store UWs set by the CPU 15, respectively. It is determined whether or not the signal supplied to the UW shift register 47 matches the UW set in the UW setting registers 51a, 51b, and 51c in the comparators 52a, 52b, and 52c (comparator 52), respectively. By preparing a plurality of UW setting registers 51 and corresponding comparators 52 (three in this embodiment), the mobile phone 1 can communicate with a plurality of information processing apparatuses (that is, a plurality of different personal computers 2). Since the set UW can be set, connection request signals from different information processing apparatuses can be simultaneously awaited. For a specific configuration for supplying a signal to the UW shift register 47 and comparing it with the UW stored in the UW setting register 51, for example, a technique described in Japanese Unexamined Patent Application Publication No. 2009-33445 (receiving apparatus and method) Applicable. When each detection signal is generated by the WLAN signal detection signal generation unit 45 and the BT signal detection signal generation circuit 46, and the signal supplied to the UW shift register 47 and the UW set in one of the UW setting registers 51 When a match is detected, the OR circuit 53 is notified. The OR circuit 53 outputs a signal to the interrupt signal generation circuit 14 when any signal is input. Further, the WLAN signal detection signal generation circuit 45, the BT signal detection signal generation circuit 46, and each comparator 52 output a signal to be read by the CPU 15 that has received the interrupt signal to the I / F unit 50. FIG. 5 shows a software configuration of the mobile phone 1 applicable to the information processing apparatus according to the present invention. In FIG. 5, the configuration for realizing wireless communication between the mobile phone 1 and the personal computer 2 related to another information processing apparatus will be mainly described, and the details of the software configuration that the mobile phone 1 generally includes Such explanation is basically omitted. The Bluetooth (BT) communication stack 61 executes a predetermined BT communication procedure. The Bluetooth (BT) driver 62 controls the BT communication module 12 to realize a procedure executed by the BT communication stack. The WLAN communication stack 64 executes a predetermined WLAN communication procedure. The WLAN driver 65 controls the WLAN communication module 13 to realize a procedure executed by the WLAN communication stack. The mobile phone wireless communication unit 66 controls the mobile phone wireless communication module 11 to realize wireless communication during communication using a communication carrier network such as voice communication and data communication of the mobile phone 1. The BT communication stack 61, the WLAN communication stack 64, and the mobile phone wireless communication unit 66 are respectively managed by the communication system manager 68. For example, the communication application 69 directly receives a communication instruction from the user and notifies the communication system manager 68 of it. The radio signal detection circuit manager 70 comprehensively controls the radio signal detection circuit 21 and communicates with each application. The wireless signal detection circuit driver 71 operates the wireless signal detection circuit 21 based on the control of the wireless signal detection circuit manager 70. The wireless signal detection circuit application 72 receives, for example, an instruction or input data from the user and notifies the wireless signal detection circuit manager 70 of the instruction. The unique word (UW) table 75 stores UW set by the user and application-specific UW. FIG. 6 shows an example of the UW table. As shown in FIG. 6A, the UW table 75 includes identification information UW used when recognizing a terminal that performs local communication processing, a command indicating processing executed by the local communication processing, and UW and commands. The applications to be activated assigned to the combinations are stored in association with each other. As shown in FIG. 6B, the UW table 75 also stores personal UWs, which are UWs that are unique among the terminals generated by the wireless signal detection circuit application 72 and are arbitrarily set by the user. As the UW assigned to start the application, not only the application-specific UW but also a UW arbitrarily set by the user can be used. In this case, the personal UW stored in FIG. 6B is referred to. FIG. 7 shows an internal configuration of the personal computer 2 applicable to the information processing apparatus according to the present invention. The personal computer 2 includes a Bluetooth communication module 112, a WLAN communication module 113, a CPU 115, a memory 118, an input unit 119, and an output unit 120. Each part of the personal computer 2 is connected by a bus 122. The Bluetooth (BT) communication module 112 performs wireless communication with another information processing apparatus or the like existing in the vicinity (several meters to several tens of meters) of the personal computer 2 via a built-in antenna. The WLAN communication module 13 performs wireless LAN communication complying with communication standards IEEE802.11a, IEEE802.11b, and the like via a built-in antenna. A CPU (Central Processing Unit) 15 is a program stored in a ROM (Read Only Memory) as a memory 18 or various application programs including an operating system (OS) loaded from a ROM to a RAM (Random Access Memory). Various processes are executed according to the control program. The CPU 115 generally controls the personal computer 2 by generating various control signals and supplying them to each unit. The RAM appropriately stores data necessary for the CPU 115 to execute various processes. The memory 18 includes a flash memory element and an HDD (Hard Disc Drive), which are nonvolatile memories that can be electrically rewritten and erased. The input unit 119 receives an input via an input unit such as a keyboard or a touch panel type, and outputs this input signal to the CPU 115. The output unit 120 outputs data including characters and images based on instructions from the CPU 115. FIG. 8 shows a software configuration of the personal computer 2 applicable to the information processing apparatus according to the present invention. In FIG. 8, the configuration for realizing the wireless communication between the personal computer 2 and the mobile phone 1 related to another information processing apparatus will be mainly described, and the details of the software configuration generally provided in the personal computer 2 will be described. Such explanation is basically omitted. The Bluetooth (BT) communication stack 161 executes a predetermined BT communication procedure. The Bluetooth (BT) driver 162 controls the BT communication module 112 in order to realize a procedure executed by the BT communication stack. The Bluetooth (BT) extension driver 180 is an extended driver for amplitude-modulating the UW and command stored in the UW table 175 and causing the BT communication module 112 to transmit the UW signal as a UW signal. The BT extension driver 180 amplitude-modulates the UW and the command once or a plurality of times immediately after activation in accordance with the activation parameter of the BT communication module 112 and causes the BT communication module 112 to transmit the amplitude. The WLAN communication stack 164 executes a predetermined WLAN communication procedure. The WLAN driver 165 controls the WLAN communication module 113 to realize the procedure executed by the WLAN communication stack 164. The WLAN extension driver 181 is an extended driver for amplitude-modulating the UW and command stored in the UW table 175 and causing the WLAN communication module 113 to transmit the amplitude. The WLAN extension driver 181 modulates the amplitude of the UW and the command once or a plurality of times immediately after activation in accordance with the activation parameter of the WLAN communication module 113 and causes the WLAN communication module 113 to transmit the amplitude. The BT communication stack 161 and the WLAN communication stack 164 are each managed by the communication system manager 168. The communication application 169 directly receives a communication instruction from a user, for example, and notifies the communication system manager 168 of it. The wireless signal detection circuit application 172 receives, for example, a UW registration instruction and input data from the user and notifies the BT extension driver 180 and the WLAN extension driver 181. The unique word (UW) table 175 stores UW set by the user. In addition, when transmitting a UW signal, an arbitrary command is transmitted together with the UW based on an instruction from the user accepted by the application or an application determination. Here, there are three possible methods for the personal computer 2 to transmit radio waves using the WLAN communication module 113 in the personal computer 2. The first transmission method is a method in which the personal computer 2 changes the mode of the WLAN communication module 113 to the AP mode and transmits a Beacon signal using the WLAN communication module 113. The second transmission method is a method in which the personal computer 2 changes the mode of the WLAN communication module 113 to the Adhoc mode, operates as a parent device in the Adhoc mode, and transmits a Beacon signal (beacon signal) using the WLAN communication module 113. It is. Further, in the third transmission method, the personal computer 2 changes the mode of the WLAN communication module 113 to the STA mode (STATION mode; in other words, the terminal mode), and the scan method in the STA mode is set to Active Scan (active scan). In this method, a probe request signal (probe request signal) is transmitted using a WLAN communication module. The “Beacon signal” and the “Probe Request signal” are signals including a predetermined management frame, and are WLAN signals at the time of WLAN communication. The “AP mode” is a mode in which information processing apparatuses including a WLAN communication module communicate with each other via a WLAN AP (access point) 7. The “Adhoc mode” is a mode in which information processing apparatuses including a WLAN communication module directly communicate with each other without using the WLAN AP 7. The “STA mode” is a mode for connecting with the AP 7 of the WLAN or another information processing apparatus, and there are two scan methods, Active Scan (active scan) and Passive Scan (passive scan). In the case of Passive Scan in the STA mode, the information processing device receives the Beacon signal broadcast from the AP 7 to the communicable area and checks the SSID (Service Set Identifier). The information processing device communicates with the AP 7. Move to the authentication phase. In the case of Active Scan in the STA mode, when the Beacon signal cannot be received from the AP 7 for a certain period of time, the information processing apparatus transmits a Probe Request signal including information on the SSID of the AP 7 that the user desires to communicate from the AP 7 that desires communication. When the Probe Response signal (probe response signal) can be obtained, the information processing apparatus shifts to the authentication phase with the AP 7. There are two types of “Adhoc mode”: when operating as an Adhoc mode master unit and when operating as an Adhoc mode slave unit. There are two scanning methods, Active Scan and Passive Scan. By the way, when it is determined that communication using an AP (access point) 7 having higher priority than communication that causes the mobile phone 1 to operate as a modem is usable, the personal computer 2 uses the available AP 7. To communicate. However, conventionally, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, the procedure regarding how the personal computer 2 connects to the server 6 or another information processing apparatus is prescribed. It has not been. FIG. 9 is a conceptual diagram for explaining an embodiment of the present invention. As shown in FIG. 9, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, the personal computer 2 automatically or the user sets the mobile phone 1 as an AP (wireless base station). When it is desired to use, an activation request signal for requesting activation of the WLAN communication module 13 in the cellular phone 1 is generated and transmitted to an EcoChip (eco chip) in the cellular phone 1. Here, the signal used as the activation request signal for requesting activation of the WLAN communication module 13 in the cellular phone 1 is a “Beacon signal”, a “Probe Request signal”, or the like, and the above WLAN signal or UW signal (unique word). Modulated wave). The UW signal is identification information used for identifying the personal computer 2 and is a signal in which unique word information set with the mobile phone 1 is added to the WLAN signal. The EcoChip in the mobile phone 1 detects an activation request signal from the personal computer 2, generates an interrupt signal for causing the CPU 15 in the mobile phone 1 to generate an interrupt, and outputs the interrupt signal to the CPU 15. The CPU 15 activates the WLAN communication module 13 based on the interrupt signal from EcoChip. The cellular phone 1 establishes a connection with the personal computer 2 via the WLAN communication module 13. However, in the conventional WiFi communication system, since the de-facto transmission cycle of the AP7 Beacon signal is about 100 ms (for example, 102.4 ms cycle), the personal computer 2 is connected to the WLAN in the first transmission method. In the second transmission method, the personal computer 2 changes the mode of the WLAN communication module 113 to the Adhoc mode and transmits the Beacon signal when the communication module 113 is changed to the AP mode and the Beacon signal is transmitted. The transmission cycle to be performed is also generally a de facto transmission cycle of 102.4 ms. Therefore, whether the mobile phone 1 that communicates with the personal computer 2 using the WLAN communication module is a normal Beacon signal from the AP 7 or a Beacon signal (start-up request signal) from the personal computer 2. It will be difficult to judge. Further, in the case of the third transmission method, the personal computer 2 changes the mode of the WLAN communication module 113 to the STA mode and transmits the probe request signal with the scan method in the STA mode set to Active Scan. This is basically the same as the de facto transmission cycle (102.4 ms cycle), and is the same as in the case of the first transmission method and the second transmission method. In particular, the personal computer 2 scans all WiFi channels every predetermined search cycle (repetition cycle), but the personal computer 2 sleeps until the next search is performed to save power. Thus, intermittent wake-up is performed at every search cycle (this series of operations is referred to as “intermittent operation”). FIG. 10 is an explanatory diagram for explaining the operation of Active Scan in the conventional STA mode performed by the personal computer 2. As shown in FIG. 10, in Active Scan, the personal computer 2 sends a Probe Request signal to neighboring APs 7 for available WiFi channels (for example, 13 channels) in one AP search. The Probe Request signal includes SSID information of the AP 7 that the personal computer 2 desires to communicate with. The personal computer 2 attempts to associate (connect) to the A7P by receiving a probe response signal (probe response signal) from the AP 7 having the same SSID as the SSID included in the probe request signal. The “WiFi Channel” is a frequency band having a predetermined center frequency and frequency bandwidth included in, for example, a 2.4 GHz band that can be used by the WLAN communication module. At this time, once the personal computer 2 transmits a Probe Request signal to a certain channel, the personal computer 2 waits for a probe response waiting time which is a waiting time for receiving the probe response signal from the AP 7, and sends the probe request signal to a certain channel. An AP search for the next channel is performed after 102.4 ms have passed since the transmission. In order to reduce power consumption until the search for all channels is performed until the next search is performed, the WLAN communication module 113 of the personal computer 2 enters a sleep state. For example, as shown in FIG. 10, the WLAN communication module 113 of the personal computer 2 sleeps at least on the order of seconds such as about 60 seconds. However, since the personal computer 2 has the number of samples equal to the number of WiFi channels (WLAN channels) when the EcoChip in the mobile phone 1 employs a detection algorithm that requires a certain number of samples by a narrow band filter or the like, It is not possible to continue transmitting Probe Request signals with the number of samples sufficient to detect the Probe Request signal at a constant period. Therefore, in the case of the third transmission method, the mobile phone 1 that communicates with the personal computer 2 using the WLAN communication module determines whether it is a normal Beacon signal from the AP 7 or a Probe Request signal from the personal computer 2. In addition, it is difficult to ensure the number of Probe Request signal samples, and there is a problem in the reception characteristics of the EcoChip in the mobile phone 1. Therefore, in the present embodiment, first, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, and automatically or when the user wants to use the mobile phone 1 as an AP, The personal computer 2 generates an activation request signal for requesting activation of the WLAN communication module 13 in the mobile phone 1 at a period (for example, 60 ms or 70 ms period) different from the AP beacon signal de facto transmission period (102.4 ms period). To the mobile phone 1. FIG. 11 is an explanatory diagram for explaining the operation of Active Scan in the STA mode performed by the personal computer 2 in this embodiment. As shown in FIG. 11, in the active scan, the personal computer 2 sends a probe request signal to the neighboring AP 7 for the available WiFi channels (for example, 13 channels) in one AP search, and the beacon of the AP. The signal is transmitted at a different cycle (for example, 60 ms cycle) from the de facto transmission cycle (102.4 ms cycle). As a result, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, and automatically or when the user wants to use the mobile phone 1 as an AP, the radio signal in the mobile phone 1 The transmission cycle of the activation request signal to be detected by the detection circuit 21 can be changed to a unique transmission cycle different from the de facto transmission cycle (102.4 ms) of the AP Beacon signal, and interference resistance can be improved. In particular, in the case of the third transmission method, when the personal computer 2 changes the mode of the WLAN communication module 113 to the STA mode and transmits the Probe Request signal as the activation request signal with the scan method in the STA mode set to Active Scan. 2 not only generates a probe request signal and transmits it to the mobile phone 1 at a cycle different from the de facto transmission cycle (102.4 ms cycle) of the AP Beacon signal, but also a search cycle (repetition cycle) as shown in FIG. Is changed to a period that is an integral multiple of 60 ms, which is the 1-channel search period after the change, for example. As a result, the personal computer 2 can continue to transmit the transmission waveform as the activation request signal at a constant cycle, and the activation request with a sufficient number of samples for the EcoChip in the mobile phone 1 that is judged only by the reception intensity on the time axis. A signal can be transmitted. Hereinafter, AP search processing using this method will be described. With reference to the flowchart of FIG. 12, AP search processing in the Active Scan method in the STA mode in the personal computer 2 of FIG. 7 will be described. In the case of FIG. 12, it is assumed that the personal computer 2 transmits the WLAN signal to the mobile phone 1 as a Probe Request signal in the Active Scan method in the STA mode. In step S <b> 1, the CPU 115 of the personal computer 2 determines whether or not a WiFi AP search request (communication request) has been accepted by the communication application 169 by operating the input unit 119 by the user. Wait until it is determined that the AP search request has been accepted. If the CPU 115 of the personal computer 2 determines in step S1 that the WiFi AP search request has been accepted in the communication application 169, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 in step S2 and sends the deact AP beacon signal. A normal AP search in the Active Scan method in the STA mode is performed using a cycle (for example, a 102.4 ms cycle) as a probe request signal transmission cycle. Specifically, as shown in FIG. 10, in one AP search, the personal computer 2 transmits a WLAN signal as a Probe Request signal to the peripheral AP 7 for available WiFi channels (for example, 13 channels). Is sent out. At this time, once the personal computer 2 transmits a Probe Request signal to a certain channel, the personal computer 2 waits for a probe response waiting time which is a waiting time for receiving the probe response signal from the AP 7, and sends the probe request signal to a certain channel. An AP search for the next channel is performed after 102.4 ms have passed since the transmission. At this time, the Probe Request signal transmitted from the personal computer 2 is defined as a “second indicator signal”. In step S3, the CPU 115 of the personal computer 2 determines whether there is an available AP as a result of the WiFi AP search in the Active Scan method in the STA mode. If the CPU 115 of the personal computer 2 determines in step S3 that there is an available AP, the CPU 115 of the personal computer 2 establishes a connection with the AP determined to be available in step S11, and establishes a connection with this AP. Communicate between each other. On the other hand, when the CPU 115 of the personal computer 2 determines that there is no usable AP in step S3, the CPU 115 of the personal computer 2 can be used as an AP by operating the input unit 119 by the user in step S4. It is determined whether or not an instruction to transmit an activation request signal requesting activation of the WLAN communication module 13 of the cellular phone 1 (EcoChip ON request of the cellular phone 1) has been received. If the CPU 115 of the personal computer 2 determines in step S4 that an instruction to transmit an activation request signal for requesting activation of the WLAN communication module 13 of the mobile phone 1 that can be used as an AP is not accepted, the process proceeds to step S1. Return to. On the other hand, in step S4, the CPU 115 of the personal computer 2 receives an instruction to transmit an activation request signal (EcoChip ON request of the cellular phone 1) requesting activation of the WLAN communication module 13 of the cellular phone 1 that can be used as an AP. If the CPU 115 of the personal computer 2 determines in step S5, the probe request signal transmission cycle in the Active Scan method in the STA mode is set to a cycle different from the de-facto transmission cycle of the AP Beacon signal (for example, a cycle of 102.4 ms). At the same time, the search cycle is changed in accordance with the transmission cycle of the changed Probe Request signal. Specifically, as shown in FIG. 11, the personal computer 2 transmits to a nearby AP 7 or other information processing apparatus for available WiFi channels (for example, 13 channels) in one AP search. The probe request signal transmission cycle is changed to a cycle (for example, 60 ms cycle) that is different from the de facto transmission cycle (102.4 ms cycle) of the AP beacon signal, and the search cycle is an integer of 60 ms, for example, 1 channel search cycle after the change The period is changed to double (for example, 20 times 60 ms). When the CPU 115 of the personal computer 2 determines that there is no AP that can be used, the personal computer 2 automatically changes the probe request signal transmission cycle and search cycle without waiting for an instruction from the user. May be. Further, it may be changed to a cycle other than 60 ms or 70 ms. Note that the personal computer 2 changes the probe request signal transmission cycle to a cycle (for example, 60 ms or 70 ms cycle) different from the de-facto transmission cycle (102.4 ms cycle) of the AP Beacon signal. As a premise for adopting this change method, in the conventional WiFi communication system, the de-facto transmission cycle of the AP7 Beacon signal is about 100 ms (for example, 102.4 ms cycle). In the case where the personal computer 2 changes the mode of the WLAN communication module 113 to the AP mode and transmits the Beacon signal, the personal computer 2 changes the mode of the WLAN communication module 113 to the Adhoc mode in the case of the second transmission method. It is assumed that the transmission cycle for changing the Beacon signal and the transmission cycle for transmitting the Probe Request signal with the scan method in the STA mode as Active Scan are generally the de facto transmission cycle of 102.4 ms. is doing. However, even in the past, the transmission cycle for transmitting the probe request signal with the scan method in the STA mode as active scan may be set to a transmission cycle different from the de facto transmission cycle (102.4 ms cycle) of the AP beacon signal. . In such a case, the personal computer 2 sets the probe request signal transmission cycle in the active scan method in the STA mode different from the de facto transmission cycle (102.4 ms cycle) of the AP beacon signal, and is set at the normal time. The scanning method in the STA mode is changed to a cycle different from the transmission cycle for transmitting the probe request signal with the active scan. As a result, the mobile phone 1 communicating with the personal computer 2 using the WLAN communication module distinguishes the normal beacon signal from the AP 7 and the probe request signal as the active scan in the normal STA mode. Separately, it can be determined whether it is a Probe Request signal (activation request signal) from the personal computer 2. The transmission cycle for transmitting the probe request signal with the scan method in the STA mode as active scan, which is set in the normal state, refers to the probe request signal with the scan method in the STA mode as active scan, and the WLAN communication module 13 of the mobile phone 1. Means a transmission cycle for transmission without using it as an activation request signal for requesting activation. In step S6, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 in step S2, and performs an AP search by the Active Scan method in the STA mode using the transmission period and search period of the probe request signal after the change. . Specifically, as shown in FIG. 11, the personal computer 2 uses the WLAN signal as a Probe Request signal to the neighboring AP 7 for the available WiFi channels (for example, 13 channels) in one AP search. Is sent out. At this time, once the personal computer 2 transmits a Probe Request signal to a certain channel, the personal computer 2 waits for a probe response waiting time which is a waiting time for receiving the probe response signal from the AP 7, and sends the probe request signal to a certain channel. An AP search for the next channel is performed 60 ms after transmission. This search cycle is, for example, a cycle 20 times as long as 60 ms. As a result, the probe request signal is transmitted to the mobile phone 1 as a WLAN signal using a transmission cycle (for example, 60 ms cycle) different from the transmission cycle of the probe request signal used during normal AP search in the active scan method in the STA mode. Since transmission is possible, the probability that the EcoChip of the mobile phone 1 erroneously detects the WLAN signal from the personal computer 2 can be made very small. At this time, a Probe Request signal in the Active Scan method in the STA mode transmitted from the personal computer 2 in step S6 is defined as a “first indicator signal”. In step S <b> 7, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 to perform device authentication for establishing WLAN communication with the mobile phone 1. In other words, the CPU 115 of the personal computer 2 controls the WLAN communication module 113, and the SSID included in the Probe Response signal (probe response signal) from the mobile phone 1 and the SSID included in the Probe Request signal transmitted to the mobile phone 1. Is determined to match, and if it is determined to match, device authentication is performed using an authentication packet. In step S <b> 8, the CPU 115 of the personal computer 2 determines whether or not device authentication with the mobile phone 1 is successful. If the CPU 115 of the personal computer 2 determines in step S8 that the device authentication has been successful, the CPU 115 of the personal computer 2 exchanges an association request and an association response with the mobile phone 1 in step S9, and performs association. A connection is established with the telephone 1. In step S <b> 10, the CPU 115 of the personal computer 2 starts WLAN communication with the mobile phone 1. Thereby, the personal computer 2 can operate the mobile phone 1 as an AP and connect to the communication carrier network via the mobile phone wireless communication module 11 of the mobile phone 1. On the other hand, if the CPU 115 of the personal computer 2 determines in step S8 that the device authentication has failed, the process ends. FIG. 13 is a sequence diagram illustrating wireless communication processing between the personal computer 2 that performs AP search processing in the Active Scan method in the STA mode and the mobile phone 1. In FIG. 13, in particular, in step S4 of FIG. 12, the CPU 115 of the personal computer 2 sends an activation request signal (EcoChip ON request of the cellular phone 1) for requesting activation of the WLAN communication module 13 of the cellular phone 1 that can be used as an AP. When it is determined that an instruction to transmit is received, the subsequent processing between the personal computer 2 and the mobile phone 1 is shown. The wireless signal detection circuit 21 in the EcoChip of the mobile phone 1 is waiting for a Probe Request signal as a WLAN signal transmitted from the personal computer 2 via the WLAN communication module 113, and the WLAN of the mobile phone 1 The communication module 13 is in an off state, and the CPU 15 of the mobile phone 1 is also performing an intermittent operation and is in a sleep state. In step S51, the OS / SW (software) of the personal computer 2 is operated by the user by operating the input unit 119, whereby an activation request signal (request for activation of the WLAN communication module 13 of the cellular phone 1 that can be used as an AP). If it is determined that an instruction to transmit an EcoChip ON request of the mobile phone 1 is received, the WLAN communication module 113 is notified of the EcoChip ON request of the mobile phone 1. At this time, the OS / SW (software) of the personal computer 2 sets the probe request signal transmission cycle in the active scan method in the STA mode to a cycle different from the de facto transmission cycle (for example, 102.4 ms cycle) of the AP beacon signal. At the same time, the search cycle is changed in accordance with the transmission cycle of the changed Probe Request signal. In step S52, the WLAN communication module 113 uses the transmission period and the search period of the probe request signal after the change according to the control of the OS / SW executed by the CPU 115 of the personal computer 2, and uses the AP in the Active Scan method in the STA mode. Perform a search. As shown in FIG. 11, the personal computer 2 sends a WLAN signal as a Probe Request signal to a peripheral AP 7 or other information processing apparatus with respect to an available WiFi channel (for example, 13 channels) (FIG. 13). Step S53). At this time, once the personal computer 2 transmits a Probe Request signal to a certain channel, the personal computer 2 waits for a probe response waiting time which is a waiting time for receiving the probe response signal from the AP 7, and sends the probe request signal to a certain channel. An AP search for the next channel is performed 60 ms after transmission. This search cycle is, for example, a cycle 20 times as long as 60 ms. The personal computer 2 continues to transmit a Probe Request signal to the mobile phone 1 until receiving a Probe Response signal from the mobile phone 1 as will be described later. In step S <b> 61, the wireless signal detection circuit 21 in the EcoChip of the mobile phone 1 determines whether or not a WLAN signal transmitted from the personal computer 2 has been detected. Specifically, it is determined whether a WLAN signal is detected from the envelope pattern output to the WLAN signal detection circuit 43 of the wireless signal detection circuit 21. When the WLAN signal is detected, the control signal output circuit 35 outputs a control signal to the interrupt signal generation circuit 14, and the interrupt signal generation circuit 14 generates an interrupt signal and outputs it to the CPU 15. When it is determined that the WLAN signal is not detected, the mobile phone 1 stands by until it is detected. This interrupt signal means a request for activation of the WLAN communication module 13 of the mobile phone 1. In step S62, when the WLAN signal is detected and the CPU 15 accepts the interrupt signal, the CPU 15 of the mobile phone 1 wakes up based on the interrupt signal. Then, the CPU 15 of the mobile phone 1 reads an interrupt factor based on signals from the WLAN signal detection signal generation circuit 45, the BT signal detection signal generation circuit 46, or each comparator 52. Here, the CPU 15 of the mobile phone 1 is an interrupt signal generated when the wireless signal detection circuit 21 detects the WLAN signal, and recognizes that the interrupt processing is activation of the WLAN communication module 13. In step S <b> 63, the CPU 15 of the mobile phone 1 notifies the OS of the mobile phone 1 of an activation request for the WLAN communication module 13. In step S <b> 64, the OS of the mobile phone 1 notifies the WLAN communication module 13 of an activation request in order to activate the WLAN communication module 13. In step S <b> 65, the WLAN communication module 13 of the cellular phone 1 is activated in accordance with the activation request for the WLAN communication module 13 from the OS of the cellular phone 1, and returns an activation notification to the effect that it has been activated to the OS of the cellular phone 1. In step S66, the OS of the mobile phone 1 notifies an AP change request for changing the mode of the WLAN communication module 13 to the AP mode. In step S67, the WLAN communication module 13 of the mobile phone 1 changes the mode of the LAN communication module 13 to the AP mode in accordance with the AP change request from the OS of the mobile phone 1. In step S <b> 68, the WLAN communication module 13 of the mobile phone 1 transmits a Probe Response signal that is a response to the Probe Request signal to the personal computer 2. At this time, the probe response signal transmitted by the cellular phone 1 is transmitted in a probe request signal transmitted from the personal computer 2 in step S53 (transmission different from the de facto transmission cycle of the AP beacon signal described in step S5 in FIG. 12). This is performed as a result of the WLAN communication module 13 receiving a Probe Request signal transmitted in a cycle. As described above, the personal computer 2 can determine the end of transmission of the Probe Request signal based on the Probe Response signal from the mobile phone 1. The WLAN communication module 113 of the personal computer 2 receives a Probe Response signal (probe response signal) from the mobile phone 1. When it is determined that the personal computer 2 has succeeded in device authentication, the WLAN communication module 113 of the personal computer 2 exchanges an association request and an association response with the mobile phone 1 to perform association, and the mobile phone 1 A connection notification is transmitted to the mobile phone 1 to establish a connection. The information processing apparatus of the present invention performs wireless communication with another information processing apparatus that can be used as a wireless base station by the wireless communication unit (WLAN communication module 113) and is included in a frequency band that can be used by the wireless communication unit. A plurality of second beacon signals having different center frequencies are sequentially transmitted using the wireless communication unit in the first transmission period, and the second beacon signal is transmitted in the frequency band (or substantially over the entire frequency band) to the second The wireless base station that can be connected to the information processing device is searched (first search method), and the information processing device is included in the wireless base stations searched by the first search method. When there is no wireless base station that can use the wireless communication unit, the wireless communication unit having another information processing apparatus activates a plurality of first indicator signals having different center frequencies included in the frequency band that can be used by the wireless communication unit. The activation request signal to be requested is sequentially transmitted using the wireless communication unit at a second transmission period different from the first transmission period, and the first indicator signal is transmitted in the frequency band (or substantially over the entire frequency band) to the first It is possible to search repeatedly for another information processing apparatus by transmitting repeatedly at a repetition period (second search method), and to establish a wireless communication unit with another information processing apparatus searched by this second search method. Can be used to establish a connection. As described above, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, and automatically or when the user wants to use the mobile phone 1 as an AP, the wireless communication in the mobile phone 1 is performed. The transmission cycle of the activation request signal to be detected by the signal detection circuit 21 can be changed to a unique transmission cycle different from the de facto transmission cycle (102.4 ms) of the AP Beacon signal. As a result, even if the AP beacon signal and the like are mixed in the space at almost the same time, only the probe request signal from the personal computer 2 can be identified and detected, and interference resistance is ensured. Can be improved. Therefore, the personal computer 2 can preferably establish a connection with another information processing apparatus using the communication module. Further, the search cycle can be changed, for example, to a cycle that is an integral multiple of 60 ms, which is a 1-channel search cycle after the change, whereby the personal computer 2 continues to transmit a transmission waveform as an activation request signal at a constant cycle. Therefore, it is possible to transmit activation request signals having a sufficient number of samples for the EcoChip in the mobile phone 1 that is determined only by the reception intensity on the time axis. Further, as shown in FIG. 12, when the personal computer 2 transmits the WLAN signal as a Probe Request signal in the Active Scan method in the STA mode to the mobile phone 1, the Adhoc mode and the AP mode as described later are used. Unlike the case, there is no need to switch the mode of the WLAN module between the personal computer 2 and the mobile phone 1, the sequence between both terminals can be simplified, and the delay time for the entire service using the mobile phone 1 as an AP can be reduced. It can be as short as possible. In the case of FIG. 12, the personal computer 2 transmits the WLAN signal to the mobile phone 1 as a Probe Request signal in the Active Scan method in the STA mode. However, the operation is not limited to such a case. The present invention can be applied in other operation modes having a WLAN search process (for example, Adhoc mode). Therefore, for example, the same EcoChip activation signal transmission can be performed in the search operation in the Adhoc mode. That is, the personal computer 2 operates as a slave device in the Adhoc mode, and transmits the above-mentioned WLAN signal to the mobile phone 1 as a Probe Request signal in the Active Scan method in the Adhoc mode, thereby performing the same EcoChip activation signal transmission. Is possible. The AP search process in this case is shown in FIG. The AP search process of FIG. 14 is basically the same as the AP search process of FIG. 12, but in the case of FIG. 14, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 in step S105. Then, the mode of the WLAN communication module 113 is switched from the STA mode to the Adhoc mode, and the personal computer 2 operates as a slave in the Adhoc mode. Thereafter, the personal computer 2 transmits the WLAN signal to the mobile phone 1 as a Probe Request signal in the Active Scan method in the Adhoc mode. By the way, in the case of FIG. 12 thru | or FIG. 14, the signal used as a starting request signal which requests | requires starting of the WLAN communication module 13 in the mobile telephone 1 is a "Probe Request signal" in the Active Scan system in STA mode or Adhoc mode. However, the present invention is not limited to such a case, and a “Beacon signal” may be used as an activation request signal for requesting activation of the WLAN communication module 13 in the mobile phone 1. FIG. 15 is a flowchart for explaining the Beacon signal transmission process in the Adhoc mode in the personal computer 2 of FIG. In the case of FIG. 15, the personal computer 2 transmits the above WLAN signal to the mobile phone 1 as a Probe Request signal in the Active Scan method in the STA mode and performs a normal AP search, and then performs the mode of the WLAN communication module. Is switched from the STA mode to the Adhoc mode, operates as a parent device in the Adhoc mode, and transmits a WLAN signal as a Beacon signal (Adhoc Beacon signal) to the mobile phone 1 in the Adhoc mode. In step S181, the CPU 115 of the personal computer 2 determines whether or not a WiFi AP search request (communication request) has been accepted by the communication application 169 when the input unit 119 is operated by the user. Wait until it is determined that the AP search request has been accepted. If the CPU 115 of the personal computer 2 determines in step S181 that the WiFi AP search request has been accepted in the communication application 169, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 in step S182 to transmit the de facto AP beacon signal. A normal AP search in the Active Scan method in the STA mode is performed using a cycle (for example, a 102.4 ms cycle) as a probe request signal transmission cycle. The specific process is the same as the process in step S2 of FIG. In step S183, the CPU 115 of the personal computer 2 determines whether there is an available AP as a result of the WiFi AP search in the Active Scan method in the STA mode. If the CPU 115 of the personal computer 2 determines in step S183 that there is an available AP, the CPU 115 of the personal computer 2 establishes a connection with the AP determined to be available in step S93, and establishes a connection with this AP. Communicate between each other. On the other hand, if the CPU 115 of the personal computer 2 determines that there is no usable AP in step S183, the CPU 115 of the personal computer 2 can be used as an AP by operating the input unit 119 by the user in step S184. It is determined whether or not an instruction to transmit an activation request signal requesting activation of the WLAN communication module 13 of the cellular phone 1 (EcoChip ON request of the cellular phone 1) has been received. If the CPU 115 of the personal computer 2 determines in step S184 that an instruction to transmit an activation request signal for requesting activation of the WLAN communication module 13 of the mobile phone 1 that can be used as an AP is not received, the process proceeds to step S181. Return to. On the other hand, in step S184, an instruction is received that the CPU 115 of the personal computer 2 transmits an activation request signal (EcoChip ON request of the cellular phone 1) requesting activation of the WLAN communication module 13 of the cellular phone 1 that can be used as an AP. If it is determined that the CPU 115 of the personal computer 2 has been selected, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 in step S185 to switch the mode of the WLAN communication module 113 from the STA mode to the Adhoc mode. The personal computer 2 starts operating as a parent machine in the Adhoc mode. In step S186, the CPU 115 of the personal computer 2 changes the transmission cycle of the Adhoc Beacon signal in the Adhoc mode to a cycle different from the de facto transmission cycle of the AP Beacon signal (for example, a cycle of 102.4 ms). Specifically, the personal computer 2 changes the transmission cycle of the Adhoc Beacon signal to a cycle (for example, 60 ms cycle) different from the de facto transmission cycle (102.4 ms cycle) of the AP Beacon signal. If the CPU 115 of the personal computer 2 determines that there is no usable AP, the personal computer 2 switches the mode of the LAN communication module 113 from the STA mode to the Adhoc mode without waiting for an instruction from the user. The transmission cycle of the Adhoc Beacon signal may be automatically changed. As in the case of step S6 in FIG. 12, the transmission cycle in which the probe request signal is transmitted with the scan method in the STA mode as active scan is different from the de facto transmission cycle (102.4 ms cycle) of the AP Beacon signal. In consideration of the case where the personal computer 2 is set in the STA mode, the transmission cycle of the Adhoc Beacon signal is different from the de facto transmission cycle (102.4 ms cycle) of the AP Beacon signal and is set in the normal time. The scan method may be changed to a cycle different from the transmission cycle for transmitting the Probe Request signal with Active Scan. In step S187, the CPU 115 of the personal computer 2 controls the WLAN communication module 113, and performs the transmission process of the Adhoc Beacon signal in the Adhoc mode using the changed transmission period of the Adhoc Beacon signal. The Adhoc Beacon signal transmitted by the personal computer 2 transmits a Beacon signal of a specific channel as a result of presetting or carrier sense. At this time, the Adhoc Beacon signal in the Adhoc mode transmitted from the personal computer 2 in step S187 is also defined as a “second indicator signal”. Accordingly, the mobile phone 1 uses the Adhoc Beacon signal as a WLAN signal in the Adhoc mode by using a transmission period (for example, 60 ms period) different from the Adhoc mode transmission period used when transmitting the normal Adhoc Beacon signal in the Adhoc mode. Therefore, the probability that the EcoChip of the mobile phone 1 erroneously detects the WLAN signal from the personal computer 2 can be made very small. In step S188, the WLAN communication module 113 of the personal computer 2 receives the connection notification in the Adhoc mode from the mobile phone 1. The CPU 115 of the personal computer 1 recognizes that the connection in the Adhoc mode has been established with the mobile phone 2. In step S189, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 and switches the mode of the WLAN communication module 113 from the Adhoc mode to the STA mode. At this time, the personal computer 1 receives the Beacon signal from the mobile phone 1. The Beacon signal from the mobile phone 1 includes SSID information of the mobile phone 1 that the personal computer 2 desires to communicate with. In step S190, the CPU 115 of the personal computer 2 controls the WLAN communication module 113, performs a normal AP search in the passive scan method in the STA mode, and confirms whether the SSID matches. In step S <b> 191, the CPU 115 of the personal computer 2 performs association by exchanging an association request and an association response with the mobile phone 1, and establishes a connection with the mobile phone 1. In step S 192, the CPU 115 of the personal computer 2 starts WLAN communication with the mobile phone 1. Thereby, the personal computer 2 can operate the mobile phone 1 as an AP and connect to the communication carrier network via the mobile phone wireless communication module 11 of the mobile phone 1. FIG. 16 is a sequence diagram showing a wireless communication process between the personal computer 2 that performs the Beacon signal transmission process in the Adhoc mode and the mobile phone 1 after the transition from the STA mode to the Adhoc mode. In FIG. 16, in particular, in step S184 of FIG. 15, the CPU 115 of the personal computer 2 sends an activation request signal (EcoChip ON request of the cellular phone 1) requesting activation of the WLAN communication module 13 of the cellular phone 1 that can be used as an AP. When it is determined that an instruction to transmit is received, the subsequent processing between the personal computer 2 and the mobile phone 1 is shown. The wireless signal detection circuit 21 in the EcoChip of the mobile phone 1 is in a state of waiting for a Beacon signal (Adhoc Beacon signal) as a WLAN signal transmitted from the personal computer 2 via the WLAN communication module 113. The WLAN communication module 13 of the telephone 1 is in an off state, and the CPU 15 of the mobile telephone 1 is also performing an intermittent operation and is in a sleep state. In step S201, the OS / SW (software) of the personal computer 2 is operated by the user by operating the input unit 119, whereby an activation request signal (request for activation of the WLAN communication module 13 of the mobile phone 1 that can be used as an AP). If it is determined that an instruction to transmit an EcoChip ON request of the mobile phone 1 is received, the WLAN communication module 113 is notified of the EcoChip ON request of the mobile phone 1. In step S202, the OS / SW (software) of the personal computer 2 switches the mode of the WLAN communication module 113 from the STA mode to the Adhoc mode, starts operating as the parent device in the Adhoc mode, and receives the Adhoc Beacon signal in the Adhoc mode. The transmission cycle is changed to a cycle different from the de facto transmission cycle of the AP's Beacon signal (for example, a cycle of 102.4 ms). In step S203, the WLAN communication module 113 performs the transmission process of the Adhoc Beacon signal in the Adhoc mode using the changed transmission period of the Adhoc Beacon signal according to the control of the OS / SW executed by the CPU 115 of the personal computer 2. The personal computer 2 transmits a WLAN signal as an Adhoc Beacon signal to other peripheral information processing apparatuses for a specific channel among available WiFi channels (for example, 13 channels) (step S203 in FIG. 15). . In step S <b> 211, the wireless signal detection circuit 21 in the EcoChip of the mobile phone 1 determines whether a WLAN signal transmitted from the personal computer 2 has been detected. Specifically, it is determined whether a WLAN signal is detected from the envelope pattern output to the WLAN signal detection circuit 43 of the wireless signal detection circuit 21. When the WLAN signal is detected, the control signal output circuit 35 outputs a control signal to the interrupt signal generation circuit 14, and the interrupt signal generation circuit 14 generates an interrupt signal and outputs it to the CPU 15. When it is determined that the WLAN signal is not detected, the mobile phone 1 stands by until it is detected. This interrupt signal means a request for activation of the WLAN communication module 13 of the mobile phone 1. In step S212, when the WLAN signal is detected and the CPU 15 accepts the interrupt signal, the CPU 15 of the mobile phone 1 wakes up based on the interrupt signal. Then, the CPU 15 of the mobile phone 1 reads an interrupt factor based on signals from the WLAN signal detection signal generation circuit 45, the BT signal detection signal generation circuit 46, or each comparator 52. Here, the CPU 15 of the mobile phone 1 is an interrupt signal generated when the wireless signal detection circuit 21 detects the WLAN signal, and recognizes that the interrupt processing is activation of the WLAN communication module 13. In step S <b> 213, the CPU 15 of the mobile phone 1 notifies the OS of the mobile phone 1 of the activation request for the WLAN communication module 13. In step S214, the OS of the mobile phone 1 notifies the WLAN communication module 13 of an activation request in order to activate the WLAN communication module 13. In step S <b> 215, the WLAN communication module 13 of the cellular phone 1 is activated in accordance with the activation request for the WLAN communication module 13 from the OS of the cellular phone 1, and returns an activation notification to the effect that it has been activated to the OS of the cellular phone 1. Note that the mode of the WLAN communication module 13 of the mobile phone 1 at this time is the Adhoc mode. In step S <b> 216, the OS of the mobile phone 1 notifies the WLAN communication module 13 of an AP search request for requesting an AP search in the Adhoc mode. In step S217, the WLAN communication module 13 of the mobile phone 1 performs an AP search by the Active Scan method in the Adhoc mode in accordance with an AP search request from the OS of the mobile phone 1 (AP search request in the Adhoc mode). In step S218, the CPU 15 of the mobile phone 1 controls the WLAN communication module 13 and collates the result of the AP search in the Active Scan method in the Adhoc mode. In step S219, the CPU 15 of the mobile phone 1 determines whether or not the personal computer 2 is a registered Adhoc AP as a result of the collation. If the CPU 15 of the mobile phone 1 determines in step S219 that the personal computer 2 is a registered Adhoc AP, the CPU 15 of the mobile phone 1 controls the WLAN communication module 13 in step S223 and establishes an Adhoc with the personal computer 2. The connection in the mode is performed, and a connection notification in the Adhoc mode is transmitted to the personal computer 2 in step S224. Thereafter, in step S225, the CPU 15 of the mobile phone 1 switches the WLAN communication module 13 from the Adhoc mode to the AP mode. In step S225, the CPU 15 of the mobile phone 1 controls the WLAN communication module 13 and transmits a Beacon signal in the AP mode to the mobile phone 1. If the CPU 15 of the mobile phone 1 determines in step S219 that the personal computer 2 is not a registered Adhoc AP, the mobile phone 1 transmits a synchronization acquisition mode transition request for shifting to the synchronization acquisition mode to the personal computer 2. To do. (Steps S220 to S221). On the other hand, when the cellular phone 1 receives the connection notification in the Adhoc mode from the personal computer 2, the CPU 115 of the personal computer 2 switches the mode of the WLAN communication module 113 from the Adhoc mode to the STA mode in step S231. In step S232, when the personal computer 2 receives the Beacon signal from the mobile phone 1, the CPU 115 of the personal computer 2 controls the WLAN communication module 113 to perform a normal AP search by the passive scan method in the STA mode, and the SSID Check whether or not they match. In step S233, the CPU 115 of the personal computer 2 exchanges an association request and an association response with the mobile phone 1 to perform association, establishes a connection with the mobile phone 1, and carries a connection notification in step S234. Transmit to the telephone 1. As described above, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, and automatically or when the user wants to use the mobile phone 1 as an AP, the wireless communication in the mobile phone 1 is performed. The transmission cycle of the activation request signal to be detected by the signal detection circuit 21 (for example, the transmission cycle of the Adhoc Beacon signal) can be changed to a unique transmission cycle different from the de facto transmission cycle (102.4 ms) of the AP Beacon signal. As a result, even if the AP (access point) Beacon signal is mixed in the space at almost the same time, only the Adhoc Beacon signal from the personal computer 2 can be identified and detected. The interference resistance can be improved. Therefore, the personal computer 2 can preferably establish a connection with another information processing apparatus using the communication module. 15 and 16, the personal computer 2 transmits the above WLAN signal to the mobile phone 1 as an Adhoc Beacon signal in the Adhoc mode. It is possible to apply in the operation mode (for example, AP mode). The Beacon signal transmission process in this case is basically the same as the process of FIG. In the case of FIGS. 12 to 16, the personal computer 2 uses a probe request signal in the Active Scan method in the STA mode or the Adhoc mode, or a Beacon signal in the Adhoc mode or the AP mode (both mobile phones that can be used as APs). The WLAN signal is transmitted to the mobile phone 1 as an activation request signal for requesting activation of one WLAN communication module 13. However, the present invention is not limited to such a case, and the above UW is used instead of the above WLAN signal. A signal (unique word modulation wave) may be used. Even in this case, the basic operation is the same. The UW signal includes information related to UW and commands (wireless LAN communication processing with the mobile phone 1) set in advance between the mobile phone 1 and the personal computer 2, and is transmitted by the WLAN extension driver 181 or the BT extension driver 180. The amplitude is modulated and transmitted from the WLAN communication module 113. 12 to 16, when the personal computer 2 determines that there is no usable AP 7 as a result of the WiFi AP search, and automatically or when the user wants to use the mobile phone 1 as an AP, The personal computer 2 generates an activation request signal for requesting activation of the WLAN communication module 13 in the mobile phone 1 at a period (for example, 60 ms or 70 ms period) different from the AP beacon signal de facto transmission period (102.4 ms period). Is transmitted to the mobile phone 1, but is not limited to such a case. That is, for example, the personal computer 2 determines whether or not the result of the WiFi AP search (whether or not it is determined that there is no usable AP 7) is an information processing apparatus such as a projector other than the mobile phone 1. In order to start the WLAN communication module included in the projector or the like, the WLAN communication module in the projector (corresponding to the WLAN communication module 13 in FIG. 2) is requested to start automatically or according to a specific operation from the user. The activation request signal may be generated and transmitted to the projector at a period different from the de facto transmission period of the AP Beacon signal. The information processing apparatus such as the projector includes an EcoChip (interrupt signal generation circuit 14 and radio signal detection circuit 21), a WLAN communication module 13, a CPU 15 and the like included in the mobile phone 1 of FIG. In particular, it is assumed that the projector has the WiFi AP function itself. A power supply such as a WiFi AP provided in a general home is always turned on. Basically, a WiFi AP constantly monitors access requests from other devices, and thus consumes 100 mA or more of power. If the WiFi AP provided in the projector is always turned on, power is consumed in the same manner. Therefore, the personal computer 2 transmits a start request signal for requesting the start of the WLAN communication module in the projector to a WiFi AP (WLAN communication module) provided in another information processing apparatus. The WiFi AP (WLAN communication module) provided in another information processing apparatus can be activated only when it is used by operating one button. Thereby, the personal computer 2 can preferably establish a connection with another information processing apparatus using the communication module. In this case, the power of the WiFi AP (WLAN communication module) provided in the other information processing apparatus is normally turned off, while the power of only the EcoChip provided in the other information processing apparatus is turned on. Therefore, power consumption can be suitably reduced in an information processing apparatus such as a projector. The processing in the personal computer 2 in this case is shown in FIG. Note that the processing in FIG. 17 is basically the same as the processing in step S4 and subsequent steps in the processing in FIG. Further, a “Beacon signal” in the Adhoc mode or the AP mode may be used as an activation request signal for requesting activation of the WLAN communication module in the projector. 12 to 17 are incorporated into the WLAN communication module 113 itself of the personal computer 2, and then the WLAN communication module 113 (wireless communication apparatus according to the present invention) is used in FIG. 12 to FIG. You may make it perform the process shown. The series of processes described in the embodiments of the present invention can be executed by software, but can also be executed by hardware. In the embodiment of the present invention, the steps of the flowchart show an example of processing that is performed in time series in the order described. However, even if they are not necessarily processed in time series, they are executed in parallel or individually. The processing to be performed is also included. Furthermore, the processes explicitly described in the embodiments may be appropriately combined. DESCRIPTION OF SYMBOLS 1 ... Mobile phone, 2 ... Personal computer, 3 ... Base station, 4 ... Public network, 5 ... Internet, 6 ... Server, 11 ... Mobile phone wireless communication module, 12 ... Bluetooth communication module, 13 ... WLAN communication module, 14 ... Interrupt signal generation circuit, 15 ... CPU, 18 ... Memory, 19 ... Input section, 20 ... Output section, 21 ... Wireless signal detection circuit, 22 ... Bus, 31 ... RF signal reception circuit, 32 ... Down converter, 33 ... Base Band signal amplifier circuit 34... Signal identification circuit 35... Control signal output circuit 41... Amplitude modulation unique word detection circuit 42... Amplitude modulation demodulation circuit 43 43 wireless LAN signal detection circuit 44 44 Bluetooth signal detection circuit 45 ... WLAN signal detection signal generation circuit, 46 ... Bluetooth signal detection signal generation circuit, 49 ... Command signal generation circuit, 50 ... Interface 51 (51a, 51b, 51c) ... UW setting register, 52 (52a, 52b, 52c) ... Comparator, 53 ... OR circuit, 61 ... Bluetooth communication stack, 62 ... Bluetooth driver, 64 ... WLAN communication stack, 65 ... WLAN driver, 66 ... mobile phone wireless communication unit, 68 ... communication system manager, 69 ... communication application, 70 ... wireless signal detection circuit manager, 71 ... wireless signal detection circuit driver, 72 ... wireless signal detection circuit application, 75 ... unique word (UW) table, 112 ... Bluetooth communication module, 113 ... WLAN communication module, 115 ... CPU, 118 ... memory, 119 ... input unit, 120 ... output unit, 122 ... bus, 161 ... Bluetooth communication stack, 162 ... Bluetooth driver, 164 ... WLAN communication stack, 165 ... WLAN driver, 168 Communication system manager, 169 ... communication application, 172 ... radio signal detecting circuit application, 175 ... UW table, 180 ... BT extended driver, 181 ... WLAN enhanced driver. A wireless communication unit that performs wireless communication with another information processing apparatus that can be used as a wireless base station; A plurality of first indicator signals having different center frequencies included in a frequency band that can be used by the wireless communication unit are used as activation request signals for requesting activation of wireless communication units included in the other information processing apparatus. Sequentially transmitting using the wireless communication unit in a second transmission cycle different from the transmission cycle, repeatedly transmitting the first beacon signal in the frequency band in a first repetition cycle, and corresponding to the first beacon signal First search means for searching for the other information processing apparatus that transmits a response ; An information processing apparatus comprising: connection means for establishing a connection with the other information processing apparatus searched by the first search means using the wireless communication unit. When a specific operation is performed, the first search means sequentially transmits a plurality of the first indicator signals as the activation request signal using the wireless communication unit in the second transmission cycle, The first information signal is repeatedly transmitted in the first repetition period in a frequency band, and the other information processing device that transmits a response to the first signal is searched. The information processing apparatus described in 1. A plurality of second indicator signals having different center frequencies included in a frequency band that can be used by the wireless communication unit are sequentially transmitted using the wireless communication unit in the first transmission period, and the second signal is transmitted in the frequency band. A second search means for searching for a connectable radio base station to which the information processing apparatus transmits a response to the second beacon signal repeatedly and transmits a response to the second beacon signal ; If there is no radio base station that can be used by the information processing apparatus among the radio base stations searched by the second search means, the first search means sends the plurality of first indicator signals to the first base station. start the wireless communication unit in said second transmission period sequentially transmitted using a request signal, and transmitting the first beacon at the frequency band is repeated by the first repetition period, said first label The information processing apparatus according to claim 1, wherein the information processing apparatus searches for the other information processing apparatus that transmits a response to the signal . The first indicator signal is a Probe Request signal transmitted by the wireless communication unit when the mode of the wireless communication unit is the first mode, and the second indicator signal is a mode of the wireless communication unit. The information processing apparatus according to claim 3, wherein the information processing apparatus is a Probe Request signal transmitted by the wireless communication unit when the second communication mode is the second mode. The wireless communication unit is a WLAN communication module, 5. The information according to claim 4, wherein the first mode is a Station mode or an Adhoc mode using an Active Scan method for a WLAN communication module, and the second mode is a Station mode for a WLAN communication module. Processing equipment. The information processing apparatus according to claim 1, wherein the first transmission cycle is a de facto transmission cycle of a Beacon signal transmitted from a radio base station. The information processing apparatus according to claim 1, wherein the second transmission cycle is a cycle shorter than the first transmission cycle. The first repetition period of the first indicator signal as the activation request signal transmitted in the frequency band by the first search means is transmitted in the frequency band by the second search means. The information processing apparatus according to claim 3, wherein the information processing apparatus is shorter than the second repetition period of the second marker signal. The information processing apparatus according to claim 1, wherein the first repetition period is an integer multiple of the second transmission period. The first indicator signal is identification information used for identifying the other information processing apparatus and includes unique word information set with the other information processing apparatus. Item 4. The information processing apparatus according to any one of Items 1 and 3. When the first transmission cycle is a cycle other than the de facto transmission cycle of the Beacon signal transmitted by the radio base station, the second transmission cycle is different from the first transmission cycle, The information processing apparatus according to claim 1, wherein the information processing apparatus is different from a transmission cycle of a de facto of the Beacon signal transmitted from the station. A wireless communication unit that performs wireless communication with other information processing apparatuses; First transmission of a first indicator signal having a specific center frequency included in a frequency band usable by the wireless communication unit as an activation request signal for requesting activation of a wireless communication unit included in the other information processing apparatus. Transmission control means for controlling to sequentially transmit using the wireless communication unit in a second transmission cycle different from the cycle; After the wireless communication unit transmits the first indicator signal and receives a response to the first indicator signal from the other information processing device, the wireless communication unit communicates with the other information processing device. and connection means for establishing a connection with, The wireless communication unit, said different from the connection establishment destination wireless communication unit, that sends the first indicator signal to said other information processing apparatus including a detectable detection unit the activation request signal An information processing apparatus characterized by that. When a specific operation is performed, the transmission control means controls to sequentially transmit the first indicator signal as the activation request signal using the wireless communication unit in the second transmission cycle. The information processing apparatus according to claim 12, characterized in that: A plurality of second indicator signals having different center frequencies included in a frequency band that can be used by the wireless communication unit are sequentially transmitted using the wireless communication unit in a first transmission period, and the second signal is transmitted in the frequency band. A search means for searching for a connectable radio base station to an information processing apparatus that repeatedly transmits a beacon signal at a predetermined repetition period and transmits a response to the second beacon signal ; When there is no radio base station that can be used by the information processing apparatus among the radio base stations searched by the search means, the transmission control means uses the first indicator signal as the activation request signal as the second request signal. The information processing apparatus according to claim 12, wherein control is performed such that transmission is sequentially performed using the wireless communication unit at a transmission cycle of the following. The first indicator signal is a Beacon signal transmitted by the wireless communication unit when the mode of the wireless communication unit is the first mode, and the second indicator signal is a mode of the wireless communication unit. The information processing apparatus according to claim 14, wherein the information processing apparatus is a Probe Request signal transmitted by the wireless communication unit in the second mode. The information processing apparatus according to claim 15, wherein the first mode is an Adhoc mode or an AP mode related to a WLAN communication module, and the second mode is a Station mode related to a WLAN communication module. 15. The information processing apparatus according to claim 12, wherein the first transmission cycle is a de facto transmission cycle of a Beacon signal transmitted from a radio base station. When the first transmission cycle is a cycle other than the de facto transmission cycle of the Beacon signal transmitted by the radio base station, the second transmission cycle is different from the first transmission cycle, The information processing apparatus according to claim 12, wherein the information processing apparatus is different from a transmission cycle of a de facto of the Beacon signal transmitted from the station. The information processing apparatus according to claim 12, wherein the second transmission cycle is shorter than the first transmission cycle. The first indicator signal is identification information used for identifying the other information processing apparatus and includes unique word information set with the other information processing apparatus. Item 15. The information processing apparatus according to any one of Items 12 and 14. In a method for establishing a connection of an information processing apparatus including a wireless communication unit that performs wireless communication with another information processing apparatus that can be used as a wireless base station, A wireless communication step of performing wireless communication with the other information processing apparatus that can be used as a wireless base station; A plurality of beacon signals having different center frequencies included in a frequency band that can be used by the wireless communication unit, and a first transmission cycle as an activation request signal for requesting activation of a wireless communication unit included in the other information processing apparatus The other information processing apparatus that sequentially transmits using the wireless communication unit at different second transmission periods, transmits the beacon signal repeatedly at a predetermined repetition period in the frequency band, and transmits a response to the beacon signal A search step for searching for, A connection establishing step for establishing a connection with the other information processing apparatus searched by the search step using the wireless communication unit. In a method for establishing a connection of an information processing apparatus including a wireless communication unit that performs wireless communication with another information processing apparatus, A wireless communication step for performing wireless communication with another information processing apparatus; A beacon signal having a specific center frequency included in a frequency band that can be used by the wireless communication unit is different from the first transmission cycle as an activation request signal for requesting activation of a wireless communication unit included in the other information processing apparatus. A transmission control step of controlling to sequentially transmit using the wireless communication unit in a second transmission cycle; The wireless communication unit transmits the beacon signal, establishing a connection the after receiving a response to the beacon from the other information processing apparatus, by using the wireless communication unit between said other information processing apparatus and a connection step of viewing including, The wireless communication unit transmits the indicator signal to the other information processing apparatus including a detection unit capable of detecting the activation request signal, which is different from a connection establishment destination with the wireless communication unit. How to establish a connection. A radio that the other information processing apparatus has a plurality of beacon signals having different center frequencies included in a frequency band that can be used when performing radio communication with another information processing apparatus that can be used as a radio base station sequentially transmitted at a first transmission period different from the second transmission period as the activation request signal for requesting the activation of the communication unit to transmit the beacon at the frequency band is repeated at a predetermined repetition period, for said beacon Search means for searching for the other information processing apparatus for transmitting a response ; A wireless communication device comprising: connection means for establishing a connection with the other information processing apparatus searched by the search means. Activation for requesting activation of a wireless communication unit included in the other information processing apparatus for a beacon signal having a specific center frequency included in a frequency band that can be used when performing wireless communication with the other information processing apparatus Transmission control means for controlling to sequentially transmit as a request signal in a second transmission cycle different from the first transmission cycle; Connection means for establishing a connection with the other information processing apparatus after the wireless communication unit transmits the beacon signal and receives a response to the first signal from the other information processing apparatus; , It said transmission control means, said different from the connection establishment destination wireless communication unit, characterized that you send the beacon to the other information processing apparatus including a possible detection unit detects the start request signal Wireless communication equipment. A plurality of first indicator signals having different center frequencies included in a frequency band that can be used by the wireless communication unit are used as activation request signals for requesting activation of wireless communication units included in the other information processing apparatus. Sequentially transmitting using the wireless communication unit in a second transmission cycle different from the transmission cycle, repeatedly transmitting the first beacon signal in the frequency band in a first repetition cycle, and corresponding to the first beacon signal First search means for searching for the other information processing apparatus that transmits a response; Detection means for waiting for a radio signal with an operating power lower than that when the radio communication unit waits for a radio signal and detecting an activation request signal for requesting activation of the radio communication unit transmitted from another information processing apparatus When, An interrupt signal generating means for generating an interrupt signal when the activation request signal is detected by the detecting means; Control means for activating the wireless communication unit based on the interrupt signal generated by the interrupt signal generating means ; The activation request signal is a plurality of beacon signals having different center frequencies included in a frequency band that can be used by the wireless communication unit, and a second transmission period different from a first transmission period from the other information processing apparatus. The information processing apparatus is characterized in that it is a signal that is transmitted in sequence and transmitted by repeating the beacon signal in the frequency band at a first repetition period . The detection means includes An RF signal receiving circuit for receiving the activation request signal and outputting an RF signal; A rectifier circuit for rectifying and detecting the RF signal to obtain a demodulated signal; A baseband signal amplification circuit for amplifying the demodulated signal and outputting a predetermined signal; A signal identification circuit for identifying whether or not the activation request signal is detected by comparing the pattern of the voltage on the time axis and the period of the signal with the pattern of the activation request signal; 27. The information processing apparatus according to claim 26 , further comprising: a control signal output circuit that outputs a control signal to the interrupt signal generation unit based on the identification result output from the signal identification circuit. JP2010058214A 2010-03-15 2010-03-15 Information processing apparatus, connection establishment method thereof, and wireless communication device Expired - Fee Related JP4865048B2 (en) JP2010058214A JP4865048B2 (en) 2010-03-15 2010-03-15 Information processing apparatus, connection establishment method thereof, and wireless communication device US12/877,198 US8422471B2 (en) 2010-03-15 2010-09-08 Information processing apparatus, and connection establishment method therefor JP2010058214A Expired - Fee Related JP4865048B2 (en) 2010-03-15 2010-03-15 Information processing apparatus, connection establishment method thereof, and wireless communication device JP4799675B1 (en) * 2010-06-03 2011-10-26 株式会社東芝 Communication device and detection cycle correction method US8554840B1 (en) * 2012-03-14 2013-10-08 Veritascope, Inc. Live stream detection and notification service US9438642B2 (en) 2012-05-01 2016-09-06 Google Technology Holdings LLC Methods for coordinating communications between a plurality of communication devices of a user JP5422862B1 (en) * 2012-08-21 2014-02-19 日本電気通信システム株式会社 Radio apparatus, radio communication system including the same, program for causing computer to execute transmission of radio frame in radio apparatus, and program for causing computer to receive radio frame transmitted from radio apparatus US9560108B2 (en) * 2012-09-13 2017-01-31 Google Technology Holdings LLC Providing a mobile access point JP5905843B2 (en) * 2013-03-14 2016-04-20 パナソニック株式会社 Radio receiving apparatus and radio receiving method JP6207298B2 (en) * 2013-08-19 2017-10-04 キヤノン株式会社 Communication device, its control method, and program CN103533512A (en) * 2013-09-17 2014-01-22 英华达(上海)科技有限公司 Method, device and system for configuring and adding equipment into network group WO2015056296A1 (en) * 2013-10-15 2015-04-23 株式会社 東芝 Electronic device and communication control method JP2016163186A (en) * 2015-03-02 2016-09-05 富士通株式会社 Mobile communication device, radio communication method, and communication control program US10070289B1 (en) * 2015-04-14 2018-09-04 Marvell International Ltd. Client association for provisioning devices in a communication network US9641915B2 (en) * 2015-05-07 2017-05-02 Cisco Technology, Inc. Sensor data broker for directed collection of sensor data between mobile collector device and sensor consumer US6377608B1 (en) * 1998-09-30 2002-04-23 Intersil Americas Inc. Pulsed beacon-based interference reduction mechanism for wireless communication networks US6654431B1 (en) * 1999-09-15 2003-11-25 Telcordia Technologies, Inc. Multicarrier personal access communication system GB0004919D0 (en) * 2000-03-02 2000-04-19 Koninkl Philips Electronics Nv Ad-hoc radio communication system US7733818B2 (en) * 2000-12-22 2010-06-08 Terahop Networks, Inc. Intelligent node communication using network formation messages in a mobile Ad hoc network DE50210223D1 (en) * 2001-08-03 2007-07-12 Siemens Ag Procedure for forming an ad hoc network US7149521B2 (en) * 2002-01-02 2006-12-12 Winphoria Networks, Inc. Method, system and apparatus for providing mobility management of a mobile station in WLAN and WWAN environments US8046581B2 (en) * 2002-03-04 2011-10-25 Telespree Communications Method and apparatus for secure immediate wireless access in a telecommunications network US6879574B2 (en) * 2002-06-24 2005-04-12 Nokia Corporation Mobile mesh Ad-Hoc networking US20040105434A1 (en) * 2002-08-19 2004-06-03 Allan Baw EtherCell US6763013B2 (en) * 2002-09-04 2004-07-13 Harris Corporation Intelligent communication node object beacon framework including neighbor discovery in a mobile ad hoc network DE60333117D1 (en) * 2002-11-20 2010-08-05 Ntt Docomo Inc Communication system, communication method, transmission device, receiving device and control program KR100468545B1 (en) * 2002-12-23 2005-01-27 한국전자통신연구원 Method for one-way link connetion of As hoc network and its program stored recording medium KR100689566B1 (en) * 2003-03-08 2007-03-02 삼성전자주식회사 System and method for handoff using initial ranging in broadband wireless access communication system US7379447B2 (en) * 2003-05-02 2008-05-27 Microsoft Corporation Slotted seeded channel hopping for capacity improvement in wireless networks US7313461B2 (en) * 2003-11-26 2007-12-25 Hewlett-Packard Development Company, L.P. Data connectivity with a robotic device US7769837B2 (en) * 2003-12-12 2010-08-03 Brother Kogyo Kabushiki Kaisha Wireless LAN setting system and communication terminal SE0303584D0 (en) * 2003-12-30 2003-12-30 Ericsson Telefon Ab L M Method and arrangement in wireless ad hoc or multihop networks US7423989B2 (en) * 2004-02-13 2008-09-09 Broadcom Corporation Preamble formats for MIMO wireless communications US7403744B2 (en) * 2004-03-11 2008-07-22 Symbol Technologies, Inc. Self-associating wireless personal area network US7768960B1 (en) * 2004-07-20 2010-08-03 Atheros Communications, Inc. Efficient communication channel survey JP4310253B2 (en) * 2004-09-21 2009-08-05 キヤノン株式会社 Communication apparatus and communication method JP3923967B2 (en) * 2004-09-27 2007-06-06 株式会社東芝 Mobile communication system and mobile communication terminal US7613154B2 (en) * 2004-09-27 2009-11-03 Siemens Communications, Inc. System and method for optimizing mobility access US7738431B2 (en) * 2004-09-27 2010-06-15 Siemens Communications, Inc. System and method for cellular telephone network access point JP4735145B2 (en) * 2004-10-18 2011-07-27 ソニー株式会社 Wireless communication system, wireless communication device, and computer program US8837528B2 (en) * 2005-02-25 2014-09-16 Sony Computer Entertainment America Llc Data distribution by proxy JP4794910B2 (en) * 2005-05-30 2011-10-19 キヤノン株式会社 System having an electronic device having a plurality of interfaces and a host device, information processing device, electronic device, setup method for the system, control method for the electronic device, setup program, and control program US20070127427A1 (en) * 2005-11-09 2007-06-07 Matsushita Electric Industrial Co., Ltd. Communication system, control terminal and communication terminal KR101330795B1 (en) * 2005-11-10 2013-11-18 삼성전자주식회사 Cell search method in OFDM cellular system, frame transmissin method thereof, and forward link frame structure thereof US20070287421A1 (en) * 2006-06-07 2007-12-13 Tony Kirke Method and system for providing continuity of service with an existing communication network US8027259B2 (en) * 2006-06-30 2011-09-27 Nokia Corporation Opportunistic routing protocol in ad hoc networks US8917673B2 (en) * 2006-07-14 2014-12-23 Qualcomm Incorporation Configurable downlink and uplink channels for improving transmission of data by switching duplex nominal frequency spacing according to conditions US8223729B2 (en) * 2006-07-19 2012-07-17 Qualcomm Incorporated Radio interface selection for a terminal JP4976776B2 (en) * 2006-07-31 2012-07-18 キヤノン株式会社 Communication device, communication method, and computer program for causing computer to execute the communication method US8958743B2 (en) * 2006-08-23 2015-02-17 Google Inc. Formation of wireless local area networks based on movement direction of nodes CN101169834A (en) 2006-10-27 2008-04-30 株式会社东芝 Generating device of trigger signal CA2567275A1 (en) * 2006-11-06 2008-05-06 Saskatchewan Telecommunications Health monitoring system and method US8451763B2 (en) * 2006-12-07 2013-05-28 Digimarc Corporation Wireless local area network-based position locating systems and methods JP4229182B2 (en) * 2006-12-21 2009-02-25 ソニー株式会社 Wireless communication system, wireless communication apparatus, wireless communication method, and program WO2008102434A1 (en) * 2007-02-20 2008-08-28 Panasonic Corporation Communication terminal and image data transfer method US8401001B2 (en) * 2007-03-28 2013-03-19 Intel Corporation Method and apparatus of connectivity recovery in wireless network US7801099B2 (en) * 2007-05-10 2010-09-21 Broadcom Corporation Cooperative transceiving between wireless interface devices of a host device with acknowledge priority KR100915831B1 (en) 2008-07-28 2009-09-07 주식회사 하이닉스반도체 Semiconductor integrated circuit US8798029B2 (en) * 2008-08-06 2014-08-05 Qualcomm Incorporated Ultra wideband assisted initial acquisition US8032182B2 (en) * 2008-08-07 2011-10-04 Broadcom Corporation Subscriber identity module with an incorporated radio US8135023B2 (en) * 2008-10-24 2012-03-13 Getac Technology Corporation Data packet, system and method for multiple nodes transmitting under AD-HOC network architecture JP4670946B2 (en) * 2008-12-04 2011-04-13 ブラザー工業株式会社 Wireless communication apparatus and program KR20100082106A (en) * 2009-01-08 2010-07-16 삼성전자주식회사 Data transfer method based on wi-fi multimedia and apparatus thereof US8743848B2 (en) * 2009-05-26 2014-06-03 Broadcom Corporation Hybrid location determination for wireless communication device KR101771386B1 (en) * 2010-02-24 2017-08-24 인터디지탈 패튼 홀딩스, 인크 Method and apparatus for sending an aggregated beacon US20110273276A1 (en) * 2010-05-07 2011-11-10 Kabushiki Kaisha Toshiba Communication device and wireless communication method US8838046B2 (en) * 2010-06-18 2014-09-16 Mediatek Inc. System and method of hybrid FDM/TDM coexistence interference avoidance CN2800674Y (en) 2006-07-26 System for decreasing communication unit scanning time in wireless network US8798542B2 (en) 2014-08-05 Information processing apparatus and method KR101814810B1 (en) 2018-01-04 Method and apparatus for wi-fi p2p group formation using wi-fi direct RU2454018C2 (en) 2012-06-20 Synchronisation between wireless devices in power save mode US8639220B2 (en) 2014-01-28 Method and system for providing Wi-Fi service by Wi-Fi device CN101300870B (en) 2012-07-04 Methods and apparatus for providing a platform coexistence system of multiple wireless communication devices US8462734B2 (en) 2013-06-11 Wireless docking with out-of-band initiation CN100571251C (en) 2009-12-16 Transmission/reception apparatus, transmission/reception method, and transmission/reception system US20080109302A1 (en) 2008-05-08 Connectionless information transfer from advertising device JP2014530524A (en) 2014-11-17 Low energy beacon coding US20120213086A1 (en) 2012-08-23 Wireless lan device and controlling method thereof JP5434230B2 (en) 2014-03-05 Wireless communication apparatus, wireless communication system, wireless communication method, and program US9042829B2 (en) 2015-05-26 Method, apparatus, and computer program product for wireless short-range communication CN103945507B (en) 2017-03-01 For the method for the power-saving control of connection of splicing, device JP2006166242A (en) 2006-06-22 Card for wireless network communication, device with incorporated card, device for supporting wireless network communication and method for detecting access point for wireless network communication US20130100855A1 (en) 2013-04-25 Method and apparatus for wi-fi connection using wi-fi protected setup in portable terminal US8224246B2 (en) 2012-07-17 Device to device connection setup using near-field communication EP2323460B1 (en) 2015-08-26 Wireless communication device, wireless communication system, program and wireless communication method US8934388B2 (en) 2015-01-13 Communication system and method, information processing apparatus and method, information processing terminal and method US20080058031A1 (en) 2008-03-06 Apparatus and method of optimizing the power saving in a handset with wlan and bluetooth™ JP3849647B2 (en) 2006-11-22 Wireless communication system, wireless communication apparatus, wireless communication method, and computer program EP2790373B1 (en) 2019-02-06 Apparatuses for transmitting data via a second interface based on network identification information transmitted via a first interface EP3461225A1 (en) 2019-03-27 Communication device RU2494571C2 (en) 2013-09-27 Method of detecting device functionalities and declaration thereof in wireless network 2014-11-18 LAPS Cancellation because of no payment of annual fees
cc/2020-05/en_middle_0061.json.gz/line1732
__label__cc
0.695069
0.304931
US10333795B2 - Dynamic optimization of simulation resources - Google Patents Dynamic optimization of simulation resources Download PDF US10333795B2 US10333795B2 US16/131,516 US201816131516A US10333795B2 US 10333795 B2 US10333795 B2 US 10333795B2 US 201816131516 A US201816131516 A US 201816131516A US 10333795 B2 US10333795 B2 US 10333795B2 Gregorius E. Poort Mulyanto W. Poort Ryan A. Kaneshiro Adam C. McKenzie Rescale Inc 2016-08-11 Priority to US15/235,004 priority Critical patent/US10193762B2/en 2018-09-14 Application filed by Rescale Inc filed Critical Rescale Inc 2018-09-14 Priority to US16/131,516 priority patent/US10333795B2/en 2019-05-10 Assigned to Rescale, Inc. reassignment Rescale, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: POORT, GREGORIUS E., KANESHIRO, RYAN A., MCKENZIE, ADAM C., POORT, MULYANTO W. 2019-06-25 Publication of US10333795B2 publication Critical patent/US10333795B2/en 238000004088 simulation Methods 0 abstract claims description title 646 239000003138 indicator Substances 0 abstract claims description 29 238000005457 optimization Methods 0 description title 4 239000011162 core materials Substances 0 claims description 130 238000004458 analytical methods Methods 0 claims description 14 238000004364 calculation methods Methods 0 claims description 13 238000004891 communication Methods 0 claims description 12 230000001419 dependent Effects 0 claims description 11 230000000977 initiatory Effects 0 claims description 6 238000006011 modification Methods 0 claims description 6 230000004048 modification Effects 0 claims description 6 229920002153 Hydroxypropyl cellulose Polymers 0 abstract 1 239000004574 high-performance concrete Substances 0 abstract 1 235000010977 hydroxypropyl cellulose Nutrition 0 abstract 1 239000002184 metal Substances 0 description 11 229910052751 metals Inorganic materials 0 description 11 238000007514 turning Methods 0 description 8 230000013016 learning Effects 0 description 6 230000001960 triggered Effects 0 description 6 230000003247 decreasing Effects 0 description 5 230000000737 periodic Effects 0 description 5 230000010006 flight Effects 0 description 3 229920001276 Ammonium polyphosphate Polymers 0 description 2 230000002159 abnormal effects Effects 0 description 2 239000000284 extracts Substances 0 description 2 238000007600 charging Methods 0 description 1 239000008264 clouds Substances 0 description 1 238000000605 extraction Methods 0 description 1 230000003278 mimic Effects 0 description 1 230000002085 persistent Effects 0 description 1 230000000135 prohibitive Effects 0 description 1 238000007864 suspending Methods 0 description 1 G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU] G06F9/5061—Partitioning or combining of resources G06F9/5066—Algorithms for mapping a plurality of inter-dependent sub-tasks onto a plurality of physical CPUs H04L41/00—Arrangements for maintenance or administration or management of packet switching networks H04L41/14—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning H04L41/147—Arrangements for maintenance or administration or management of packet switching networks involving network analysis or design, e.g. simulation, network model or planning for prediction of network behaviour G06F11/00—Error detection; Error correction; Monitoring G06F11/30—Monitoring G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems G06F11/3017—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is implementing multitasking G06F9/48—Program initiating; Program switching, e.g. by interrupt G06F9/4806—Task transfer initiation or dispatching G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system H04L47/00—Traffic regulation in packet switching networks H04L47/70—Admission control or resource allocation H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network The present invention dynamically optimizes computing resources allocated to a simulation task while it is running. It satisfies application-imposed constraints and enables the simulation application performing the simulation task to resolve inter-instance (including inter-server) dependencies inherent in executing the simulation task in a parallel processing or other HPC environment. An intermediary server platform, between the user of the simulation task and the hardware providers on which the simulation task is executed, includes a cluster service that provisions computing resources on hardware provider platforms, an application service that configures the simulation application in accordance with application-imposed constraints, an application monitoring service that monitors execution of the simulation task for computing resource change indicators (including computing resource utilization and application-specific information extracted from output files generated by the simulation application) as well as restart files, and a computing resource evaluation engine that determines when a change in computing resources is warranted. FIELD OF ART The present application is a continuation of co-pending U.S. Non-Provisional patent application Ser. No. 15/235,004, filed Aug. 11, 2016, which is incorporated by reference herein. The present invention relates generally to managing computing resources in parallel processing environments, and in particular to dynamically optimizing computing resources during the execution of a task having inter-instance dependencies, such as a simulation or other high-performance computing task. BACKGROUND Description of Related Art As the demand for hardware and software computing resources continues to increase at a dramatic pace, new computing platforms have evolved in part to alleviate the burden on individuals and companies of providing access to and management of computing resources in a cost effective manner. The “hardware providers” that operate such platforms enable customers to outsource their physical computing resource requirements while retaining a great deal of control over their use. For example, cloud computing platforms from companies such as Amazon, Microsoft and Google offer customers access to shared physical computing resources. Such computing resources include servers with one or more operating systems, one or more single or multi-core CPUs, network interconnectivity hardware (e.g., Ethernet controllers) and varying amounts of memory (e.g., RAM and nonvolatile memory) and persistent storage (e.g., hard disks and flash drives), including external hard disk and flash arrays. Each hardware provider typically offers a variety of different server “types” with different configurations of computing resources for execution of applications on their platforms. These hardware providers often employ virtualization to enable customers to specify a set of virtual computing resources (e.g., “virtual machines”) to be allocated to each customer request. Certain hardware providers offer similar services, but enable customers to specify dedicated physical hardware that is not shared with other customers. Such “bare metal” services may provide enhanced performance for tasks that are particularly CPU-intensive, such as those found in simulations and other high-performance computing (HPC) environments. Whether providing virtual and/or bare metal services, hardware providers frequently offer an on-demand “pay-per-use” model (in lieu of, or in addition to, a periodic monthly or annual lease or “subscription” model) in which customers pay only for the time during which they use specified computing resources. Efficient use of such resources is important both to hardware providers (to maximize value by efficiently deploying finite physical computing resources across a base of customers) and to their customers (to optimize value, for example, by balancing the cost-saving benefit of provisioning less powerful computing resources against the time-saving benefit of completing specified tasks more quickly). Hardware providers face a “load balancing” problem in allocating usage of finite physical computing resources across the overlapping demands of multiple customers. Various “dynamic provisioning” approaches have been employed to reallocate the computing resources specified by each customer among different available physical servers and associated computing resources (memory, storage, network bandwidth, etc.)—see, e.g., U.S. Pat. No. 9,009,294. Such load-balancing approaches do not, however, adequately address the scenario in which the computing resource requirements of a task change dynamically—i.e., during the execution of the task. In such scenarios, it is not sufficient merely to reallocate a task's computing resources among different physical servers. Another mechanism is required to identify and address, at various points during the execution of a task, the problems posed by a suboptimal allocation of computing resources to that task. While hardware providers can monitor a task's current usage of computing resources (e.g., utilization percentages of CPU, RAM, storage, network bandwidth, etc.), such “computing resource utilization” information alone is insufficient to determine the task's optimal “future” resource requirements. To make such a future prediction or forecast would require access to internal “application-specific” information relating to the application being executed and the particular functionality of the task being implemented. One current approach to this problem is exemplified by Amazon's “EC2 Auto Scaling” service, which enables its customers to define the conditions that determine dynamically when to increase and/or decrease the number of “Amazon EC2 Instances” (i.e., virtual servers of a particular type) allocated to the current request. Not to be confused with multiple “instances” of an application running on distinct CPU cores in a parallel processing environment, Amazon EC2 Instances are virtual machines or virtual servers that have a specified configuration of computing resources (CPU cores, memory, storage, network bandwidth, etc.). When a customer-specified condition is satisfied, the number of EC2 Instances is increased or decreased by the customer-specified amount. For example, consider a web server application that processes numerous HTTP requests from external client web browsers over time. Amazon's customer (e.g., the owner of a website) might initially request that Amazon provision four EC2 Instances, where each EC2 Instance is a virtual server with an 8-core CPU, 32 GB of RAM, 160 GB of storage and a 10 GB Ethernet connection. An instance of the web server application might be running on each of the 32 cores, and each core might handle hundreds or thousands of external HTTP requests from various web browsers every second. As the number of external client web browser requests increases or decreases, the customer might desire to increase or decrease the number of EC2 Instances accordingly, thereby attempting to provision an “optimal” amount of computing resources over time. For example, the customer might specify an EC2 Auto Scaling condition that triggers the provisioning of eight additional EC2 Instances when the number of external HTTP requests per second across all current EC2 Instances exceeds a predefined threshold. Conversely, another condition might trigger the termination of existing EC2 instances when the number of HTTP requests falls below a lower predetermined threshold. It should be noted that, when EC2 Instances are removed, the application instance running on each CPU core of those EC2 instances is terminated. Similarly, when EC2 Instances are added, a new application instance is installed and executed on each CPU core of each of those added EC2 Instances. Nevertheless, these changes can be said to occur “while the application is running” because they occur automatically, without intervention of the customer, and without completely “starting over” and forfeiting all of the task's current progress. Because external HTTP requests are generally independent of one another, due to the stateless nature of the HTTP protocol, the task performed by a web server application benefits from parallel processing by simultaneously executing similar independent “sub-tasks” (e.g., external HTTP requests) on each of multiple CPU cores. Moreover, because future sub-task calculations are not generally dependent upon prior such calculations (also due to the stateless nature of the HTTP protocol), web server applications are also relatively immune from dynamic changes in computing resources (e.g., the addition or removal of EC2 Instances), making web server applications ideal candidates for Amazon's EC2 Auto Scaling service. To the extent such dependencies exist, however, the customer must identify and address them. No such mechanism is provided by Amazon's EC2 Auto Scaling service, as it has no knowledge of the internal application-specific information relating to the application being executed and the particular functionality of the task being implemented. For example, if a web server application handles multiple external HTTP requests within a webpage containing multiple related forms, certain subsequent sub-task calculations regarding these related forms might be dependent upon prior calculations (e.g., where the value of a field in one form depends upon the value of a field in another form). Thus, in the event of the termination of an EC2 Instance, the customer would be required to detect such dependencies and address them—e.g., by saving the results of relevant prior calculations for use by another EC2 instance performing the subsequent calculations dependent upon such results. Similarly, in the event of an added EC2 Instance, the customer would be required to ensure that subsequent calculations performed by newly added EC2 Instances know where to obtain the results of any prior calculations on which they are dependent. While applications specifically designed for parallel processing may include mechanisms to address such dependencies, they typically must be pre-configured with the “knowledge” of at least a subset of the provisioned computing resources (e.g., the number of CPU cores), making it difficult to modify such computing resources while the application is running. Amazon's EC2 Auto Scaling service has no built-in mechanism for communication among EC2 Instances—e.g., to inform a running application that additional CPU cores are available, whether on the same or another EC2 Instance. As a result, there are significant limitations to this EC2 Auto Scaling approach. One problem is that the customer must specify the conditions under which a change in computing resources is required, as well as the nature of the change (e.g., the number of EC2 Instances to be added or removed once a condition is satisfied). Moreover, to be effective, such conditions must be predictive, and not merely reactive. For example, the fact that external HTTP requests exceed a predefined threshold at any given time may or may not reflect a traffic pattern that will continue, even into the near future. Even more significantly, the customer is left to address “inter-instance” (including “inter-server”) dependencies in order to manage the consequences of these dynamic changes in computing resources. As noted above, many applications implement tasks that benefit from parallel processing due to the existence of independent sub-tasks that can perform intermediate calculations in parallel—typically by running multiple instances of the application simultaneously on distinct CPU cores. However, these applications often exhibit inter-instance dependencies in which subsequent calculations, performed by one instance of an application on one CPU core, are dependent upon the results of these intermediate calculations (on the same or other CPU core, or even across physical or virtual servers, resulting in inter-server dependencies). The presence of these inter-instance dependencies imposes a significant burden on customers seeking to modify the computing resources allocated to a task while it is running. As noted above, even if the application is designed for parallel processing, and includes a mechanism to address these inter-instance dependencies, the customer is still left with the problem of informing a running application that particular computing resources have changed—e.g., that certain CPU cores have been added or removed. No such mechanism presently exists. Simulation applications (as well as other HPC applications) are prime examples of applications that benefit from parallel processing environments because they typically involve many similar sub-task calculations that overlap in time but are not dependent upon one another and can thus be performed in parallel. Yet, because subsequent calculations during the course of a simulation are often dependent upon the results of these prior intermediate sub-task calculations (i.e., due to the existence of inter-instance dependencies), simulation applications must address these inter-instance dependencies in order to function properly in a parallel processing environment. Simulation applications are designed to facilitate parallel processing of independent sub-tasks while also providing mechanisms for addressing inter-instance dependencies—e.g., by communicating the results of intermediate calculations among CPU cores and servers that perform the subsequent sub-tasks that are dependent on those prior results. Yet, in order to implement such communications, simulation applications impose certain constraints on the simulation task, such as assuming a minimum amount of RAM or network bandwidth, or being pre-configured with a specific number of CPU cores based upon the particular characteristics of a customer's simulation data “model.” In other words, simulation applications assume advance knowledge (through pre-configuration) of at least a subset of the computing resources on which they run, presenting a challenge for customers seeking to modify those computing resources while a simulation application is running. To better understand this challenge, it is helpful to understand how simulation applications address specific inter-instance dependencies and utilize computing resources within the boundaries of their own “application-imposed constraints.” Simulation applications implement underlying algorithms that utilize customer-provided data “models” designed to represent the behavior of a particular real-world or abstract system within a vast array of scientific and engineering disciplines. The system being modeled, including its environment, is typically divided into discrete components or “cells” (sometimes referred to as “elements,” “particles,” “molecules,” etc., depending upon the simulation discipline). These component cells have certain properties (length, density, temperature, pressure, etc.) that undergo various changes over time. Even systems with no real-world or physical counterpart (e.g., role-playing applications) can be divided into component cells exhibiting various abstract properties (e.g., psychological behaviors, emotions, actions, etc.). A car manufacturer designing a front bumper might employ simulation software to model the effects of their car crashing into a solid wall. The effect of the impact on the properties of individual cells of the front bumper which directly impact the wall might initially be calculated in parallel to the extent such calculations are independent of one another (e.g., by running the simulation application simultaneously on multiple CPU cores). However, the indirect effects of the impact on neighboring cells over time are dependent upon the results of these initial calculations, thus resulting in inter-instance dependencies (including inter-server dependencies). Similarly, an airplane designer might simulate the effects of turbulence on an airplane wing by employing numerous individual cells not only to represent the wing itself, but also to represent the air surrounding the surface of the wing during flight. When a simulation application “runs” the model of the airplane in flight in its environment, it calculates these changes to the properties of the cells in accordance with the rules or constraints imposed by the model. As the execution of a simulation progresses, the simulation application (also in accordance with the customer's model) may divide an individual cell into multiple cells (e.g., to process more detailed interactions among component cells), or conversely combine multiple cells together into a single cell. It should be noted that this modification of the number of cells impacts the efficiency of the simulation application's use of computing resources. For example, at any given point in time during the execution of a simulation, there may exist an ideal number of “cells per core”—based on a balance between the desire for maximum parallelism and the overhead imposed by inter-instance communication among CPU cores (as well as “global optimizations” for various other factors, such as time and cost). Changes in the number of cells at any given point in time may therefore render the actual specified computing resources more or less “optimal.” What is needed, particularly in parallel processing and other HPC environments, is a mechanism and process for dynamically optimizing the computing resources allocated to a particular task, while freeing customers from the responsibility of determining the conditions warranting changes in such computing resources, as well as the nature of such changes. Such a mechanism and process must also automatically adhere to application-imposed constraints that enable the application to address inter-server and other inter-instance dependencies affected by such changes. The present invention includes embodiments of systems and methods for addressing the deficiencies noted above, e.g., by providing an intermediary server platform that frees a customer from determining, for a specific task, optimal computing resources needed at various points in time during the execution of that task. While the present invention can be applied to various types of applications that benefit from parallel processing and other HPC environments, the embodiments discussed herein focus on the area of scientific and engineering simulation for illustrative purposes. However, any application involving independent sub-tasks whose subsequent calculations have dependencies on the results of prior sub-task calculations can attain the benefits of the present invention. Moreover, while specific hardware and software embodiments are described below, the functionality of the various components of the present invention can be combined or divided into other distinct components, and implemented in hardware or software, without departing from the spirit of the present invention. In one embodiment, a “simulation server platform” is provided as an intermediary (e.g., over the Internet, or other network connection) between end-user customers desiring to run simulations of their models and hardware providers of the physical computing resources on which particular simulation applications will execute user simulations. In this embodiment, the simulation server platform serves as the “customer” of one or more hardware providers, while the end user is the “customer” of the simulation server platform. The owner of each simulation application may license its application to the user directly, or indirectly via the owner of the simulation server platform (or even via the owner of a hardware provider platform). For example, the end user establishes a connection over the Internet with the simulation server platform, specifies a desired simulation application, and provides its simulation data model and other relevant input parameters and data files. In one embodiment, the user also selects a desired initial set of computing resources, while in another embodiment, the simulation server platform makes this initial determination based upon an analysis of the information provided by the user. In either event, the simulation server platform establishes a connection over the Internet with one or more hardware providers, and provisions an initial set of computing resources—i.e., a “cluster” of physical or virtual servers from among the available computing resource types offered by each hardware provider. The simulation server platform installs the appropriate simulation application on the provisioned cluster (e.g., including an instance of the simulation application on each CPU core), along with other relevant software and data, including the user's simulation model, and then initiates the execution of the simulation task. Note that simulations may execute for hours, days or even weeks, while simulating a much shorter period of time in the real-world or abstract “system” being modeled or simulated (e.g., a 15-second car crash may take 3 weeks to simulate). As will be discussed in greater detail below, the simulation server platform also performs, in one embodiment, a “metering” function, whereby it monitors the time during which the simulation is executing on particular provisioned hardware as well as software computing resources. This enables the owner of the simulation server platform to offer user pricing models that vary from those established by hardware providers and vendors of simulation applications (and charged to the owner of the simulation server platform). For example, with respect to hardware metering, a simulation that runs for three hours would enable a pricing calculation based upon the cost of each particular provisioned hardware resource. For example, a 16-core server with 8 GB of RAM (and a “price per core hour” of $0.10 for CPU cores and $0.05 for 8 GB of RAM) would yield a price of $7.00 for a three-hour simulation (48 core hours for a CPU price of $4.80 and a RAM price of $2.40), taking into account only CPU cores and RAM. While hardware providers typically offer pricing for a particular virtual server type, the use of an intermediary simulation server platform enables a wide variation of customer pricing models that may or may not mimic those offered by a selected hardware provider—e.g., on-demand or low priority pricing, as well as different “core-hour” or other pricing for individual computing resources (e.g., RAM, network bandwidth, etc.), as opposed to pricing on a physical or virtual server basis. Moreover, given that the present invention enables modification of the specified computing resources allocated to a simulation task, the hardware metering functionality of the present invention monitors the time (and associated pricing) allocated to each set of computing resources provisioned during the execution of the simulation task. Similarly, with respect to software metering, the simulation server platform monitors the time during which a particular simulation application (and, in one embodiment, each component thereof) is executed. While some simulation application vendors employ a metered software pricing model, others may utilize a subscription, per-seat, concurrent user, or other pricing model. In any event, the software metering functionality of the present invention facilitates flexibility in offering various different pricing models to different users or groups of users. Moreover, in one embodiment, when different sets of computing resources are provisioned over time to a simulation task, different software pricing models are employed. The software metering functionality of the present invention enables monitoring of the time allocated to different simulation applications (and to particular components thereof) running during the course of the execution of a single simulation task. The simulation server platform also serves as an intermediary for the authentication of users with respect to particular simulation applications and component features. In one embodiment, the simulation server platform communicates with software “license servers” that can be deployed in various different physical locations, including for example the premises of the user, the simulation application provider, one or more hardware providers, or even directly on the simulation server platform (which itself may be deployed on a hardware provider's physical hardware). To facilitate the dynamic modification of the computing resources allocated to an individual simulation task, the simulation server platform, in one embodiment, includes a “cluster service” that provisions a cluster of computing resources on a hardware provider platform for executing a user's simulation task (i.e., a simulation application that runs a user's simulation data model). In one embodiment, the cluster includes one or more virtual servers of a selected type of virtual server offered by a hardware provider, having a particular configuration of CPU cores, RAM, storage, network bandwidth, etc. As noted above, the simulation application is designed to run on the cluster in a parallel processing environment, in which individual instances of the simulation application run in parallel on distinct CPU cores, and perform independent sub-task calculations simultaneously. Moreover, the simulation application addresses inter-instance (including inter-server) dependencies, in which subsequent sub-task calculations performed by one instance of the simulation application are dependent upon the results of prior sub-task calculations performed by the same or other instances (i.e., across CPU cores and, in some cases, across virtual servers). The simulation server platform also includes, in one embodiment, a “simulation service” that configures the simulation application with various user-specified input parameters, the user's simulation model, the required subset of specified computing resources (e.g., the number of CPU cores) and other relevant software, input parameters and data files. As noted above, the computing resources specified in the cluster must adhere to any constraints imposed by the simulation application (e.g., a minimum amount of RAM), even if not required to be specified. In this embodiment, the simulation service installs all relevant software and data in the cluster, including instances of the simulation application on each CPU core, as well as other software unique to other components of the present invention described in greater detail below. Finally, the simulation service initiates execution of each instance of the simulation application on each CPU core within each virtual server in the cluster. The simulation server platform further includes a simulation monitoring service that, in one embodiment, dynamically monitors over time various “resource change indicators” that relate to the simulation application's use of the computing resources in the cluster, and provide information that is utilized by the present invention on a continuous basis to determine whether and when a change is warranted in the current computing resources allocated to the simulation application, as well as the nature of that change (e.g., a different type of virtual server with a sufficient number of additional CPU cores). As will be described in greater detail below, such resource change indicators include, in one embodiment, both “computing resource utilization” information (such as the percentage of current utilization of particular computing resources by instances of the simulation application) and “application-specific” information (relating to the particular simulation application task being monitored) that reflect the extent to which the simulation application's use of the current computing resources in the cluster meets certain predefined goals, and facilitate predictions of the simulation application's future computing resource requirements. In addition, in one embodiment, the simulation monitoring service monitors and stores computing resource utilization and application-specific information over time with respect to each computing resource, so that historical trends can be discerned, as will be discussed in greater detail below. For example, at a given point in time, the simulation monitoring service monitors a simulation task's utilization of CPU, RAM, storage and network bandwidth resources within the specified cluster. A CPU core on a particular virtual server may exhibit a current 58% CPU utilization, while 78% of the available RAM may be in use. Such current and historical information, taken individually, may suggest a need for an increase or decrease in a particular specified computing resource (e.g., based upon predefined thresholds). In another embodiment, a more holistic (and even predictive) analysis is facilitated by a rules-based or machine learning engine that considers both computing resource utilization and application-specific information as a whole. The resource change indicators also include application-specific information relating to the particular simulation application task being monitored. For example, as a simulation progresses, the simulation application writes various data to “output files” that are parsed by the simulation monitoring service to extract information from which it can infer whether a change in computing resources is warranted. It should be noted that simulation applications write data to output files for an entirely different purpose than is employed by the present invention. Such information is intended for manual analysis by users (perhaps with the assistance of analytic tools) for a variety of different reasons. For example, a user may troubleshoot a simulation and determine from the information in the output files whether an error has occurred that warrants stopping the simulation, and perhaps re-running it at a future time once the problem has been resolved—e.g., correcting a bug in the simulation model. In another scenario, a user may analyze this information to assess the efficiency of the simulation, and perhaps make changes to the model or to input data so that future simulations will execute in a shorter amount of elapsed time, utilize fewer computing resources, or otherwise meet whatever desired constraints the user desires. In any event, in one embodiment, the simulation monitoring service parses the output files for information providing valuable insights with respect to the efficiency of the simulation application's use of current computing resources, as well as its potential future computing resource requirements (including predictions of future computing resource utilization). It should be emphasized that the present invention challenges the “conventional wisdom” that a single fixed set of computing resources is optimal throughout the execution of an entire simulation task. Various different types of information are extracted from output files to facilitate this analysis and determination of when a change in computing resources is warranted, as well as the nature and degree of such change. For example, as noted above, simulation applications may from time to time divide cells into multiple cells, or combines multiple cells into a single cell, thereby altering a specified cells-per-core ratio and perhaps suggesting a need for more or fewer CPU cores—or at least factoring into a future prediction of the number of cells or other related factors. Other information found in or inferred from the output files relates to disk I/O operations. For example, an increase in disk I/O operations over time might suggest an imbalance in inter-instance or inter-server communications, possibly suggesting a need for more RAM per CPU core if such increases are predicted to continue at a particular rate. In other scenarios, the results of particular calculations might suggest, for example, that a resource-intensive phase of the simulation (e.g., a combustion cycle) has begun. As also noted above, the simulation application itself imposes certain computing resource constraints, which also must be taken into account before modifying the computing resources allocated to the simulation application. These “application-imposed constraints” require that the simulation application be pre-configured (e.g., via input parameters or configuration files) with certain of the computing resource information. For example, a simulation application typically must “know” the particular number of CPU cores on which instances of the application are installed in order to function correctly and address the relevant inter-instance dependencies—e.g., by handling communications among the CPU cores. Without that knowledge of certain computing resource specifications, the simulation application could not address the dependencies that occur when subsequent independent sub-task calculations performed by a CPU core require results from prior calculations performed by other CPU cores, perhaps on other physical or virtual servers. It is therefore vital that the simulation application be pre-configured with the necessary computing resource specifications before execution begins. If simulation applications could be reconfigured during execution, a change in computing resources could be effected dynamically without ever halting execution of the simulation task. However, given current limitations in simulation software design, the present invention, in one embodiment, temporarily suspends execution of the simulation applications in the current cluster when a change in computing resources is warranted, and restarts instances of the simulation task on a new cluster. Yet, such a process requires knowledge of a current intermediate “simulation state” (i.e., the precise state of all variables). So, in addition to monitoring resource change indicators, the simulation service also, in one embodiment, monitors the writing of “restart files” generated by the simulation application and containing a current intermediate simulation state. In many cases, the frequency with which simulation applications write these restart files to disk can be configured before the simulation application is executed; though it should be noted that it may be prohibitive to save the entire simulation state too frequently (e.g., due to the time and other resources required to save the entire simulation state). As was the case with the output files, these restart files are intended for a different purpose (fault tolerance) from the one utilized by the present invention. This process, sometimes referred to as “checkpointing,” involves the periodic writing to disk of an application's state, so that the application can resume from this intermediate state in the event of a failure (e.g., a hardware failure, software crash, etc.). The simulation server platform, however, utilizes these restart files, in one embodiment, not for the purpose of recovering from hardware or software failures, but for the purpose of facilitating a change in computing resources while the application is running (even though the change itself involves suspending and resuming execution of instances of the simulation application). In other words, in this embodiment, the simulation server platform intentionally terminates a simulation running on a hardware provider's currently provisioned cluster, and provisions a new cluster (from the same or a different hardware provider, or multiple hardware providers) with different computing resources, where it can be restarted from the saved intermediate simulation state contained in a selected restart file. Unlike a fault tolerance or failure scenario, the simulation server platform knows in advance (based on real-time monitoring) whether an appropriate restart file exists, and precisely when to suspend execution of the simulation task. Moreover, in one embodiment, based upon predicted computing resource usage, the simulation server platform determines an optimal time to effect this change, as well as generate an optimal new set of computing resources that complies with the constraints imposed by the various types of computing resources available on one or more hardware provider platforms, as well as the constraints imposed by the simulation application itself (which is reconfigured to conform to the new set of computing resources). The simulation server platform additionally includes, in one embodiment, a computing resource evaluation module that continuously analyzes the computing resource change indicators and existing restart files to determine when a change in computing resources is warranted. It should be noted that an otherwise warranted change may be affected by the lack of a sufficiently recent restart file. In another embodiment, users can configure certain simulation applications to control the frequency with which such applications generate restart files. As will be discussed in greater detail below, the computing resource evaluation module applies various techniques (including predefined formulas and triggers, rules-based analytics and machine-learning) designed to predict the application's future computing resource requirements. In one embodiment, this monitored information is continuously analyzed to determine whether one or more predefined threshold conditions have been satisfied so as to warrant a change in computing resources. It should be emphasized that this analysis process is performed automatically in real time without any need for user intervention. In the event a change in the current set of provisioned computing resources is warranted, the simulation server platform further includes, in one embodiment, a computing resource calculation module that applies similar techniques to those performed by the computing resource evaluation module, but with consideration of the additional constraints imposed by the types of computing resources available on one or more hardware provider platforms. For example, upon determining that a change is warranted, the computing resource calculation module may determine that an additional 16 CPU cores is optimally required, but that 32 GB less RAM is needed, potentially resulting in the selection of a different type of virtual server offered by one or more hardware providers (perhaps even a different hardware provider than the one on which the simulation application is currently executing). Once the computing resource calculation module generates the specifications of the desired new cluster of modified computing resources, the current cluster must be replaced. The simulation server platform includes, in one embodiment, a simulation resource manager that directs the cluster service to provision the new cluster of modified computing resources on a selected hardware provider platform, and to terminate the current cluster on which the simulation application is currently executing (after saving relevant data that may be required by the new cluster). It then directs the simulation service to reconfigure the simulation application with a specification of the required subset of the modified computing resources, as well as the location of the selected restart file containing the intermediate simulation state from which the simulation application can resume execution. The simulation service then installs all relevant software and data in the new cluster, including instances of the simulation application on each CPU core, as well as other software unique to other components of the present invention described in greater detail below. Finally, the simulation service initiates execution (i.e., “resumes” execution from the saved intermediate simulation state) of each instance of the simulation application on each CPU core within each virtual server in the new cluster. In one embodiment, users specify one or more predefined global optimization goals, such as optimizing for the shortest overall execution time, least expensive computing resource fees or various other goals, including an optimization function balancing one or more of such goals. In this embodiment, the simulation server platform accommodates such goals in its determination of when and to what extent to modify current computing resources, in order to optimize for the user's specified goals. In particular, the simulation server platform monitors both resource change indicators and application-specific information, and assesses the extent to which the simulation application's use of the current computing resources meets such predefined goals. In an alternative embodiment, the simulation server platform predetermines a number of “simulation stages” and associated sets of computing resources (e.g., based upon user-provided information from prior simulations), as opposed to determining such stages dynamically in real time. In this embodiment, the simulation server platform need only determine when to effect a transition from one predefined simulation stage to another. In another alternative embodiment of the present invention, the simulation server platform provides recommendations of computing resources to users (rather than effecting automatic changes in computing resources) based, for example, on an analysis of prior simulation tasks and other user-provided information. In another alternative embodiment, the simulation server platform “pre-runs” a portion of the simulation application (e.g., one pass through a major loop or time period) for the purpose of predicting computing resource requirements for a future “complete” run of the simulation task. Before turning to a detailed description of the embodiments of the present invention illustrated in the following drawings, it should be noted that the present invention provides significant benefits to users who currently must select a single fixed set of computing resources on which their simulation task will be executed. For example, users who “overspecify” a cluster of computing resources ultimately overpay for their simulation tasks, while users who “underspecify” a cluster of computing resources may find that their simulation tasks run too slowly, or perhaps fail entirely. BRIEF DESCRIPTION OF DRAWINGS FIG. 1 is an architectural block diagram of one embodiment of the key components of the simulation server platform of the present invention. FIG. 2 is an architectural diagram illustrating one embodiment of the dynamic interaction of the key components of the simulation server platform of the present invention. FIG. 3 is a flowchart illustrating one embodiment of a process performed by the hardware metering module on the simulation server platform of the present invention. FIG. 4 is a flowchart illustrating one embodiment of a process performed by the software metering module on the simulation server platform of the present invention. FIG. 5 is an architectural block diagram illustrating one embodiment of the key components of a cluster provisioned on a hardware provider platform by the simulation server platform of the present invention. FIG. 6 is an architectural block diagram illustrating one embodiment of the key components of a simulation resource manager on the simulation server platform of the present invention. FIG. 7 is a flowchart illustrating one embodiment of the dynamic operation of a simulation resource manager on the simulation server platform of the present invention. Detailed embodiments of the systems and methods of the present invention are illustrated in the accompanying Figures and described below. It should be noted at the outset that the present invention is not limited to the particular embodiments discussed below with reference to the Figures. For example, the present invention could be integrated into distinct server platforms with the functionality reallocated among fewer or more different conceptual modules (implemented in hardware or software), reflecting different engineering tradeoffs, without departing from the spirit of the present invention. Additional embodiments of the systems and methods of the present invention will be apparent to those skilled in the art. Turning to FIG. 1, system 100 of the present invention enables users, via their User Devices 140 (desktop and laptop computers, smartphones, etc.), to run their simulations on the physical hardware of various Hardware Provider Platforms 130. Simulation Server Platform 101 serves as an intermediary (via the Internet 125) between the User Devices 140 and the Hardware Provider Platforms 130, providing users with a variety of features designed to enhance and simplify the simulation process. For example, users need not identify and contract with multiple different hardware providers, install and configure their desired simulation applications and manage the associated license server deployment and authentication process. Instead, users are provided with a user-friendly interface tailored to running simulations, along with automated metering of their hardware and software usage and an integrated and flexible billing system. Even more significantly, as will be explained in greater detail below, users are no longer limited to a single fixed set of computing resources. Instead, Simulation Server Platform 101 dynamically determines, while a user's simulation task is running, an “optimal” point at which a change in computing resources is warranted, as well as an “optimal” new set of computing resources. Moreover, Simulation Server 101 automatically implements that change in computing resources across one or more Hardware Provider Platforms 130, while preserving the ability of the selected simulation application to address inter-instance (including inter-server) dependencies without user intervention. In one embodiment, users employ STD HW/SW 142 (including standard CPUs, displays, I/O devices, memory, etc.) to communicate with Simulation Server Platform 101 via the Internet 125. Instead of requiring custom client applications in this embodiment, standard web browsers are employed to provide the User Interface 141 through which users communicate with Simulation Server Platform 101. Thus, the functionality performed by each User Device 140 is implemented by standard CPUs executing instructions stored in memory. In other embodiments, custom hardware and software can be employed without departing from the spirit of the present invention. Similarly, Hardware Provider Platforms 130 include Physical HW/SW 132 which implements its functionality via CPUs executing instructions stored in memory. As noted above, hardware providers frequently also include various virtualization hardware and software mechanisms designed to share Physical HW/SW 132 among multiple user applications running simultaneously, as is well known in the art. Simulation Server Platform 101 also includes Server HW/SW 102 to implement its functionality via CPUs executing instructions stored in memory. In one embodiment, much of the functionality of Simulation Server Platform 101 resides on one or more of the Hardware Provider Platforms 130, freeing the owner/operator of Simulation Server Platform 101 from providing its own standard physical hardware and software components to service its users. Some standard components of Server HW/SW 102 still reside on the premises of the owner/operator of Simulation Server Platform 101 to enable remote administrative access to the functionality of Simulation Server Platform 101. When a user initiates a simulation task, Simulation Server Platform 101 deploys Clusters 131 on one or more Hardware Provider Platforms 130 to implement the user's simulation task. While various key components of each Cluster 131 will be discussed in greater detail below (in particular with reference to FIG. 5), it should be noted that, for each simulation task initiated by a user, certain components of Simulation Server Platform 101 are copied to and deployed on a Cluster 131 of one or more Hardware Provider Platforms 130 to manage the simulation process for that task. At a summary level, Simulation Runner 133 manages the operation of a user's simulation task, which is implemented by the Simulation Application instances 139 themselves—i.e., the instances of the simulation application selected by the user that typically run in parallel across multiple CPU cores. Turning to the key components of Simulation Server Platform 101, Server DB (database) 105 is employed to store a variety of different types of current and historical data, including administrative billing, profile and other data regarding users, hardware providers and simulation application providers, as well as data relating to specific components of Simulation Server Platform 101 (discussed in greater detail below with respect to the operation of each component). The information stored in Server DB 105 should be distinguished, however, from information stored on the Cluster 131 provisioned for each user's simulation task, also discussed in greater detail below. In other embodiments, the storage requirements of Server DB 105 can be met by multiple distinct databases, as well as other short-term and long-term file storage mechanisms and physical devices, without departing from the spirit of the present invention. For example, in one embodiment, user data and other information relating to simulation tasks are encrypted and segregated in secure storage devices, and protected by various standard hardware and software security protocols. Simulation Server Platform 101 authenticates users, as part of a standard authentication process, when they first access the system. However, before a user can initiate a simulation task, the user must first be authenticated for use of the particular simulation application selected by the user to simulate the behavior represented by the user's model. In another embodiment, certain simulation applications also require that users be authenticated for use of individual components of the simulation application. Such authentication may occur before the simulation task is initiated, or in other embodiments during the execution of the simulation—e.g., at the time the individual component is accessed. This authentication process is implemented via License Servers 112 that are provided by owners of the individual simulation applications, as well as by third-party license server vendors. License Servers 112 may consist of software running on standard server hardware, or may be embodied in custom server hardware devices. Moreover, License Servers 112 may be deployed on the premises of the user, the simulation application provider, or in other locations (including the premises of Simulation Server Platform 101). In any event, the authentication process, as well as overall communication with License Servers 112, is managed by License Service 113 a, as part of the software metering process performed by Software Metering Module 113. As will be explained in greater detail below with reference to FIG. 4, Software Metering Module 113 monitors the total time a simulation application (or component thereof) is in use during the execution of a user's simulation task. Similarly, Hardware Metering Module 114 (discussed in greater detail below with respect to FIG. 3) monitors the total time the hardware computing resources are in use during the execution of a user's simulation task. It should be noted that, in the event multiple different sets of computing resources are deployed during the execution of a user's simulation task, Hardware Metering Module 114 will monitor the total time during which each set of computing resources is in use. In another embodiment, Hardware Metering Module 114 monitors the use of computing resources for an individual user's task across multiple Hardware Provider Platforms 130 (and in yet another embodiment individual hardware resources are monitored separately). Together, Software Metering Module 113 and Hardware Metering Module 114 facilitate a flexible “pay per use” billing model that enables a user to optimize the cost, time and other desired characteristics of the user's individual simulation task, whether that simulation task involves one or more simulation applications, one or more hardware provider platforms, and one or more different sets of computing resources (as will be discussed in greater detail below). Once a user initiates a simulation task, Cluster Service 104 provisions a cluster of computing resources from one or more of the available Hardware Provider Platforms 130. In one embodiment, the user determines the initial set of computing resources, selected from among various available choices provided by Simulation Server Platform 101. In another embodiment, Simulation Server Platform 101 determines this initial set of computing resources, employing the techniques described below to determine subsequent sets of computing resources while a user's simulation task is running. Availability Monitor 104 a maintains information regarding the availability of the various virtual server types provided by the Hardware Provider Platforms 130, including currently available capacity and associated pricing. At any given time, each user's simulation task will be associated with a cluster of virtual servers provisioned from one or more Hardware Provider Platforms 130. But, the various types of virtual servers (and capacity of each type, as well as pricing) offered by each of the Hardware Provider Platforms 130 may vary over time. As noted above, from the perspective of a hardware provider, Simulation Server Platform 101 is the customer that provisions a cluster of one or more virtual servers associated with an individual user's simulation task. Yet, from the perspective of Simulation Server Platform 101, each user is a customer whose simulation task has varying computing resource requirements (which may or may not initially be categorized as a cluster of virtual servers). As will be explained in greater detail below, these computing resource requirements (whether established initially before a simulation task is initiated, or subsequently at various different points in time while the simulation task is running) are effectively “translated” into a cluster of virtual servers (of one or more particular virtual server types) currently made available by one or more Hardware Provider Platforms 130. In any event, the connection between Simulation Server Platform 101 and each of the Hardware Provider Platforms 130 is maintained over the Internet 125 via Hardware Provider Adapters 104 b—i.e., custom APIs enabling bidirectional communication and exchange of information. For example, Hardware Provider Adapters 104 b are employed by Simulation Server Platform 101 to provision (as well as terminate) clusters of virtual servers from the Hardware Provider Platforms 130, as well as to obtain status information regarding a user's simulation task. As will be explained in greater detail below, this status information is employed not only for metering purposes (e.g., for use by Hardware Metering Module 114 and Software Metering Module 113) but also for monitoring data relating to the execution of each user's simulation task—e.g., computing resource utilization and application-specific information monitored over time with respect to each computing resource. Once Cluster Service 104 provisions a cluster for execution of a user's simulation task, Simulation Service 103 configures the user's selected simulation application (or, in another embodiment, multiple different simulation applications) with various user-specified input parameters, along with the user's simulation data model and the required subset of specified computing resources. As noted above, these specified computing resources and other application-imposed constraints are required by simulation applications in order to simulate the user's model properly and address any inter-instance (and inter-server) dependencies. Simulation Service 103 also installs all relevant software and data in the provisioned cluster. For example, in addition to configuring the simulation application on each virtual server in the cluster, an instance of that simulation application must be installed for execution by each CPU core on each such virtual server. Additional software and data components installed on each cluster will be discussed in greater detail below with reference to FIG. 5. Once all relevant software and data has been configured and installed, Simulation Service 103 initiates execution of each instance of the simulation application on each CPU core within each virtual server in the cluster. Finally, Simulation Resource Manager 110 is responsible, in one embodiment, for managing the dynamic process of modifying the computing resources allocated to a user's simulation task while it is running. As will discussed in greater detail below with reference to FIGS. 6 and 7, Simulation Resource Manager 110 continually monitors execution of each user's simulation task as it is running in its provisioned cluster, searching for various “resource change indicators” that evidence a need to modify the current computing resources associated with that provisioned cluster. These resource change indicators include “computing resource utilization” information (such as the percentage utilization of each CPU core and other computing resources, such as RAM, storage, network bandwidth, etc.), as well as application-specific information relating to the user's simulation task (e.g., current number of cells in the user's model, extracted from output files written dynamically by the simulation application). Upon extracting these resource change indicators, along with occasional restart files generated by the simulation application, Simulation Resource Manager 110 continually analyzes this information in order to determine an optimal point (if any) at which a change in computing resources is warranted. If such a change is warranted, Simulation Resource Manager 110 also determines an optimal new set of computing resources (e.g., 16 additional CPU cores, 8 GB less RAM, etc.), which it then “translates” into an available cluster of virtual servers on one or more Hardware Provider Platforms 130 (which may, in some cases, be on a different Hardware Provider Platform 130 than was employed for the current cluster—e.g., due to the lack of an appropriate virtual server type at that time). As will be explained in greater detail below, this analysis can range from relatively simple calculations of predefined conditions and thresholds to a more complex rules-based analysis, and, in one embodiment, a predictive machine-learning approach involving an assessment of future computing resource requirements. In any event, once such an analysis triggers a change in computing resources, Simulation Resource Manager 110 invokes Cluster Service 104 to provision a new cluster, terminate the current cluster, and “resume” execution of the user's simulation task on the new cluster. As noted above, in order to ensure that the simulation application can resume execution (e.g., from the intermediate simulation state contained in the selected restart file), Simulation Resource Manager 110 configures the simulation application in the new cluster with the required application-imposed constraints (e.g., the number of CPU cores in the new cluster) before initiating (resuming) execution. The components of Simulation Server Platform 101 are themselves installed, in one embodiment, on a distinct cluster of one or more of the Hardware Provider Platforms 130, from which they are accessed for administrative and related purposes from any computer via a web browser interface and appropriate authentication credentials. Nevertheless, certain components of Simulation Server Platform 101 (e.g., Simulation Runner 133) are installed in each cluster corresponding 131 corresponding to a user's simulation task, as discussed in greater detail below. Turning to FIG. 2, diagram 200 illustrates one embodiment of the dynamic interaction of the key components of Simulation Server Platform 101 discussed above. For example, when a user initiates a simulation task, Simulation Service 203 invokes Cluster Service 204 with a “Launch Cluster” request (including the specifications of the computing resources defining the cluster), causing Cluster Service 204 to provision the cluster on one or more Hardware Provider Platforms 130 and to obtain a “Simulation Cluster ID,” which it provides to Simulation Service 203. This Simulation Cluster ID facilitates future communications with Hardware Provider Platforms 130 via Cluster Service 204, as it uniquely identifies each specific cluster, associated with a particular user's simulation task. Such communications include terminating the cluster, as well as obtaining status information while the user's simulation task is running. Simulation Service 203 generates Cluster Metadata (in one embodiment, a Hostname/User pair) relating to each particular cluster, which it provides to Simulation Resource Manager 210 to facilitate communications relating to that cluster. For example, when Simulation Resource Manager 210 determines that a change in computing resources is warranted with respect to a user's simulation task, it provides a “Simulation Resource Change Request” to Simulation Service 203, along with the relevant information regarding the new cluster (e.g., identifying the desired hardware provider, the number of virtual servers of a particular type, etc.). Cluster Metadata is also utilized in this embodiment for hardware and software metering (again to uniquely identify the user's simulation task). Once a cluster is provisioned by Cluster Service 204, Simulation Service 203 installs and configures the relevant software and data on the cluster, including Simulation Runner 233, with which it then communicates to initiate execution of the user's simulation task, and to exchange status information while that task is running as well as perform certain “instructions” (e.g., uploading output files). Installation and configuration information provided by Simulation Service 203 includes the user's model, input configuration parameters and files for starting the simulation application (including application-imposed constraints relating, for example, to certain provisioned computing resources) and any other relevant input data (e.g., intermediate simulation state information from a selected restart file if the simulation is “resuming” execution rather than starting in its initial state). Once Simulation Service 203 installs the relevant software and data and instructs Simulation Runner 233 to initiate execution of the simulation, Simulation Runner 233 starts the simulation by initiating execution of each of the “SIM APP Instances” 239 (i.e., each instance of the simulation application to be executed by a distinct CPU core), as is described in greater detail below. Simulation Service 203 also maintains periodic communication with Simulation Runner 233, for example, to “ping” the cluster to ensure it is still “alive” and to shut down the cluster when the simulation has completed (or an earlier termination is warranted, for example, due to a software or hardware failure). Many simulation applications implement a standard “Message Passing Interface” (MPI) that facilitates inter-node communication. In one embodiment, Simulation Runner 233 also implements MPI for its own communications. In one embodiment, upon initiating execution of the simulation task, each of the SIM APP instances 239 of the simulation application communicates with License Servers 212 to authenticate the user and permit the user to “check out” and “check in” the simulation application, or specific component features of the simulation application. License Servers 212 employ the Hostname/User pair (generated by Simulation Service 203 as noted above) to uniquely identify the user whose simulation task is running to facilitate the authentication process. In another embodiment, a “master” instance in a “head node” within the cluster (discussed below with reference to FIG. 5) performs the authentication function on behalf of other nodes. As the simulation task is running, Simulation Runner 233 obtains various types of usage data (including the extracted resource change indicators), and provides that data to Simulation Resource Manager 210 for analysis, as will be discussed in greater detail below. In addition, Simulation Server Platform 101 continuously meters the use by each simulation task of both hardware and software computing resources, as illustrated in FIG. 3 below. Flowchart 300 in FIG. 3 illustrates one embodiment of a metering process performed by Hardware Metering Module 114 to monitor the time during which the hardware resources of a provisioned cluster associated with a user's simulation task are in use (e.g., based upon a “START” and “END” time). This process enables the user to be billed on a “pay per use” basis by multiplying the pricing for specific hardware resources by the monitored usage time. It should be noted that hardware providers typically operate on the level of granularity of a “virtual server” (or “virtual machine”) as opposed to a cluster of multiple virtual servers. In other words, from the perspective of Simulation Server Platform 101, a user's simulation task is associated with a single cluster that may include multiple virtual servers (even across multiple hardware providers in one embodiment). Yet, from the perspective of a hardware provider, each virtual server may be considered a separate “billable job,” as the hardware provider need not be aware that multiple virtual servers are associated with a single simulation task. Moreover, in another embodiment, a simulation task may be running simultaneously across different hardware providers, including providers of bare metal as well as virtual servers. It should also be noted that, in addition to handling multiple users running various simulation tasks simultaneously (potentially across multiple different Hardware Provider Platforms 130), the process described in flowchart 300 also addresses the scenario (described in greater detail below) in which the hardware resources allocated to a user's individual simulation task are modified while the simulation task is running (e.g., to provision more or fewer hardware resources as required at various points during the execution of the simulation task). In such a scenario, the execution of a simulation task on a first cluster is stopped and resumed on a second cluster (perhaps multiple times); and the use of hardware resources on each of these clusters (and on each virtual server within each cluster) is metered at the differing prices associated with each cluster (or individual virtual server), thereby charging the user of the simulation task for an “optimal” amount of hardware resources. In any event, it should be emphasized that the following discussion of the hardware metering process illustrated in flowchart 300 applies equally whether a hardware provider monitors the usage of hardware resources at the level of granularity of an individual simulation task and its associated cluster of hardware resources (including one or more virtual machines and/or bare metal servers), or at the level of granularity of each individual virtual or bare metal server (with distinct START and END times), unaware that the simulation task is associated with and running on multiple such servers (consecutively or simultaneously). One skilled in the art can easily extrapolate from flowchart 300 to understand how one combines separate START and END times across multiple virtual or bare metal servers (or even across multiple hardware providers) to generate a total hardware fee for a simulation task (even when different pricing exists for individual virtual or bare metal servers). The continuous metering process illustrated in flowchart 300 begins at step 310 in which Hardware Metering Module 114 retrieves the next “active” simulation task record from Server DB 105. Though not all details are shown in flowchart 300, it is helpful to understand how database records relating to a simulation task are generated and maintained, both by Hardware Provider Platforms 130 and by Simulation Server Platform 101. When Simulation Server Platform 101 provisions a cluster (associated with an individual simulation task) from a Hardware Provider Platform 130, the Hardware Provider Platform 130 maintains a “hardware provider” database record, which is accessible via APIs, such as those employed by Hardware Provider Adapters 104 b in Cluster Service 104. This record typically includes an identification of the provisioned simulation task (i.e., “Cluster ID” or, as noted above, separate “Virtual Server” IDs), along with associated metrics, including timestamps of various activities performed by or with respect to the simulation task (which vary among different hardware providers). This ID typically indicates which specific processes are running on the cluster (or on a distinct virtual or bare metal server). When the execution of a simulation task ceases in its entirety (whether due to the normal completion of the simulation or due to a hardware or software failure), the record is no longer designated as “active” in the hardware provider's database. Simulation Server Platform 101 maintains a similar corresponding database record in Server DB 105. As will become apparent from the discussion below regarding flowchart 300, Hardware Metering Module 114 relies on information maintained by the Hardware Provider Platforms 130 to perform its metering function and maintain the simulation task record in Server DB 105. It should also be noted (as alluded to above), that the simulation task ID maintained in Server DB 105 may be associated with multiple different bare metal or virtual servers across one or more Hardware Provider Platforms 130. Returning to flowchart 300, the simulation task ID in the database record in Server DB 105 (retrieved in step 310) identifies the relevant hardware provider associated with the simulation task (whether at the level of granularity of the cluster of servers, or individual bare metal or virtual servers). Hardware Metering Module 114 utilizes this information in step 312 to query the APIs of the relevant hardware provider (via Hardware Provider Adapters 104 b) for a matching active “hardware provider” record associated with that simulation task. In step 315, if the response to the query indicates the existence of such an active hardware provider record, Hardware Metering Module 114 updates, in step 320, the simulation task database record (from Server DB 105) with a START timestamp extracted from that hardware provider record. It should be noted that some amount of time elapses from the time a hardware provider receives a request to provision a cluster and the actual provisioning of that cluster and creation of a “hardware provider” record. In this embodiment, the existence of the hardware provider record indicates the presence of an accurate START timestamp—as this is the timestamp the hardwire provider uses to bill its “customer”—i.e., the Simulation Server Platform 101—once an END timestamp is determined (as discussed below). Then, in step 322, Hardware Metering Module 114 updates the simulation task database record with a temporary END timestamp based on the current time. In other words, because the simulation task is still “active” from the perspective of the hardware provider, it has not yet ended. But, as will be discussed below, this temporary END timestamp may serve as useful data from which an actual END timestamp may be inferred (e.g., in the event of an abnormal termination of the simulation task due to a hardware or software failure). Then, in step 330, Hardware Metering Module 114 saves this updated simulation task database record to Server DB 105, and calculates, in step 370, a temporary “current” hardware fee—i.e., the usage time, based on the START and temporary END timestamps, multiplied by the hardware provider's pricing for the provisioned hardware resources. Eventually, the simulation task will be terminated (normally or abnormally), and an active hardware provider record will no longer be found by the query in step 312. Thus, in step 315, if the response to the query in step 312 indicates that no such active hardware provider record exists (regardless of whether such a record was ever found), hardware provider does not have an active record relating to the simulation task (in step 315), then Hardware Metering Module 114 searches for a START timestamp in Server DB 105 in step 325. If no START timestamp is found (i.e., indicating that the simulation either completed very quickly or, more likely, failed abnormally), then Hardware Metering Module 114, in step 338, uses its “internal” START timestamp as a fallback to update its database record. In other words, it uses the time at which Cluster Service 104 requested provisioning of the cluster (since no START timestamp was available from the hardware provider). Regardless of the outcome of step 325, Hardware Metering Module 114 now has an updated database record with a START timestamp, and knows that the simulation has ended, but does not yet have an END timestamp. So, in step 340, Hardware Metering Module 114 queries the APIs of the relevant hardware provider (again via Hardware Provider Adapters 104 b) for historical metrics regarding the simulation task. In other words, while no active hardware provider record is present, historical metrics are still maintained by the hardware provider. These metrics are utilized, in step 342, to infer an END timestamp. For example, they may provide a timestamp at which the simulation task was terminated abnormally due to a hardware or software failure. Alternatively, they may indicate a normal termination and provide an actual END timestamp. In other cases, they may not provide an actual END timestamp, but may provide evidence of activity from which an END timestamp can be inferred. Simulation Server 101 may also detect evidence of normal or abnormal termination of the simulation task via its own monitoring processes (as explained in greater detail below). In one embodiment, if no actual END time can be extracted from this available “evidence,” then the timestamp of the latest activity is utilized as an inferred END time. In another embodiment, periodic polling is employed (for a “heartbeat” of activity, or for specific hardware metrics, such as CPU usage) to determine when a simulation task has ended (i.e., when it no longer responds to polling events). In any event, Hardware Metering Module 114 now has an updated simulation task database record with both START and END timestamps and, in step 360, saves this updated record to Server DB 105. It then proceeds to step 370 and calculates the hardware fee as described above (updating any temporary hardware fee previously calculated). Though not shown in flowchart 300, the result of this “final” hardware fee calculation is utilized for billing purposes (in one embodiment, by combining it with similar fees calculated for other bare metal or virtual servers, perhaps across multiple hardware providers, associated with the same simulation task). In one embodiment, hardware fees across multiple simulation tasks (as well as multiples users within an organization) are then combined to generate monthly hardware fees for an organization and each of its individual users. In step 375, Hardware Metering Module 114 continually (or, in another embodiment, periodically) searches Server DB 105 for other active simulation tasks to monitor. Once another active simulation task is found, Hardware Metering Module 114 returns to step 310 to retrieve its associated active simulation task database record, and repeat this continuous hardware metering process. Turning to FIG. 4, flowchart 400 illustrates one embodiment of a metering process performed by Software Metering Module 113 to monitor the time during which the software resources of a provisioned cluster associated with a user's simulation task are in use. In contrast to the hardware metering process described above with respect to FIG. 3 (which monitors START and END times regarding usage of hardware resources), flowchart 400 monitors “checkOUT” and “checkIN” events regarding usage of software resources—i.e., simulation applications (and, in one embodiment, particular component features thereof). In other words, software metering begins not when the hardware resources of the cluster are provisioned, and not even necessarily when the simulation task is initiated, but when the user of a particular simulation application (or a particular component feature of that application) is authenticated and the application or component feature is launched. This checkOUT event marks the beginning of the software metering process, while a subsequent checkIN event marks the end of the process with respect to usage of a particular simulation application or component feature. As discussed above, simulation applications employ License Servers 112 to authenticate users before allowing them access. When a user seeks to access a simulation application or component feature—e.g., to initiate a simulation task, or an intermediate part of that task—the simulation application communicates with its associated License Server 112, which authenticates the user and either permits or denies such access. Following authentication, when the simulation application or feature is launched, the License Server 112 generates a checkOUT event, followed eventually by a checkIN event when the simulation application or feature is no longer in use. License Servers 112 document these checkOUT and checkIN events in “License Log Files” in order to maintain a record of the events for contractual, billing or other purposes. These logged events typically include information identifying the simulation application and the user, as well as a “timestamp” indicating when the event occurred. In some cases, the timestamp identifies both the date and time of the event, while in other cases only the time is included, and a separate “DateStamp” event is generated (e.g., at the beginning or end of each calendar day) from which the date of prior and subsequent timestamps can be inferred. Software Metering Module 113 includes License Service 113 a to manage communications with the License Servers 112 so that it can monitor usage of simulation applications by extracting checkOUT and checkIN timestamps from the License Log Files. Beginning with step 410, License Service 113 a of Software Metering Module 113 establishes a connection with each of the various License Servers 112 responsible for authenticating users of the simulation applications installed by Simulation Platform 101. In one embodiment, in step 410, Software Metering Module 113 periodically polls the License Servers 112 for new entries. In this embodiment, Software Metering Module 113 gains access to the License Log Files (via the connections established by License Service 113 a), but must determine, in step 415, whether a new entry has in fact been added since it last checked (e.g., a new line at the end of a License Log File). In another embodiment, an interrupt mechanism is employed to detect a new entry and notify Software Metering Module 113, though such a mechanism requires more extensive integration with the various License Servers 112 (in some cases provided by various Hardware Provider Platforms 130). In one embodiment, step 415 is a continuous process performed by Software Metering Module 113 that is repeated across the License Log Files generated by all connected License Servers 112 until a new entry is detected. Once Software Metering Module 113 detects a new entry in one of the License Log Files, it processes that entry in the remaining steps of flowchart 400 (beginning with step 420), after which it resumes searching for new entries in step 415. In a separate process (not shown in flowchart 400), Software Metering Module 113 analyzes each checkOUT record (including a “matching pair” of corresponding checkOUT and checkIN events associated with a particular user's simulation task or component feature) to determine the usage time associated with that record (i.e., the difference between the checkOUT and checkIN event times). It then cumulates these usage times (across simulation tasks, users, organizations of users, and simulation applications) and applies the relevant associated pricing structures to calculate software metering fees for billing purposes. As a result, Simulation Server Platform 101 can generate periodic (e.g., monthly) fee and usage reports (for users, organizations and licensors of simulation applications) detailing the usage of software resources by users of Simulation Server Platform 101. In one embodiment (also not shown in flowchart 400), if no matching checkIN event is generated and recorded in the License Log Files (e.g., if a simulation application terminated abnormally unknown to its License Server 112), then Software Metered Module 113 creates an artificial checkIN event and infers its date and time from other monitored information. Such information can include a notification from the Hardware Provider Platform 130 on which the cluster is being executed, as well as information discerned from within the cluster itself, as discussed in greater detail below with reference to FIG. 5. Returning to flowchart 400, once Software Metering Module 113 detects a new entry in one of the License Log Files in step 415, it parses that new entry in step 420 so that it can determine its type. It determines, in step 425, whether the new entry is a checkOUT event. If not, it then determines, in step 435, whether the new entry is a checkIN event. If not, it then determines, in step 445, whether the new entry is a DateStamp entry. If not, it then concludes, in step 492, that the new entry is therefore an “Unknown Log Entry” which it can ignore (and then resume searching for new entries in step 415). In other embodiments, License Servers 112 may generate additional types of events, which can be processed in a similar manner without departing from the spirit of the present invention. If the new entry is determined in step 425 to be a checkOUT event, Software Metering Module 113 then generates, in step 450, a checkOUT “DateTime” entry, and then creates, in step 460, a new checkOUT record that includes the checkOUT DateTime entry and an “open” checkIN entry (as the simulation application or component feature has yet to be “checked back in”). It then saves this new checkOUT record in Server DB 105. In other words, Software Metering Module 113 saves the date and time of the checkOUT event, as well as related information associating the event with the corresponding simulation application and user's simulation task. As noted above, if the date is not included, Software Metering Module 113 can infer the date from the most recent prior DateStamp entry in the License Log File. As will be discussed below, this information is subsequently employed by Software Metering Module 113 to match this event with its future corresponding checkIN event to determine overall usage by the relevant simulation task, from which it then calculates software metering fees as noted above. At this point, however, having completed the processing of this checkOUT event, Software Metering Module 113 returns to step 415 to resume searching the License Log Files for new entries. On the other hand, if the new entry is determined in step 435 to be a checkIN event, Software Metering Module 113 then generates, in step 470, a checkIN “DateTime” entry. Because it knows that there must exist a previous corresponding checkOUT entry, it then searches Server DB 105, in step 480, for the corresponding checkOUT record created and saved back in step 460 (utilizing the related information discussed above associating the checkOUT event with the corresponding simulation application and user's simulation task). Software Metering Module 113 then updates this checkOUT record with the checkIN DateTime entry, and saves the updated checkOUT record in Server DB 105. As was the case with checkOUT events, Software Metering Module 113 can infer the date of this checkIN event (if it is not included in the new entry) from the most recent prior DateStamp entry in the License Log File. Software Metering Module 113 then, in step 490, saves the current date to Server DB 105 to facilitate the matching of checkIN and checkOUT records due to the fact (noted above) that certain License Servers 112 include only the time (but not the date) with each checkIN and checkOUT entry they add to their License Log File. If the new entry is determined in step 445 to be a DateStamp entry, then Software Metering Module 113, in step 490, saves the current date from that DateStamp entry into Server DB 105. In either case, this “current date” information facilitates the search, in step 480, for a corresponding matching checkOUT record—i.e., ensuring that a date is associated with each checkOUT entry. Software Metering Module 113 then returns to step 415 to resume searching the License Log Files for new entries. As noted above, this software metering process illustrated in flowchart 400 matches checkOUT and checkIN events for a simulation application generally, as well as for individual component features of that simulation application, thereby accommodating different authentication and pricing mechanisms employed on a feature-by-feature basis by the owner of simulation applications. Turning to FIG. 5, block diagram 500 illustrates one embodiment of key components of a cluster after it is provisioned on a Hardware Provider Platform 130 by Cluster Service 104. As noted above, Simulation Service 103 configures the cluster by installing and configuring certain components, including instances of the simulation application. It should be noted that these components, despite residing in each cluster associated with a user's simulation task, are conceptually part of the functionality of Simulation Server Platform 101. The allocation of this functionality among different hardware and software components is the result of engineering and design tradeoffs, which can be modified without departing from the spirit of the present invention. To better understand how Simulation Resource Manager 110 manages the process of monitoring the use of computing resources and modifying them when warranted (as described in greater detail with reference to FIGS. 6 and 7 below), it is helpful to understand how these key functional components interact with a running simulation and facilitate communication between each cluster 531 and the Simulation Server Platform 101. In one embodiment, for each simulation task, Cluster Service 104 provisions and configures a cluster 531 containing a single “Head Node H” 531 H, (which includes an instance 539 H of the simulation application), along with an additional node for each remaining instance of the simulation application (node H1 531 H1, node H2 531 H2, . . . node Hn 531 Hn). In this embodiment, each instance (539 H, 539 H1 . . . 539 Hn) of the simulation application, installed by Cluster Service 104, is executed by a distinct CPU core. The CPU cores may reside on one or more CPUs in a single physical or virtual server, or be spread across multiple CPUs, physical and virtual servers. In another embodiment, each node corresponds to a virtual server provisioned from a Hardware Provider Platform 130, and can thus contain more than one CPU core and therefore execute more than one instance of the simulation application. Each node (including Head Node H 531 H) also includes a Hardware Monitor (538 H, 538 H1 . . . 538 Hn), which, as will be explained below, dynamically monitors the use of computing resources by its corresponding instance of the simulation application. Head Node H 531 H also includes additional components (in one embodiment, Simulation Runner 533, Output File Parser 534, Restart File Monitor 536 and Cluster DB 535) relating to management of the simulation task as a whole. The functionality of such components is effectively shared among all of the nodes in cluster 531. As noted above (and described in greater detail below with reference to FIGS. 6 and 7), Simulation Resource Manager 110 continually monitors execution of each user's simulation task while it is running on its provisioned cluster, searching for various resource change indicators, including computing resource utilization information as well as application-specific information relating to the user's simulation task. In one embodiment, Hardware Monitors (538 H, 538 H1 . . . 538 Hn) in each node are responsible for obtaining computing resource utilization information, such as the percentage CPU utilization by each CPU core in cluster 531. While certain computing resource utilization information can be obtained via standard services provided by Hardware Platform Providers 130, Hardware Monitors (538 H, 538 H1 . . . 538 Hn) also supplement this information, in one embodiment, with additional information not available from the Hardware Platform Provider 130 on which cluster 531 resides, such as the amount of free RAM, overall network bandwidth utilization, etc. The computing resource utilization information obtained by Hardware Monitors (538 H, 538 H1 . . . 538 Hn), including information obtained indirectly via services provided by Hardware Platform Providers 130, is stored and maintained in Cluster DB 535, and ultimately utilized by Simulation Resource Manager 110 (as described in greater detail below with reference to FIGS. 6 and 7). In one embodiment, data stored in Cluster DB 535 is periodically synchronized with Server DB 105 for use in the event of a hardware or software failure in cluster 531 that prevents further access to Cluster DB 535. As noted above, Simulation Runner 533 manages the overall operation of the user's simulation task and, in one embodiment, communicates with Simulation Server Platform 101 via Simulation Service 103. In addition to initiating execution of each of the instances (539 H, 539 H1 . . . 539 Hn) of the simulation application and shutting down the cluster when the simulation has completed (or terminated abnormally), Simulation Runner 533 also manages the dynamic process of obtaining the various resource change indicators—e.g., communicating with Hardware Monitors (538 H, 538 H1 . . . 538 Hn) to manage the process of obtaining computing resource utilization information. Simulation Runner 533 also manages the extraction of application-specific information relating to the user's simulation task as a whole (i.e., across multiple instance of the simulation application). As noted above, simulation applications generate and write various types of status information to output files. in the embodiment illustrated in FIG. 5, the simulation application is configured to write these output files to Cluster DB 535 in Head Node H 531 H. Output File Parser 534 parses these output files to extract information from which Simulation Resource Manager 110 can infer whether a change in computing resources is warranted (e.g., information relating to the efficiency of the simulation application's use of computing resources, including indicators of its potential future computing resource requirements), as explained in greater detail below with respect to FIGS. 6 and 7. Simulation applications also (as noted above) occasionally generate and write restart files which, in this embodiment, are also written to Cluster DB 535. Restart files include a current intermediate simulation state from the simulation application can be restarted. As noted above, simulation applications typically require pre-configuration information indicating the number of CPU cores on which they will be executed (i.e., one instance per CPU core). For example, 8 instances of a simulation application may initially be running on 8 CPU cores. However, when restarted from the intermediate simulation state identified in a restart file, the simulation application can be configured for a lesser or greater number of CPU cores. In one embodiment, Restart File Monitor 536 monitors and analyzes the restart files occasionally written by the simulation application, and provides information utilized by Simulation Resource Manager 110 in its determination of whether a change in computing resources is warranted. Such information may include the captured “snapshot” state of particular variables, as well as more general information, such as the time at which the restart file was written. For example, while other resource change indicators might otherwise suggest that a change in computing resources is warranted, the lack of a sufficiently recent restart file may tip the balance against such a determination. Turning to FIG. 6, block diagram 600 illustrates one embodiment of key components of Simulation Resource Manager 110, which determines dynamically, while a user's simulation task is running, whether, when and to what extent to modify the computing resources currently provisioned to the simulation task. Simulation Monitoring Service 615 manages communication with Simulation Runner 533 in each cluster 531 associated with a currently running simulation task. As noted above, information obtained by Simulation Monitoring Service 615 from Simulation Runner 533 includes resource change indicators, including computing resource utilization information, which relates to percentage utilization of CPU cores, available memory and disk space on each physical or virtual server, disk read/write information (e.g., number of bytes read to and written from particular storage devices within a given period of time), and network bandwidth utilization (e.g., number of bytes transferred across virtual servers). Historical computing resource utilization information is also maintained in Cluster DB 535 over time while the simulation task is running, enabling inferences by Simulation Resource Manager 610 regarding the efficiency of such use. Simulation Monitoring Service 615 also obtains (from Simulation Runner 533) application-specific information (another type of resource change indicator) relating to the user's simulation task. As noted above, such information is extracted from output files generated by the simulation application, and includes, for example, direct and indirect references to the current number of cells the simulation application is processing with respect to the user's simulation model. For example, as the simulation progresses, the simulation application may combine or divide the number of cells in some or all parts of the model, enabling Simulation Monitoring Service 615 to infer the current number of cells being processed and, in other embodiments, to predict the number of cells that will be processed in the future. In other cases, the number of cells can be estimated from cell characteristics, such as their length (e.g., 2 mm) or volume (e.g., 1 meter cubed). Given a predefined target number of cells per core, Simulation Monitoring Service 615 infers a new target number of CPU cores, which may affect targets for other computing resources (e.g., a relatively high number of 512 CPU cores may benefit from a higher network bandwidth, such as 10G Ethernet or, if available, possibly 40G InfiniBand). As noted above, cells of a user's simulation data model have various properties (e.g., length, volume, density, temperature, pressure, etc.) that undergo changes over time depending upon the system being modeled and the functionality being performed by the simulation application on the user's simulation data model. For example, in a “computational fluid dynamics” (CFD) simulation, the simulation application may perform calculations on the user's model of an airplane wing to simulate the effects of turbulence on the wing as it moves through the air upon takeoff (or during flight at a given altitude, or during descent for landing, etc.). In this example, the cells of the airplane wing may have certain initial properties, such as volume, temperature, pressure, etc. But, as the wing moves through the air, and encounters air molecules (also represented as cells with analogous properties), the properties of certain cells on the wing may change, for example, based upon standard turbulence and related equations. As a result of these calculations, for example, pressure may increase on certain cells of the wing, which may result in changes to the properties of these and other neighboring cells, and so on as the simulation progresses. Over the course of numerous iterations of these calculations over time, changes in cell properties perpetuate, and are reflected in status information occasionally written to output files. It should also be noted that different simulation applications write different types of information to output files. For example, some correlate cells to CPU cores, and write data to output files as the number of cells increase or decrease by a predetermined amount or percentage. Others determine a required amount of RAM based upon specifications of the user's simulation data model, and write to output files the minimum and most efficient amounts of RAM required at various times while the simulation is running. Still others require inferences regarding RAM requirements based upon information written to output files indicating the amount and frequency of data written to disk. Simulation Monitoring Service 615 monitors these different types of application-specific information (obtained from Simulation Runner 533 after being extracted from output files), makes inferences regarding the use of computing resources by the simulation application (e.g., relating to the current number of cells, amount of free RAM, etc.) and organizes and formats this data for evaluation by Optimal Computing Resource Evaluation Engine 620. Simulation Monitoring Service 615 also obtains from Simulation Runner 533 the restart files generated over time by the simulation application, which it provides to Optimal Computing Resource Evaluation Engine 620 to facilitate its analysis in particular of when a change in computing resources is warranted. In one embodiment, Optimal Computing Resource Evaluation Engine 620 includes a set of “trigger evaluators” to assess this data from Simulation Monitoring Service 615 and determine whether a change in computing resources is warranted. Hardware-Level Trigger Evaluator 623 is employed to assess computing resource utilization data—i.e., current and historical percentages of utilization of each computing resource (CPU, RAM, storage, network bandwidth, etc.). Simulation-Level Trigger Evaluator 621 is employed to assess application-specific data relating to the user's simulation task (extracted, for example, by Simulation Runner 533 from the output files generated by the simulation application). In one embodiment, individual triggers are employed for each computing resource. Information relating to the number of cells may trigger an increase or decrease in the number of CPU cores. Information evidencing an increase in “inter-core” communication over time may trigger a decrease in the number of CPU cores, and perhaps an increase in the amount of RAM. Application-specific information may also evidence a transition to a more or less CPU-intensive phase of the simulation, thereby triggering an increase or decrease in the number of CPU cores. For example, a transition to a particular type of component of the simulation application (e.g., a “solver” for a specific type of calculation) frequently indicates a less CPU-intensive “phase” of the simulation. Moreover, evidence that a simulation has completed one of a series or hierarchy of repeating “iteration steps” (e.g., iterations simulating a period of time, mathematical convergence toward a particular solution, such as cell pressure converging toward equilibrium, or other similar repeated iterations) may indicate that the historical utilization of computing resources is likely to be repeated for subsequent “iteration steps.” In such a scenario, the historical evidence of the use of the currently provisioned computing resources during one or more iteration steps provides facilitates an inference regarding such use during future iteration steps, and thus (in one embodiment) takes on greater weight regarding the decision of whether a change in computing resources is warranted. In one embodiment, the triggers of Simulation-Level Trigger Evaluator 621 and Hardware-Level Trigger Evaluator 623 are combined, enabling more complex functions or rules. For example, a triggered increase in CPU cores might require both a threshold increase in the number of cells and in CPU utilization. Finally, User-Level Trigger Evaluator 622 is employed in one embodiment to facilitate the decision by Optimal Computing Resource Evaluation Engine 620 in light of a user's predefined overall goals (optional in one embodiment) regarding the allocation of computing resources. For example, one user may elect to optimize for minimal cost, while another user may elect to optimize for minimal overall simulation time. In another embodiment, users may provide triggers including functions with predefined thresholds, as well as rules or other heuristics to be utilized by a rules-based implementation of Optimal Computing Resource Evaluation Engine 620. In one embodiment, Optimal Computing Resource Evaluation Engine 620 employs a learning engine (distributed among its component trigger evaluators) that includes predictive models of the behavior of the simulation application on a given set of provisioned computing resources. For example, one such predictive model predicts the number of cells that will exist in the user's simulation data model over time during the course of the simulation (based upon application-specific data extracted from output files). This predictive model is continuously refined as the simulation progresses and new information is obtained by Simulation Monitoring Service 615. Once the predicted number of cells exceeds a predefined threshold, Simulation-Level Trigger Evaluator 621 “triggers” a recommendation for an increase in the current number of CPU cores. Other triggers are generated, for example, by Hardware-Level Trigger Evaluator 623, for example, when the percentage utilization of CPU cores (or RAM, storage, network bandwidth or other computing resources) exceeds predefined thresholds. These triggers are combined, in one embodiment, to generate a single decision as to whether a change in one or more computing resources is warranted. For example, in one embodiment, a predefined function is employed to combine the various triggers, and to apply predefined weights to each trigger. In this embodiment, User-Level Trigger Evaluator 622 is employed to modify the weighting of the triggers in these functions by taking into account predetermined user goals. For example, a user goal of optimizing for minimal overall simulation time may weight a trigger for increased CPU cores more heavily (despite the additional resulting cost) than a user goal of optimizing for overall cost. In other embodiments, instead of a learning engine, Optimal Computing Resource Evaluation Engine 620 includes predefined rules (e.g., as employed by a knowledge-based expert system) that do not predict the future use of computing resources by the simulation task, but instead generate triggers based solely on current data monitored by Simulation Monitoring Service 615 and historical trends monitored over time. For example, one such rule or heuristic employed in this embodiment triggers an increase in CPU cores when the percentage of CPU utilization exceeds a predefined threshold and the number of cells has increased by another predefined threshold percentage over yet another threshold period of time. In yet another embodiment, a simpler set of predefined functions is employed without any knowledge base or expert system. Optimal Computing Resource Evaluation Engine 620 determines on a continuous basis whether a change in individual computing resources is warranted, regardless of the form of engine employed. In one embodiment, before reaching such a determination, Optimal Computing Resource Evaluation Engine 620 analyzes the restart files to determine whether a sufficiently recent restart file is available. For example, if the state of certain information in the most recent restart file would lead to a different conclusion than would the current version of such information, Optimal Computing Resource Evaluation Engine 620 determines, in one embodiment, that no change to the provisioned computing resources is warranted. In another embodiment, it adjusts the predefined weighting of one or more triggers, based upon the extent of the differences between the versions of such information. In the event Optimal Computing Resource Evaluation Engine 620 determines that a change in computing resources is warranted, Optimal Computing Resource Calculator 630 is employed to determine an optimal amount of each computing resource to be allocated to the user's simulation task, and to translate that optimal set of computing resources into actual physical or virtual servers to be provisioned from one or more Hardware Provider Platforms 130. For example, based upon the results provided by the various triggers in Optimal Computing Resource Evaluation Engine 620, Optimal Computing Resource Calculator 630 may determine that an increase in CPU cores is warranted, while the amount of RAM should be decreased. But the precise number of CPU cores and amount of RAM are determined, in one embodiment, by extrapolating from the evaluations performed by the various triggers, taking into account both historical trends and projected future computing resource requirements, as well as the constraints imposed by the simulation state available in most recent restart file. For example, with respect to CPU cores, the projected number of required CPU cores may be based upon historical trends or a predictive learning engine. In any event, the number of cells may be projected to increase at a certain rate which, taking into account a predefined optimal number of cells per core, would yield a desired number of required CPU cores for the remainder of the simulation task (or at least until another change is warranted based upon actual usage data). This desired number may, for example, be reduced slightly once the past results from the time at which the most recent restart file was generated are taken into account. In one embodiment, a simple average is employed—e.g., selecting 30 CPU cores if the projected needs range from 14 to 46 cores for the remainder of the simulation (from the intermediate state available in the most recent restart file). In another embodiment, a predefined function may yield a different result—e.g., taking into account a user's desire to optimize for minimal cost or minimal overall simulation time, or some other desired goal. Similar calculations are performed for other computing resources (RAM, storage, network bandwidth, etc.), each of which is based upon the data extracted and monitored by Simulation Monitoring Service 615 for each specific type of computing resource. In each case, the calculations are based upon a projected utilization of that specific computing resource. Once a desired set of computing resources is determined (taking into account the most recent available restart file), these amounts are effectively translated into a set of computing resources that can actually be provisioned from one or more Hardware Provider Platforms 130. For example, although the calculations may generate a requirement for 30 CPU cores and 3 GB of RAM per CPU core, the closest matching available physical or virtual server may be 2 virtual servers, each of which has 16 CPU cores and 64 GB of RAM. Note that the current set of configured computing resources may, for example, include a different type of virtual server (e.g., one with 8 CPU cores and 64 GB of RAM). This does not present a problem in one embodiment of the present invention—because a new cluster is provisioned, potentially even from a new Hardware Provider Platform 130. Once Optimal Computing Resource Calculator 630 determines the new desired set of computing resources to be provisioned as a new cluster, Simulation Resource Manager 110 orchestrates the process for terminating the current cluster, provisioning and configuring the new cluster, and resuming execution of the user's simulation task (from the intermediate simulation state contained in the most recent restart file) on that new cluster. This process is illustrated in flowchart 700 of FIG. 7 below, and described along with examples of the types of simulation scenarios that benefit from this dynamic modification of provisioned computing resources while a user's simulation task is running. Turning to FIG. 7, flowchart 700 illustrates one embodiment of the dynamic operation of Simulation Resource Manager 110 on Simulation Server Platform 101 of the present invention. This process begins in step 701 (before Simulation Resource Manager 110 is invoked) with receipt by Simulation Server Platform 101 of a user's simulation task request. As noted above, Cluster Service 104 is invoked in step 702 to obtain user information relating to the requested task, including the user's data model, identification of the simulation application and relevant user input parameters. In step 704, Simulation Resource Manager 110 is invoked to initialize Optimal Computing Resource Evaluation Engine 620. All formulas, thresholds, rules, and other triggers are initialized with predetermined values for subsequent use while the user's simulation task is running—i.e., monitoring the use by the simulation task of the currently provisioned set of computing resources, and evaluating whether, when and to what extent to modify that set of provisioned computing resources. In one embodiment, this information is predetermined generically for all simulation tasks, while in other embodiments it is tailored to particular types of simulations and simulation applications—taking into account, for example, that different simulation applications perform better with different optimal cell-per-core ratios. In other embodiments, this information is based upon prior simulation runs or other analytics performed by Simulation Server Platform 101 or the user. Once Optimal Computing Resource Evaluation Engine 620 is initialized, Optimal Computing Resource Calculator 630 is invoked, in step 710, to calculate an optimal set of computing resources to be provisioned to the user's simulation task. It should be noted that, in one embodiment, step 710 is performed to calculate the initial set of computing resources to be provisioned before the user's simulation task is initiated, as well as subsequent sets of computing resources in the event a change in computing resources is warranted while the user's simulation task is running. In another embodiment, users select the initial set of computing resources from choices provided by Simulation Server Platform 101, and this step 710 is performed only when changes are warranted. With respect to the initial set of computing resources, Optimal Computing Resource Calculator 630 does not yet have access to any analysis by Optimal Computing Resource Evaluation Engine 620, because the user's simulation task has not yet been initiated. However, it does have access to the user's simulation data model, input parameters to the simulation task and any user-provided optimization goals. Moreover, historical data maintained in Server DB 105 may also be available—e.g., relating to the results of prior simulation runs. For example, a simulation application may recommend an optimal number of cells per core which may yield an optimal number of CPU cores based upon an initial number of cells in the user's simulation data model. Yet, Optimal Computing Resource Calculator 630 may select a different number of initial CPU cores based on an analysis of historical data from similar runs of the user's simulation task. In one embodiment, a prior “pre-run” of an initial time-step iteration (which will be repeated many times during execution of the simulation task) may also suggest a different number of CPU cores or other computing resources. In some cases, an initial number of cells is defined explicitly in the user's data model, while in other cases Optimal Computing Resource Calculator 630 infers the number of cells—e.g., from the size of an input file, or from other parameters relating to the geometry and characteristics of the mesh to be generated. For example, given a 10 mm cell size and a domain size of 1 cubic meter, Optimal Computing Resource Calculator 630 will calculate an initial cell count of one million cells, and perhaps infer an initial number of 100 CPU cores if the simulation application can support up to 10,000 cells per core. Moreover, this initial number of cores may effectively dictate other initial computing resources, such as a particular amount of RAM (e.g., based on a minimum 2 GB RAM/core requirement imposed by the simulation application) or a particular network bandwidth (e.g., 20G or 40G InfiniBand) required to accommodate that many CPU cores. As will be discussed below, an optimal set of computing resources may need to be refined in light of available physical or virtual server types. In one embodiment, Optimal Computing Resource Calculator 630 accommodates different types of simulation applications. For example, while some simulation applications correlate cells to CPU cores, others may specify a minimal or desired amount of RAM based upon the user's simulation data model. Once a simulation task is running on a provisioned cluster defined by an initial set of computing resources, and Optimal Computing Resource Evaluation Engine 620 determines that a change in computing resources is warranted, Optimal Computing Resource Calculator 630 is again invoked to determine a new optimal set of computing resources in light of the changes that have occurred to the simulation state. In that scenario, additional information is now available. For example, the number of cells in the user's simulation model may have increased or decreased significantly. In one embodiment, Optimal Computing Resource Evaluation Engine 620 predicts the number of cells (or other computing resources) for the remainder of the simulation task—or at least until the simulation task enters another “phase” warranting yet another change in computing resources. Moreover, as alluded to above, evaluation of other resource change indicators monitored by Simulation Monitoring Service 615 and evaluated by Optimal Computing Resource Evaluation Engine 620 may reflect certain changes in this new simulation state from its initial state before the simulation task was initiated. For example, application-specific information extracted from output files and evaluated by Simulation-Level Trigger Evaluator 621 may indicate that the simulation task is still in an initial “meshing stage” in which the simulation application is generating a mesh based upon the user's simulation model. Yet, computing resource utilization information may indicate that, while CPU utilization was within an expected range, RAM utilization was significantly higher than expected. As a result, based upon the extent of this higher-than-expected RAM utilization, Optimal Computing Resource Calculator 630 will, in one embodiment, leave the number of CPU cores unchanged, while recalculating the amount of RAM based upon an increased RAM per core requirement. In another scenario, information from Simulation-Level Trigger Evaluator 621 may indicate that the simulation task has entered a more CPU-intensive phase of the simulation, and that additional CPU cores are required (or conversely that fewer CPU cores are required once that phase is completed). While the calculation “formula” may be the same, the resulting number of CPU cores may be higher or lower (than those provisioned in the current cluster) due to the changes in the simulation state extracted from output files generated while the simulation task is running. In another embodiment, different formulas may be employed for different predetermined simulation phases. In yet another embodiment, Optimal Computing Resource Evaluation Engine 620 may generate such different formulas via an embedded learning engine. In yet another scenario, information from Simulation-Level Trigger Evaluator 621 may indicate that the simulation task has entered a disk-intensive phase of the simulation (e.g., writing out simulation results to disk upon completion of a CPU-intensive phase), and that fewer CPU cores are required, but additional storage space is needed (and perhaps additional network bandwidth). Various other scenarios requiring different sets of computing resources will be evident to one skilled in the art of parallel processing, including simulation and other HPC computing environments. Once Optimal Computing Resource Calculator 630 completes step 710 and calculates an optimal set of computing resources to be provisioned to the user's simulation task (whether in its initial simulation state or a subsequent intermediate simulation state), it then refines this set of optimal computing resources, in step 712, by translating them into an available cluster. In other words, it employs Hardware Provider Adapters 104 b in Cluster Service 104 to identify currently available clusters of physical or virtual servers on one or more Hardware Provider Platforms 130. For example, it may not be possible to match precisely the specific allocation of computing resources generated in step 710 (e.g., 200 CPU cores, 3 GB RAM per core and 20G InfiniBand). Optimal Computing Resource Calculator 630 may find a virtual server type with 64 CPU cores, 256 GB RAM, and 40G InfiniBand, which closely matches these requirements by allocating three virtual servers of that type. But the additional computing resources would require a tradeoff of some additional cost. Alternatively, six virtual servers, each with 32 CPU cores, 128 GB RAM and 20 GB InfiniBand, may also be available. In one embodiment, Optimal Computing Resource Calculator 630 makes this decision by employing predefined functions with weighted parameters based on how close each actual computing resource is to the available cluster choices. In another embodiment, the user's goals (e.g., optimizing for lower cost as opposed to lower overall simulation time) are taken into account in assigning weights to these parameters. In yet another embodiment, a rules-based engine is employed—e.g., ensuring that each computing resource equals or exceeds the specifications generated in step 710. Once Optimal Computing Resource Calculator 630 completes step 712 and identifies the cluster of computing resources to be allocated to the user's simulation task (including relevant Hardware Provider Platforms 130 and the number and type of each physical and/or virtual server on those platforms), then Cluster Service 104 is invoked, in step 720, to provision that cluster (as discussed above). Simulation Service 103 is then invoked, in step 722, to configure the cluster (as described above with reference to FIG. 5) and initiate execution of each instance of the simulation application on that cluster. Note, however, if this cluster is not being provisioned initially before the simulation task has been initiated (i.e., if Simulation Resource Manager 610 determines that a change in computing resources is warranted while the user's simulation task is running), then the current cluster is terminated before execution of the simulation task resumes on a newly provisioned cluster. In one embodiment, Simulation Resource Manager 610, in step 752, updates Server DB 105 with information necessary to resume execution of the simulation task after a new cluster is generated and provisioned. This information will otherwise be lost once the current cluster is terminated. For example, Simulation Resource Manager 610 saves the most recent restart file(s) as well as other information from Cluster DB 535 that may facilitate the calculation of the computing resources and new cluster (in steps 710 and 712) on which the user's simulation task will resume execution. In one embodiment, the entirety of Cluster DB 535 is saved to Server DB 105 before the current cluster is terminated. Simulation Resource Manager 610 then invokes Cluster Service 104, in step 752, to terminate or “deprovision” the current cluster. Optimal Computing Resource Calculator 630 is then invoked to perform steps 710 and 712 as discussed above. In another embodiment, steps 710 and 712 are performed before steps 752 and 754 (e.g., in the event that it was determined not to be feasible to generate a new cluster, and that execution of the simulation task should continue on the current cluster). In that scenario, Simulation Monitoring Service 615 is invoked to continue monitoring execution of the user's simulation task in step 730, as discussed below. Otherwise, after steps 710 and 712 have been performed, Cluster Service 104 is invoked to provision the new cluster, and Simulation Service 103 is invoked to configure that new cluster, largely in the manner discussed above. However, because execution of the user's simulation task will resume from the intermediate simulation state contained in the most recent restart file, some additional work is performed by Simulation Service 103 in step 722. For example, Cluster DB 535 is “initialized” in accordance with the intermediate simulation state. Moreover, the simulation application is configured in accordance with any application-imposed constraints, such as specifying the number of CPU cores in the new cluster or any similar constraints relating to the computing resources provisioned in the new cluster. Then, in step 724, Simulation Service 103 initiates execution of each instance of the simulation application on each CPU core within each physical or virtual server in the new cluster. However, in this scenario, execution of the simulation task is effectively “resumed” from its intermediate simulation state. In the scenario in which the user's simulation task is initiated for the first time—i.e., from its initial simulation state—then steps 722 and 724 are performed with respect to that initial simulation state. Once execution of the user's simulation task is initiated (or resumed), Simulation Monitoring Service 615 is invoked, in step 730, to monitor execution of that simulation task. As alluded to above, this step effectively involves monitoring the efficiency with which the simulation application utilizes (and, more importantly, will continue to utilize) the provisioned computing resources while the simulation task is running. In other words, as Simulation Monitoring Service 615 monitors execution of the simulation task and extracts various resource change indicators, Optimal Computing Resource Evaluation Engine 620 evaluates these resource change indicators to determine whether a change in computing resources is warranted—i.e., whether one or more of the provisioned computing resources should be modified as execution of the simulation progresses. For example, in step 732, Simulation Monitoring Service 615 obtains computing resource utilization information as described above, which it processes for subsequent evaluation by Computing Resource Evaluation Engine 620 to assess whether a change in computing resources is warranted. Though listed sequentially, steps 732, 734 and 736 are, in one embodiment, performed in parallel while the simulation task is running. Thus, in step 734, application-specific information is extracted from output files while, in step 736, intermediate simulation states are obtained and saved from restart files as they are generated by the simulation application. In essence, Simulation Monitoring Service 615 is monitoring a continuously changing simulation state of the user's simulation task. If simulations or other parallel-processing tasks involved easily predictable simulation stages or phases, with known patterns of usage regarding computing resources, then one could simply allocate in advance the appropriate set of computing resources to each such known simulation phase. Because that is rarely the case, Simulation Monitoring Service 615 extracts resource change indicators from which Computing Resource Evaluation Engine 620 makes inferences regarding future usage patterns. For example, the output files generated by the simulation application contain information regarding the number of cells being processed by each CPU core over time, as well as the extent of inter-core communication. This information, in conjunction with CPU, RAM and other computing resource utilization trends, provides a window into whether the simulation is entering a more or less CPU-intensive phase, or whether it is simply requiring more or fewer computing resources than originally provisioned. Detection of frequently repeating simulation iteration steps also provides information enabling prediction of future computing usage patterns. In addition to extracting this information in steps 732, 734 and 736, Simulation Monitoring Service 615 processes this information by organizing it into a form in which it can be utilized by Computing Resource Evaluation Engine 620. For example, in one embodiment, computing resource utilization information extracted in step 732 is formatted in Cluster DB 535 to support time-based queries on individual computing resources, such as the percentage increase in CPU utilization over the past 15 minutes of simulation time. In other embodiments, information is organized to facilitate queries that correlate additional factors or events beyond mere time, such as the current number of cells per core, threshold number of writes to disk or even presence of a restart file. In other words, the organization of information extracted by Simulation Monitoring Service 615 facilitates the evaluation by Computing Resource Evaluation Engine 620 of factors that cut across its component trigger evaluators. The evaluation of resource change indicators by Computing Resource Evaluation Engine 620 in step 740 also involves, in one embodiment, a set of steps (742, 744, 746 and 748) that are listed sequentially but performed in parallel. For example, a rule or heuristic employed by Hardware-Level Trigger Evaluator 623 may be triggered when CPU utilization exceeds 90%, while another rule may be triggered only if CPU utilization exceeds 90% and information extracted from output files indicates that a current CPU-intensive phase of the simulation has been completed (detected, for example, by Simulation-Level Trigger Evaluator 621). Another rule might be triggered when CPU utilization falls below a specified threshold and disk I/O exceeds a specified threshold, suggesting a need for a physical or virtual server with greater network bandwidth. In other words, in step 742, Hardware-Level Trigger Evaluator 623 generates trigger conditions or events relating to computing resource utilization, while in step 744, Simulation-Level Trigger Evaluator 621 generates conditions or events relating to application-specific information extracted from output files. As noted above, such application-level events include detection of iteration steps, e.g., simulating repeated real-world events such as a heartbeat, opening or closing of a valve, seconds of a simulated event such as a car crash, or even a hierarchy of iteration steps separately calculating cell pressure, temperature and velocity. In certain scenarios, subsequent iteration steps involve different types of calculations. For example, in a chemical simulation, initial steps may involve relatively short calculations across a wide domain of objects, such as molecules. Such steps may benefit from relatively high levels of parallelism across many CPU cores. Subsequent calculations, however, may be successively more complex and take a longer time to complete, but across fewer and fewer objects (thus benefitting from relatively less parallelism and fewer CPU cores). Detection of such phases by Simulation-Level Trigger Evaluator 621 facilitates prediction of future CPU usage. In one embodiment, Simulation-Level Trigger Evaluator 621 generates conditions or events that may not only trigger a change in the number of CPU cores, but will, in such a scenario, facilitate the calculation by Optimal Computing Resource Calculator 630 of an optimal number of CPU cores to be provisioned in a new cluster. Similarly, in step 746, User-Level Trigger Evaluator 622 generates conditions or events in accordance with user-imposed goals. In one embodiment, such goals are implemented by weighting parameters of rules from other trigger evaluators—e.g., causing the threshold of CPU utilization to be raised to 95% before additional CPU cores are added at an additional cost to the user. Conversely, a lower threshold of CPU utilization may be raised from 40% to 45% before CPU cores are decreased, thereby saving the user money). In one embodiment, extreme weighting of certain factors (e.g., a lower threshold of free RAM) is employed to avoid potentially catastrophic events, such as crashing the simulation due to running out of RAM. In step 748, Simulation-Level Trigger Evaluator 621 creates conditions or events relating to restart files generated by the simulation application. In one embodiment, the presence of a restart file within a threshold period of time triggers such a condition. In other embodiments, conditions may be triggered based upon specific events extracted or inferred from the contents of a restart file, such as invocation of a component solver of the simulation application (e.g., evidencing entry into a more CPU-intensive, but less disk-intensive, phase of the simulation). As noted above, Computing Resource Evaluation Engine 620 is implemented, in one embodiment, as a learning engine which predicts future usage of computing resources based upon historical information monitored over time, and employs dynamically-generated triggers rather than predefined rules from a knowledge base. In another embodiment, heuristic rules are generated dynamically from a continuously expanding knowledge base, while in yet another embodiment, predefined “static” formulas and thresholds are employed. The following scenario illustrates the operation of Computing Resource Evaluation Engine 620 (in particular the performance of steps 742, 744, 746 and 748) in making the determination, in step 750, as to whether a change in computing resources is warranted. If such a change is warranted, Simulation Resource Manager 610 is invoked, in step 752, as described above (to update Server DB 105 with information necessary to resume execution of the simulation task after a new cluster is generated and provisioned). Otherwise, Simulation Monitoring Service 615 is invoked to continue monitoring execution of the user's simulation task in step 730. In one scenario, a user's simulation task involves a combustion model for a CFD (computational fluid dynamics) application—simulating, for example, combustion of an automotive engine. In this scenario, when a combustion event occurs, the simulation enters a CPU-intensive phase in which cell size decreases and the number of cells increase significantly. In other words, the simulation application splits each cell into multiple (e.g., 8) cells. While such simulation applications typically may be configured to limit the number of splits that can occur (or conversely the number of times multiple cells are combined into a single cell), the occurrence of a combustion or similar event cannot easily be predicted in advance. In this scenario, the simulation application generates output files occasionally that include information relating to the current number of cells in the user's simulation model. As noted above, these output files are generated to enable users to manually detect bugs in the model—i.e., highly unusual situations that warrant shutting down the simulation and running it again from the beginning once the bugs are fixed. However, in the present invention, Simulation-Level Trigger Evaluator 621 detects, in step 744, that a combustion event has begun, based upon information extracted from the output files. For example, such information may indicate a sharp increase in the number of cells, or an explicit “split” event. In some cases, this event may be confirmed by other information in the output file, such as invocation of a particular solver designed to handle the combustion event. Simulation-Level Trigger Evaluator 621 may also detect, in step 748, that a restart file was generated relatively recently before the simulation entered the combustion phase, ultimately causing Computing Resource Evaluation Engine 620 to increase the number of CPU cores. Other computing resources may be affected as well. For example, Hardware-Level Trigger Evaluator 623 may have triggered one or more conditions, in step 742, resulting from the increased demand on the existing number of CPU cores—e.g., an increase in writes to disk and a significant decrease in available RAM. But, in this embodiment, Computing Resource Evaluation Engine 620 predicts how a future increase in the number of CPU cores (e.g., from 64 to 128) will affect the utilization of these other computing resources. For example, the current amount of RAM per CPU core may be sufficient once the load of the additional computations is spread across a greater number of CPU cores (easing the load on each physical or virtual server), while the network bandwidth may need to be increased due to an increase in inter-core and inter-server communication. Thus, as a result, Optimal Computing Resource Calculator 630 is invoked, in step 710, to calculate these changes in computing resources, and a new cluster is provisioned in step 720 and configured in step 722. This new cluster, because it consists of more CPU cores, the same amount of RAM and a greater network bandwidth, may require a different type of physical or virtual server, perhaps on a different Hardware Provider Platform 130 (e.g., due to current availability). Due to the existence of a relatively recent restart file, the simulation task may resume execution on the new cluster, in step 724, before the beginning of the combustion phase of the simulation (thus avoiding the inefficiency of having too few CPU cores and potentially crashing due to an insufficient amount of RAM). Moreover, upon later detecting the end of this combustion phase in a similar manner, Simulation Resource Manager 610 will modify the computing resources again (e.g., reducing the number of CPU cores, as well as modifying other computing resources accordingly) and provision yet another cluster to resume execution of the simulation task. Thus, in this combustion scenario, three different clusters are provisioned while the simulation task is running, each based on optimal allocations of computing resources to the simulation task at different points during its execution—determined by monitoring and extracting resource change indicators, predicting future usage patterns and generating new clusters with different sets of computing resources to accommodate these future usage patterns. In other scenarios, new clusters may be provisioned at multiple different points during the execution of the simulation task. As noted above, it is often difficult to predict in advance when these points will occur (even in our combustion example above when the occurrence of the event is known), as well as how many different times during a simulation a change in computing resources may be warranted. For example, in the case of simulations involving “variable” iteration steps, in which the calculations performed during each step may well differ in time, complexity or other respects (whether randomly, gradually increasing or decreasing, or otherwise), it is virtually impossible to predict in advance when each iteration step will occur, much less which set of computing resources to allocate to each particular step. However, by monitoring the simulation state while a simulation task is running, and extracting resource change indicators (including computing resource utilization information as well as application-specific information from output files generated by the simulation application), the present invention predicts future computing resource usage patterns (e.g., assessing whether a subsequent iteration step requires an increase or decrease in each individual computing resource) and determines an optimal set of computing resources (translated into clusters of physical and/or virtual servers) to be allocated to the simulation task. Moreover, by leveraging restart files generated by the simulation application, the present invention terminates existing clusters and provisions new clusters (when it determines that a change in computing resources is warranted and feasible), and resumes execution of the simulation task on the newly provisioned cluster. This process can be repeated as many times as is warranted while a simulation task is running. It should be noted that computing resources cannot feasibly be changed too frequently, as the overhead of terminating and provisioning new clusters may not justify the benefits of a more efficient allocation of computing resources. In one embodiment, this tradeoff is considered as a factor by Simulation Resource Manager 610 (e.g., based upon the time between cluster changes) in determining whether a change in computing resources is in fact warranted. The embodiments of the systems and methods of the present invention described above provide significant advantages to users of Simulation Server Platform 101. Such users need not rely upon a single set of computing resources to be allocated to the entirety of their simulation task. Moreover, they need not determine themselves whether, when and to what extent a change in computing resources is warranted while their simulation task is running (as is required, for example, by Amazon's EC2 Auto Scaling service). Finally, users retain the benefits of having their simulation applications address application-imposed constraints and inter-core (and inter-server) dependencies that arise during execution of their simulation tasks. Other advantages include automated hardware and software metering, which enables users to pay only for the computing resources actually used by their simulation tasks, and avoid overpaying for computing resources not required at all times during the execution of their simulation tasks. The invention claimed is: 1. A method for facilitating hardware and software metering of tasks performed by a plurality of applications on behalf of a plurality of users, the method comprising the following steps: (a) provisioning a first cluster of computing resources on one of a plurality of hardware provider platforms for executing an application on behalf of a user and, in the event a change in computing resources is warranted while the application is running, provisioning a second cluster of computing resources and terminating the application on the first cluster; (b) configuring the application and initiating execution of the application on the provisioned first cluster and, in the event the second cluster is provisioned by the cluster service, reconfigures the application and resumes execution of the application on the second cluster; (c) authenticating each user of the application with a corresponding license server before permitting that user to initiate execution of the application on the provisioned first and second cluster. (d) monitoring the total hardware time the provisioned computing resources are in use during execution of the task, wherein the total hardware time includes the sum of the times the provisioned computing resources are in use on the first cluster and the second cluster; and (e) monitoring the total time the application is in use during execution of the task, wherein the total software time includes the sum of the times the application is in use on the first cluster and the second cluster. 2. The method of claim 1, further comprising the step of authenticating each user of a component of the application before permitting that user to initiate execution of the component of the application on the provisioned first and second cluster. 3. The method of claim 1, further comprising the step of monitoring the total software time a component of the application is in use during execution of the task. 4. The system of claim 1, further comprising the step of monitoring a plurality of applications performing the task. 5. The method of claim 1, wherein the application performs a task having inter-instance dependencies, and the application, in order to execute properly and resolve the inter-instance dependencies, includes one or more application-imposed constraints requiring a pre-configuration specification of at least one of the computing resources allocated to the application, the method further comprising the following steps: (a) monitoring execution of the application for (i) a plurality of computing resource change indicators and (ii) one or more restart files generated by the application; and (b) continuously analyzing the computing resource change indicators and restart files to determine whether modification of the current computing resources is warranted and, if so, implementing a change in the current computing resources while the application is running. 6. The method of claim 5, wherein: (a) the cluster includes a plurality of CPU cores for executing independent sub-task calculations of the application in parallel, including a first sub-task calculation performed by a first instance of the application on a first CPU core, and a second sub-task calculation performed by a second instance of the application on a second CPU core; and (b) a third sub-task calculation performed by the first instance is dependent upon the results of the second sub-task calculation performed by the second instance, and thereby constitutes an inter-instance dependency. 7. The method of claim 5, wherein the plurality of computing resource change indicators include: (a) computing resource utilization data that reflect the extent of the application's current usage of the computing resources; and (b) application-specific data, including data extracted from output files generated by the application during its execution, that facilitate a prediction of the application's future usage of computing resources. 8. The method of claim 5, wherein the computing resource change indicators include indicators of one or more of the following: (a) a change in the number of cells in a simulation data model provided as input to the application, (b) one or more repeating iteration steps in the task performed by the application; (c) a change in the extent of inter-core communication exhibited by the application; and (d) a change to a more or less computing resource-intensive phase of the task performed by the application. 9. The method of claim 5, further comprising the step of generating, based on the analysis of the computing resource change indicators, a prediction regarding the extent of the application's future usage of computing resources. 10. The method of claim 5, wherein the determination of whether modification of the current computing resources is warranted is based on historical information monitored over time. 11. The method of claim 5, wherein the application-imposed constraints include a pre-configuration specification of the number of CPU cores in the provisioned first and second cluster. 12. The method of claim 5, wherein the change in computing resources includes an increase in one computing resource and a decrease in another computing resource. 13. The method of claim 5, wherein each restart file contains data reflecting the application's current intermediate state, thereby enabling the application, if restarted in the future, to resume execution from that intermediate state. 14. The method of claim 5, wherein the implementation of a change in the current computing resources while the application is running includes the following steps: (a) provisioning the second cluster of computing resources on a selected hardware provider platform; (b) terminating the first cluster on which the application is executing; (c) reconfiguring the application in accordance with the application-imposed constraints; and (d) resuming execution of the application on the second cluster from the intermediate state contained within a selected one of the restart files. US16/131,516 2016-08-11 2018-09-14 Dynamic optimization of simulation resources Active US10333795B2 (en) US15/235,004 US10193762B2 (en) 2016-08-11 2016-08-11 Dynamic optimization of simulation resources US16/398,942 US20190260648A1 (en) 2016-08-11 2019-04-30 Dynamic optimization of simulation resources US15/235,004 Continuation US10193762B2 (en) 2016-08-11 2016-08-11 Dynamic optimization of simulation resources US16/398,942 Continuation US20190260648A1 (en) 2016-08-11 2019-04-30 Dynamic optimization of simulation resources US10333795B2 true US10333795B2 (en) 2019-06-25 US15/235,004 Active 2036-10-20 US10193762B2 (en) 2016-08-11 2016-08-11 Dynamic optimization of simulation resources US16/131,516 Active US10333795B2 (en) 2016-08-11 2018-09-14 Dynamic optimization of simulation resources US16/398,942 Pending US20190260648A1 (en) 2016-08-11 2019-04-30 Dynamic optimization of simulation resources KR (1) KR20190038883A (en) US9378560B2 (en) * 2011-06-17 2016-06-28 Advanced Micro Devices, Inc. Real time on-chip texture decompression using shader processors US20180300176A1 (en) * 2017-04-17 2018-10-18 Red Hat, Inc. Self-programmable and self-tunable resource scheduler for jobs in cloud computing US10491499B2 (en) * 2017-05-11 2019-11-26 Accenture Global Solutions Limited Analyzing resource utilization of a cloud computing resource in a cloud computing environment US10419437B2 (en) * 2017-06-30 2019-09-17 Futurewei Technologies, Inc. Quasi-agentless cloud resource management US10303576B1 (en) * 2018-05-04 2019-05-28 6Fusion Usa, Inc. Systems and methods for IT intelligence and management based on container-level metering US8706852B2 (en) * 2011-08-23 2014-04-22 Red Hat, Inc. Automated scaling of an application and its support components US8725798B2 (en) * 2011-12-15 2014-05-13 Microsoft Corporation Provisioning high performance computing clusters US8725875B2 (en) * 2011-06-21 2014-05-13 Intel Corporation Native cloud computing via network segmentation US8805975B2 (en) * 2008-12-09 2014-08-12 Go Daddy Operating Company, LLC Using routing protocols to optimize resource utilization US9300536B2 (en) * 2013-02-05 2016-03-29 International Busines Machines Corporation Cluster-aware resource provisioning in a networked computing environment US9313133B2 (en) * 2013-09-10 2016-04-12 Robin Systems, Inc. Anticipatory warm-up of cluster resources for jobs processed on multiple cluster nodes US9323580B2 (en) * 2010-06-30 2016-04-26 International Business Machines Corporation Optimized resource management for map/reduce computing US9411648B2 (en) * 2012-06-28 2016-08-09 Rackspace Us, Inc. Flexible resource configuration management for computing clusters US9444764B2 (en) * 2015-01-20 2016-09-13 State Farm Mutual Automobile Insurance Company Scalable and secure interconnectivity in server cluster environments US20160285957A1 (en) * 2015-03-26 2016-09-29 Avaya Inc. Server cluster profile definition in a distributed processing network US9465630B1 (en) * 2013-02-20 2016-10-11 Ca, Inc. Assigning dynamic weighted variables to cluster resources for virtual machine provisioning US9635101B2 (en) * 2011-01-28 2017-04-25 Netapp, Inc. Proposed storage system solution selection for service level objective management US9747136B2 (en) * 2014-12-09 2017-08-29 Vmware, Inc. Methods and systems that allocate cost of cluster resources in virtual data centers US20180024964A1 (en) * 2016-07-19 2018-01-25 Pure Storage, Inc. Disaggregated compute resources and storage resources in a storage system US20180067776A1 (en) * 2015-03-25 2018-03-08 Intel Corporation Cluster computing service assurance apparatus and method US9916233B1 (en) * 2015-03-27 2018-03-13 Amazon Technologies, Inc. Using containers for update deployment US9967318B2 (en) * 2011-02-09 2018-05-08 Cisco Technology, Inc. Apparatus, systems, and methods for cloud agnostic multi-tier application modeling and deployment US9985859B2 (en) * 2012-12-13 2018-05-29 Tencent Technology (Shenzhen) Company Limited Method and system for managing servers US10013289B2 (en) * 2016-04-28 2018-07-03 International Business Machines Corporation Performing automatic map reduce job optimization using a resource supply-demand based approach US10015106B1 (en) * 2015-04-06 2018-07-03 EMC IP Holding Company LLC Multi-cluster distributed data processing platform US20180198680A1 (en) * 2015-07-08 2018-07-12 Convida Wireless, Llc M2m clustering management US10075442B2 (en) * 2015-06-30 2018-09-11 Vmware, Inc. Methods and apparatus to grant access to cloud computing resources US10097410B2 (en) * 2014-06-26 2018-10-09 Vmware, Inc. Methods and apparatus to scale application deployments in cloud computing environments US10110502B1 (en) * 2015-02-02 2018-10-23 Amazon Technologies, Inc. Autonomous host deployment in managed deployment systems US10135712B2 (en) * 2016-04-07 2018-11-20 At&T Intellectual Property I, L.P. Auto-scaling software-defined monitoring platform for software-defined networking service assurance US10135701B2 (en) * 2016-02-19 2018-11-20 At&T Intellectual Property I, L.P. Context-aware virtualized control decision support system for providing quality of experience assurance for internet protocol streaming video services US10148736B1 (en) * 2014-05-19 2018-12-04 Amazon Technologies, Inc. Executing parallel jobs with message passing on compute clusters US10153941B2 (en) * 2016-05-17 2018-12-11 Microsoft Technology Licensing, Llc Distributed operational control in computing systems US10162682B2 (en) * 2016-02-16 2018-12-25 Red Hat, Inc. Automatically scaling up physical resources in a computing infrastructure US7788671B2 (en) * 2004-11-01 2010-08-31 International Business Machines Corporation On-demand application resource allocation through dynamic reconfiguration of application cluster size and placement US8108845B2 (en) * 2007-02-14 2012-01-31 The Mathworks, Inc. Parallel programming computing system to dynamically allocate program portions US9811849B2 (en) * 2007-09-28 2017-11-07 Great-Circle Technologies, Inc. Contextual execution of automated workflows US9910708B2 (en) * 2008-08-28 2018-03-06 Red Hat, Inc. Promotion of calculations to cloud-based computation resources US9600344B2 (en) * 2009-01-21 2017-03-21 International Business Machines Corporation Proportional resizing of a logical partition based on a degree of performance difference between threads for high-performance computing on non-dedicated clusters US9110706B2 (en) * 2009-02-09 2015-08-18 Microsoft Technology Licensing, Llc General purpose distributed data parallel computing using a high level language EP2414849B1 (en) * 2009-03-31 2019-03-20 Freestyle Technology Limited A communications process and system associated with monitoring and controlling resource consumption US9009294B2 (en) 2009-12-11 2015-04-14 International Business Machines Corporation Dynamic provisioning of resources within a cloud computing environment EP2583211A4 (en) * 2010-06-15 2016-06-22 Oracle Int Corp Virtual computing infrastructure US9003416B2 (en) * 2010-09-29 2015-04-07 International Business Machines Corporation Predicting resource requirements for a computer application US8862738B2 (en) * 2010-10-18 2014-10-14 International Business Machines Corporation Reallocating resource capacity among resource pools in a cloud computing environment US8548790B2 (en) * 2011-01-07 2013-10-01 International Business Machines Corporation Rapidly determining fragmentation in computing environments US20170293980A1 (en) * 2011-04-04 2017-10-12 Aon Securities, Inc. System and method for managing processing resources of a computing system US9251481B2 (en) * 2011-06-13 2016-02-02 Accenture Global Services Limited Distributed metering and monitoring system US20130031035A1 (en) * 2011-07-31 2013-01-31 International Business Machines Corporation Learning admission policy for optimizing quality of service of computing resources networks US9781205B2 (en) * 2011-09-12 2017-10-03 Microsoft Technology Licensing, Llc Coordination engine for cloud selection AU2012340684A1 (en) * 2011-11-22 2014-07-17 Solano Labs, Inc. System of distributed software quality improvement CA2858189A1 (en) * 2011-12-05 2013-06-13 Hatch Ltd. System, method and controller for managing and controlling a micro-grid US8756609B2 (en) 2011-12-30 2014-06-17 International Business Machines Corporation Dynamically scaling multi-tier applications vertically and horizontally in a cloud environment US10031783B2 (en) * 2012-03-02 2018-07-24 Vmware, Inc. Execution of a distributed deployment plan for a multi-tier application in a cloud infrastructure CN102857363B (en) * 2012-05-04 2016-04-20 运软网络科技(上海)有限公司 A kind of autonomous management system and method for virtual network US9075788B1 (en) * 2012-06-15 2015-07-07 Amazon Technologies, Inc. Account state simulation service for cloud computing environments US9210054B2 (en) * 2012-11-14 2015-12-08 International Business Machines Corporation Secure metering and accounting for cloud services US9503310B1 (en) * 2012-11-27 2016-11-22 Leidos, Inc. Methods and systems of dynamic management of resources in a virtualized environment US9904579B2 (en) * 2013-03-15 2018-02-27 Advanced Elemental Technologies, Inc. Methods and systems for purposeful computing US9813318B2 (en) * 2013-03-15 2017-11-07 International Business Machines Corporation Assessment of best fit cloud deployment infrastructures EP2811405A1 (en) * 2013-06-04 2014-12-10 Fujitsu Limited Process migration method, computer system and intermediate computing resources EP3014443A1 (en) * 2013-06-24 2016-05-04 Cylance Inc. Automated system for generative multimodel multiclass classification and similarity analysis using machine learning US9602423B2 (en) 2013-06-28 2017-03-21 Pepperdata, Inc. Systems, methods, and devices for dynamic resource monitoring and allocation in a cluster system WO2015031512A1 (en) * 2013-08-27 2015-03-05 Huawei Technologies Co., Ltd. System and method for mobile network function virtualization US20150082316A1 (en) * 2013-09-18 2015-03-19 evoleap, LLC System and Method for Efficient Utilization of Simulation Resources US20150256475A1 (en) * 2014-03-05 2015-09-10 Wipro Limited Systems and methods for designing an optimized infrastructure for executing computing processes US9872195B2 (en) * 2014-04-10 2018-01-16 Samsung Electronics Co., Ltd. Method and system for providing data communication through a cluster head for machine type communication (MTC) based group communication US9979617B1 (en) * 2014-05-15 2018-05-22 Amazon Technologies, Inc. Techniques for controlling scaling behavior of resources US10496927B2 (en) * 2014-05-23 2019-12-03 DataRobot, Inc. Systems for time-series predictive data analytics, and related methods and apparatus US9876539B2 (en) * 2014-06-16 2018-01-23 Ntt Docomo, Inc. Method and apparatus for scalable load balancing across wireless heterogeneous MIMO networks US9712542B1 (en) * 2014-06-27 2017-07-18 Amazon Technologies, Inc. Permissions decisions in a service provider environment US10120907B2 (en) * 2014-09-24 2018-11-06 Oracle International Corporation Scaling event processing using distributed flows and map-reduce operations US9984044B2 (en) * 2014-11-16 2018-05-29 International Business Machines Corporation Predicting performance regression of a computer system with a complex queuing network model US9329907B1 (en) * 2014-12-18 2016-05-03 International Business Machines Corporation Automated exploitation of virtual machine resource modifications US9569271B2 (en) * 2015-02-03 2017-02-14 Dell Products L.P. Optimization of proprietary workloads US9871857B2 (en) * 2015-04-29 2018-01-16 Microsoft Technology Licensing, Llc Optimal allocation of dynamic cloud computing platform resources US9882798B2 (en) * 2015-05-13 2018-01-30 Vmware, Inc. Method and system that analyzes operational characteristics of multi-tier applications US10051082B2 (en) * 2015-06-05 2018-08-14 International Business Machines Corporation Cost determination to provide software as a service US9612865B2 (en) * 2015-06-15 2017-04-04 International Business Machines Corporation Managed services coordinator US10387605B2 (en) * 2015-07-23 2019-08-20 Synopsys, Inc. System and method for managing and composing verification engines US9733970B2 (en) * 2015-08-21 2017-08-15 International Business Machines Corporation Placement of virtual machines on preferred physical hosts US20170090970A1 (en) * 2015-09-30 2017-03-30 Yokogawa Electric Corporation Method, system and computer program for cloud based computing clusters for simulated operator training systems US20170126820A1 (en) * 2015-10-30 2017-05-04 Carolyn B. McClain Service usage metering techniques US10361919B2 (en) * 2015-11-09 2019-07-23 At&T Intellectual Property I, L.P. Self-healing and dynamic optimization of VM server cluster management in multi-cloud platform US10031781B2 (en) * 2015-11-24 2018-07-24 International Business Machines Corporation Estimating job start times on workload management systems US10063634B2 (en) * 2015-11-24 2018-08-28 International Business Machines Corporation Deployment of multi-task analytics applications in multi-clouds JP2019522263A (en) * 2016-05-10 2019-08-08 マルチメカニクス、インコーポレイテッド System and method for material composition modeling US10268512B2 (en) * 2016-06-23 2019-04-23 International Business Machines Corporation Optimizing simultaneous startup or modification of inter-dependent machines with specified priorities US20180025007A1 (en) * 2016-07-22 2018-01-25 Sap Se Method and system for adaptive processing of resource usage records US10095539B2 (en) * 2016-07-25 2018-10-09 International Business Machines Corporation Automated data structure-driven orchestration of complex server provisioning tasks US10089135B2 (en) * 2016-08-09 2018-10-02 International Business Machines Corporation Expediting the provisioning of virtual machines based on cached repeated portions of a template US10120724B2 (en) * 2016-08-16 2018-11-06 International Business Machines Corporation Optimized resource metering in a multi tenanted distributed file system US10289767B2 (en) * 2016-08-24 2019-05-14 Improbable Worlds Ltd Communications interface facilitating operations of a persistent spatially-optimized computer-based simulation 2017-08-10 KR KR1020197006622A patent/KR20190038883A/en unknown Shen et al. 2011 Cloudscale: elastic resource scaling for multi-tenant cloud systems Gulati et al. 2012 Vmware distributed resource management: Design, implementation, and lessons learned US8543711B2 (en) 2013-09-24 System and method for evaluating a pattern of resource demands of a workload Nguyen et al. 2013 {AGILE}: Elastic Distributed Resource Scaling for Infrastructure-as-a-Service Lenk et al. 2011 What are you paying for? performance benchmarking for infrastructure-as-a-service offerings US9396008B2 (en) 2016-07-19 System and method for continuous optimization of computing systems with automated assignment of virtual machines and physical machines to hosts US20080271039A1 (en) 2008-10-30 Systems and methods for providing capacity management of resource pools for servicing workloads US20120053925A1 (en) 2012-03-01 Method and System for Computer Power and Resource Consumption Modeling JP2006520027A (en) 2006-08-31 Method and apparatus for managing computing deployment when workload changes Kundu et al. 2012 Modeling virtualized applications using machine learning techniques US9294557B2 (en) 2016-03-22 Hardware level generated interrupts indicating load balancing status for a node in a virtualized computing environment Gandhi et al. 2014 Adaptive, model-driven autoscaling for cloud applications US9106589B2 (en) 2015-08-11 Predicting long-term computing resource usage Al-Dhuraibi et al. 2017 Elasticity in cloud computing: state of the art and research challenges US20140089727A1 (en) 2014-03-27 Estimating a performance parameter of a job having map and reduce tasks after a failure US9811451B1 (en) 2017-11-07 Distributed software testing US8424059B2 (en) 2013-04-16 Calculating multi-tenancy resource requirements and automated tenant dynamic placement in a multi-tenant shared environment JP2016507121A (en) 2016-03-07 Cost minimizing task scheduler US20100049851A1 (en) 2010-02-25 Allocating Resources in a Distributed Computing Environment US9645808B1 (en) 2017-05-09 Integrating software updates with the testing and deployment of software Lorido-Botrán et al. 2012 Auto-scaling techniques for elastic applications in cloud environments WO2008134143A1 (en) 2008-11-06 Resource model training Suleiman et al. 2012 On understanding the economics and elasticity challenges of deploying business applications on public cloud infrastructure US9288158B2 (en) 2016-03-15 Dynamically expanding computing resources in a networked computing environment US9916135B2 (en) 2018-03-13 Scaling a cloud infrastructure Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY 2019-02-26 STPP Information on status: patent application and granting procedure in general Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS Owner name: RESCALE, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:POORT, GREGORIUS E.;POORT, MULYANTO W.;KANESHIRO, RYAN A.;AND OTHERS;SIGNING DATES FROM 20170807 TO 20170808;REEL/FRAME:049145/0146 Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED
cc/2020-05/en_middle_0061.json.gz/line1733
__label__cc
0.650662
0.349338
> China University List > Zhejiang University of Technology > Course List > Zhejiang University of Technology (1) Over 18 years old and hold a minimum of high school diploma. (2) Requirements for students taught in English: 1)Native English Speaker or English as official language, 2) IELTS 5.0/TOEFL 60, 3) Instructed in English at high school 4) Other English Language Competence are accepted by our university. Note: For those who have given up their original Chinese citizenship and become foreign citizens, according to Document No.83 (2009) of Ministry of Education of the PRC, must become foreign citizens before April 30, 2016, and must have lived abroad more than 2 years from April 30, 2016 to April 30, 2020 (more than 9 months of residence abroad per year can be considered as one year) Those who wish to apply for engineering-related course should have a good background of mathematics, physics and chemistry; those who wish to apply for courses related to economics and management should be excellent in Mathematics; those who wish to apply for courses related to art and design should have basic foundations in fine arts and design. Your Chance to Get Admitted Choosing ReasonsMORE Reasons from M************************************* The reason I'm choosing ZJUT is that their curriculum is very very wide and also there are a lot of international students. Name:Mu************************************ From:Nigeria Reasons from T********************** I CHOSE THIS UNIVERSITY BECAUSE I THINK THEY HAVE THE BEST EXPERTISE TO MY STUDY AREA. Name:TH********************* From:Sierra Leone Reasons from W************** It’s been the recommendation of my cucas agent. It seem to be a really good university too and last but not least, the person I know, isn't far away. Name:We************* From:Austria Reasons from K********************* I believe that a university is more than just an education. Your university experience should provide you the skills, knowledge, experience and confidence to guide you to make your world better, or in my personal case, my country better. A university should open up a world of possibilities for a student, and with that i believe that Zhejiang University of Technology is the university for me. Name:Pe****** From:Kenya Reasons from A********************* High-quality education and research. A strong focus on graduate employability. An affordable cost of living. Excellent support services for international students..ETC Name:AD******************** From:Ghana Share Your Reasons Pay Deposit Before Getting Admission Letter: Required, and You Will Need to Pay 1,000 RMB You will need to pay 1,000 RMB as a deposit to the university before you can get admission letter, and usually it will be used as part of the tuition fee. This program is an important major in Zhejiang Province. This program provides internship opportunities in nearly 70 well-known software corporations in China. The School has built 4 teaching and experimental bases together with big-scale companies, such as National Animation Industry Base and National Digital Entertainment Industry Base. Cooperation with famous universities and research institutes, such as Chinese Academy of Sciences and Beijing University of Aeronautics and Astronautics. 1. Training Goal Editor Notes: This program is one of the first leading majors in "Extraordinary Engineers Cultivation Plan". To train international elites with a systematical and comprehensive knowledge of computer technology. Be able to conduct academic research. Being able to work in scientific research departments, education unit, enterprise, institution, computer hardware development and administrative department. Being able to be employed in the fields of computer science teaching, science research and computer science and technology application. 2. Program Introduction Editor Notes: Computer Science and Technology is an important program in Zhejiang Province. This program depends on Zhejiang Province Information Processing and Automation Technology Top Key Discipline, Zhejiang University of Technology computer network application software engineering research center. This program pays much attention to guiding students to set up a comprehensive knowledge framework, strong hands-on ability and innovative ability. The School owns a powerful faculty team and excellent experimental facilities. 2. Program Structure Editor Notes: The program includes 14 main courses. Introduction to Computer Science and Technology Discrete Mathematics C++ Programming Data Structure Fundamentals of Electronic Technique Digital Circuit and Digital Logic Principles of Computer Organization Principles of Operating System Principles of Computer Networks Principles and Applications of Database Microcomputer Interface Technology Embedded Systems The Principle of Compiler Software Engineering Note: students should pay RMB 1000 Yuan in advance. 3. Internship and Future Career Editor Notes: Students can choose to do the internship in practice bases and they have lots of career directions. 3.1 Practice Base The School has built practice bases with almost 70 well-known software corporations in China. There are 4 teaching and experimental bases which have been established together with several big-scale companies. The School has cooperated with famous universities and research institutes at home and abroad. 3.2 Employment Information Graduates can be engaged in related fields with their professional knowledge. Being engaged in individually developing software and managing computerized systems in technology companies. 4. School Introduction Editor Notes: ZJUT is a comprehensive university among the top 100 universities in P.R.China. The year 1953 saw the establishment of a new Zhejiang University of Technology (ZJUT) in Hangzhou, the picturesque historical and cultural city in China. Dating back to 1910 as Zhejiang Technology School, the University has successively gone through various historical periods, namely, Hangzhou Chemical Engineering School, Zhejiang Secondary Chemical School, Zhejiang Chemical College, and Zhejiang Engineering College, Learn More>> 5. College of Software Engineering Editor Notes: The College is one of the largest-scale, most active, and rapidly developing schools at ZJUT. There are more than 160 full-time faculty members and staff, including 29 professors and 63 associate professors. Visual Media Intelligent Processing Technology which is an Engineering Center for computer network applications is a Zhejiang Provincial Key Laboratory. This program is the Provincial Key Specialty and the Digital Media Technology is the Innovative Training Model Demonstration Area. The college has cooperated with more than 80 national well-known enterprises to provide student internships. The college has researched an agreement for joint training with universities and research institutes at home and abroad. 6. Faculty Editor Notes: 95% of over 60 faculty members hold a master's or doctoral degree. Subject: Intelligence Technology Professor Wang Wanliang Dean of College of Software Engineering, Subject : Wireless Network and Network Coding Professor Zhu Yihua Research Scientist in University of British Columbia, Canada, (2005) ​ Subject : Database System Professor Fan Jing Visiting Scientist in The University of Aberdeen, Britain, (2009); Senior Engineer 7. Campus Life Editor Notes: International students enjoy the wonderful life in the campus. Mid Autumn Festival Registed Address Center for International Programs, ZUT, No.18 Chaowang Road, Hangzhou, China Bachelor RMB 18,800 per year RMB 75,200 in total (About $ 13,790) East 16 Building Double Room RMB 6,500 Quad room RMB 3,500 No 11 International Students Apartment Triple Room RMB 600 Application Fee USD 75 Living Expense RMB 2,180 to RMB 2,780 1. Applicants who have given up their original Chinese citizenship and become foreign citizens should submit (1) cancellation certificate of Chinese citizenship (2) current citizenship certificate (3)Exit and Entry Record on passport, from July 30th ,2016 to July 30th , 2020. 2. English proficiency test certificate For example, IELTS or TOEFL, only for applicant whose native language is not English. 3. The notarized high school diploma The documents in other language except Chinese and English shall enclosed with the notarized translated version in Chinese or English. Graduating students can provide pre-graduation Certificate. After admission, the original graduation certificate or notarized copy should be submitted. 4. Applicants less than 18 years (by September 1st, 2020) should submit (1) Letter of Guarantee (who must be an adult residing in Hangzhou) (2) notarized Authorization Letter written by parents, copies available. 5. The copy of passport With name, passport number & expiration date, and photo included 6. Recent photos White background, 35mm×45mm in size. 7. High school transcript 8. Supporting Documents: Certificate of Good Conduct Provided by your current/previous school/company in Chinese/English to improve your success rate. You can download a template or sample from here. For applicants who are in China: If you are an employee, you still need to provide employment separation certificate and your current residence permit. If you are a student, you need to provide transfer certificate, leaving certificate, certificate of attendance rate issued by previous school and your current residence permit. It only take you minutes to apply through CUCAS! 1. Click “Apply Now” button on the right side of the page. 2. Fill in online application form. (About 10 minutes) 3. Upload required documents. (About 5 minutes) 4. Pay the application fee and CUCAS service fee (CUCAS is authorized to collect on the university’s behalf). (About 5 minutes) 5. Click “Submit” button. Important notice: You need to create a CUCAS account before apply. Account name needs to be a valid email, which will be used to receive CUCAS notice about your application process. CUCAS Service CUCAS provides best service in this industry to international students. Apply through CUCAS, you will enjoy: • Free Online Consulting, response within one working day. • Free access to Chinese university database, 20,000+ programs in 300+ top Chinese universities are available. • Free and easy-to-use online application system, only need 20 minutes to complete application. • Free accommodation booking. • Free DHL delivery - fast arrival and guarantee to get admission package. • Mostly get admission letter in 2 weeks. • Free visa guide, per-departure guide and students handbook. • Airport pick-up Service. • Money Transfer Service. • Chance to find alumni. • The content has been updated. January 16, 2020 • The application deadline has been updated to July 31, 2020 January 16, 2020 ·Starting Date : Sep&nbsp1 , 2020 ·Duration: 4 Years Teaching Language : English Application Deadline: Jul&nbsp31 , 2020 Tuition : RMB 18,800 Per Year Application Fee: USD 75 (Non-Refundable) Service Fee: USD 50 (Non-Refundable) Apply Now Save for Later Feel Free to Ask Questions! Tel : (86) 010-82865135 E-mail : service@cucas.cn Short-term Chinese Business Administration/Management International Trade/Business Application Fee: USD 75 ( Non-Refundable) Service Fee: USD 50 (Non-Refundable) Action Forbidden You can only sign up for an account once with a given e-mail address. Forget the password? Your Nationality Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua & Barbuda Argentina Armenia Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia & Herzegovina Botswana Brazil British Indian Ocean Terr British Virgin Islands Brunei Bulgaria Burkina Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China China Hong Kong China Macao Christmas Island Colombia Comoros Congo Congo (Zaire) Cook Islands Costa Rica Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic East Timor Ecuador Egypt Equatorial Guinea Eritrea Estonia Ethiopia Faroe Islands Falkland Islands Fiji Finland France French Guiana French Polynesia Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guernsey Guinea Guinea-Bissau Guyana Haiti Heard & Macdonald Is Honduras Hungary Iceland India Indonesia Iran Iraq Ireland Isle of Man Israel Italy Ivory Coast Jamaica Japan Jersey Johnston Atoll Jordan Kazakhstan Kenya Kiribati Kuwait Kyrgyzstan Laos Latvia Lebanon Lesotho Liberia Libya Liechtenstein Lithuania Luxembourg Macedonia Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia Midway Islands Moldova Monaco Mongolia Montenegro Montserrat Morocco Mozambique Myanmar (Burma) Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island North Korea Northern Mariana Islands Norway Oman Pakistan Palestine Palau Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Island Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Samoa San Marino Sao Tome & Principe Saudi Arabia Senegal Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Korea Spain Spratly Islands Sri Lanka St. Helena St. Kitts & Nevis St. Lucia St. Pierre & Miquelon St. Vincent & Grenadines Sudan Suriname Svalbard Swaziland Sweden Switzerland Syria China Taiwan Tajikistan Tanzania Thailand Togo Tokelau Tonga Trinidad & Tobago Tunisia Turkey Turkmenistan Turks & Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States Uruguay Uzbekistan Vanuatu Vatican City Venezuela Vietnam Virgin Islands (US) Wake Island Wallis & Futuna West Bank & Gaza Yemen Serbia Zambia Zimbabwe Croatia Republic of South Sudan Palestine Get Application Evaluation Before submit application, you can get an application evaluation to: Get most accurate admission chance evaluation report for 3 universities within 24 hours. Minimize the risk of wasting time and money from failed application attempt. Find the best university in China easily with our most experienced counselor with years of work experience. Get Now at $10
cc/2020-05/en_middle_0061.json.gz/line1739
__label__wiki
0.804888
0.804888
Seguin ISD 2017-2018 Seguin ISD Seguin, TX Seguin ISD is a school district in Seguin, TX. As of the 2017-2018 school year, it had 7,446 students. The school received an accountability rating of C. 52.2% of students were considered at risk of dropping out of school. 9.5% of students were enrolled in bilingual and English language learning programs. An average teacher's salary was $51,848, which is $1,486 less than the state average. On average, teachers had 10.3 years of experience. The average SAT score at Seguin ISD was 994. The average ACT score was 19.4. In the Class of 2017, 95.5% of students received their high school diplomas on time or earlier. The dropout rate was 0.7%. www.seguin.k12.tx.us Matthew Gutierrez mgutierrez@seguin.k12.tx.us Students in Seguin ISD are part of the Texas Education Agency’s Region 13. Students who started eighth grade in 2007 in this region had a college graduation rate of 24.3 percent. View a more comprehensive breakdown of the higher ed outcomes in Region 13. 344 (4.6%) 129.1 (27.8%) Lizzie M Burges Alternative School Ball Early Childhood Center Jefferson Ave Elementary School Koennecke Elementary School Mcqueeney Elementary School Oralia R Rodriguez Elementary School Patlan Elementary School Vogel Elementary School Weinert Elementary School Middle school or junior high schools Briesemeister Middle School Jim Barnes Middle School Mercer & Blumberg Learning Center Seguin High School
cc/2020-05/en_middle_0061.json.gz/line1741
__label__wiki
0.95216
0.95216
CAA: Mayawati, Akhilesh Yadav, Asaduddin Owaisi want open debate with BJP after Amit Shah’s dare Top news: Shouting ‘Azadi’ slogans will amount to sedition, warns Adityanath Jharkhand: SIT formed after seven villagers beheaded, police unsure of Pathalgadi link Nov 29, 2016 · 11:58 am Updated Jan 03, 2017 · 03:01 pm US elections: Donald Trump officially wins state of Michigan even as vote recount looms The Michigan Board of State Canvassers announced that the Republican candidate defeated his Democratic rival Hillary Clinton by 10,074 votes. Reuters/Mike Segar United States president-elect Donald Trump on Monday officially won the state of Michigan after the final vote count was tallied. The Michigan Board of State Canvassers announced that the Republican Party candidate had defeated his Democratic rival Hillary Clinton by 10,074 votes, The New York Times reported. The win gave Trump 16 electoral college votes, taking his total count to 306, well above the 270 required to win the election. Clinton secured 232 electoral college votes in the November 8 elections. The news of Trump’s fresh win comes even as calls continue for a vote recount in three states, including Michigan. The campaign to fund and promote a vote recount is being led by Green Party nominee Jill Stein. Last week, the Wisconsin Election Commission said they would begin the process of recounting the nearly three million votes cast in the elections after Stein paid the required fee. Stein said her aim was to verify the integrity of the US voting system and not undo Trump’s win. Clinton’s campaign also joined the efforts. However, Trump dismissed the efforts to push for a recount of votes as a “scam”. “This recount is just a way for [Green Party candidate] Jill Stein, who received less than 1% of the vote overall and wasn’t even on the ballot in many states, to fill her coffers with money, most of which she will never even spend on this ridiculous recount,” Trump said in a statement. “The people have spoken, and the election is over.” Bezos’ phone hack: Saudi prince knew of Amazon CEO’s affair before it was public, UN experts suggest
cc/2020-05/en_middle_0061.json.gz/line1747
__label__cc
0.515934
0.484066
Golden Age of Television: Volume 15 DVD Golden Age of Television: Volume 15 Ronald Colman is "The Man Who Walked Out on Himself" (1953), a wealthy cad whose plan to leave his wife for a younger lover hits a snag when his disgusted mirror image abandons him, in a "Four Star Playhouse" tale. Next, the "Four Star" episode "Never Explain" (1954) stars David Niven as a widower with unique plans to educate his children. And from the anthology series "Stage 7" comes "The Greatest Man in the World" (1955), with Pat O'Brien in a tale of an auto mechanic facing a life-changing choice, and "Emergency" (1955), where a diplomat and his wife must race to save a friend; Lee Bowman, Jean Byron star. 102 min. total. Standard; Soundtrack: English. Plays All Regions. Title: Golden Age of Television: Volume 15 Genre: TV Drama Starring: Ronald Colman, David Niven, Billy Chapin, Ann Doran, Pat O'Brien, Lee Bowman, Jean Byron, Christopher Dark Directors: Robert Florey, Roy Kellino, William Asher Attributes: Black & White, Manufactured on Demand Ronald Colman Billy Chapin Ann Doran Pat O'Brien Lee Bowman Jean Byron Robert Florey Roy Kellino William Asher
cc/2020-05/en_middle_0061.json.gz/line1748
__label__cc
0.63278
0.36722
Meet the Maestro Know Your Composer Young Conductors MONTE MUSIC FESTIVAL 2020 Art Song Festival 2020 Beethoven’s 250th in Colombo The Madras Musical Association through the ages Celebrating Celia GVS: A TEN YEAR SINGING ODYSSEY Mapping the Musical Genome: The Wagner Family ORGANIZING YOUR SCORES: A SERIOUS BUSINESS My Life as a Moon Rock In Conversation with the Vassar Choir Directors The French touch Stephen Kovacevich A GOETHE LEGACY IN VIENNA THE SERENDIPITOUS SOIREE A SUPERLATIVE NOVEMBER WEEKEND IN MUNICH’S NATIONAL THEATRE What is Western Classical Music? How is it different from Indian Classical Music? THE MAKING OF MARK Mehroo Kotval April 14, 2019 Interviews8 min read The idiom proclaims, “Behind every great / successful man there stands a woman.” In this day of gender parity, the opposite is equally true. Mark Troop married to Patricia Rozario, is a case in point. Pianist, broadcaster and writer, Mark is founder of The Chamber Music Company, devoted to all types of music. His broadcasts on BBC Radio 3, have included The Twilight of the Iguana, which is a three-part Latin American series and several live recitals. He has made an in depth study of the Songs of the 20th Century Argentinian tango master – Astor Piazzolla and performs South American repertory regularly. Over and above, Mark runs five London-based events: The Latin American Roadshow, a multi-arts Festival dedicated to the culture of Latin America; The CMC Summer Solstice, which scales up classical and jazz music under one roof; The CMC Rare Music Series, which discovers neglected Classical repertory; The Second Glance Festival of New Music which peddles selected new music to a wider audience and I’m a stranger Here Myself. He also runs Yin Yang Collective, London’s first Chinese-Western fusion group. He has also set up British Council tours in India, Spain and Latin America. All this is enough to keep the musician on his toes, when he is not limbering up doing yoga asanas, whilst waiting for Patricia parsing a song or overhearing an interpretation dispute. Willy-nilly, his expertise is sought mid-way the controversy. Similarly his language pronunciation puts to rest argumentative differences. This is not to say that he declaims his knowledge as the final word. In fact his intent look gives him credibility and his vast experience – authority. The musician taught at the Guildhall School of Music for two decades, and still teaches at Dartington International Summer School and St Paul’s Boys’ School. As a writer he has been published in Musical Opinion, Piano and Musical Performance – quite a diverse and eclectic exposure to several different genres and styles. Associated closely with Trinity Laban, he applauds the music college for “pushing music to ensure its continuity. On a visit four hours south of Hyderabad, in a place so small that he could not even remember the name, he wondered what he was doing in this God forsaken spot. Dressed impeccably, a student presented himself with “…this is the most wonderful day of my life, to play for you.” And then proceeded to play beautifully. Richard Deering of the Trinity school found that all of the students presented for exams were taught by a lone music enthusiast living in that tiny town. Such was his obsession he had called his children Haydn and Mozart. The width and depth of penetrating music in India heartens the teacher. There is an excellent standard in Indore, Nagpur, Baroda etc. He generously praises the devotion of small-town-India teachers, their seriousness with integrity and laments that in big cities teachers often do imitation jobs rather than let a style flower. He also credits YouTube for sustaining interest. The pianist states, “There is a drift towards classical music, particularly in Bombay and elsewhere as well. No more are big cities the only centres of a high standard.“ He talks of teachers who have inculcated a better perception of classical music where kids go to just study music. Mark elucidates, “Rather, what I’ve noticed is that students who before, wouldn’t or couldn’t have studied music seriously (it’s not a respectable profession) are now being allowed to study. This is a big turnaround from even five years ago. Today parents are happy to finance music as a study.” In Nagpur they want to start an academy to popularise classical music. He adds, “What interests me are the Kazakhs who are working at a school of music in Trivandrum. Internationally trained musicians are getting to teach in India.” He is awaiting the emergence of a style for Indian musicians as the subject matures in the country. He clarifies, “When you export your culture, it does not have to be the right or wrong way. It has to be understandable… in the nature of a dialogue.“ To further fine tune his view, he gives the example of Latin Americans playing their own indigenous music with a freedom and natural verve. “They lack this spirit the moment they play classical. They become rigid. Can the Latin American musician communicate that freedom and yet be faithful to the music?” Mark reveals that “the way Indians hear microtones Westerners do not. Why do Indian players have to imitate? Look at Jagdish Mistry (The Bombay born violinist), he hears intonation differently. He adds something to a western score that was not immediately envisioned by the composer. Now that is dialogue. New generations need to develop a fluidity – that is not borne of imitation.” This ability to flow into another’s world is Mark’s forte. He makes special mention of the KM Music Conservatory founded by musician AR Rahman in Chennai which enables a student to learn Indian and and Western classical music. “This fusion may be possible with these students and something interesting is bound to surface. Western classical music may take on an Indianness and change so subtly, it is possible.” Mark Troop and Patricia Rozario conducting workshops at KM Music Conservatory (2017) The Britain’s insatiable interest in India doesn’t only start with the music and yoga. He even enjoys street food and eats hotter food than his Indian born wife! Both have pursued their intention of doing something for the country for Western classical music. Talking of the current music scene, Mark’s realism is gripping. “Musicians have a choice, I started as a soloist, then went into chamber music whilst continuing to accompany Patricia for voice. Around the UK there used to be flourishing music scene, with several small societies devoted to music. But by the time I started they had become a bit down at heel, with poor quality and worse hospitality. Work has started to dry up in Europe, even in Germany. Top quality prize-winners are chasing smaller festivals and societies and taking away work from musicians lower in the food chain. The way wealth is spread is different. Government funding has stopped, the middle class is strapped for cash and the first withdrawal of funding is money for the Arts. One has to be innovative and investigate new ways of getting funding. People drift away because there is not enough work.” The husband-wife duo started the Giving Voice to India programme in 2009, which flourishes even today as the Giving Voice Society, a Charitable Trust established four years later. This engagement involves the couple completely. “Formerly I did touring India on the side. Although psychologically I was always in India. I had concerts and teaching in the UK and India was a hobby. Three years ago, India started taking over our lives and we started taking the country very seriously – more seriously than the UK. In fact I started letting go projects in the UK. I stopped pursuing work and when I needed to be here, I was here. Life revolves round commitments here.” At this junction of his musical career, when Mark has expanded his musical quest to new classical, Chinese, Latin American – tango and theatre, he concentrates now on the Indian itinerary. GVS course in Mumbai (2011) In Goa the couple have started performing by adding an instrument to their piano-voice repertoire. One year it was a Horn player, another year a clarinetist, and then a violinist. This is the accomplishment of three years in India. They also perform operas keeping skill sets and finance in mind. The experimenter, director of new emergences continues, “music is exported to a country, the importer thinks it is sacrosanct. We in Europe understand Bach differently than did musicians in his time. History shifts and we don’t know what was actually intended. We are so distanced from medieval music we cannot possibly know how music in the 1400s sounded. Transfer of context is very important. Today, we think a Beethoven sonata is to be interpreted in a particular way. Maybe in Germany, the historical connection is better but ultimately the music is always greater than a single performance can express. That’s how music evolves. It is no more limited to the original time and place. Each generation must necessarily interpret in its own way. I heard Franz Liszt’s Hungarian Rhapsody with stunning virtuosity on a cimbalom (a stringed instrument with a tone which is a cross between the piano and the harp). It had such poetry. You see, no one told him do this or that. There is a kind of spontaneous authenticity here that is essential to preserving music.” Mark’s ability to flow into different ages, different cultures, different milieus provides him the keen ear he possesses. We too are all ears. giving voice societyIndiamark troopPiano Previous ArticleTapping talent Next ArticleThe Velvet Revolution of Claude Debussy Mehroo Kotval Mehroo Kotval is a Human Resource executive who worked with International corporations in Bombay over 35 years. She always dreamt of setting up HR systems for NGOs. Grabbing the first opportunity she did that for two NGOs for women and for children. A choral singer from 1980, her other interests are people, travel and process work. She was on an editorial team of a community magazine. Julia Sophie Wagner, Jerome Voisin, Oliver Triendl Stella Chen (Violin) & Boris Kusnezow (Piano) SOI Spring 2020: The Classical Style Augustin Dumay and Maria Joao Pires Send us a Tweet © Serenade Magazine 2020. All Rights Reserved. Any reproduction of our content without express consent is strictly prohibited. Add Serenade to your Homescreen!
cc/2020-05/en_middle_0061.json.gz/line1756
__label__cc
0.669257
0.330743
Traditional boat race marks National Day Monday, September 03, 2012 14:58 A traditional dragon boat race was held in Thua Thien–Hue Province on National Day, September 2. Traditional dragon boat race on the Huong River in Thua Thien–Hue Province(Photo: SGGP) The competition race attracted 400 participants from Thua Thien-Hue, Quang Binh and Quang Tri Provinces. The race is part of the ‘Waterway Festival 2012’ organized by the Department of Culture, Sports and Tourism of Thua Thien–Hue Province. Another boat race was held on Han River in Da Nang City on the same day, in which 16 male and female groups from Da Nang and Quang Nam Provinces joined in two long distance races of 5,000 meters and 7,000 meters. The annual event to mark National Day also lured visitors with performances in water-skiing, parachuting and music street shows. In addition, traditional boat races celebrating the national holidays were also organized in Huong Khe and Thach Ha Districts in Ha Tinh Province. Meanwhile a traditional dragon boat race in Chau Doc Town in the Mekong Delta province of An Giang attracted a large number of visitors on September 2. 16 groups from An Giang, Hau Giang, Soc Trang Provinces and Can Tho City competed in three distance races of 700, 500 and 200 meters. By staff writers – Translated by Kim Khanh HCMC’s most anticipated festivals on Tet holidays opens Exhibition presents artworks inspired by rats HCMC’s Spring Flower Festival 2020 to open on January 19 SGGP Newspaper receives two awards Hanoi Spring Press Festival 2020 Vietnamese film to compete in China Int’l Micro - Film Festival Taste of Chinatown in Cho Lon Kitchen 10 remarkable culture, sports and tourism events in 2019 announced Ha Long int’l music festival to bring over 150 local, foreign artists Annual charity program helps poor artists enjoy Tet 'Vietnam Love Story’ concert to bring together veteran artists Ministry of Health inspectors check prevention task in Noi Bai Airport Following confirmation of person-to-person transmission of the acute pneumonia, caused by a novel coronavirus (nCoV), a group of inspectors from the Ministry of Health arrived at Hanoi-based Noi Bai Airport to check prevention task. Thailand develops world’s largest hydro floating solar hybrid power project Countries ramp up efforts against new coronavirus Indonesia prepares for return of alleged militants abroad Thursday, January 23, 2020 08:42 The Nguyen Hue Flower Street 2020, themed “Ho Chi Minh city - Confidently Stepping Forward” officially opened in the evening on January 22 (the 28th day of the 12th lunar month). Tet atmosphere on DK1 platform Bringing warm Tet to the poor HCMC presents Tet bus tickets to disadvantaged students HCMC inundated with Tet products
cc/2020-05/en_middle_0061.json.gz/line1758
__label__cc
0.573436
0.426564
Arranging Shannon Cruising Holidays in Ireland since 2002 View All Boats Cruising Times Getting to your Boat Suggested Cruises Lower Shannon/Lough Derg Upper Shannon Erne Waterway/Lough Erne WELCOME TO THE ULTIMATE RIVER CRUISING AND SHANNON BOAT HIRE TOURIST TRAVEL GUIDE FOR IRELAND - WWW.SHANNON-RIVER.COM cruise ireland, cruising ireland, boat hire ireland, irish boating holidays, shannon river, vacations in ireland, boats, cruisers, cruise, relax, boat rental, boating vacations, river holidays, shannon river, fishing, irland, bootstouren, ferein, fischen, bootscmiete irland, CRUISE IRELAND, CRUISING IRELAND, BOAT HIRE IRELAND, IRISH BOATING HOLIDAYS, SHANNON RIVER, VACATIONS IN IRELAND, BOATS, CRUISERS, CRUISE, RELAX, BOAT RENTAL, BOATING VACATIONS, RIVER HOLIDAYS, SHANNON RIVER, FISHING, IRLAND, BOOTSTOUREN, FEREIN, FISCHEN, BOOTSCMIETE IRLAND LINKS FOR PEOPLE WHO WANT TO CRUISE IRELAND BOATING OR CRUISING ON THE SHANNON RIVER Boat Hire and Cruiser Rental on the Shannon River - Travel Guide to the Shannon River in Ireland - Map for Cruising the Shannon River in IrelandThings to do on the Shannon RiverTips for Tourists Cruising the Shannon RiverInformation for Boat Hire Cruising on the Shannon River in IrelandHow to Get to your hire boat on the Shannon River Shannon River Cruising FAQ If it's your first time to take a boat on the Shannon you'll have lots of questions. Below are the answers to the most common questions we're asked about Shannon cruising holidays, divided into categories. Click on one of the main categories below for questions and answers in that category. Do I need experience at handling a boat? No. All of the cruiser companies we represent provide full tuition when you first take the boat, and will stick at it until you're happy that you can handle the boat. Do I need a licence to drive a boat on the Shannon River? No. At present no license is necessary to drive a boat on the river. Can I hire a boat for less than a week? Yes. Most (but not all) of the companies will let a boat for a period of three or four nights. These short breaks are subject to availability and usually can't be booked until two weeks before the cruise is due to begin but some of the larger companies are more flexible. Prices for short breaks vary from company to company - please contact us for a quote. What's the minimum age to hire a cruiser? The minimum age to hire a cruiser 21. Can I take a pet on board? Yes, but your choice of boat is severely limited by taking a pet on board as most of the cruiser companies don't allow it. Those that do allow pets will charge a fee of €35-€100. What are the collection and return times? Seven nights is really six and a half days as the boat can be collected from 16:00 and must be returned by 09:00 or 10:00 on the last day. For short breaks most companies will allow a 14:00 collection. Can I hire a boat at any time of year? No. The cruiser companies operate from March to October only and there are no boats available over the winter. Is there somewhere to park my car? Yes. There's free car parking at all of the marinas in Ireland with the exception of the Emerald Star marina in Portumna who charge €4 per night to park a car. This parking is not supervised at night but the crime rate is very low in rural Ireland and we have yet to hear of a car being interfered with at any marina on the river. Payment and Costs What are the payment terms? Payment terms with all of the cruiser companies is 33% (40% with Emerald Star) of the boat hire fee to confirm the booking and the balance is paid six weeks before the cruise is due to begin. For short breaks the full hire fee is required to confirm the booking. At Shannon River we can take payment by credit card online or by phone, bank transfer or cheque - cheque payments should be made at least six weeks before the cruise is due to begin. You can send your card details with the booking form that we send, or we can take it over the phone. You can also make a payment online in our customer area, we'll send login details when you book your boat. Our bank details are available on the booking form. Are there any hidden costs? Two costs to bear in mind are the refundable damage deposit and fuel. Refundable damage deposits vary from €850 to €3,200 depending on the boat and are paid directly to the cruiser company when you arrive using cash or a credit card. The damage deposit is fully refunded when the boat is returned undamaged. Many companies offer a damage waiver instead of the deposit - this is a smaller amount than the deposit but is not refundable. The main difference between the two is that the amount you pay is the maxumum amount you're liable for should the boat be damaged. You'll find more information with the listing for each boat. Generally you'll have plenty of fuel for your holiday and the fuel tank will be refilled at the end of the cruise and the fuel costs calculated. Emerald Star charge per engine hour for fuel, there's a gauge on the dashboard that displays the engine hours. The smaller boats use around 3 litres of fuel per hour and the largest boats can use up to 10 litres per hour. Fuel costs approximately the same as diesel in a filling station, sometimes more depending on the company. You can check the fuel costs before you leave and there's a meter at the helm of each boat to show how many hours you've travelled. Running the engine slower will use less fuel. Are the boats insured? The boats are fully insured against damage, although there is an excess with each boat equal to the refundable damage deposit. Please note that you, your crew or your belongings are not insured and you may need to take separate travel insurance for these items. Do I need a fishing license? It's recommended that you buy a license for a nominal fee if fishing in the Shannon - these are usually available from the cruiser company. A license is required to fish on the Erne. Please note that live bait is not allowed on the boat at any time. You can get details information on fishing licences at Fishing in Ireland Arriving for your boat. How do I get to the marina? You can get detailed information on getting to the marina HERE but a summary follows. Most of the companies that we represent provide a transfer service from Major airports to their marinas. Shared transfers take passengers from several flights and take them to marinas on the river, and these cost between €65 and €80 per person for the round trip (airport-marina-airport), and one way transfer are available for approximately half the price. More information on prices for transfers is available on each company page (go to the map page and click on the name of the hire company). Shared transfers are available on Saturday for most companies, and Wednesday or Friday may also be available depending on the time of year and the company in question. Private transfers are also available, prices on request. What time can I collect the boat, and what time do I bring it back at? The collection time with all of the cruiser companies is 4pm - this is to allow time for the boat to be cleaned and maintained from the previous crew. All of the companies try to get short breaks out at about 2pm and usually succeed unless the marina is very busy. The boat should be returned by 9am or 10am on the final morning depending on the company, again to allow time to clean and maintain the boat for the next crew. What's on the boat? Everything that you need to live on board is provided on the boat. Fresh bed-linen and towels, all cutlery and crockery, cooking utensils etc. Every boat has at least one bathroom with shower, and from four berth up most will have two or more. There is a fully functional galley on board with a small cooker and oven/grill and a small fridge. Is there electricity on the boat? All of the boats have 12v cigarette lighter sockets for charging mobile phones or laptops, although you'll need to bring your own adaptor. Some of the larger boats have limited 220v outlets, and some have special low-voltage hairdryers, televisions and DVD players. Some companies will provide an inverter for 220v power. Some of the newer boats on the Shannon have shore power, which means that you can plug the boats power system into the quayside and have full 220v power. The problem is that shore power is relatively new in Ireland and there aren't too many places to plug in. Waterways Ireland are adding new shore power points along the river and there are a list of available shore power points in the Guide to Irelands Waterways booklet, available here Is there Heating on the boat? All of the boats have warm air central heating that runs of it's own motor so there's no need to run the main engine to heat the boat. You'll need to run the main engine for hot water. Are life jackets and safety equipment provided? Life jackets are provided for crew members of all ages, and the marina staff will be happy to fit life jackets to children. Fire safety equipment is also on board - fire extinguishers and fire blankets. How fast do the boats go? Not very fast. The idea of a Shannon River cruise is to relax and unwind, and most of the boats have a maximum speed of about 10-15Kph. What do I need to take with me? All of the cruisers are fully equipped with everything you need to live on board - bed linen, towels, soap, toilet paper, a fully equipped galley with cooker and hob, all crockery and cutlery, a fridge. Life jackets are available for adults and children and fire extinguisher(s) and a first-aid-kit are on board. Most of the companies will supply a torch, binoculars and a dinghy. One thing we always recommend at Shannon River is that you take some extra towels if possible. You will of course have to provide your own food and drinks and optional recommended items include rubber-soled shoes for grip and soft luggage that stores easily (although most of the companies will store hard luggage for you on request). Which way do I go? Any direction you want within the limits of navigation. Bear in mind the times it takes to get from place to place, we've come up with some suggested routes to give you an idea of the best route for you. Do I have to pay to moor the boat? Although there are some private marinas that charge for mooring, there's free mooring at every town and village on the length of the Shannon and Erne waterways. There's a charge to moor at Athlone and this mooring is supervised. At busy times it's acceptable practise to moor alongside another boat if there are no free spaces. What about Locks? Your cruiser company will supply information on how to operate any locks that you come across. There are 16 locks on the Shannon Erne Waterway, all of which are automatic, and you will need a swipe card to use these locks. Swipe cards are available from your cruiser company, as well as from many shops along the waterway. These swipe cards can also be used to access facilities at harbours along the river, such as showers or laundry. Locks on the River Shannon are operated by lock keepers, and cost €1.30 to pass through. The opening hours for the locks are: March to Early April: 9:00 to 18:30 on weekdays, and 10:30 to 16:00 at weekends Early April to late September: 9:00 to 20:30 on weekdays, and 9:00 to 18:00 at weekends Late September to early November: 9:00 to 19:30 on weekdays, and 10:00 to 16:00 at weekends Early November to March: 9:00 to 12:30 on weekdays, and 10:00 to 12:30 at weekends Portumna Bridge Opening Times. The bridge at Portumna opens on a fixed schedule and the opening times are below; March 14 - April 3: 09:45 11:00 12:30 14:30 16:30 17:30 on weekdays and 11:00 12:30 14:30 16:00 on Sundays April 4 - September 25: 09:45 11:00 12:30 15:00 17:30 19:30 on weekdays and 11:00 12:30 15:00 17:00 on Sundays September 26 - November 1: 09:45 11:00 12:30 15:00 17:00 18:30 on weekdays and 11:00 12:30 14:30 16:00 on Sundays November 2 - March 13: 09:45 11:00 12:00 on weekdays and 11:00 12:00 on Sundays How many crew? 2-4 4-6 6-8 8+ For How Long 3 Nights 4 Nights 5 Nights 6 Nights 7 Nights 10 Nights 11 Nights 14 Nights Book a cruise of 3 nights or more in April and get 10% off. Book a cruise of 3 nights of more in 2020 and get 15% off selected Emerald Star boats. Book your 2020 cruise of 7 nights for 2020 with Manor Marine and get 10% off/ Book a cruise in March or April and get 15% off. Please enter the answer: The Shannon Cruising FAQ SHANNON RIVER Phone: 00353 (0)766 709928 Email: info@shannon-river.com Copyright © All rights reserved | Web design by websmiths
cc/2020-05/en_middle_0061.json.gz/line1759
__label__cc
0.636965
0.363035
Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems Jirada Gosumbonggot, Goro Fujita 地域環境システム専攻 Photovoltaic (PV) technology has been gaining an increasing amount of attention as a renewable energy source. Irradiation and temperature are the two main factors which impact on PV system performance. When partial shading from the surroundings occurs, its incident shadow diminishes the irradiation and reduces the generated power. Moreover, shading affects the pattern of the power–voltage (P–V) characteristic curve to contain more than one power peak, causing difficulties when developing maximum power point tracking. Consequently, shading leads to a hotspot in which spreading the hotspot widely on the PV panel’s surface increases the heat and causes damage to the panel. Since it is not possible to access the circuit inside the PV cells, indirect measurement and fault detection methods are needed to perform them. This paper proposes the global maximum power point tracking method, including the shading detection and tracking algorithm, using the trend of slopes from each section of the curve. The effectiveness was confirmed from the dynamic short-term testing and real weather data. The hotspot-detecting algorithm is also proposed from the analysis of different PV arrays’ configuration, which is approved by the simulation’s result. Each algorithm is presented using the full mathematical equations and flowcharts. Results from the simulation show the accurate tracking result along with the fast-tracking response. The simulation also confirms the success of the proposed hotspot-detection algorithm, confirmed by the graphical and numerical results. https://doi.org/10.3390/en12050882 Photovoltaic cells Fault detection Gosumbonggot, J., & Fujita, G. (2019). Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems. Energies, 12(5), [882]. https://doi.org/10.3390/en12050882 Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems. / Gosumbonggot, Jirada; Fujita, Goro. :: Energies, 巻 12, 番号 5, 882, 01.01.2019. Gosumbonggot, J & Fujita, G 2019, 'Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems', Energies, 巻. 12, 番号 5, 882. https://doi.org/10.3390/en12050882 Gosumbonggot J, Fujita G. Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems. Energies. 2019 1 1;12(5). 882. https://doi.org/10.3390/en12050882 Gosumbonggot, Jirada ; Fujita, Goro. / Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems. :: Energies. 2019 ; 巻 12, 番号 5. @article{520fdc8f5dc0499c99eb59c800c6d650, title = "Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems", abstract = "Photovoltaic (PV) technology has been gaining an increasing amount of attention as a renewable energy source. Irradiation and temperature are the two main factors which impact on PV system performance. When partial shading from the surroundings occurs, its incident shadow diminishes the irradiation and reduces the generated power. Moreover, shading affects the pattern of the power–voltage (P–V) characteristic curve to contain more than one power peak, causing difficulties when developing maximum power point tracking. Consequently, shading leads to a hotspot in which spreading the hotspot widely on the PV panel’s surface increases the heat and causes damage to the panel. Since it is not possible to access the circuit inside the PV cells, indirect measurement and fault detection methods are needed to perform them. This paper proposes the global maximum power point tracking method, including the shading detection and tracking algorithm, using the trend of slopes from each section of the curve. The effectiveness was confirmed from the dynamic short-term testing and real weather data. The hotspot-detecting algorithm is also proposed from the analysis of different PV arrays’ configuration, which is approved by the simulation’s result. Each algorithm is presented using the full mathematical equations and flowcharts. Results from the simulation show the accurate tracking result along with the fast-tracking response. The simulation also confirms the success of the proposed hotspot-detection algorithm, confirmed by the graphical and numerical results.", keywords = "Hotspot, Irradiation, Maximum power point tracking (MPPT), Photovoltaic, Renewable energy, Shading, Temperature", author = "Jirada Gosumbonggot and Goro Fujita", doi = "10.3390/en12050882", journal = "Energies", T1 - Global maximum power point tracking under shading condition and hotspot detection algorithms for photovoltaic systems AU - Gosumbonggot, Jirada AU - Fujita, Goro N2 - Photovoltaic (PV) technology has been gaining an increasing amount of attention as a renewable energy source. Irradiation and temperature are the two main factors which impact on PV system performance. When partial shading from the surroundings occurs, its incident shadow diminishes the irradiation and reduces the generated power. Moreover, shading affects the pattern of the power–voltage (P–V) characteristic curve to contain more than one power peak, causing difficulties when developing maximum power point tracking. Consequently, shading leads to a hotspot in which spreading the hotspot widely on the PV panel’s surface increases the heat and causes damage to the panel. Since it is not possible to access the circuit inside the PV cells, indirect measurement and fault detection methods are needed to perform them. This paper proposes the global maximum power point tracking method, including the shading detection and tracking algorithm, using the trend of slopes from each section of the curve. The effectiveness was confirmed from the dynamic short-term testing and real weather data. The hotspot-detecting algorithm is also proposed from the analysis of different PV arrays’ configuration, which is approved by the simulation’s result. Each algorithm is presented using the full mathematical equations and flowcharts. Results from the simulation show the accurate tracking result along with the fast-tracking response. The simulation also confirms the success of the proposed hotspot-detection algorithm, confirmed by the graphical and numerical results. AB - Photovoltaic (PV) technology has been gaining an increasing amount of attention as a renewable energy source. Irradiation and temperature are the two main factors which impact on PV system performance. When partial shading from the surroundings occurs, its incident shadow diminishes the irradiation and reduces the generated power. Moreover, shading affects the pattern of the power–voltage (P–V) characteristic curve to contain more than one power peak, causing difficulties when developing maximum power point tracking. Consequently, shading leads to a hotspot in which spreading the hotspot widely on the PV panel’s surface increases the heat and causes damage to the panel. Since it is not possible to access the circuit inside the PV cells, indirect measurement and fault detection methods are needed to perform them. This paper proposes the global maximum power point tracking method, including the shading detection and tracking algorithm, using the trend of slopes from each section of the curve. The effectiveness was confirmed from the dynamic short-term testing and real weather data. The hotspot-detecting algorithm is also proposed from the analysis of different PV arrays’ configuration, which is approved by the simulation’s result. Each algorithm is presented using the full mathematical equations and flowcharts. Results from the simulation show the accurate tracking result along with the fast-tracking response. The simulation also confirms the success of the proposed hotspot-detection algorithm, confirmed by the graphical and numerical results. KW - Hotspot KW - Irradiation KW - Maximum power point tracking (MPPT) KW - Photovoltaic KW - Renewable energy KW - Shading KW - Temperature U2 - 10.3390/en12050882 DO - 10.3390/en12050882 JO - Energies JF - Energies 10.3390/en12050882
cc/2020-05/en_middle_0061.json.gz/line1766
__label__wiki
0.797228
0.797228
Showtime Orders A Third Season Of The Tudors As episode six of THE TUDORS&rsquo; second season debuts this coming Sunday on SHOWTIME, the network is ramping up for a third season of palace intrigue and royal drama, premiering in 2009. Production is slated to begin on June 16th in Dublin, Ireland with series star Jonathan Rhys Meyers set to return. THE TUDORS took SHOWTIME subscribers and the media by storm when it premiered in April 2006, generating record viewership and critical acclaim. Last year, both the series and Rhys Meyers earned Golden Globe&reg; nominations. And, season one of THE TUDORS is currently one of CBS Home Entertainment&rsquo;s top-selling titles. &nbsp; &ldquo;THE TUDORS is now a fixture for us at SHOWTIME and we&rsquo;re on our way to completing the entire saga of all six wives of Henry VIII,&rdquo; says SHOWTIME President of Entertainment Robert Greenblatt. &ldquo;We are enormously proud of this show, the extraordinary cast, and the production team that recreates the grandeur of the Renaissance year in and year out. There is nothing like this anywhere on American television.&rdquo; Viewers and critics alike have been enthralled watching the storied exploits of the sexy, hard-bodied King Henry VIII (Rhys Meyers) as he weds Anne Boleyn (Natalie Dormer) while working to declare his marriage invalid to Queen Katherine (Maria Doyle Kennedy). This prompts Pope Paul III (Peter O&#39;Toole) to have him excommunicated — a fall-out that changed the course of history. Anne&rsquo;s failure to deliver a male heir sets the wheels in motion for her beheading, and sends Henry straight into the arms of yet another prospect &ndash; Jane Seymour (Anita Briem), who dies from an infection after finally giving him his coveted male heir. THE TUDORS is an Ireland-Canada co-production, executive produced by Morgan O&rsquo;Sullivan for Octagon Films; Benjamin Silverman and Teri Weinberg for Reveille Productions; Eric Fellner and Tim Bevan for Working Title Films, and Sheila Hockin; and is created, written and executive produced by Michael Hirst. SHOWTIME presents the series in association with Peace Arch Entertainment. PENELOPE ANN MILLER AND MIA KIRSHNER TO STAR IN LIFETIME’S MOVIE THE COLLEGE ADMISSIONS SCANDAL Seat42F April 22, 2008 Screener Girl Checks Out Moonlight’s Fated To Pretend Moonlight Cast Video Interview
cc/2020-05/en_middle_0061.json.gz/line1771
__label__wiki
0.858602
0.858602
All set for revival of New City project along Ravi Sprawling over hundreds of acres, this ambitious scheme will have a number of residential and commercial zones, and medical city Our Staff Reporter LAHORE - Punjab government is all set to revive an old urban development project of the PML-N government to develop the riverfront of River Ravi on the modern theme. Sprawling over hundreds of acres, this ambitious scheme will have a number of residential and commercial zones, medical city and forest reserve besides a central business district. The previous PML-N government had shelved the project in 2013 as it failed to attract the required foreign investment amounting to $7.5 billion. The new City would be developed on the pattern of River Thames that runs through London. In this connection, Chief Minister Punjab Sardar Usman Buzdar on Thursday presided over a meeting at his office to review proposals for building the new city alongside the River Ravi. DG LDA Sumair Ahmed Saeed gave a briefing about the proposed project. The chief minister directed to constitute a high-level steering committee comprising of federal and provincial government departments and other stakeholders to review and examine the proposed plan and submit its recommendations. He also directed to work out recommendations for developing a new city around any other district except Lahore adding that alternate model should be worked out instead of focusing on any particular city for building the new city. “Building new cities is important in the wake of population increase”, he said. Housing Minister Mian Mehmood-ur-Rasheed, Chairman Naya Pakistan Housing Authority, Chief Secretary, Vice Chairman LDA, SMBR, Chairman P&D and others attended the meeting. Originally conceived in 2013, the project, spreading over 44,817 acres and running along the River in a northeast-southwest direction, will set a new centre of the City in the districts of Lahore and Sheikhupura. As per the original plan, the new City would be developed on both sides of the riverbank along a 33-kilometre long stretch contiguous to Lahore district’s northern and western boundaries. The government is also considering a proposal to sell over 25,000 acres of riverfront to investors for business and cultural activities. Prime Minster Imran Khan is also taking keen interest in this project. He also got a briefing about the project from Lahore Development Authority Vice Chairman S M Imran and LDA Director General Sumair Ahmad Syed last month. He was told that feasibility studies about this multi-billion-rupee project had been conducted during last tenure of the PML-N government. In anticipation of foreign visitors coming to visit the new City, it has been proposed to give it a Mughal aura by replicating some old architectural designs. Project to set up nine Quran Mahal Pakistan’s growth path set after tough economic period: PM BRT project to be completed by June 30: KP Stage set for 50th edition of World Economic Forum Content for January 10, 2020 is not available× IF IT'S SO EXPENSIVE STOP EATING IT!! Social safety and poverty alleviation Muhammad Zeeshan Khan From judicial to NAB activism Brig (retd) Masud Ahmad Khan From Gilgit scouts to NLI regiment Mediating Efforts Health Sector In Shamble Roadblock For Tapi Our biggest rival Lie or Life?
cc/2020-05/en_middle_0061.json.gz/line1791
__label__wiki
0.939926
0.939926
A new Batmobile in London? Categories: 1966 batmobile, Batman, batmobile, DC comics, movie cars, news and TV car Tags: 1966 batmobile, Batman, batmobile, DC comics, movie cars, news, TV car He is the iconic Caped Crusader who has starred in comic books, television series and film franchises for the last 70 years. Now Batman is making his stage debut in one of the most lavish theatrical productions ever to appear in London, at The O2 arena. Gotham City will be brought to life in Batman Live, with a huge stage lit up by a dazzling display of pyrotechnics and special effects. Today the villains that Batman and sidekick Robin will face during the show were unveiled as the Joker, Riddler, Penguin, Poison Ivy, Harley Quinn and Catwoman. Creative director Anthony Van Laast, who has worked on West End shows and Hollywood movies including the latest Harry Potter, said: “It’s got stunts, it’s got Batman flying, it’s a big lavish spectacular – this is going to be a really good piece of theatre.” The Dark Knight will be helped by a brand new Batmobile created by Formula One designer Professor Gordon Murray, which will drive on to the stage before skidding to a halt. A 100ft screen shaped like a bat will act as a backdrop for the special effects, and characters will be able to fly around the set thanks to a grid suspended above the stage. It will also include an action sequence where the Joker tries to escape in a hot air balloon, only to be shot down in flames. The story of Batman Live follows the young Dick Grayson, a circus performer whose parents are murdered, and how he becomes Batman’s sidekick It will tour the world for five years! For more details go to batmanlive.com. But batman the musical idea has been around a while, and even was featured in one of the Batman:The animated series episodes! Take a look! One of my favorite clips! 0 Responses to “A new Batmobile in London?” « KNIGHT RIDER FEST 3 Brings together fans of KITT and KARR in VEGAS, BABY! STARCARCENTRAL IS EVERYWHERE THIS WEEKEND! WizardCon Anaheim, Torrance, and Rosemead! »
cc/2020-05/en_middle_0061.json.gz/line1793
__label__wiki
0.821388
0.821388
SirkTV Broadcast on Cable and at Colleges Across the Nation! About SirkTV SirkTV Affiliates Subscribe to SirkTV Zilo Networks Sirk Productions Here's What's New! IR Interview: The Cast & Creative Of “Servant” [AppleTV+] Exciting Technology & Direct Connection: CinemaCon 2012 – Feature Posted by insidereel CinemaCon, like its namesake Showest before it, has always been about exciting the theater owners with new technology and product meant to get them pumped for their direct connection to the customer. While the textures of this year from “Life Of Pi” to “Skyfall” provided some interesting visions, none was more discussed or contested like the footage that Peter Jackson showed of “The Hobbit”, shot at 48fps, which only a year or so after the acceptance of 3D and the near conversion to full digital, takes the string up one more notch. It is all about what you show. Paramount Heading into summer, Paramount opened the con by honoring Dwayne Johnson with the “Action Star Of The Decade Award” with studio head Rob Moore calling him “franchise viagra”. Johnson, with his textbook charm along with director John Chu, best known for the”Step Up” films, introduced a dexterous element of scenes from the film which both showed humor and drama. Next, Tom Cruise, in a taped greeting from the set of “Oblivion” [directed by Joe Kosinski] in Baton Rouge, spoke before showing scenes from “Jack Reacher” directed by Christopher McQuarrie whose last helming outing was “Way Of The Gun”. Two scenes adapted from the graphic novel distinctified “tone” which Cruise mentioned in his opening remarks. Rob Moore then turned the stage over to Jeffrey Katzenberg who, after a great year with “Kung Fu Panda 2” and “Puss In Boots”, brought “Madagascar 3” and “The Guardians”. The third entry into the “Madagascar” franchise showed almost 15 minutes of the opening optimizing new animation techniques since the last one in the series with Chris Rock coming on stage saying that it was the best so far adding that some parts were “trippy” which reflected in a circus montage. “The Guardians” based on a children’s book is a completely different animal using “myth” and “belief” to approach its subject matter with an edge and texture. Chris Pine who leads the cast as the voice of “Jack Frost” spoke about the key in the character to finding “the center”. Interestingly, the whole time he was speaking, all of his remarks also applies everything he sees in this character to James Kirk for which he is currently shooting the sequel to “Star Trek” as. The ending of the presentation did not disappoint with Sascha Baron Cohen making his second public appearance as “The Dictator” complete with girls and soldiers in tow and walking through the crowd. After throwing some zingers on stage as is his MO, Cohen as the character angled out Katzenberg as the other “dictator” in the room before announcing (which most thought as a joke) that the film would be screening at 11pm up the Strip and that it was not a threat before he exited with great fanfare as Katzenberg kissed his ring. Warner Brothers The texture of Warner Brothers relies in being able to follow up the powerhouse of Harry Potter. While the arrival of Tim Burton and Johnny Depp to introduce an extended trailer of “Dark Shadows”, it was Christopher Nolan talking about shooting almost a 1/3 of his “Dark Knight Rises” in IMAX that offered a stemming view of a brooding dark conclusion so much so that Adam Shankman who showed an extended trailer of “Rock Of Ages” including the first bit of Tom Cruise singing threw a “you fucker” line at Nolan because of how unbelievable bad ass it was. Director Jay Roach then talked about the balance of political “broo-haha” in regards to his new film:”The Campaign” starring Will Ferrell and Zach Galifianakis. However it was moving into fall that offered the most interesting view with the first glimpse of footage from Baz Luhrmann’s “The Great Gatsby” in 3D which Luhrmann explained in a taped message from Australia allows you to see the actors shine without any visual effects. Lastly, Peter Jackson introduced in 3D from New Zealand, the first footage of 48 frames per second from “The Hobbit”. Like seeing “Avatar” for the first time, it takes some getting used to because it is a completely different movie experience in terms of perception with Jackson showing distribs around 10 minutes of footage. One piece in particular showing Gollum’s face very close to camera shows the distinctiveness of this frame rate as do flying shots (like those seen in the original trilogy). Another one very specific to the changing viewpoint of the immersion of the technology is when Gandalf is alone in the catacombs. The depth of the shot makes you think you are actually there though the process does retain an almost HD camera quality in terms of perspective which is rather hard to describe. Disney Balancing out with the texture of brand specifications from Warner, the Mouse House used the cross structure promotion with Marvel, Pixar and Dreamworks to fuel the fire. Marvel presented a short clip from “The Avengers” intermixing Iron Man, Thor and Captain America with bone-crunching sound followed directly with the announcement of Thor II and Captain America II before Marvel President Kevin Feige showed a small clip leading to the production of Iron Man III which begins production in North Carolina later in the month. Progressing into Dreamworks, the aspect of “People Like Us” starring Chris Pine and Elizabeth Banks (and directed by Alex Kurtzman of “Star Trek” and “Fringe” frame) capitalizes on the studio’s penchant for more novel based forms. “Lincoln” which makes its distribution stateside through Fox, was also mentioned, without texture of a trailer likely to be seen at Fox’s Presentation two days later. Disney Pictures itself started quietly with sleeper quality textures of the stop motion film “Frankenweenie” directed by Tim Burton which does contain odes to Brad Bird’s “Family Dog” episode of “Amazing Stories” and definitely suburban angles of “Edward Scissorhands”. “The Odd Life Of Timothy Green” starring Jennifer Garner and Joel Edgerton seems more reminiscent of Disney fantasy/morality films of the 70s like “Pete’s Dragon” depending on the tone of the eventual picture. “The Wonderful World Of Oz”, which just completed filming just a couple weeks ago, boasts a great pedigree in director Sam Raimi re-teaming with his “Spiderman” villain James Franco as the titular character here. The story details unearthed by the director speak to an interesting betrayal in the story of sorts centering around Mila Kunis’ character which fuels the intentions of what happens in the world. The footage shown dictates a mixture of sets, which producer Joe Roth identified as Detroit, as well as some interestingly created background CG mattes which might or might not be the final textures. Conversely, Jerry Bruckheimer was brought out by current live action film prexy Sean Bailey after a short live stage bit about Kermit wanting to be the Lone Ranger and Miss Piggy wanting to be the Good Witch in Oz. Entertaining for sure. Bruckheimer spoke of them shooting in Arizona with Johnny Depp coming out and speaking as well. Depp made reference to that fact that “I just saw a frog and pig out here. Did anybody else see that?” When asked about Tonto, Depp deferred in a show of modesty saying, kindly, that he wants the theater owners to see it when it is done. With no footage to speak of for the title with the exception of a photo, details are still scarce. John Lasseter, head of Pixar and Walt Disney Animation Studios, came out next to discuss his slate. “Wreck It Ralph” is a non-Pixar film which is interesting in its own right following a bad guy in an 8-bit video game stuck in an arcade. Lasseter spent a good ten minutes setting up the premise and characters before showing the first ten minutes of the film. John C. Reilly, who spoke about trying to improvise during the recordings with sometimes co-star Sarah Silverman, gives a definite heart to the character. A specific “bad guys anonymous” scene represents this with a dexterity and tongue-in-cheek element replete with visual gag cues. Representing beyond and speaking into the Pixar mode, the announcements in terms of new structures (beyond “Monster University”) border on more esoteric which might be undeniably groundbreaking with one being “The Last Dinosaur” with only a silhouette of a brachiosaurus present and another one that can be encapsulated as “Journey Into The Mind” but probably not in the “Fantastic Voyage” way. Finally, as a perspective of a film which has been interestingly placed without any real knowledge of it, Lasseter unspooled nearly a half-hour of “Brave” which follows the exploits of a tomboyish princess in the highlands of Scotland. While interesting echoes of Robin Hood play through especially when the heroes take disguise, what does seem to ring through. which was not prevalent before as much in the other Pixar movies (because this is inherently a human world), is the reactions of the animals and others in a more realistic way which was a hallmark of say “Beauty & The Beast”. It shows how the feature animation side of Disney is being impacted by Lasseter. While not at the full potential of Disney because of responsibility to the shareholders, he is pushing the bar in subtle ways as he can. Filmmaker Forum: Martin Scorsese & Ang Lee Whenever you get Martin Scorsese in the room, the perspective becomes one of a film class which is interesting when he is speaking to a roomful of theater owners. The impact of “The Hobbit” footage at 48fps had been ringing for about 24 hours and everybody had an opinion on it, both good and bad. This forum was more about 3D with Scorsese’s “Hugo” pushing the barrier last year in terms of serious filmmakers from a dramatic point of view. Ang Lee, mostly known for his more direct non-genre dramas (but Oscar-winning fare) recently immersed himself in 3D for his Christmas release “Life Of Pi” which many said to be “unfilmable” (and for good perspective reason). While it is interesting to see these men discuss the virtues of this medium, it almost feels like they are behind the ball because the technology is moving so fast. Before the discussion began, a sample of 120fps technology was shown. The eye cannot see, for what is being said, beyond 60fps. The footage here was more smooth gliding elements but the separation dictates the depth. This is one thing that did interact in terms of the Scorsese/Lee discussion because lighting becomes even more of an important structure which Lee said drove him mad in certain respects on “Pi”. Scorsese reflects that the I/O, which determines depth in 3D, was something he and his cinematographer Robert Richardson constantly toiled with on “Hugo”. He however said it was one shot when Sascha Baron Cohen is staring down into the camera with his dog in forced perspective that gave him chills because it showed what the technology was capable of doing. Lee, still in the midst of figuring everything out on his movie, spoke on the essence of using water since a lot of his movie takes place in the ocean. The Taiwanese government ended up building him a massive tank but the camera was the first to use a housing to shoot 3D actually underwater. Neither had seen “The Hobbit” footage so they could not comment though Scorsese seemed visibly intrigued at everyone’s reaction. He compared it to a movie he showed to his daughter, her school friends and some of their mothers at his home in New York recently. It was from back in the 30s where the aspect ratio and the color changes during the film (much like “Wizard Of Oz” in some respects). People, he said, spoke the same way about color. It is just something that will eventually, after growth spurts, become a mainstay. 3D took a little longer but eventually is having its day. Sony While franchises seem to pile on with respect to the Sony brand, the intention seems to reflect that bigger is better quality. While “MIB 3” and “Total Recall” showed extended structures in 2D, it is interesting to perceive their eventual release.The time travel perspective of Men In Black does not quite have its plot direction set in the footage shown but the humor, as always, plays dry and loose with Josh Brolin doing a spot on impression that you would almost think that Tommy Lee Jones is doing the voice over. “Total Recall” oddly enough recreates an almost deja-vu situation because the set ups in terms of plot device to the original are eerily similar with a swig of “The Fifth Element” thrown into the mix. The world is intense and Kate Beckinsale, melding a character that mixes Sharon Stone and Michael Ironside from the original, is bad-ass especially in an extended foot chase sequence that just screamed with adrenalin yet felt wholly original. The intention of what Douglas Quaid is being accused of here is played a little more than conjecture. “That’s My Boy” looks to bring Adam Sandler back to full resolution after the misfire that was “Jack & Jill” but the man experiments with comedy (albeit more low brow) much like Will Ferrell but with more success on an ongoing basis. This is an R-rated romp that has textures of “Little Nicky” but with more curse words and breasts. Sort of like Billy Madison grown up. It looks hilarious because Sandler’s character can go nuts because Andy Sandberg takes on Adam’s usual role with aplomb. It should kill for sure. And as the announcements proved, “Grown Ups 2” is around the corner a summer from now. “The Amazing Spiderman” also seems to be trying to find its footing. The hardest thing in rebooting the franchise is selecting the right tone and space within which to set it. The humor and action shown here is seeking a balance for sure and the scale surely feels much bigger than the last franchise. Andrew Garfield’s approach is more aloof at times though Emma Stone stabilizes the structure. Denis Leary as the police captain who sees Spiderman as a threat will bring some added tension and the more comprehensive view of Lizard Man promises interesting feelings but it all contains relevance in heart depending on the end product. “Resident Evil: Retribution” shows Paul W.S. Anderson pushing the 3D ideals but the mythology is getting extremely deep. However as long as Milla Jovovich can wield a sword and guns with fire blazing behind her (with extended I/O mind you) people will flock. The final perception allowed was a first look at the Bond film “Skyfall” directed by Sam Mendes. The teaser is dark with overcast skies and dark rooms. It seems almost built like a brainwash sequence. The music is rumbling and has tendencies of foreboding much like “Road To Perdition” which gave chills. Granted it gives no perspective of overall story but the tone indicated feels much like “The Dark Knight Rises”: a dark humor that mixes with tragedy. 20th Century Fox With two summer films that hang on the precipice with different elements at stake, the ideas are humming. With “Prometheus” and a bang up viral campaign, director Ridley Scott seems to know what he is doing. The extended trailer showing the landing sequence onto the planet in its full glory has a dexterity and industrial feeling that only Scott can do. “Alien” DNA plays heavily into the trailer from the ship to the Space Jockey. The blood letting definitely paints it well. It looks phenomenal on the big screen. “Abraham Lincoln: Vampire Hunter” I have been interacting with over the past couple months. It is a near idea that is perched between real life and genre which is always a hard sell. Director Timor Bekmambetov has the chops to make it happen and the new footage plays to more the historical basis and less of the acrobatics which may be a conscious decision. “Neighborhood Watch” is another interesting amalgamation with Ben Stiller, Vince Vaughn and Jonah Hill moving into an alien invasion hybrid comedy where they become defenders of their community, swilling beer and taking no bullshit. It is interesting but the line being walked is a tightrope. The final perception to be mentioned on Fox’s upcoming slate is “Life Of Pi”, Ang Lee’s 3D epic to be released at Christmas. Lee showed one sequence and one scene from the film to show what he is trying to do. What comes across for sure is a necessity to use 3D as a storytelling mechanism of immersion. The sequence involves the marooning of the lead character on the ocean and the sinking of the freighter he is traveling on. At first it seems almost simple but the single long takes show a deeper thought at work. Like “Titanic” in a way but more intimate, Lee’s camera follows the actor (picked from a worldwide casting search) underwater trying to save his family who is trapped in the water below deck. The 3D camera picks up the bubbles which gives a much more real feel. Pi, the lead character, ends up on a life raft which a zebra (there are a lot of animals on the ship) jumps onto. The perspective of that and then a Bengal tiger (an integral part of the story) jumping on as well while rain is pouring down, makes on realize that there is a lot of stuff going on technically here. One of the most beautiful shots comes around this point where you can see the sinking ship lingering below Pi in an overhead shot with its lights still on. He disappears below the surface and you get a sense of scale. When 3D starts to be used for this kind of thing (which Cameron embraces as well) is when you will get some killer stuff. The other scene Lee showed is very reminiscent of “Old Man & The Sea”. You can tell at a point it is in a studio stage while Pi and The Tiger fight over their food of flying fish along with tuna that sail into the boat. It has that aspect of Anthony Quinn and the primal fight. The tiger (which is probably CG but it is so seamless as not to be believed) blows Aslan from “Narnia” out of the water with its reality. CinemaCon, showing new advances, continues to challenge theater owners and, by extension, audiences by trying to keep up with changing technology and rights conversion which, while exciting, always seems to come with a bit of apprehension but ultimately interest. Posted in Entertainment Industry Coverage Tags: 20th Century Fox, 48fps, Abraham Lincoln: Vampire Hunter, Adam Sandler, Adam Shankman, alex kurtzman, Andrew Garfield, Ang Lee, Baz Luhrmann, Ben Stiller, Brave, Chirstopher McQuarrie, Chirstopher Nolan, Chris Pine, Chris Rock, Dark Shadows, disney, Dreamworks, Dwayne Johnson, Elizabeth Banks, emma stone, Feature, Frankenweenie, GI Joe: Retaliation, Hs Franugo, Industry, inside reel, Jack Reacher, Jameco, James Bond, James Kirk, Jay Roach, jerry bruckheimer, Joe Roth, john c. reilly, John Chu, john lasseter, johnny depp, jonah hill, Kate Beckinsale, Kevin Feige, Life Of Pi, Lincoln, Martin Scorsese, marvel, Men In Black 3, Mila Kunis, Milla Jovovich, Monster University, Neighborhood Watch, Paramount, Paul W.S. Anderson, People Like Us, peter jackson, pixar, Prometheus, Rob Moore, Rock Of Ages, Sam Mendes, Sam Raimi, Sarah Silverman, Sascha Baron Cohen, Sean Bailey, Sirk TV, Skyfall, sony, Spiderman, star trek, That's My Boy, The Campaign, The Dark Knight Rises, The Dictator, The Great Gatsby, The Guardians, The Hobbit, The Odd Life Of Timothy Green, The Wonderful World Of Oz, Tim Burton, tim wassberg, Timor Bekmambetov, Tom Cruise, Vince Vaughn, warner brothers, Way Of The Gun, will ferrell, Wreck It Ralph, Zach Galifianakis Arts Travel & Culture Features (118) BD/DVD Reviews (81) Entertainment Industry Coverage (109) Film Festival Coverage (207) Film Reviews (89) JBTV (3) Music Television (1) Other Reviews (314) Sirk TV First Look (125) SirkTV Productions (6) SirkTV Programming (12) Television Reviews (67) VIDEO: Sirk TV On The Scene Interviews (420) VIDEO: The Inside Reel In the Trenches (115) VIDEO: The Inside Reel Interviews (1,301) VIDEO: The Inside Reel Short Takes (71) VIDEO: The Inside Reel TV Show (15) Severe Clear the Movie The Inside Reel Contact SirkTV 12 West 31st Street
cc/2020-05/en_middle_0061.json.gz/line1794
__label__wiki
0.738256
0.738256
Lisbon Residents Are Latest to Be Fed Up With Too Many Tourists Henrique Almeida, Bloomberg Tourism is so very often a wonderful thing. But the damage it can do is so rarely understood, and the tourists who inflict the worst of it have absolutely no clue what they’re doing. Ever since tram number 24 stopped running up one of Lisbon’s famous hills two decades ago, residents have been demanding its return. So when the renamed Tram Tour began service in May on a shortened route known for hilltop views of the city, it might have been cause to rejoice. Instead, the tram has become just the latest symbol for locals of tourists being attended to while they’re literally being left behind. Lisbon has been the fastest-growing city destination in southern Europe for overnight guests since the global financial crisis amid an unprecedented surge in the nation’s $11.6 billion tourism sector. The tram is “a little insulting for Lisbon residents,” said Mario Alves, who is among the more than 2,500 people who have signed a petition demanding another tram service also meant for locals, which, at 6 euros ($6.70) a ride, costs more than twice other city transport and caters to visitors. “Other trams are often filled with tourists and some old city residents have to walk.” The backlash isn’t limited to trams — resident groups across the city are asking for more regulation to limit the impact of the tourism inflow. Neighborhood officials are advocating that Lisbon join European cities such as Barcelona, which froze hotel openings. Better garbage collections in highly trafficked zones and a crackdown on public drinking are also necessary, they said. While Lisbon hasn’t announced any similar plans, the nation’s economy minister agrees that something may have to give. While tourism is crucial to the economy, “there are aspects that need to be balanced out, such as noise in certain areas of Lisbon,” Antonio Pires de Lima said on Aug. 11. Mass Inflow Long overlooked by visitors who favored Portugal’s southern Algarve region, Lisbon is attracting more tourists as a result of an ambitious online marketing campaign and relatively lower prices for tourists than in other similar destinations, a growing cruise-ship port and security concerns in other sunny destinations. An estimated 3.6 million overnight foreign guests, or more than 6.5 times the city’s population, will visit it this year – – an even higher multiple than Barcelona, which expects to receive 7.6 million international visitors. The increase has helped lead Portugal out of recession and is forecast to account for 15.8 percent of Portugal’s 2015 GDP. Still, locals are increasingly feeling put out as tourists take over their streets, transport and even their apartments, changing the fabric of the city. Pink Street The epicenter of the growing tension between residents and tourists has turned to the riverside Cais do Sodre neighborhood, which decades ago was one of the city’s forgotten districts. Its dark, back streets with a handful of brothels was filled with sailors and locals. In 2011, everything changed. The quarter was given a makeover and its main street Rua Nova do Carvalho closed to traffic, painted fluorescent pink and nicknamed Pink Street. Hotels, tourist apartments, restaurants and bars set up shop in the area. “These days, about 70 to 80 percent of our clients are tourists,” said Catarina Cabrita, a bartender at Champanharia do Cais in Pink Street. “Business is excellent.” Living there is another matter, locals say. “It’s gotten worse,” said Isabel Sa da Bandeira, who lives 100 meters from Pink Street and heads an organization called “People Live Here” aimed at reminding authorities of the residents around them. “This area used to be in bad shape but we could all sleep at night because everything was done behind closed doors. Now, the party is everywhere.” And she really means everywhere as tourists start sleeping in locals’ apartments. One change of the 2011 European Union and International Monetary Fund aid package extended to Portugal to ease it out of the sovereign-debt crisis stipulated a gradual end to long-held rent controls. As those protections end, landlords are turning away longtime tenants and selling properties to foreign investors — or renting directly to tourists for short stays. Sale prices measured in square meters have jumped 60 percent in some areas of Lisbon since 2011, said Paulo Silva, head of Aguirre Newman in Lisbon, a real estate consulting firm. The money keeps pouring in — foreigners accounted for 90 percent of the 730 million euros invested last year in Portuguese real estate — nearly three times the 2013 amount. Portuguese property investment will increase to about 1 billion euros this year, according to Aguirre Newman data. That could lead to an exodus of natives from the city, said Vasco Morgado, president of Santo Antonio civil parish, which includes several of Lisbon’s historic quarters. ‘Growing Pains’ “Landlords are putting pressure on residents to leave so they can rent the units to tourists,” said Morgado, pointing out a 35-meter street in his parish that is now home to five hostels. “Nobody is against tourism but there must be a balance because Lisbon has Lisbonites and Lisbonites can’t be considered as collateral damage. Tourists won’t want to come to Lisbon if there are no residents.” Without legislation to restrain the growth, however, Lisbonites might need to learn how to live with it in the short term, at least, said Eduardo Abreu, a partner at the Lisbon- based Neoturis tourism consulting firm, calling the dissent “growing pains.” “When a city goes through such an unprecedented tourism boom, it’s obvious that unpleasant situations occur,” Abreu said. “But Lisbon residents have to learn to live with tourists. After all, if you go to London, Paris or New York you will always find thousands of tourists in spots like Piccadilly Circus, the Eiffel Tower or Times Square. It’s inevitable.” This article was written by Henrique Almeida from Bloomberg and was legally licensed through the NewsCred publisher network. Tags: lisbon, portugal, tourism Photo Credit: A trolley along Lisbon's tourist route. Filipe Fortes / Flickr
cc/2020-05/en_middle_0061.json.gz/line1796
__label__wiki
0.614961
0.614961
* There’s Something Strange About This Group Go Phish Why email is so laughably insecure right now. By Josephine Wolff Even the White House’s unclassified computer system is susceptible to phishing. Photo by Saul Loeb/AFP/Getty Images Perhaps the most surprising thing about this week’s reports of Russian hackers infiltrating an unclassified White House computer system is that for all their efforts the hackers appear to have been unable to retrieve anything more interesting than the unclassified details of the president’s schedule. That is probably due in no small part to the White House’s refreshingly realistic security strategy, as articulated by deputy national security adviser Ben Rhodes in an interview with CNN: “You have to act as if information could be compromised if it’s not on the classified system.” If the end result of the breach was unexpected, its early stages were anything but—the incident apparently started with a phishing email. So did the ransomware infection at the Tewksbury Police Department earlier this week, which led to the officers paying a $500 ransom (in bitcoin, naturally) to decrypt their data. And that’s just this week—the high-profile examples of security incidents that are launched by phishing emails go back years and include the 2012 breach of the South Carolina Department of Revenue and the espionage efforts of China’s People’s Liberation Army Unit 61398, which were reported in 2013 by security firm Mandiant. Even last year’s Sony breach appears to have been initiated using spear-phishing emails. Phishing emails appear to come from someone you know, trust, or would want to hear from but are, in fact, sent by someone else entirely (for instance, Russian hackers) to trick you into downloading malware or sharing login credentials or other sensitive information. Phishers can cast a broad net (“Dear Sir, I am a Nigerian prince please send me the details of your bank account …”) or a slightly smaller, more targeted one tailored to a particular organization or group of people (“Dear MIT user, your email is full, please click here to increase your quota …”). They can “spear phish” by sending even more targeted messages directed at particular individuals (“Dear Josephine, please complete the attached form prior to your dissertation defense …”). In general, the more targeted the message—and the falsified sender information—the more likely we are to fall for it. (I’ve never fallen for messages of the first two varieties, but you could fool me in a heartbeat with the third—and no, that’s not an invitation.) When you scan the cybersecurity headlines, it quickly starts to seem like email is almost always the way in to a protected system—is there any other Internet application so consistently exploited in so many different types of security breaches? The only thing surprising about a successful phishing attack at the White House is that it doesn’t happen more frequently. In its 2013 Data Breach Investigations Report, Verizon found that phishing was used in 95 percent of state-affiliated espionage incidents. In the 2014 version of that same report, the exasperated authors write: [W]hile the array of tools [used for cyberespionage] is diverse, the basic methods of gaining access to a victim’s environment are not. The most prolific is the old faithful: spear phishing. We (and others) have covered this ad nauseam in prior reports, but for both of you who have somehow missed it, here goes: A well-crafted and personally/professionally-relevant email is sent to a targeted user(s), prompting them to open an attachment or click a link within the message. Inevitably, they take the bait, at which point malware installs on the system, a backdoor or command channel opens, and the attacker begins a chain of actions moving toward their objective. It’s no wonder they sound a little weary of the topic: We’ve been using email for decades now. How can we still be so bad at it? Part of the security problem is that, well, email is getting old. The first ARPANET email was sent in 1971, and the Simple Mail Transfer Protocol standard, which is still widely used today, was originally defined in 1982. And while the stereotype of the older person bumbling with technology isn’t fair, technologies themselves don’t always age well as we find new uses for them. Unlike more recent applications, email was developed in an era before online security was really a concern, when Internet users were so few and so close-knit that impersonation and phishing would have seemed almost impossible to imagine. But over the years, we’ve seen all the things that can go wrong when anyone can spoof an email’s “from” address. People have tried time and again to make email more secure—and made surprisingly little headway. Email security is challenging for several reasons. For one thing, many of us want to be able to receive emails from total strangers—so unlike applications that limit our communications to the people whom we preapprove or “friend,” email intentionally provides access to the outside world, making it an attractive initial means of contact for spies and thieves. Also unlike many of the other online applications we use, email is federated—there’s no single company with centralized control over or visibility into all of the different users and accounts. That makes it hard for any individual actor to strengthen email security unilaterally. Traditional models for email security tend to rely on digital signatures, an encryption mechanism that enables individual users to prove their identity to their email recipients. To be clear, I’m not talking about the email signatures that appear automatically at the end of people’s messages featuring inspirational quotations or long lists of distinguished titles. (Those serve no earthly purpose, security or otherwise.) I’m talking about the kind of digital signature in which you use your private encryption key to “sign” a message so that recipients of the message can verify you really sent it, using your public encryption key. This is helpful because, remember, that “from” address is all but meaningless if someone is trying to fool you. But this system only works if we all get encryption keys and use them to sign our emails, and if the people we send those emails to bother to verify those signatures—and most of us don’t. (The inspirational quotation signatures, on the other hand, we’ve been all too eager to adopt.) As the challenges of changing behavior one email user at a time have become clearer, some email providers have tried to find more centralized ways to tackle phishing that don’t require them to teach their users about digital signatures (or store those users’ encryption keys). For instance, in 2012, Google, Microsoft, and Yahoo announced that they would filter phishing emails that purported to be sent from the domains of companies including PayPal, Facebook, and LinkedIn. Essentially, those senders issued a list of the servers that they use to send email and any messages with a “from address” ending in one of those domains (i.e., @paypal.com or @facebook.com or @linkedin.com) that were not sent from those pre-approved servers could then be filtered. So there’s been some small progress—catching some common phishing templates on popular email platforms—but overall, email has been surprisingly resistant to security interventions, despite its prominent role in launching so many successful security breaches. These days, when we talk about addressing phishing, we tend to focus on user education and awareness as the solution. With more people turning to popular webmail services like Gmail that don’t support digital signing by default, signatures are rarely even part of the conversation anymore. Even when it comes to the kinds of email that are most often exploited by attackers—messages containing attachments or website links—we’ve been content to live in a world where we know very little about who is sending us emails. Education and awareness efforts may help people distinguish the less sophisticated and targeted of these phishing messages, but they can’t change the fact that often opening attachments or clicking on links—even those sent from addresses you recognize—is fundamentally an act of faith. Yes, many of us could get better at recognizing the indicators of suspicious emails—but email could also give us some stronger indicators to rely on. Email remains a way that the Internet opens us up to the world with all its dangers, and yes, we have to learn some new kinds of cleverness, but it’s also helpful to have some technical protections. So if, someday, we really do succeed at teaching everyone about how easy it is to impersonate other people using email, perhaps we’ll all finally be ready to acknowledge that some technical interventions are long overdue. Perhaps we’d even be willing to accept stricter authentication requirements for the messages we receive with attachment and links, whether that authentication is enforced via digital signatures or verification of the servers associated with the sending domain. Total strangers and unauthenticated users could still email you, but they’d be restricted to text, and they’d have a much harder time pretending to be your father or boss or buddy at the State Department. This article is part of Future Tense, a collaboration among Arizona State University, New America, and Slate. Future Tense explores the ways emerging technologies affect society, policy, and culture. To read more, visit the Future Tense blog and the Future Tense home page. You can also follow us on Twitter.
cc/2020-05/en_middle_0061.json.gz/line1797
__label__wiki
0.507642
0.507642
Nike, Adidas Up in Arms Against Trump's Tariffs on 'Made in China' Shoes The Footwear Distributors and Retailers of America, a trade organisation, has estimated that the increased tariffs on Chinese goods announced by the United States could cost shoe shoppers more than $7 billion each year. Internet Obsessed With Michelle Obama's $4,000 Holographic, Thigh-High Boots (PHOTOS) Everyone says money can’t buy happiness, but check out Michelle Obama’s b*tchin shoes: her glittery gold Balenciaga boots worth almost $4,000 are apparently topping fashionistas’ shopping wish-lists. #GoTransparent Campaign Demands Clothing Brands Come Clean About Supply Chains A coalition of rights groups are calling on the world's apparel and footwear companies to commit to publishing information that will enable advocates, workers and consumers to find out where their products are made - and has published a report on their efforts to universalize transparency standards across the industry.
cc/2020-05/en_middle_0061.json.gz/line1802
__label__cc
0.577232
0.422768
Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow A. Abubakar, A. R. Al-Hashmi, T. Al-Wahaibi, Y. Al-Wahaibi, A. Al-Ajmi, M. Eshrati Oil & Gas Research Center In this study, the influence of a drag-reducing polymer on oil-water flow patterns and pressure gradients was investigated in a downward-inclined pipe (-5°) and compared with the results obtained in a horizontal pipe for the same flow characteristics. Drag reduction was achieved by adding 40. ppm of polymer into an oil-water flow in an acrylic pipe of 0.0306. m ID flowing at 0.1-1.6. m/s mixture velocities and 0.05-0.9 input oil volume fractions. The downward inclination enhanced the mixing of the two phases and hence the boundaries between the dispersed and separated flows occurred at lower mixture velocities in downward flow than in horizontal flow. In both pipe orientations, the addition of the DRP affects the flow patterns and pressure gradients mainly in the water-dominated flow regions. Compared with those of the horizontal flow, the effect of polymer addition on flow pattern boundaries was generally lower at -5° inclination. The effect of the polymer on the pressure gradients was more pronounced at horizontal flow than at -5° flow, resulting in a maximum drag reduction of 64% and 55% at horizontal and -5° flows, respectively. Since the polymer used is water-soluble, there were no observable changes in the flow characteristics at the oil-dominated flow regions. Chemical Engineering Research and Design https://doi.org/10.1016/j.cherd.2015.08.010 Pressure gradient Flow patterns Drag reduction Inclination angle Oil-water Abubakar, A., Al-Hashmi, A. R., Al-Wahaibi, T., Al-Wahaibi, Y., Al-Ajmi, A., & Eshrati, M. (2015). Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow. Chemical Engineering Research and Design, 104, 237-246. https://doi.org/10.1016/j.cherd.2015.08.010 Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow. / Abubakar, A.; Al-Hashmi, A. R.; Al-Wahaibi, T.; Al-Wahaibi, Y.; Al-Ajmi, A.; Eshrati, M. In: Chemical Engineering Research and Design, Vol. 104, 2015, p. 237-246. Abubakar, A, Al-Hashmi, AR, Al-Wahaibi, T, Al-Wahaibi, Y, Al-Ajmi, A & Eshrati, M 2015, 'Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow', Chemical Engineering Research and Design, vol. 104, pp. 237-246. https://doi.org/10.1016/j.cherd.2015.08.010 Abubakar A, Al-Hashmi AR, Al-Wahaibi T, Al-Wahaibi Y, Al-Ajmi A, Eshrati M. Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow. Chemical Engineering Research and Design. 2015;104:237-246. https://doi.org/10.1016/j.cherd.2015.08.010 Abubakar, A. ; Al-Hashmi, A. R. ; Al-Wahaibi, T. ; Al-Wahaibi, Y. ; Al-Ajmi, A. ; Eshrati, M. / Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow. In: Chemical Engineering Research and Design. 2015 ; Vol. 104. pp. 237-246. @article{2e7ebf60476141fea5dd669a455e0f8a, title = "Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow", abstract = "In this study, the influence of a drag-reducing polymer on oil-water flow patterns and pressure gradients was investigated in a downward-inclined pipe (-5°) and compared with the results obtained in a horizontal pipe for the same flow characteristics. Drag reduction was achieved by adding 40. ppm of polymer into an oil-water flow in an acrylic pipe of 0.0306. m ID flowing at 0.1-1.6. m/s mixture velocities and 0.05-0.9 input oil volume fractions. The downward inclination enhanced the mixing of the two phases and hence the boundaries between the dispersed and separated flows occurred at lower mixture velocities in downward flow than in horizontal flow. In both pipe orientations, the addition of the DRP affects the flow patterns and pressure gradients mainly in the water-dominated flow regions. Compared with those of the horizontal flow, the effect of polymer addition on flow pattern boundaries was generally lower at -5° inclination. The effect of the polymer on the pressure gradients was more pronounced at horizontal flow than at -5° flow, resulting in a maximum drag reduction of 64{\%} and 55{\%} at horizontal and -5° flows, respectively. Since the polymer used is water-soluble, there were no observable changes in the flow characteristics at the oil-dominated flow regions.", keywords = "Drag reduction, Flow pattern, Inclination angle, Oil-water, Pressure gradient", author = "A. Abubakar and Al-Hashmi, {A. R.} and T. Al-Wahaibi and Y. Al-Wahaibi and A. Al-Ajmi and M. Eshrati", doi = "10.1016/j.cherd.2015.08.010", journal = "Chemical Engineering Research and Design", publisher = "Institution of Chemical Engineers", T1 - Performance of a drag-reducing polymer in horizontal and downward-inclined oil-water flow AU - Abubakar, A. AU - Al-Hashmi, A. R. AU - Al-Wahaibi, T. AU - Al-Wahaibi, Y. AU - Al-Ajmi, A. AU - Eshrati, M. N2 - In this study, the influence of a drag-reducing polymer on oil-water flow patterns and pressure gradients was investigated in a downward-inclined pipe (-5°) and compared with the results obtained in a horizontal pipe for the same flow characteristics. Drag reduction was achieved by adding 40. ppm of polymer into an oil-water flow in an acrylic pipe of 0.0306. m ID flowing at 0.1-1.6. m/s mixture velocities and 0.05-0.9 input oil volume fractions. The downward inclination enhanced the mixing of the two phases and hence the boundaries between the dispersed and separated flows occurred at lower mixture velocities in downward flow than in horizontal flow. In both pipe orientations, the addition of the DRP affects the flow patterns and pressure gradients mainly in the water-dominated flow regions. Compared with those of the horizontal flow, the effect of polymer addition on flow pattern boundaries was generally lower at -5° inclination. The effect of the polymer on the pressure gradients was more pronounced at horizontal flow than at -5° flow, resulting in a maximum drag reduction of 64% and 55% at horizontal and -5° flows, respectively. Since the polymer used is water-soluble, there were no observable changes in the flow characteristics at the oil-dominated flow regions. AB - In this study, the influence of a drag-reducing polymer on oil-water flow patterns and pressure gradients was investigated in a downward-inclined pipe (-5°) and compared with the results obtained in a horizontal pipe for the same flow characteristics. Drag reduction was achieved by adding 40. ppm of polymer into an oil-water flow in an acrylic pipe of 0.0306. m ID flowing at 0.1-1.6. m/s mixture velocities and 0.05-0.9 input oil volume fractions. The downward inclination enhanced the mixing of the two phases and hence the boundaries between the dispersed and separated flows occurred at lower mixture velocities in downward flow than in horizontal flow. In both pipe orientations, the addition of the DRP affects the flow patterns and pressure gradients mainly in the water-dominated flow regions. Compared with those of the horizontal flow, the effect of polymer addition on flow pattern boundaries was generally lower at -5° inclination. The effect of the polymer on the pressure gradients was more pronounced at horizontal flow than at -5° flow, resulting in a maximum drag reduction of 64% and 55% at horizontal and -5° flows, respectively. Since the polymer used is water-soluble, there were no observable changes in the flow characteristics at the oil-dominated flow regions. KW - Drag reduction KW - Flow pattern KW - Inclination angle KW - Oil-water KW - Pressure gradient U2 - 10.1016/j.cherd.2015.08.010 DO - 10.1016/j.cherd.2015.08.010 JO - Chemical Engineering Research and Design JF - Chemical Engineering Research and Design 10.1016/j.cherd.2015.08.010
cc/2020-05/en_middle_0061.json.gz/line1803
__label__cc
0.55976
0.44024
The Digitization Dilemma By daseger From my perspective, there are two digitization dilemmas inherent in the Peabody Essex Museum’s plan to relocate the Phillips Library outside of Salem, where it was created over a period of 200+ years. The first is my own dilemma: if the PEM had actually made digitization an institutional priority, I certainly would have much less of a leg to stand on (or no leg at all) in my argument that the Library should remain in Salem. The second is theirs: if they had engaged in digitization equal to that of their peer institutions across the country and globe, or even comparable, their relocation–especially as it comes with promises of increased access– would be more palatable. One thing that the public debate over the relocation has made crystal clear is the fact that despite some confusing messaging, the PEM has actually only digitized the catalog of the Phillips collections, and a few additional items, pictured below. Compare the PEM’s online holdings to those of an institution with similar historical materials, the Massachusetts Historical Society, or another regional institution, the Boston Athenaeum. This scant list is not completely representative of Phillips materials online: in partnership, the PEM has enabled more of its collection to be accessible, chiefly with the Congregational Library & Archives and Adam Matthew, a British-based digital publisher of primary source databases for teaching and research. Where there is a partner, there is a way. The materials at the Congregational Library site, including witch trial records digitized previously by the University of Virginia and other records digitized as part of a Digitizing Hidden Collections grant from the Council on Library and Information Resources, are open access, but the materials at Adam Matthew are solidly behind a paywall. This is really unfortunate, because these are truly important Salem sources which constitute part of Adam Matthew’s China, America, and the Pacific database and the entirety of its module on Meiji Japan. Both are wonderful thematic databases, expertly curated, and likely very dear—I wasn’t able to obtain exact pricing information. We don’t have these Adam Matthew products at Salem State, but I was able to get trial access to both databases for the month of January and I dove in. It’s wonderful to have so many Morse materials assembled in one place: Morse was an extraordinary intellectual and person, by all accounts: a naturalist, ethnologist, and director of one of the PEM’s foundation institutions, the Peabody Museum of Science, from 1880 until his death in Salem in 1925. (There’s a wonderful story of Morse’s young colleagues running through and around the Great Salem Fire of 1914 to their mentor’s house on Linden Street, only to find Morse ensconced in his living room, calmly playing a flute). Meiji Japan includes materials drawn from the Phillips’ 55 boxes of Morse papers, including Morse’s famous Japan diaries, correspondence (including letters to and from his colleague Ernest Fenollosa, the Salem-born Japanese Imperial Minister of Fine Arts, whose childhood home is right next door to ours), scrapbooks, and scholarly works. There is a note in the Phillips catalog that This digital resource is available to researchers on Phillips Library computers so I guess we can all troop up to Rowley to see the works of this long-time Salem resident, or perhaps there will be a desktop in Plummer Hall. The very interesting house of Edward Sylvester Morse on Linden Street in Salem; the Account Book of the Thomas Perkins of Salem (pictured above from the Essex Institute’s Old-Time Ships of Salem, 1922) is included in Adam Matthew’s China, America, and Pacific database. Morse is amazing, but I found the China, America, and the Pacific collection captivating, as its sources have been even less accessible and are extremely relevant to, and illustrative of, historiographical trends in world history. My trial is rapidly coming to an end with this database, but we have one at the Salem State University Library for the next month or so, so you can go and see for yourself. Records of several major Salem merchants, including Benjamin Shreve, Samuel Barton, Joseph Peabody, Benjamin Crowninshield, Joseph Bowditch, and Nathaniel Kinsman, are included, encompassing account and log books for myriad Salem ships, including Minerva, the first Salem ship to circumnavigate the globe, Canton, New Hazard, China, Comet, Catherine, Bengal, Mount Vernon, and more. These materials don’t just record trade, they decipher relationships for us, as in the account book of the Minerva’s 1809 voyage to Canton, in which “the captain and his clerk have added detailed remarks about the Canton System and the Hong Kong merchants who they met”. This particular Adam Matthew “product” would be wonderful for my students, and I wish SSU could purchase it, but funds are limited and demands great for all library materials at my public university, just as they are at all public institutions. It seems more than a bit ironic then, that so many of the Phillips materials (including the Tucker, Kinsman, Barton, Shreve, Bowditch and Peabody papers) which are included in the China, America, and the Pacific database were, in fact, processed with public funds from either the National Endowment of the Humanities or the National Historical Publications and Records Commission. I want to be very precise in my presentation of facts as PEM CEO Mr. Dan Monroe has recently complained that those of us who have “virulently criticized” the removal of the Phillips Library from Salem have been “constantly presenting false information to the public”: the PEM has licensed historical materials donated by Salem families and processed with Federal funds to a commercial academic database, and if I want my Salem students to be able to access these materials (after our trial run is over) we will have to pay for the privilege. This entry was posted on Thursday, January 25th, 2018 at 9:04 am and tagged with China trade, Digital History, Edward Sylvester Morse, Ernest Fenollosa, Libraries, Local Events, Peabody Essex Museum, Phillips Library, Salem State University, Teaching and posted in Current Events, History, Salem. You can follow any responses to this entry through the RSS 2.0 feed. « A Thin Veneer of Heritage Curtain Lectures » 19 responses to “The Digitization Dilemma” dccarletonjr Another excellent post. Let us see what the NHPRC has to say about the materials licensed through Adam Matthew. Maybe the in-library terminal access was deemed sufficient in terms of public accessibility at the time the NHPRC funding was approved, but one has to wonder whether even that limited option can be considered operable in terms of the collecton’s current closure. daseger Yes I am looking forward to hearing what the NHPRC has to say. greenheron628 John nailed the PEM/Phillips situation from a scholarly point of view. I’ve also had a close-up view of the ways museums have changed. My former husband was curator at a major Boston art museum at the time I was a grad student at the school attached to the MFA. Those museums then and now have undergone radical changes, are nearly unrecognizable versions of their former entities. Isabella Gardner’s will stipulated that any additions not exceed the square footage of her house. We know how well that went. I look out my office window now at the results: her house dwarfed by an addition two thirds larger in scale. The PEM is no different. When I moved here in 1990, PEM was a quaint, provincial museum that exhibited Chinese porcelain. After the merger, the mission changed to the establishment of a top tier world class art museum. Some residents may not understand what that means, or realize that it has already happened. Imagine MoMA or the Getty on the Essex walking mall, because that’s what we have now, done quietly, with a low profile and no transparency. Did anyone know about either of the new wings before they were announced? Were residents asked for their input, feedback, and suggestions? Top tier world class museums are juggernauts. They steamroll and they get what they want. They tend to have, um, colorful directors. Perhaps people remember how at one point during the Liberty Street broohaha, PEM threatened to pick up their big ball and go elsewhere. They showed no allegiance to Salem. It was a viable location, not their home. They’d begun to build their reputation here, but if the climate and politics weren’t conducive, they’d move their game. Salem offered a blank slate, no other museums, a mayor who sought to attract business and fill empty storefronts, residents who demanded a more vibrant attractive town. It happened. We have an exciting culture here now, which includes the arts. When I moved here there was no reason to go downtown at night, now there are too many. Word got out and people–many of them young–left Boston to move to Salem. Like the PEM, we’re becoming world class. All art museums have massive volumes of work in their collections, more than ever could be exhibited. Storage is a huge problem, finding the space, covering costs. The PEM is shedding the Phillips Library because it is viewed as a burden in the pursuit of their major art museum goals. In their view, local consternation and protest is an inevitable but acceptable consequence. Expect more decisions like this one. Their historic houses will be addressed similarly in the coming years. Once the new wing opens, our city will change in ways residents cannot now imagine. One can be certain that the mayor quietly nods her head to PEM’s decisions, as she did to this one. Her mission and theirs are the same. A public demand to digitize the collection, to make it freely available to all residents, is a realistic hope. The PEM is grossly behind other museums in this regard. For years I have been able to show my students jewels from the vast Harvard art collection at a click on my laptop, in high resolution, every single page of every one of John Singer Sargent’s sketchbooks. It’s infuriating for us and embarrassing for them to be in such museum digital dark ages. Focus and effort could be productive here, in ways that demands to keep the collection in Salem will not. I apologize that this runs long. I am not a member of Facebook. Publish or not, that’s fine. In stating a different point of view than my neighbors, some will see me as a disruptor, an enemy, as they did John Grimes, who spoke truth and reality. Change is hard. Loss is hard. This both. Suzanne offers a very astute analysis in terms of how the museum business has evolved in the past couple of decades, but her analysis misses a major point: PEM has obligations to the community which gave it life and in which it operates. Were it strictly an independent private actor, PEM’s leadership would have every right to make all the decisions they believe are necessary for the institution to thrive and survive without any outside consultation whatsoever. But like all nonprofits, PEM is NOT a strictly independent actor: it is an NGO enjoying tax-exempt status and other governmental benefits in exchange for the public “goods” it is expected and assumed to be providing. Not only does the PEM enjoy indirect public support through tax exemption, including exemption from local property taxes, in operating the Phillips Library it has assumed a particular public service role in the community: over the generations, the Phillips has come to serve as Salem’s de facto archives. The Phillips, not least because its collections do include some public and quasi-public records, is not just some private proprietary library that can simply “up stakes” on the whims of its leadership. It’s fate and future are matters in which the broader community has a legitimate stake. And it is the failure of PEM’s leadership to understand–or to try in any sense to meaningfully address–the “community responsibility” element of its overall mission that is at the core of the current controversy. Thank you for your excellent comments, Suzanne–not coming from the museum world myself, I am very interested in your views as well as those of John Grimes. While I have a very passionate point of view on the particular issue of the Phillips, I have strove throughout this crisis (and that’s how I view it) to present the positive points of PEM, as I feel there are many, but the leadership is determined to demonize any opposition, I fear. Two points that you have presented here are my worst fear: the “shedding” of the Phillips (that is exactly what it feels like to me) and perhaps the houses! I have also been continually surprised to see how……backward the PEM is in terms of all digital endeavors. While they have digitized the Phillips catalog they apparently do not have a digitized catalog of the objects? No integrated catalog will be possible, then, as Philcat is exclusively-library-focused? It just looks to me, who knows next-to-nothing about how museums run, that the focus has been all external to the detriment of the internal. I hope you can comment again! dcarleton, PEM says they have fulfilled their public obligation to the library collection. Their position is that they rescued it from a building that presents a danger, is not up to code, prevents proper stewardship and conservation. It has been responsibly moved to a safe state of the art climate controlled situation, where the collection will be available to the public (in Rowley). PEM butt, fully covered. If the PEM was a private institution, the library collection would have been sold or turfed to another institution years ago. In his comments to the Boston Globe, PEM’s director stated his perspective quite clearly. What Salem residents want is of little importance or consequence. To assume or demand input is not to know our place. Donna, I do feel that the houses are destined for some big changes, although probably not until the current controversy cools. PEM restored the Ropes and seems to view that as enough bone. The houses, like the library, don’t fit the world class art museum model. PEM has an opportunity to establish themselves as a unique cutting edge art institution if they could find a creative solution to the houses, but I suspect they don’t have the foresight or imagination, and clearly, they are unwilling to dedicate the finances. The houses divert a huge amount of PEM dollars and do not support the museum’s vision and agenda for art.The Ropes might be all we get. Good thing that historic houses cannot be packed up and shipped to Rowley. One doesn’t need a knowledge of museums to read the writing on the wall, written in display scale type. As both an artist and a Salem resident, naturally my feelings are mixed. The caliber of many PEM exhibits surpass even MFA offerings–MFA has vied for exhibits that went to the PEM. Patrick Dougherty, who created the stickworks is a huge deal in the art world. It was a treat to have a major piece by him in our own yard. I commented earlier on how I felt about Georgia O’Keeffe. I’ve been twice already and will go again. Same with the Rodin. For me, PEM is a lovely beast, a force and a celebration of beauty. But what about all these dresses and shoes, Suzanne? And are you looking forward to Play Time? Car wash brushes in Salem’s sacred hall? And also: you should know that there are extant architectural studies and plans for the the perfect renovation of the historical Phillips Library buildings, to accommodate all concerns of preservation and accomodation. Let’s dispense with the fiction. Whether “What Salem residents want is of little importance or consequence” as regards the fate of the Phillips collections is something yet to be determined, I think. Certainly the question of the disposition of public-origin materials held by PEM like the Essex County probate records will be of interest to the Secretary of the Commonwealth and perhaps the Attorney General as well. Where the actual bounds of management’s freedom of action lie in this matter is something to be litigated–metaphorically, in the court of public opinion–not to mention literally, in terms of legal actions that may yet be taken. Lara Favaretto….she’s an Italian artist with an impressive exhibit record currently receiving international attention, recently exhibited at MoMA. I’ve read about her work, but have never experienced a piece in person, and yes, I’m excited to see it! It’s easy to laugh at the work when taken out of context, i.e. it’s just some car wash brushes. One needs to approach it with an open curious mind to pick up the content. Art is all about irony and metaphor. Favaretto’s work explores the momentary, which requires a viewer to experience it in the moment. PEM exhibition designers and curators do an excellent job of explaining work to an audience who might not arrive informed. That happened to me with the monster movie posters. I knew nothing about the genre, thought I had no interest, then went, and really enjoyed it. Monster movie posters 🙂 I also loved the shoes! The birds and guitars. The wearable art–went twice, the pix are on my phone. These exhibits are about culture, something that many museums have been offering up in the past decade or so to attract audiences not necessarily informed or interested in art, like the famous Chinery guitar collection exhibit at the MFA and the Alexander McQueen at the Met, which btw, was held over for months by intense popular demand, lines around the block two and three times. Blockbuster exhibits garner a ton of press and make piles of money for the institutions. While I averted my eyes when the America’s cup yacht was stuck into the ground in the front yard of the MFA for six months, museums seek to attract new and broader audiences, reeling them in with a culture exhibit and exposing them to their collection in the process. The role of museums in art stewardship and exhibition has been a hot topic in the art world for some time, but that’s beyond the scope of a blog comment. It’s not about whether Salem residents approve or don’t approve of the art. Making fun is a way to vent, and that’s understandable, when people feel angry and unheard, but it’s tangential to the primary wound, the shedding, the removal, the loss. It’s hard to see friends and neighbors upset, and I’m upset too, but the Phillips collection won’t be coming back, no matter how much noise gets made. Well, you may be right, but as a historian I feel the responsibility to make a lot of noise about the loss, not only because I believe it is wrong for an institution to tear out the archival guts of a city, but also to document what’s happening. Then that’s what you must do. To be most productive in your efforts, I’d encourage you to press for the digitization. The museum is aware that they are monumentally behind other museums, lesser museums, in this regard and there’s ground to be gained there. Not sure you realize that the decision to move the Phillips was made multiple years ago with the mayor’s full support, and that she will support future decisions along these lines. You might consider expending energy on what is being decided and planned behind the big closed doors right now, the houses for example. The handwriting is there, we can read it, and have been shown that PEM approach decision-making is calculated, callous, and opaque. Laying the groundwork now in preparation for the houses decision is a good idea, because chances are good they have something in the planning stages already. Wanted to add, I’ve appreciated the civility of our discussion. I find myself in a hard place with Salem friends, as an arts professional, often falling off the fence onto the PEM side. I wish it wasn’t so, that Salem residents and PEM could be without a fence, but the fence is growing as the PEM grows and will only continue to do so. In the meantime, I’d encourage you to go to the Lara Favaretto installation without expectations, and see what you think 🙂 I don’t realize that the decision was made to move the Phillips years ago with the Mayor’s support; this is certainly not what the Mayor herself says. Greenheron, I think many of us have had a hard time grasping how Mayor Driscoll could have been as caught unawares by PEM’s Rowley gambit as she has publicly represented. But the fact of the matter is that the Mayor has indeed said she was caught by surprise. So I doubt that I am alone in wondering the source of your knowledge that she is prevaricating! As regards the fate of PEM’s architectural collection, if you are aware of what is “going on behind closed doors right now” it might be a community service to enlighten all of us as to what is indeed transpiring…I see from their blog that they’ve contracted for new research on the Ward House, which is at least one ray of hope. Donna, two years ago the PEM began enacting this move. At some point, the mayor had to have given a nod. It would be nice to think she was blindsided like everyone else, but politics don’t work that way. PEM growth is all tied up with Salem growth, and the PEM is much bigger than Salem residents seem to understand. I wish you luck on your endeavors though. I do think there is reason for hope with the digitization demands. Well I might be naive but I prefer to have confidence in all of Salem’s elected officials at this point–all of whom have issued statements in support of the return of the Phillips materials. Certainly the PEM was looking for a large facility for its collections center a few years ago, and the Mayor was aware of this search, but at that time I believe it was for only the objects and not the library materials. dccarletonjr, no insider info, only a general working knowledge of museums as an artist/art professor, close museum observation, particularly in NYC/Boston for over four decades, alumna of the school run by the MFA, museum people friends, and a museum curator’s ex wife 🙂 Re: the houses. Given PEM’s low level of commitment to the Salem community, the quiet forceful way PEM moves forward, their stated goal as a top tier art museum to be a trendsetter in exhibition practice, their lack of priority regarding the library, the historic houses seem vulnerable in that light, don’t they? Perhaps I’m wrong, I’d love to be wrong, but if they considered the houses as valuable assets, wouldn’t you expect them to be giving them more love? The changes that are coming with the new PEM wing/expansion will be monumental. We all might want to prepare for that. Although I don’t know exactly what is going on behind the closed doors, I’m certain that big things definitely are going on there. Donna, naive is more admirable than jaded. Yet, like me, you got an email out of the blue last week saying that your health insurance options would radically diminish in July. For five years, I’ve noticed how my Tufts plan benefits were diminishing, so this news came as no surprise. Even with the inevitable ensuing broohaha, I still am switching to Uni. Jaded is why. shortb February 1st, 2018 at 11:31 am Hello Donna, Just a quick note, your link to ” the Congregational Library & Archives” in this post doesn’t appear to be working. Thanks—-will fix! Streets of Salem: Somewhat random but still timely posts about culture, history, and the material environment, from the perspectives of academia, Salem and beyond. Donna Seger Teaching with Tentacles German Witches Witches and Trees The Medieval World The Hustling Hathorne Sisters Salem's "Japanese House" Definitive Duels Columbus and the Guinea Pig An Historian Goes to the Movies BiblioOdyssey gardenhistorygirl Goat Anyone? Historic House Blog Into the Forest Dark Lost Past Remembered Material Histories Moving in Time Mrs. Daffodil Digresses Our Looney Barn Res Obscura Stories from Ipswich and the North Shore The 1640s Picturebook The Beehive The Collation The Down East Dilettante The Essex Street Irregulars The Front Door Project British Printed Images to 1700 Creative North Shore Destination Salem Historic New England Historic Salem, Inc. Library of Congress Digital Collections London Shh New York Public Library Digital Gallery Preservation Massachusetts Salem City Guide Salem State University History Department Sexy Codicology Sheaff Ephemera The Curated Object The History List advertising Antiques and Collectibles Architecture Art Auctions books Chestnut Street Commemoration Commemorations Culture Decorative Arts design England ephemera Exhibitions Fashion Flora and Fauna Food and drink Garden Gardens Graphic Design great houses Historic Preservation holidays Home horticulture illustration Interiors Local Events Massachusetts New England Peabody Essex Museum Phillips Library Photography Popular Culture Pottery print culture Renaissance Salem witch trials Samuel McIntire Shopping Teaching urban planning weather Witch City View Donna Amelia Vinson Seger’s profile on Facebook View @daseger’s profile on Twitter View donnaseger7’s profile on Instagram View daseger’s profile on Pinterest View daseger’s profile on WordPress.org I always attribute the images that I use in my blog; if you are going to copy them, please do so as well.
cc/2020-05/en_middle_0061.json.gz/line1805
__label__wiki
0.5567
0.5567
Tickets Tickets Mijn Strong Viking Training & Voeding 5 Fun-facts you might not know about Vikings! Here are 5 fun facts about the Vikings that you probably didn’t know. 1. Use of onion soup for medical reasons Vikings are known as one of the most innovative tribe in human history with great solutions for the simplest things of their time, also when it came to medicine. When a wounded Viking warrior came back from battle, the Vikings in the village would give him/her very strong onion soup. After a few minutes a person of the tribe would smell the wound of the warrior very closely to check if they could detect the smell of the onion. If so, it meant that the abdominal wound was serious and deep enough that death was inevitable. 2. You (likely) carry a Viking symbols with you every day! You’ve probably never noticed this before, but it’s very likely that you’re using a Viking symbol in your everyday life since the rise of smartphones. Over 1000 years ago, around the year 958, there was a Viking king called Harald Bluetooth (ca. 910-986). He ruled over all tribes in Denmark and managed to conquer parts of Norway, where he succeeded in making several mutually contending tribes unite and communicate with each other. Jim Kardach, who developed the technology behind Bluetooth that we use today, was reading the book ‘The Long Ships’ during its development and decided to name his technology in honour of the famous Danish king. For the logo he took the initials of King Harald Bluetooth and combined them into the well-known logo that is used for wireless connections in telephones and many other devices. 3. The days of the week are named after Viking Gods In addition to the use of Viking symbols, you’re also using Viking terms/names daily, most likely without knowing it! That’s because our days of the week (in English) are named after several gods that were worshipped by the Vikings. Sunday and Monday are named after the Sun and the Moon, Tuesday after Tyr who was the god of war. Wednesday (Woden’s Day) is named after the king of the Viking gods: Odin, also known as Woden. Thursday is named after Thor, the Norse god of thunder. And also, most people’s favourite day of the week, Friday gets its from Freya (Frigg), who was the goddess of love and marriage. The only day of the week that’s not directly named after a Norse god is Saturday which gets its name from Saturn, an old Roman god. 4. Christopher Columbus wasn’t the first to discover America At school you’re taught that the man who discovered America was the Italian explorer Christopher Columbus. However, this fact isn’t entirely true. There’s a saga from the Greenlanders supporting the proof that the Vikings found America ‘by accident’ when a trader went on a trip to Iceland around the year 896. The lost trader ended up near the land ‘covered with forests’, when he turned around a successfully found his way home. Later, in the year 1.000 the saga of the lost trader inspired Leif Eriksson, an Icelandic explorer, to buy a boat and explore the unknown. If the rest of the legend is true, Eriksson landed on the coast of Canada 500 years before Columbus set a foot on American ground. Nowadays, there is a substantial amount of evidence that confirm this ‘saga’. As real Viking fans, we of course support this theory, what are your thoughts? 5. Vikings liked to Ski for fun Roughly 6000 years ago, the Scandinavian Vikings developed their own version of skis and used them for hunting, traveling and sometimes also for entertainment. They even had a god of skiing, who was named Ullr. Kings and high lords indulged in skiing for entertainment, and sometimes had competitions where the best skiers could win prizes. Do you have more fun facts that you want to share with us? Let us know! Strongviking.com maakt gebruik van cookies om je een goedwerkende site aan te bieden en onze communicatie zo relevant mogelijk aan te bieden. Door verder te zeilen op onze website ga je akkoord met onze voorwaarden welkehierte lezen zijn.
cc/2020-05/en_middle_0061.json.gz/line1807
__label__cc
0.724882
0.275118
Archive for the ‘Random Images’ Category Posted in clouds, history, landscape, projects, Random Images, Rural Art, tagged 2013, art, cumbria, environmental art, heritage, installation, landscape, Lindisfarne, manley, north pennines, photography, radar, red, rural, sculpture, walking, weather on December 30, 2013| 2 Comments » There’s a TV station dedicated to weather. You can have weather on your TV 24 hours a day. Imagine that! 24 hours of non-stop weather… Alternatively you can live in the North Pennines – there’s more weather here than you can shake a stick at. Why anyone would want to shake a stick at the weather and what they thought it would achieve is beyond me. As an artist working predominantly outdoors all year, the weather is a pretty major thing for me. Besides knowing if I’m going to get frozen or soaked all day, there’s the practical challenges of making sure the weather doesn’t prematurely destroy what I create, or make them dangerously unstable for visitors. There’s been a fair bit of stormy weather here n the UK over the past month. It seems that there’s an unusually large number of these storms heading off the Atlantic for the time of year. Last week, as my house was being battered by winds in excess of 80mph the weather station on Great Dun Fell recorded gusts of over 120mph. The weather was calmer yesterday as I set off up to explore Great Dun Fell for myself. Despite living overlooking the Eden Valley I’d never walked up any of the North Pennine Fells on that side so this was a first for me. Great Dun Fell, at 849m (over 2,700 feet) is the second highest peak on the Pennines after Cross Fell and are the largest mountains in England outside the Lake District. It was a reasonable day in the Eden Valley as I set off from the village of Knock, skirting around the back of Dufton Pike. Walking these fells is much easier than the Breadalbane hills I’d been doing in the Highlands lately. The footpaths are well marked and the main Pennine Way itself is well trodden and maintained. However, by the time I reached Knock Old Man (2,0o0ft) there was a good smattering of snow on the ground and some beautiful rime on the cairn. From there it’s a straight line over the top to Great Dun Fell and with the cloud cover lifted it’s easy to see where you’re heading. There are dozens of weather stations across the UK and you can track their readings live online at any number of sites. However, Great Dun Fell is a bit special. The readings now come from the radar station – the giant white golfball on the fells that’s a bit f a landmark from both the Eden Valley and Upper Teesdale. Back in 1937 George Manley set up the first mountain meteorological record station in a small wooden hut on Great Dun Fell. That spot of the North Pennines was chosen as this tract of Pennine hills has the most variation of weather in England. When he started his collection of weather data in 1932 he noted: “I was attracted by the Northern Pennines, in particular around Cross Fell, as the most extensive area of bleak uncompromising upland that England possesses” For ten years Manley’s weather station recorded sun, rain, wind and temperature data every three hours, 24hours a day – at the time the longest continuous weather record ever made. As well as a substantial record of mountain weather data, his station also led to the understanding of the ‘Helm Wind’ – a wind phenomena that only occurs around Cross Fell where violent, roaring winds appear to come from nowhere, even on otherwise fair days. In his research into historical records of the Helm wind there are some great accounts of sheep being tossed around like balls of cotton wool, and brussels sprouts blown off the stalks and ricocheting around the gardens. The legacy of Manley’s work 849m up Great Dun Fell was the CET (Central England Temperature) – a record of mean temperatures going back to 1649 – the longest weather record in the world. So when the weathermen say it’s the coldest March on record – that’s Manley’s record, started on the North Pennines in the 1930’s. More importantly the length and depth of the weather record is at the centre of ongoing research into climate change – the Moor House National Nature Reserve, in which Great Dun Fell lies, plays a crucial role in that research today. Nothing remains of Manley’s wooden hut now. It’s all long gone when the radar station was built in the ’80’s. What does remain though is the access road to the radar station. Once a track for the myriad of mineral mines on the high fells, it’s now a tarmac’d road and officially the highest road in the UK. It’s also the only road in the UK that goes up a mountain and stops at the top. Unfortunately it’s a private access road so you can’t really drive it. The height of the snow poles show just how deep the snow gets up here anyway. This past year has definitely been a year of walking for me. I’ve always enjoyed walking but never considered myself a serious walker. I still don’t, but this year walking the landscape has been pretty central to my work. Back in January I started a research residency on the West Pennine Moors. The first day’s walk caught the tail end of the January snowfall up on Darwen Moor with snow up to my knees. Deserted farm on West Pennine Moors February was a fantastic lull in the weather with some great long spells of clear, dry and often sunny weather and I got some great walks in over those moors and rediscovered my love of wandering with a camera. The project finished at the end of March just as the worst of the winter weather hit and I was cut off for days behind 12ft drifts. dragging coal to my house over a 12ft drift. Photo by Paul Kingston © North News 2013 However, by April the weather turned again and started a period of dry, hot and sunny days that seemed to last for most of the rest of the year. The end of April was the start of a joint project around ‘God’s Bridge’ on Bowes Moor. Besides being a great project for meeting other artists, it really got me out exploring my home turf – the North Pennines. The result of this project will be an indoor sound installation at the Bowes Museum in Barnard Castle in the spring. Mountain Pansy on Bowes Moor By June, summer was in full flow and positively roasting when the sun got going. I’d anticipated a wet week installing the 20,000 jars of ink on Lindisfarne and the workstation was all set up under cover for the purpose. Although it rained only on the day the TV came day the rest of the show was glorious sunshine with sunburn and heat stroke the major hazards when it came to take the piece down. I spent the end of September on Öland in the Baltic sea creating a piece for an ancient forest. Once again the weather gods were on my side and gave me a fortnight of glorious late summer sunshine. The weather was turning however and by the second week the temperature had dropped significantly. The Pavilion for Listening to the Forest was the first piece I’ve made specifically to survive significant snowfall. The fabric is waterproof and under enough tension that rain or snow won’t pool on the surface. It should also have enough tensile strength to withstand a large amount of snow if any manages to settle on it. December had a brief snowfall in Southern Sweden so I know it’s still looking good, but can’t wait to see how it looks when the real stuff arrives. The last part of the year has been spent in Loch Lomond and the Trossachs National Park, Scotland where I’ve been artist in residence since October. Once again it’s been great to get to know and understand the landscape on foot – walking along lochs and old railway lines as well as up some of the bigger hills. In November I had a weather window of bright and clear conditions and managed to get up some of the less visited Corbetts (between 750 and 900m). The frosty air on the tops made for some cracking views of the surrounding mountains with the bigger ones getting their first real coats of snow. In early December the first of the storms to hit the UK came racing across Scotland. Glen Ogle – where I was staying, recorded gusts of 106mph, ripping down power-lines and felling hundreds if not thousands of trees which disrupted the area for days. Yet, less than 12 hours after those huge gusts, there was a gentle covering of snow on Glen Ogle and a clear,starry sky. With no power for miles and a dark cottage for the evening, I ventured out into the forests to play with some lights in the snow for my Christmas card. In between all these projects I also created the ultimate version of the ‘Souvenir’ umbrella structures in Oxfordshire, built an installation from 4,000 remembrance poppies for a royal visit and worked on four other pieces that in the end never happened. It’s also been a year of research and development, not only for new work but professionally too. It’s not been my busiest year and at times things have been very difficult. However, the time I’ve been able to give to each of the projects I’ve worked on I think shows in the final work and has made a year of good solid pieces. A lot of work has already been done for next years projects and hopefully sets a trend towards a more considered approach to my work. I’ve got a good feeling about next year. It’s already looking busy – possibly the busiest its been for years. It’s going to be full on and really hard work. There’s some great stuff coming up – all will be revealed over the coming few weeks – and it’s all really exciting, but the proof will be if this time next year I can look back and be as proud of what I’ve achieved as have have been of this past year. Au + Ag Posted in history, landscape, Random Images, tagged art, landscape, north pennines, photography, rural on May 28, 2013| 3 Comments » It was another gorgeous day out yesterday, so with it being the weekend and all that I decided to go out exploring again. This time it was a walk along Baldersdale and up Goldsborough – the sister hill to Shacklesborough where I’d been a few weeks ago. It’s not as high as Shacklesborough, but the view from the top is arguably much more dramatic. You get the whole sweep of the Baldersdale reservoirs and right round into Teesdale, over to Barnard Castle, and it being so clear yesterday, beyond to Darlington. The loneliness of Cotherstone moor follows the final sweep round to Shacklesborough again on the horizon. No wonder the bronze-age folk liked it so much they built things up there – stone circles, chambered cairns etc. All long gone now. The Millstone grits are impressive too. Big hulking chunks of grey with it old-age wrinkles and dramatic overhangs. A climbers dream, and in the late afternoon light they looked good on camera too. The textures of the rock against the clear sky would look good in black and white I thought. I also wanted to try out a new toy I’d found online for recreating black and white film. During the week I’d read an interview with Sebastião Salgado -one of the great monochrome reportage photographers. In it he lamented the demise of all the wonderful film, papers and chemistry he used to use to achieve his incredible images. However, he siad he now used the software from DxO labs to recreate the classic Kodak Tri-X look from digital files. Well, if it’s good enough for Salgado, it ought to be worth a try. Photo © Sebastião Salgado/Amazonas Back in the late eighties I used to work in a professional photographic lab in central London. It was a specialist black and white lab and at the time it was one of dozens of specialist labs all over the West End and the City. My department was film processing. It became my domain – processing hundreds of rolls of film for London’s advertising and PR photographers. Each type of film had its own process. Most of the film was developed in a big ‘dip’n dunk’ processor in Ilford ID11 developer. Different development and fixing times were given to different types of film, and we could also ‘push’ and ‘pull’ film stock up to 3 stops. On top of that I also used to do bespoke processing in a variety of other developers. There were dozens of film types and dozens of developers. The combinations were almost endless. Each film and developer combination would have their own characteristics. I really loved using Ilford HP5 for my own work, so I tended to keep the main processing set-up for really wide tonal scale and fine grain resolution on that. All monitored daily on a densitometer so that it was consistant from day to day. my old darkroom in London This attention to detail was important. These things mattered. Every photographer would have their film of choice and we’d work with them to get a bespoke process which gave them the final look they were after. No professional photographer would just use any old roll of film and expect to get consistant results. the wetbench and some of the chemistry in my old darkroom In time I also used to do bespoke printing jobs which needed particular paper and chemistry combinations. While the bulk of the work in the darkrooms was on resin-coated paper and developed in machines for speed and accuracy, I had a wet-bench and got to play with fibre-based paper and all sorts of toning processes. My favourite was split toning Agfa Record Rapid in Selenium toner. With a slightly stronger dilution you could part-tone prints where the selenium would act on the shadows first, and you snatched it out at the right moment to get rich purple mid-tones, deep blacks and cool highlights. It took a lot of skill and know-how to pull off with any certainty. I guess you could call it craftsmanship. Most of those black and white films have disappeared now. Almost all the paper varieties have gone too, so there’s simply no way to do that stuff anymore. It’s mostly lost knowledge. Digital imaging is pretty ubiquitous now. It’s point and shoot lots, edit later. The forethought and preparation are gone. There’s no film stock to choose – checking all the rolls are the same batch to ensure consistency across the whole shoot. No clip-testing film at the processing stage to tweak the image brightness and contrast. That, along with peeling polaroids is in the past (alongside lunar landings and supersonic passenger flight). some left over film – basically the stuff I never used very often Still, the digital workflow is slowly opening up some of that finesse again. The DxO software does a really good job of replicating most of the workhorse film emulsions. It’s a bit like instagram, but with intelligence I can now make my Pennine landscapes look as if they were shot on Tri-X. The extra contrast and sharp grain is all there, just like the original. Street shots can look like they were done on HP5 – a bit softer both in contrast and grain holding plenty of shadow detail. There’s a richness in the overall tonality which seems to lift it from the standard monochrome transformation. At least on screen they look a lot like film, and as most of the time they’ll only be seen on screen, that’s good enough for me. It’s good to use a bit of that knowledge again. I’m not sure most people could tell the difference – it’s fairly subtle, but to me it’s important. The other little bit of digital kit I got recently was a film scanning attachment for my iPhone. It’s a series of stacking boxes with a built-in light-box and a tidy little app which allows you to scan your negs or slides at the touch of the screen. There’s a handful of built-in presets which help manage the colour from popular colour neg film stock. It’s not brilliant quality – you are photographing through a tiny plastic lens onto a teeny sensor, but it’s a great way to evaluate negs, and is OK for web-use. one of thousands of contact sheets I have thousands of rolls of negatives filed in a big cabinet. I used to meticulously label every sheet and attach a contact sheet to each page so I knew what was on each. However, a few dozen seem to have slipped through the net and I had rolls of negs which for one reason or another had never been printed, let alone seen as positives. It was great seeing these photos for first time after sitting unseen for years. Although a bit clunky, a bit soft and low-res, the iPhone previews at least give a fair idea of the potential of each frame. There’s a couple of rolls of the Berlin Wall coming down… Last bit of wall in the West boy in East Berlin with his shrapnel collection …and I’d completely forgotten about the rolls I shot of hand-made signs during the Foot and Mouth outbreak in 2001. At some point I’ll get to printing these properly – paper and wet chemicals of course. But the thing that they made me think about, which is why I’m writing this post, is that those two sets bring home the real purpose of photography. That of capturing a moment in time.Those are both historic moments in their own rights, but smaller than that, each image is a minute moment in time of a larger culmulative moment. My digital files now tell me what that moment in time is. The gritstone pics on Goldsborough were just 1/640th of a second. That’s faster than the bink of an eye. A really really small moment in time in comparison to a day, a lifetime even. In contrast, the gritstones took millions of years to build up. The geology of the landscape is a snapshot lasting epochs. I guess where I’m ending up today is thinking about the relative time of moments and capturing those moments. Can the time of photography say anything about the time of geology? spreading the love Posted in landscape, projects, Random Images, tagged art, christmas, cumbria, durham, fairies, julia margaret cameron, Kurt Schwitters, landscape, north pennines, paper, photography, red, snow, storm studios, yorkshire on December 30, 2012| 1 Comment » The tree is up in the living room, there’s a fire roaring in the grate and strictly come dancing is on the telly. It must be that time of year again. There’s something reasurring about a big holiday festival this time of year. There’s nothing like it for slowing down and taking stock of the past year (more of that next time). It’s also the time of year I like to give a big thankyou to all those people who have supported me in their various ways throughout the past year, and look forward to forging new partnerships in the coming year. Every year I do a crimbo card for the select few just for this purpose. Each year I try to do something while not blatantly Christmassy but seasonal, and frequently echoes something I particularly enjoyed doing over the past year. Back in 1997 the Independent ran a 3/4 page article on some of my cards (I remember underneath was a preview of a show by an up-coming artist called Martin Creed – I wonder what became of him?…). It’s not a new idea and certainly not an original one. I’m not sure where I first got the idea from to do an annual piece, but plenty of artists and designers do their own every year. There was a section in Thomas Heatherwick’s V&A show this year all about his own cards – each a thing of beauty. Christmas Card by Thomas Heatherwick For the first dozen or so years’ my cards were hand-printed in the darkroom and either hand-coloured, chemically toned or printed on liquid photographic emulsion on random paper. this one speaks for itself – again this was done in a wet darkroom and not in photoshop. More recent images have been more colourful: The year before was red too – shot just outside my back door one January. It’s not always snow – this one on a frosty sunbiggin tarn in the Eden Valley This one a montage in the Yorkshire Dales (again, done the hard way without photoshop). This year I had been looking forward to doing something large and spectacular for the cards, however as the year moved on I still hadn’t got the technology working how I wanted it to, so that idea will have to wait another year. So at the last minute, after doing some frantic head scratching I figured I could do something white. We’d had a bit of snow early on in December, but that had largely caught me out and I spent most of it working out how best to get up my track and get work done, than thinking creatively with it. With a change n the weather, there was forecast a couple of freezing nights with some early mist or fog. What I was hoping for was that wonderful thing when the overnight moisture freezes on every surface turning the landscape a cryslaine white. I would then create a piece made from hundreds of white balloons – much like the red piece I’d done earlier in Sweden, and shoot it low with a disappearing perspective in the background – maybe a track or even a sheep path. Something quite still and quiet. Maybe a little surreal, like a Storm Thorgerson album cover type thing. A quick trip over to Darlington netted a hundred or so balloons – I’m sorry if you were after any that day, but I bought the last from every shop and market stall that had any. As the planned shot would be done at first light, and I’d have to move fast as the frost can melt quickly if the sun comes out, I spent the night before blowing up all the balloons. It wasn’t until the morning that I realised I couldn’t fit them all in the car, so had to make do with a much smaller piece. However, despite all my planning and preparation, the weather didn’t do what I’d hoped it would, instead there was a light frost up i the hills above an inversion cloud just below. Ordinarily this would be quite stunning, but the cloud was rising fast and the inversion wasn’t stable enough. My only hope was to get a nice bit of atmospheric moorland disappearing into the murk and cloud so I headed up to the Cumbria / Durham border in Teesdale. The North Pennines are a severe border. The western side influenced by the wet Atlantic weather fronts, to the east the much drier but colder north sea systems. And so right on top of the border on the Teesdale side, the snow was still lying thick and white over large swathes of wilderness landscape. Where the rain had thawed and washed the snow away in Cumbria days before, the eastern side had remained dry and cold, the snow now frozen solid and the sky as clear as a bell and bright blue. I must have spent a good couple of hours walking across that frozen wasteland shooting hundreds of pictures. The snow was so solid in parts I could position everything with ease as I left no footprints. And so, here it is. A study in white. the after art Posted in architecture, history, projects, Random Images, Rural Art on November 30, 2011| 1 Comment » The other week I finished installing a number of pieces at a school in Cumbria. Three pieces were linked in a linear way through a part of the school to explore the path of learning. The line started with a giant mirror polished into the bank of lockers and ends with a display theatre made from 3,000 red pencils. It was as always, good fun to do stuff like this. However, the biggest challenge was the permanence of the pieces. A school is not the most conducive of venues for art installations at the best of times, and especially challenging for me as most of my work relies on being temporary. As I’ve written about in previous posts, most of my large-scale pieces are only ever up for 16 days or less. The benefits of this are both logistical – they don’t need planning permission for a start – but also allow me to make pieces with the delicacy and fragility you can’t get in permanent pieces. The downside to working with short-term projects is what to do with stuff afterwards. These can be enormous pieces – some measured in miles. Were they just to lounge around in my studio afterwards I ‘d very rapidly run out of room to make new pieces. There’s also the issue I’m uncomfortable with creating more stuff for the sake of art. The world’s resources are finite, and I’m not sure that artists creating stuff is really helping. So, when designing new pieces I build in a plan of what to do with it when it’s all over. Back in the winter of 2009 / 2010, I created one of my favourite pieces to date: ‘Clad’. A derelict 18th century Welsh cottage was covered in the fleeces of two of the local sheep breeds to recreate the black and white timber frame so typical of the area. Around 300 raw fleeces were used in the piece. A chunk was provided by the Wool Marketing Board, whose main Welsh depot was just across the river from the piece. Others were supplied by local farmers, interested in how it could raise the profile of what they do. As with a lot of my larger pieces, there was a lot of media interest. In particular the farming press and media. There was a nice feature on Ffermio on S4C – a bit like a Welsh language Countryfile – and a good programme on Radio 4’s ‘On your Farm’ – the longer Sunday version of Farming Today. As a rural artist I feel really flattered when my work features in the farming section rather than the arts bit. Although it was nice to get a glowing review in the Guardian too. Farmers being good practical people, typically wanted to know if there was a practical benefit to the piece. I guess the cottage inside would have een warmer, but as it was structurally unsafe you’d never know. But it did get me thinking to what would happen to all the fleece afterwards. It was all raw, greasy fleece, in some cases straight off the sheep’s back. Being upland sheep breeds, the fleece was really good at repelling water – if it didn’t sheep would be squashed with all the weight every time it rained. The winter was one of those particularly snowy ones, so the fleece had a lot to cope with and I had no idea how well it would survive. A chance conversation with Sue Blacker at the Natural Fibre Company led to the possibility of at least scouring (cleaning) the fleeces with a view to spinning some yarn. As it happened, the fleeces were still in a good condition when the piece was finally taken down, and a few months down the line still showed little sign of rot. So the bags of fleece were bundled into the back of my car – as many as I could fit – and I took them down to Cornwall. The Natural Fibre Company specialises in scouring small quantities of fleece and spinning in to yarn. In doing so they have been instrumental in making it possible for smallholders and rare-breeds farmers to create woollen yarns and in turn raising the profile of small sheep farming in the UK. All the fleece was scoured without bleaching to retain its natural colour, and spun into yarn for weaving into blankets. From this point I could have sent the yarn to any number of commercial weavers o make the blankets. However, there was a story behind the original installation, and the subsequent fleece, so it was important to continue that with the blankets. The yarn was then sent to Melin Teifi – a weaving company at the National Museum of Wool in Wales where the owner Raymond worked from a pile of photos of the installation to create a one-off pattern which matched the proportions of the original timber frame architecture. More importantly, the weaving style was the same as that which made the town of Newtown all those years ago. In May of this year, the Port House – the little thatched cottage underneath Clad, was burnt down. The owners, while sad that a part of their family history is now gone, are proud of its moment of glory as an artwork. I also wonder – can the recycling of artworks help sustain the creation of new pieces? I now have these beautiful throws which were once an artwork, and are now a work of the art of spinning and weaving. I’ve also got something I’ve never had before – something to sell. It’s all new ground to me, and it’ll be interesting to see how that works out. I’ve decided to put all the money made from the throw sales directly into making new work in the hope this will lead to some kind of sustainable model for creating large-scale works in the landscape in due course. The throws are available on my website here, and will also be sold through the Oriel Davies gallery shop in Newtown. More stockists are to come and I’ll update this as we go along. The ‘Beyond Pattern’ exhibition for which Clad was commissioned, ends its tour at 20-21 Visual Arts Centre in Scunthorpe from 3rd December until February next year. Details here. Another common enquiry I have is for more information about past pieces. From time to time students at all levels seem to come across pieces and want to know a little but more – how things were built, where the ideas came from and so on. I’ve always been bad about keeping my website up to date, but I’ve finally made a start on cataloguing everything. I now have an archive covering the bigger pieces over the past five years. I’ve completed about a third of those so far with a bit of background detail and a gallery of pics including initial ideas, scrapped ideas, research stuff and how pieces were made. Still a way to go – with over 50 big pieces since 2005 alone, it’s a fairly major task, but the start has been made… life in mono Posted in Random Images, Uncategorized on June 18, 2011| 3 Comments » I’ve just returned from a few days in Paris. It wasn’t really a holiday – I went for business for something I’m not allowed to tell you about yet – but I admit I did stay an extra night for wandering and recharging the cultural batteries. I have a bit of a thing about the Grand Tour – it’s been the reason behind at least three recent commissions – and I’ve an idea to explore the greater Tour to see if it’s still relevant to contemporary art and architecture. Still, it’s no surprise Paris was the stepping off point for this great art and architecture adventure. It still seeps culture at every corner and is certainly the bedstone of the city. I love Paris. It’s an affair that started many years ago – and I was more than a little horrified to work out just how many. I started out as a photographer. I did all sorts, but mostly stuff for the music mags and editorial pieces for the broadsheet weekend magazines. My passion for photography in itself was born by the work of the early 20th century French reportage photographers I saw at the Barbican ‘Art or Nature’ exhibition in 1988. From that moment on I was hooked. Atget’s urban landscapes were haunting, timeless capsules – documents of places and things, often devoid of people. They had a real stillness about them. Unhurried and full of detail – stories hidden in corners and through half-opened doorways. Jaques-Henri Lartigue did great sweeping panoramas full of blurry atmosphere in glorious widescreen. Cartier-Bresson had a darker view of the seedier side of Paris, Wily Ronis and Robert Doisneau almost owned the genre of what is now known as street photography with volumes of classic and well known studies of people living, laughing, kissing, dancing, yelling playing in the streets. But most of all for me there was André Kertèsz. He saw the city through strong graphical compositions often abstracting the mundane, everyday into a series of lines and shapes. …and of course, this one! Over four or five years, while I was working in a darkroom in London, I would make frequent trips to Paris in search of this light and a desire to capture that spirit in way I could just never do in London. I also had the advantage of working in a specialist photographic lab so processing and printing film, was not only free, but crafting those images in the darkroom – fine-tuning the combination of film type and paper and toners – in search of the timeless quality of those great images. D'Orsay_Clock (1990) Street near Pigale (1989) Paris Metro (1990) l'actrice (1989) - I loved these stencil works in the Marais district - all a good 15 years before Banksy made his name So, last week, arriving in Paris with my trusty (now digital) Leica, I found myself switching it to black and white mode and shooting in 35mm full-frame format. With demise of my favourite fim and photographic paper, this was going to be the closest I could get to that experience of my youth. The Institute Arabe (2011) Saxaphone Busker on the Metro (2011) tourists at Notre Dame It may have been more than a decade since I was last in the city, but it seems in some respects some things change very slowly. Out of the city centre, away from the coach dumping points, there is still chracter and beauty in hidden corners. Glimpses through half-opened doorways and people leading their carefree existence – the joi de vivre. I may not be a great photographer, and the images may not be the timeless classics of Kertesz or Brassai, but for the first time in over a decade I’ve fallen in love with my camera again. paper trees Posted in landscape, Random Images, Rural Art on March 24, 2011| 2 Comments » While I wait for bureaucracy to release the materials I need from customs here in China, here’s some trees I’m looking at for the ‘Boxed’ installation next week: In the 1930’s, Chinese artist Chiang Yee visited the Lake District, armed with one pair of shoes his brushes, ink and paper – he ventured over the fells in solitude. He recorded his daily walks with paintings and poems in his own Chinese style. The landscapes of mountains and lakes was a familiar one to Chiang and fulfilled his longing for the Chinese landscape while in the UK. Chiangs trees are full of traditional chinese styling – with ‘welcome’ arms and add colour and texture to the grey, rainy lakes. Arthur Rackham’s trees are full of life and character and often became self-portraits. His trees twist and turn, wriggling out of the earth to embrace and guide those who come across them. His thorny briars on the other hand knot their way across the pages enveloping and binding anything and everything in their path. A paper cut tree at Shanghai gallery Island6 with interactive LED elements. So pulling all those ideas together – here’s where the ‘Boxed’ tree is going at the moment: needs work to be more windswept and twisted, but getting there I hope. Back-up materials arrive in the morning, so we’ll see where it all goes… Posted in landscape, Random Images on January 10, 2011| 2 Comments » In 2005 I installed seven large red balls on Grasmere in the Lake District. I liked the colour red before then or course, but for me that piece changed the way I look at the colour in the landscape, and in art in general. Balls to Grasmere - 2005 It was said that Constable and Turner would compete with each other at the Royal Academy Summer Exhibition. Constable would do outrageous things like add a blob of red to a painting just before hanging. (oh! the rebel). My first car was red. Renault5 MkI - 1976 Red is a lucky colour in China. In the ’80s the first traffic lights appeared in Beijing causing much chaos – why should cars stop at red lights? It’s a lucky colour. Souvenir 2. Shanghai 2007 The installation on Grasmere worked as the red balls filled a gap in the palette of the landscape. In this way the colour works as a visual accent adding a focal point or point of reference within the landscape. Red Cubes - Ullswater, Cumbria. 2010 Wrapped yew from colour workshop, Brockholes, Windermere, Cumbria 2009 walkway and jumping bridge in the Garden of Cosmic Speculation, by Charles Jencks. Portrack, Dumfries & Galloway. Lily - Tatton Park, Cheshire. 2010 Red form in the snow - North Pennines. 2010 Shelter - Newtown, Powys. 2009 There something about scale and colour I find interesting. Same as intense coloured environments such as Olafur Eliasson’s ‘Weather Project’ installation in the Tate Turbine Hall, and Annette Messager’s ‘Casino’ at the 2005 Venice Biennale. These installations, as well as the immense ‘Marsyas’ piece by Kapoor, have in their own way helped influence my attitude towards space and place through colour. Marsyas by Anish Kappor - Tate Modern, 2003 'The Weather Project' by Olafur Eliasson, Tate Modern, 2004 Casino by Annette Messanger at the Venice Biennale 2005 Cloudcube - Lancaster University. 2009 Dotted - an installation in Robert Stephenson's historic factory, Newcastle. 2005 Eliasson used specific use of the colour in his 2007 Serpentine Pavilion, although not to the extent of Jean Nouvel in 2010. Nouvel making great use of the variety of green within Hyde Park with which to juxtapose his rhapsody of colour. Lamp detail from 2007 Serpentine Pavilion by Olafur Eliasson Serentine Pavilion 2010 by Jean Nouvel Serpentine Pavilion 2010 by Jean Nouvel
cc/2020-05/en_middle_0061.json.gz/line1814
__label__wiki
0.81246
0.81246
18/05/2016 – Buhler Quality Yarns — auf Deutsch lesen Market leader takes new path Buhler Quality Yarns is a key supplier to the knit trade in the Western Hemisphere. Glimpse at production (Photos: Buhler) Glimpse at production A division of Swiss-based Buhler, the operation in Jefferson, Ga., opened in 1996. Buhler has about 32,000 spindles and produces about 3,700 tons of yarn annually. The Georgia-based plant specialises in yarns made from Supima extra-long staple cotton, MicroModal Edelweiss and Micro Tencel, along with various blends. The company is considered to be the leading producer of fine-count yarns in the US. David Sasso, vice president of sales at Buhler Quality Yarns, reports that business has been good in 2015 and he says he’s optimistic the year will finish that way and continue into the next. However, customers’ habits have changed in recent years. In the past, Buhler could count on long programme orders. Now, it is more of a short order situation. While business is steady, there is less certainty these days. Through the years, Buhler Quality Yarns has evolved from being a traditional sales yarn spinner to becoming involved in supply chain management, creating retail relationships and developing an understanding of the supply chain and how the spinner can participate. “We have an understanding of all the costs involved between the fibre and garment stage and that’s not typically what a spinner does,” Sasso says. About 90 percent of Buhler’s yarn production goes into the knit trade. Orders from Central America are strong, likewise with Peru. Sasso describes the US domestic market as steady.” Buhler is relying on export markets for long-term programmes. The largest end use for Buhler yarn is knitted apparel. Some also goes into uniforms and military garments. Sasso notes that while apparel more often represents short-term programmes, there is an opportunity in the high-end sheeting market. Buhler also produces yarn for woven applications, such as the military and some for towel manufacturing. “Our parent company produces air-jet and ring-spun yarns,” Sasso says. “We use them to see how that market goes and to see what the demand for those yarns is. We keep a close eye on those technologies and if we can implement them here, we will.” Yarn spinners face a myriad of challenges, but weather is not usually at the top of the list. However, the ongoing drought in California continues to affect pima cotton. Buhler sources all of its Pima from California. “We’re concerned about raw material prices,” Sasso says, “So, you have to have alternatives because it affects pricing.” Sasso has been with Buhler’s US operation since 2001. He says the biggest change in the industry during those years has been the explosion of online retailing and buying. He notes that the more choices consumers have, the more unpredictability there is in the market. Developing close relationships along the supply chain can often bring in unexpected business. “The traditional way of thinking about selling yarns is not very effective any more,” Sasso says. “Our knit customers or our garment customers, all of these guys can sell and pull your yarns through.” Most of Buhler’s orders come from long-standing customers. The company is well known in the industry, among brands and retailers: “If I visit a brand in Los Angeles, I want to make sure what we are the preferred yarn supplier for their apparel. Everyone knows you need high-end yarns and Buhler is the supplier of choice.” Much of the recent investment in the US textile industry has involved yarn spinning in the South. Sasso says the relatively low energy costs in the region have encouraged expansion. Lower energy costs help offset higher labour costs. Buhler has not had a major expansion, but has replaced three of its older spinning machines with new models, which has increased its capacity. While some areas of the South have seen a dissipation of qualified textile employees over the past 15 years as the overall industry has shrunk, Sasso says Buhler has been successful in maintaining a qualified work force. Employment at Buhler has remained fairly steady in recent years, averaging about 150, including management. Sasso observes that today’s textile workers have to be a combination of electrician and mechanical engineer. “While spinning hasn’t changed in many years, the environment they work in is so much better than it was.” Author: John McCurry © VDMD 20/01/2020 – Summer 2021 VDMD trend pulse S/S 2021– personalisé The VDMD Trend Research team continues to explore themes relevant to all of society. For the summer season 2021 the future concept is: personalisé. By Iris Schlomski Jess Fleischer, CEO and Co-Founder of Son of a Tailor: “We founded Son of a Tailor because we believe the fashion industry has to be better – for its customers, the environment and for the people involved in production.” © Soat 16/01/2020 – Against fashion waste Jess Fleischer and Andreas Langhorn fight against surplus production and textile waste. For low return quotas and against overproduction. By Iris Schlomski Hessnatur is the exclusive partner of the upcoming Neonyt and will be extensively represented at the former Tempelhof Airport and the Neonyt Fashion Show during MBFW. © hessnatur 10/01/2020 – Driving the change forward in the fashion industry Driving the change forward in the fashion industry Neonyt: hessnatur is the exclusive partner For the A/W 2020/21 edition, Neonyt is working closely with hessnatur, Europe’s leading supplier of sustainable textiles, as an exclusive partner. By Iris Schlomski Buhler Yarn
cc/2020-05/en_middle_0061.json.gz/line1832
__label__cc
0.667218
0.332782
Posts tagged with "love Cape Town" SAA VACATION × “LOVE CAPE TOWN” SOUTH AFRICAN AIRWAYS VACATIONS® OFFERS AN AIR-INCLUSIVE “LOVE CAPE TOWN” PACKAGE FROM $1999* Just in time to celebrate Valentine’s Day, South African Airways Vacations® (SAA Vacations®), the leisure division of South African Airways is offering a 5-night air-inclusive experience in the beautiful city of Cape Town. Starting at just $1,999* per person (restrictions apply) travel from New York – JFK between April 01 – May 31, 2018, and August 11-31, 2018 and enjoy the breathtaking views and exhilarating activities in sophisticated Cape Town. SAA Vacations’® “Love Cape Town” package offers a stay in one of the hottest new hotels in the city center, Tsogo Sun’s Sun Square Cape Town City Bowl. This modern hotel boasts a hip and fresh edgy design, free wi-fi, an onsite restaurant serving complimentary breakfast daily, great service and personalized hospitality. With its convenient central location, travelers can explore the city of Cape Town, the Victoria & Alfred Waterfront, iconic Table Mountain and Lion’s Head and the trendy neighborhood restaurants and club scene of the “Mother City”. The “Love Cape Town” package includes a Cape Point bike & hike tour. A fun way to experience the sights and sounds of the picturesque Cape Peninsula exploring the Cape of Good Hope Nature Reserve and enjoying the breathtaking views of the Atlantic Ocean from the summit at the Cape Point lighthouse. Also included is a Hop on Hop off Red City Tour, the easiest and most convenient way to visit Table Mountain, explore the City Bowl, Camps Bay, and the Atlantic Seaboard for the complete Cape Town adventure. “The Love Cape Town package provides what active travelers are asking for at an incredibly affordable price.” said Terry von Guilleaume, president of SAA Vacations®. “Experience the breathtaking scenery of Cape Town and the Cape Point Peninsula with an exciting bike & hike activity as well as a hop on hop off bus tour to stretch those legs! This vacation package is a great introduction to the Mother City.” “It’s fantastic to have a travel partner in South African Airways, which will make travelling to a world- class destination more accessible. said Enver Duminy, CEO of Cape Town Tourism. The “Love Cape Town” package has been carefully selected to provide a wonderful introduction to some of the best bucket list attractions and experiences the city has to offer. We look forward to welcoming our visitors and sharing everything with them, from our natural environment to our award-winning restaurants and bars.” SAA Vacations® “Love Cape Town” Package Includes: • Round-trip Economy Class air transportation from New York JFK Airport to Cape Town on South African Airways. • 5-nights at the NEW Sun Square Cape Town City Bowl, on a bed and breakfast basis • Full-day Cape Point, Bike and Hike Tour • Full-day pass on the Hop on Hop off Red City Tour bus • Airport transfers and meet and greet service by South African Airways Vacations representative in South Africa “Love Cape Town” package is available for new reservations made as of February 01, 2018. Travelers can book by calling 1-855-359-7228 or their professional travel consultant. South African Airways Vacations offers air-inclusive vacation options for all budgets, with their African Specialist available to ensure their clients experience the vacation of their dreams. For more vacation packages throughout Africa, please visit www.flysaavacations.com. About South African Airways Vacations® A division of South African Airways (SAA), South African Airways Vacations® (SAA Vacations®) is highly regarded for its wide array of affordable luxury packages to Africa and uses SAA’s extensive route network to create packages for travel throughout South Africa, Botswana, Victoria Falls, Namibia, Mozambique, Zambia, Zimbabwe, Kenya, Tanzania, Senegal, Ghana and the Indian Ocean Islands. Offering more than 80 air-inclusive packages, which range from value to superb luxury. Our specialty-themed programs offer unique experiences, whether you are interested in safaris, culture, cuisine, romance and adventure. The program is managed and fulfilled by Destination Southern Africa (DSA), which was founded in 2001 and offers an extensive portfolio of tour programs with a variety of hotels, game lodges and safari companies throughout Southern Africa. About South African Airways South African Airways (SAA), South Africa’s national flag carrier and the continent’s most awarded airline, serves over 75 destinations worldwide in partnership with SA Express, Airlink and its low-cost carrier Mango. In North America, SAA operates daily nonstop flights from New York-JFK and direct flights from Washington D.C.-IAD (via Accra, Ghana and Dakar, Senegal) to Johannesburg. SAA has partnerships with United Airlines, Air Canada and JetBlue Airways, American Airlines and Virgin America, which offer convenient connections from more than 100 cities in the U.S. and Canada to SAA’s flights. SAA is a Star Alliance member and the recipient of the Skytrax 4-star rating for 15 consecutive years. Like South African Airways Vacations on Facebook here Follow South African Airways Vacations on Twitter here. Like South African Airways on Facebook here. Follow South African Airways on Twitter here. *Terms & Conditions – Love Cape Town: Price is per person based on double occupancy. Valid as of February 01, 2018 for departures from New York-JFK between April 01 – May 31, 2018 and August 11-31, 2018 with the same itinerary available at higher prices during other travel periods. Other departure points and domestic flights within the U.S. can be booked. Price for other departure cities and/or travel dates may vary. Subject to availability and currency exchange rate fluctuations. Prices are valid for new bookings only, are not retroactive and may change without notice. Package includes all government and airline imposed taxes and fees. Baggage and optional service fees, cancellation charges and other restrictions may apply. This entry was posted in Travel + Food and tagged 360, 360 Magazine, accommodations, adventure, Africa, Atlantic seaboard, bike, Cape Point, Cape Town, City bowl, Diana Macaraeg, Flysaa, food, hike, lions head, love Cape Town, presents, South African airways, table mountain, tour, travel, vacation, Valentines Day, valentines ideas, Vaughn Lowery on February 2, 2018 by Pitch360.
cc/2020-05/en_middle_0061.json.gz/line1833
__label__cc
0.53857
0.46143
Terrorist Financing Interactive Timelines Before and After Series Documenting Cultural Racketeering Educating Policymakers Closing U.S. Borders to Illicit Antiquities #BuyerBeware Awareness Campaign Digital Library of the Middle East #CultureUnderThreat Task Force How Daesh Turns Illicit Digs Into Dollars Katie A. Paul On May 16, 2015, US Special Forces raided the compound of Abu Sayyaf, a leader of Daesh (commonly known as ISIS), uncovering a stockpile of documents illustrating the violent extremist network’s exploitation of illicit antiquities trafficking as a source of funding. According to the State Department, “Receipts for more than $265,000 in khums tax suggest total sales transactions worth more than $1.25 million.” With over one million dollars in receipts from looted antiquities in such a short span of time—or $5 million annualized—it is critical to understand how Daesh turns illicit digs into dollars. Understanding the development of this activity can help in the fight to combat looting as a source of terrorist financing. Receipts, documents, and taxation revealed that the looting by Daesh is more than just digging, it’s an administrative process. The terrorist group has created its own department of antiquities within the Diwan Al Rikaz (Office of Resources). One cannot simply dig in Daesh territory, permits must be acquired from the terror group and paid for—that means that even if no artifacts are found, Daesh has already made their first round of money by way of permit fees. Once the artifacts are found, the looters are given two opportunities—each spanning several weeks—to sell the artifacts. During any of these sales Daesh gains a portion of the proceeds. If the artifacts fail to sell they are reclaimed by the Department of Antiquities who seeks a buyer, and if no buyer is found they are finally handed over to the Diwan Al Rikaz and sold at a Daesh auction. The Antiquities Coalition is working with groups like The Day After Heritage Protection Initiative (TDA HPI) and their teams on the ground in Syria to illustrate the highly organized process. The infographic More Than Just Digging: Daesh Antiquities Trafficking an Institutionalized Process helps provide a better understanding of the methods behind trafficking patterns under Daesh and similar criminal networks and terrorist groups. 1875 Connecticut Avenue, NW, 10th Floor © 2020 The Antiquities Coalition. All Rights Reserved.
cc/2020-05/en_middle_0061.json.gz/line1835
__label__cc
0.513218
0.486782
Tag: fight Posted on April 10, 2009 April 22, 2009 in 2009 happenings, Big Cheap Motel, LPs, Reviews Review: Big Cheap Motel ‘09 from STILL SINGLE Reprinted from: http://still-single.tumblr.com/post/89271183/axemen-big-cheap-motel-lp-siltbreeze Axemen – Big Cheap Motel LP (Siltbreeze) “…a surplus of defiant attitude…” “…opening up the world…” “…this is the sort of action that more artists should fight for…” Big Cheap Motel '09 LP First of three reissues by this forgotten New Zealand punk trio out on Siltbreeze this year, opening up the world to their scarcely-heard ‘80s material. The record of theirs I have, Derry Legend, is just as irreverent, but still sounds far more refined than the cassette release Big Cheap Motel. It’s chaos, pretty much, of the Fall or Country Teasers variety; some guys who’d gotten their way into a big public concert, sponsored by the Big M dairy conglomerate, chomp on the corporate hand with a set of ten songs, all written the day of the show, condemning the company and its use of scantily-clad women to advertise its wares (“Can’t Stand Up For 40-Inch Busts,” “Our Sponsor Today,” “The Pornographic Milk Drink”). Tinny, handheld recording paints a lack of means, but a surplus of defiant attitude by those who would kick sand in the face of big business looking to increase its profile on the backs of the downtrodden. In a modern era where several prominent countercultural press outlets have their own fucking record labels, where bands fight for the right to shill for Scion or Pepsi or RJ Reynolds, this is the sort of action that more artists should fight for. Their reasons could have been purely political, or just done for a laugh; both evoke satisfying reactions. (www.siltbreeze.com) Post: Doug Mosurock, Still Single 2009 anarchy angry anti-evil corporate crime fight milk modern post-modern Post-Punk pre-modern pre-punk protest punk sexism uber-modern youth Posted on April 7, 2009 April 11, 2009 in 2009 happenings, Big Cheap Motel, blather, cultural studies, LPs, NZ bands, Photograsps, Posters, Reviews Review: Big Cheap Motel ’09 from Satan Rulez Reprinted from: http://satanrulez.blogspot.com/2009/03/zap.html “…Built around a thick guitar line that is distorted until it becomes a fluid conveyer belt of sound… ” “…hermetic tribes… ” “… The Pornographic Milk Drink contains rotating metal spoke on a ferris wheel guitar… ” “…Pleasantly skewed junkyard Buddy Holly rhythm lines played atop walls of distorted uber-rock riffs that contain the weight and force of a Flipper-like death dirge and the occasional saxophone blurt frame the basic vehicle for the band’s Brautiganian lyrical worldview... ” Outside of a few ardent music fans, hipsters and record collectors, how many Americans ever heard of the Axemen before the Siltbreeze reissue campaign? I’m guessing not many of us had the pleasure and, yet, the band steadily released albums throughout the last two-and-a-half decades. At face value, it seems like the band just wishes to entertain themselves and devotees by performing and recording their take on the music they enjoy. These hermetic tribes usually end up being the most effective musical acts because their mission really cannot fail. If the mind’s creation gears continually turn and you possess the unique ability to, at once, channel and transform the music that inspires you, not much could go wrong. Such is the case with the Axemen. The Big M corporation shamelessly used this appallingly sexist image to promote their range of flavoured milk in the early '80s - the Axemen were not about to let these corporate milk merchants milk mens' mouths with their product lying down So, TJ Lax provides the public with a vital service and a history lesson by releasing not one but two Axemen reissues in 2009. The first installment, 1984’s Big Cheap Motel, proves why this band deserves the reissue treatment and the attention it will likely receive by bearing the Siltbreeze tag. Like a more cohesive version of their UK brothers from other mothers on the Street Level Records roster, the Axemen kick grimy, postmodern, crooked punk-jazz sermons filtered through a boombox haze and serious subject matter that is littered with in-jokes. Milk, sexism and breasts all factor into a biting take on UK anarcho-punk lyrics soundtracked by a serious defacto homage to the aforementioned Street Level sounds. In fact, the second tune on the album—billed as a rehash of album-opener “Big Fat ‘M’”— sounds like a looser a Good Missionaries outtake tracked on top of a Danny and the Dressmakers tune. A dense, plodding rhythm line lays the grounds for a strange, possible anti-sexism rant wherein the singer exhibits the same off-kilter, slurred sing-speak vocals as Mark Perry. Interrupted by chatter and greasy guitar-driven sound experimentation, the song detours into a shapeless pile of intersecting ideas before briefly rising back into its initial structure. The results of the expedition on the second rendition of “Big Fat ‘M’” could be disastrous and annoying if its slant on song construction continued for an entire album. This appallingly sexist image appeared on New Zealand billboards and TV sets for one of Big M's early '80s campaigns But the Axemen duck this possible pitfall and keep Big Cheap Motel fresh and exciting by providing a home base of sound to which they can return after their journey into a foreign territory commences. Songs like the title track and “The Pornographic Milk Drink” showcase this sound without sacrificing the variety of execution techniques that runs through the album. Pleasantly skewed junkyard Buddy Holly rhythm lines played atop walls of distorted uber-rock riffs that contain the weight and force of a Flipper-like death dirge and the occasional saxophone blurt frame the basic vehicle for the band’s Brautiganian lyrical worldview. “The Pornographic Milk Drink” contains rotating metal spoke on a ferris wheel guitar leading into a sludgy sewage drain of a riff. Lead guitar lays the groundwork for a boogie-infused take on the band’s sound, as big ‘70s hard rock sounds collide with the band’s surrealist take on Crass Records political sloganeering. Big Cheap Motel - the Axemen's ode to the fight for womens' rights Built around a thick guitar line that is distorted until it becomes a fluid conveyer belt of sound, the title track reaps the benefits of its relative simplicity. The mantra of “Big cheap motel/ Big Tamla motel” pairs with the lava guitar flow to form a song that would work fine with guitar and vocals. But each time the Axemen run through things, a slight variation on the initial theme seems to arise on the next go-round—an off-rhythm guitar line, extra guitar fractures, a more minimal drum beat. The initial riff melts into small, blurry guitar bridges. A faux-Dick Dale guitar construction spackled in the cracks of “Big Cheap Motel” wanders to whatever rhythmic variation that the guitarist feels best compliments the tune. All the slight variations keep the sense of adventure that Big Cheap Motel showcases intact. Big Cheap Motel is one of those records where you can imagine the band’s thought process as they delve into any musical alleyway that pleases them. Though the names and age range of the band members are hard to discern from the liner notes (the insert contains poorly Xeroxed photos of the band and each band member’s name printed in black magic marker with an arrow pointed to his place in the photo), Big Cheap Motel contains the wide-eyed looseness of a bunch of kids in a garage trying to mimic the music they enjoy. Let’s do a hardcore tune. Let’s try inserting a drill sound on this one. The refreshing results vary wildly from the artists’ that may or may not have inspired the Axemen but the band’s affinity for the challenge and reward of artistic creation shines through. Posted by s. kobak Posted on March 31, 2009 April 11, 2009 in 2009 happenings, Big Cheap Motel, cultural studies, LPs, Reviews Review: Big Cheap Motel ’09, Alternative Music Talk Reprinted from: Alternative Music Talk The Axemen: A NZ Protest It’s understandable that Australia and New Zealand have a contentious relationship. I used to live in Cleveland, don’t anymore, but still cringe whenever I see a Stealers logo anywhere. The fact, though, that the Aussies recently claimed that New Zealanders are hermits, or some such, seems a bit beyond me. Anyway, New Zealand, as much Australia, has a pretty rich and important musical history. The Tall Dwarfs (sic) and Chris Knox have impacted current indie musical trends in a pretty noticeable way. You’d be able to hear it even if Jay Reatard didn’t tell us straight out. But a less lauded band – the Axemen – in the early ‘80s mined similar territory to Knox. They were a bit more noisey. Ok. A lot more noisey. The trio comprised some scene veterans and when Bob Brannigan, Little Stevie McCabe and Stu Kawowski came together, a more twisted vision of what pop should be was spat from speakers. Perhaps their most enduring – and time specific – document comes in the form of Big Cheap Motel (it’s there, but you gotta look for it). At a time when British punk bands wrote songs about Maggie being some body part and American punkers criticized Reagan on a daily basis, the Axemen took a more localized view of politics. Being slated to perform at a festival early in 1984 at a public park, the band was prepared to run through a set of their previously written material, but sponsorship of a milk company – Big M – prompted the trio to compose eleven new songs to comment upon the perceived problem. Supposedly, the band took issue with the sexist imagery displayed at the festival. Although, there aren’t any specifics to be found in the interwebs as to what, exactly, the problem was. Either way, it inspired some stripped down, rock thudding. Most frequently, the Flying Nun label and its stable of acts are in some way checked in relationship to the sound found on this disc. But the Axemen sound way more furious than anything else that I’ve come across on that label. The occasional inclusion of a sax, as on the anthemic “Stupid Symbol of Woman Hate,” points to the breadth of work that these folks were listening to. It isn’t quite Funhouse from the Stooges, but that track does ratchet up repetitive punk tropes along with the bleated chorus. And for some reason, this track sounds a bit better recorded than a few others. A few other tracks leap out of the pile, which, for a great deal of the long player suffers from less than desirable sound. But even if you can’t understand the words to “Pornographic Milk Drink,” you can sense the band’s dedication to what they have to say as the disheveled punk track plays out. The inclusion of an extended Stones cover – “We Love You” – is a bit confusing since this performance, in part, was meant to defy corporate shenanigans. But if you’ve heard the Cock Sparrer version, you may have already heard the best rendition of the track. If the historic and political perspective of this work was removed, I don’t know that we’d still be talking about this disc twenty some years after it was recorded. But it’s an artifact. And it’s one that fits into the linear narrative of rock history. Post: Came Best Vice Posted on March 10, 2009 April 11, 2009 in 2009 happenings, Big Cheap Motel, cultural studies, LPs, Reviews, Uncategorized Review: Big Cheap Motel ’09, Volcanic Tongue Reprinted from: Volcanic Tongue TIP OF THE TONGUE 08 MARCH 2009 “…free jazz skronk…radical prole violence…” “…punk primitive avant garde smarts…” Big Cheap Motel Siltbreeze Fantastic vinyl issue of what was originally a cassette from a group that were an anomaly even within the relatively eclectic environs of the original Flying Nun catalogue. This New Zealand group released a bunch of vinyl and cassettes, all of which took the basic Kiwi-pop blueprint and exploded it with classic UK art/damage moves, crude free jazz skronk, radical prole violence and punk primitive avant garde smarts. Big Cheap Motel was recorded live at Hagley Park Ritual and Peterboro Studios and was conceived as an anti-corporate/sexist action aimed at the sponsorship of a Christchurch Summer Rock festival by a milk company: “Stoopid Symbol Of Women Hate/The Pornographic Milk Drink”. Still, the sonics are nowhere near the kinda ‘worthy’ protest music that have sunk so many student duds, this kinda rallying owes more to the blunt, subversive style of the early Fall or the art-punk aggression of the Swell Maps/Steve Treatment cultus, referencing classic rock/roll yucks like Steve Mackay’s signature saxophone sound or the tantrums of Half Japanese while maintaining the kinda dazed topographical haze that defines alla the best NZ/FN action. This sits perfectly on the Siltbreeze label, joining the dots between early avant garage moves and the label’s own deeply-embedded crude-fi aesthetic and if you’re into classic outsider modes in the hands of musical Neanderthals but dig ’songs’ more than ‘noise’ then this is the white stuff: highly recommended. Posted on January 30, 2009 February 1, 2009 in 2009 happenings, Gigs, Photograsps, Press Releases, video Gig Report – Eugene Chadbourne support gig, the Whammy Bar, Auckland, 29 Jan 2009 Axemen, Dr Chad clowning at the Whammy Bar - L-R Stu Kawowski, Steve McCabe, Emeritus Professor the honourable and distinguished Dr Eugene Chadbourne, Bob Brannigan - Bob Brannigan: "You guys should know - where can I get some food around here?" Photo: Axemen International On 29 Jan 2009, the Axemen fulfilled one of their lifelong dreams, meeting and playing as humble support to legendary musicologist, Shockabilly geezer, generally dexterous solo artist and fellow mayhem cohort Dr Eugene Chadbourne. The Axemen played a short sharp set as a 3 piece, the first time in 16 years Stu Kawowski, Bob Brannigan and Steve McCabe had publicly aired their particular brand of rock’n’roll as a cohesive unit, and sounded as if they had never put down their instruments. On the verge of the worldwide re-release on new vinyl of their legendary 1984 protest album “Big Cheap Motel”, the lads whisked through a timewarp of tracks covering many crucial aspects of their long, speckled and bespectacled career – the Dunedin years, the Christchurch years, the Frisbee sessions, the Auckland wilderness years – all encapsulated in their electrifying 20 minute set. View Video [Big Cheap Motel, Live] After complimenting the boys, (“Wild set guys!”), Dr Chad proceeded to perform a chilling fingerpopping solo banjo set before taking a quick break, during which time McCabe stumbled across the stage to pick up his guitar and inadvertantly stepped on Eugene’s infamous electric rake, inflicting horrifying facial injuries which doctors say will likely scar him forever (“that’s rock’n’roll!” McCabe shrugged to the waiting papparazi). Steve McCabe puts on a brave face after standing on Eugene's rake - Dr Chad tries to make amends for tying his shoelaces together by playing him a song on one of them. After playing a blistering set with the Vitamin-S guys on bass, drums/percussion, stratocaster-slide and vibraphone the Chad-meister, obviously fired up and hepped out on steroids, pushed his way across the bar to Bob Brannigan and proceeded to arbitrarily pick a fight with him, deliriously warbling about being the best pummeler in the land of the long white cloud… Brannigan, in a foul mood after missing his evening insulin shot, stepped up to the plate, accepted the challenge and proceeded to take the pounding of his life. "I'm a Bully!".....EC: Repeat after me - "Eugene is the best pummeler in the land of the long white cloud!" Story: Electable Vice Mitts auckland bruising bully dr chad eugene chadbourne fight gig whammy bar
cc/2020-05/en_middle_0061.json.gz/line1837
__label__cc
0.63204
0.36796
10 Fun Facts for the Bulgaria Curious May 29, 2015 Balkan, BulgariaBansko, Bulgarian Orthodox Church, Cyrillic, кукери, Jewish, kukeri, mineral springs, monument, mummery, pessimism, rock climbing, ski, Soviet army, Thrace, tomb, treasure, winerisabuzatova Bulgaria has been known since antiquity for its soothing and healing mineral baths. There are hundreds, some say over 1000, mineral springs and spas galore. Bulgarians are literally world-class pessimists, even when living the good life drinking expressos for hours in cafés and visiting their country cottages on the weekends and holidays. The world-class ski slopes of Bansko, Bulgaria host the Ski World Cup Races. Lindsey Vonn won in 2009 and 2012 in Bansko. The Bulgarian Orthodox Church leadership helped save the Bulgarian Jewish population from being sent to the concentration camps. Bulgarian wine is famous. Sir Winston Churchill reportedly ordered 500 liters of Bulgaria’s Melnik wine every year. Import your own or ask your local store. Балкан (Balkan) refers to the central mountain range running west to east so it’s no surprise that Bulgaria has great rock climbing opportunities throughout the country. Guerilla artists have been using the enormous Sofia monument to the Soviet army as a protest vehicle. Among other statements, they’ve memorialized the 1968 Prague Spring, the current state of affairs in Ukraine, and generally thumbed their collective creative noses at Russia. Ancient Thrace, where Orpheus sang, is today’s southeastern Bulgaria. Archeologists continue to uncover their tombs and treasures. Bulgaria maintains a tradition of mummery in towns and villages nationwide. Кукери (kukeri) wear elaborate costumes and re-enact ancient rituals to scare away evil spirits. The Bulgarians created the Cyrillic alphabet. So important do Bulgarians consider their alphabet that they celebrate its creation as part of Day of the Alphabet, Culture and Education each May 24. To Bulgaria and Back May 28, 2015 Balkan, Bulgaria, Europe, expatBulgarian, East Blocrisabuzatova One Great Country You Need to Know More About When I first met my Bulgarian artist refugee future husband in St. Louis, I had no idea that the word “family” in that old cliché “You don’t just marry the person, you marry his whole family” was woefully insufficient. In fact, I was to marry the entire country of Bulgaria, a country that, sad to report, I had at that time no clear idea where in Europe it was located. From East Bloc to E.U. I first visited the People’s Republic of Bulgaria alone when it was too risky for my then fiancé to return. We got married there when the shelves were bare. We vacationed at the Black Sea when American television shows were blaring in every sidewalk restaurant in Sozopol. We lived there during total economic and political collapse. My daughter was born there. We recently lived there with both children for two memorably wonderful years. I’m quite sure we’ll do it again. Shake Your Head “Да” So I have a certain point of view about, lots of opinions on, and an enduring interest in Bulgaria. I speak its language, I read its history, I eat its food, I sleep with a Bulgarian every night (the same one)—now that’s commitment! Share a Bulgarian Story—Имало едно време… Whether you are Bulgarian curious about a sometime expat’s observations or a not-Bulgarian curious about the country, I hope you’ll find something to interest and entertain you here. Whether you ever travel or live in Bulgaria for real or just want to do it vicariously, please share your thoughts. Bulgaria is a Balkan country with no war or famine or natural disaster, but it has its own compelling stories. I have mine to tell. Please tell yours too.
cc/2020-05/en_middle_0061.json.gz/line1842
__label__cc
0.622832
0.377168
The Kylemore Claddagh Ring in 14kt White Gold & Sapphire This ring takes its name from the Neo-Gothic Abbey of Kylemore, one of the most admired and photographed buildings in the West of Ireland. The Kylemore Claddagh ring is hand crafted in 14 karat white gold and set with a heart shaped sapphire in the centre. There are two round brilliant cut diamonds in the crown. This beautiful Claddagh ring is Made to-Order exclusively for you by Claddagh Jewellers in our own workshop here in Galway. Claddagh Jewellers- Home of the Authentic Claddagh Ring™ - From Galway with Love! SPECIAL ORDER Learn More This ring takes its name from the Neo-Gothic Abbey of Kylemore, one of the most admired and photographed buildings in Connemara in the West of Ireland. The ring is hand crafted in 14 karat yellow gold and set with a beautiful heart shaped sapphire in the centre. There are two round brilliant cut diamonds set into the crown. Claddagh Jewellers - Home of the Authentic Claddagh Ring™ - From Galway with Love! SPECIAL ORDER Learn More The Kylemore Claddagh Ring in Platinum & Sapphire This ring takes its name from the Neo-Gothic Abbey of Kylemore, one of the most admired and photographed buildings in the West of Ireland. The Kylemore Claddagh ring is hand crafted in platinum and set with a heart shaped sapphire in the centre. There are two round brilliant cut diamonds in the crown. This beautiful Claddagh ring is Made to-Order exclusively for you by Claddagh Jewellers in our own workshop here in Galway. Claddagh Jewellers- Home of the Authentic Claddagh Ring™ - From Galway with Love! SPECIAL ORDER Learn More Diamond Claddagh Engagement Rings Give her your heart on that special day. These diamond Claddagh rings are part of our Claddagh Engagement Ring Collection. Experience the ultimate type of luxury with a Diamond Claddagh ring. The Claddagh ring is a symbol of love, loyalty and friendship. When you give someone a Claddagh ring, you are giving them your heart and crowning that love with your loyalty. The famous Claddagh ring has become so popular that it is now combined into many pieces of Irish jewellery, however, wedding bands and engagement rings have become prominent on the wedding scene in recent years. The Diamond Claddagh Ring collection features fabulous Claddagh Diamond set rings, Emerald set rings, Ruby set rings and Sapphire set rings, Claddagh Wedding Sets and Two Part Diamond Crowned Rings. Each ring is individually made and has been inspired by famous locations in Ireland. The Ashford Claddagh collection, the Cashel collection, the Kinvara collection and our Kylemore collection, will leave you spoilt for choice. The unique design in each collection showcases the Claddagh symbol. If that wasn't enough, we have Claddagh Wedding Sets which are expertly crafted in-house. These rings are beyond beautiful, they are stunning in every way. The rings are available in white gold, yellow gold and platinum. They are made with the finest 14kt and 18kt gold. Even though many of the items in this collection are bought as engagement rings, many people buy Diamond Claddagh Bands as gifts for their partners. Claddagh Jewellers are renowned for making the Authentic Claddagh ring ™. Our Claddagh rings are sought after from people all over the world, and we continue to grow every year. Check out our exclusive collection of Claddagh engagement rings today. Please do not hesitate to contact us if you have a specific style in mind. We are happy to help. Amethyst - Real Ruby - Real
cc/2020-05/en_middle_0061.json.gz/line1847
__label__wiki
0.737594
0.737594
Students jump onto Littlefield Fountain hopping tradition Photo Credit: Pedro Luna | Daily Texan Staff Published on September 26, 2018 at 11:02 pm By Caroline Betik Every year, students jump in Littlefield Fountain to pose for graduation pictures, some even decked out in their stoles and champagne in hand. Other mischievous students take a spontaneous dip in the middle of the night in hopes they don’t suffer the consequences. Health and society sophomore Renee Alducin said she recently partook in the traditional fountain dip with friends to start the semester with an exciting experience. Once they saw a police car coming, several members of the group made a beeline towards the Tower. She said a few friends stayed behind to talk to the officer. “The officer didn’t even get out the car,” Alducin said. “He just sat there a couple minutes to make sure we weren’t coming back, then he left.” Penalties for getting into the water include being subject to disciplinary action and a fine up to $200. While many students know fountain hopping is not permitted, it doesn’t stop them. Since 1933, Littlefield Fountain has decorated 21st street, sitting directly in line with the UT Tower. Named for George W. Littlefield and originally dedicated as a memorial to honor Confederate war soldiers, the fountain is now an iconic spot for graduation photos. Alducin said she recognized Littlefield Fountain as a beautiful campus landmark, and although it isn’t intended for students to swim in, her time jumping in the water was a bonding experience “At first, we texted a bunch of people to have a water balloon fight at the Tower at midnight and after decided to hop in the fountain,” Alducin said. “We all lined up on the second tier of the fountain and jumped in to get our whole bodies wet. We took pictures, hung out and splashed around for a bit.” Psychology and philosophy senior Michael Krol said he has never fountain hopped before because he considers it a rite of passage for graduation. But he said he isn’t concerned with getting in trouble with the University if he were take a dip next spring. “I haven’t done it yet, because I am not graduating,” Krol said. “(If I were) it would probably be jumping in for graduation photos, but that is just me. The idea is pretty cool though.” Despite the fact that students and Austin Monthly Magazine dub Littlefield Fountain as a bucket list item for many students, there are concerns for anyone who participates. The fountain lacks steps to enter and exit, and the area around the fountain and rock may be slippery, which puts students at risk for injury. “The fountain is not a pool and contains hazards wherein someone could slip and hit his or her head,” John Salsman, director of the Environmental Health and Safety Department, said in an email. “In addition, the water in the fountain is not maintained to the same water quality standards as a pool, so the University cannot ensure the water is safe for human contact.” In order to ensure the safety of students and protect property, Regents’ Rules and Regulations Rule 80110 states it’s unlawful for any person to enter the water of any fountain not designed for “recreational or therapeutic purposes” controlled by the UT System or institutions unless they have prior written permission. Despite Alducin and her friends getting caught, Alducin said it was definitely worth the experience and memories she made. “The fountain is a Texas landmark, something everyone walks by every day,” Alducin said. “But it’s a big thing and it makes you feel a part of something bigger than yourself and it really solidifies your relationship to Austin and UT. Jumping in the fountain makes you feel like you’re not just a student, you’re a Longhorn.”
cc/2020-05/en_middle_0061.json.gz/line1848
__label__wiki
0.571938
0.571938
About The Statue History of the Statue What is a Pilgrim Statue? Why Schedule a Visit? Gift of the First Class Relics Custodian of First Class Relics and Pilgrim Statue What is a Pilgrim Statue?Joan Alix2019-11-27T11:39:58-05:00 “The Statue, Our Lady of Fatima, Mother of Mercy has been an Ambassador of Peace. This is especially true in our times of war and terrorism. We have now been focusing on the role of the Our Lady of Fatima Statue, serving as Mother of Mercy, through prayer, always bringing us closer to her Son, Jesus. This representative Statue provides inspiration to both young and old equally to answer God’s call of love and divine mercy”. © Copyright Fatima Statue, Rhode Island Division | Site Design by Kickstart Media | All Rights Reserved
cc/2020-05/en_middle_0061.json.gz/line1852
__label__cc
0.60588
0.39412
Ready Player One: Snap, Crackle and Pop Culture *** (out of four) STARS Tye Sheridan, Olivia Cooke Olivia Cooke in Ready Player One (Photo: Warner Bros.) In the name of full disclosure, I have never read Ernest Cline’s bestselling 2011 novel Ready Player One. Of course, I haven’t read many books that ended up becoming popular movies, but it’s a tidbit that seems worth mentioning in this particular case. Naturally, I’m aware of the property and have actually perused great chunks of it – all of which left me thinking that Cline’s writing level tapped out somewhere around the fifth grade. More importantly, I have yet to meet anyone whose opinion I value – i.e. intelligent people who don’t get excited over, say, that upcoming Jersey Shore reunion show or the next inane Trump tweet – who hasn’t dismissed the novel as a painful experience, a name-dropping tome where practically all the ‘80s-friendly nostalgia is artificially manufactured rather than organically integrated into the framework. In short, it basically sounds like fan fiction — Fifty Shades of Grey for guys who have yet to discover their peckers. That Ready Player One the movie sounds superior to Ready Player One the book shouldn’t come as a complete surprise, given that Steven Spielberg is the one sitting in the director’s chair. After all, Spielberg worked similar alchemy when he helped transform Peter Benchley’s Jaws — a terrible book I did read — into merely one of the all-time great motion picture entertainments. Clearly, Ready Player One isn’t in the same league as Jaws – heck, it’s not even in the same 20,000 leagues – but on its own terms, it’s pleasing pablum, buoyed by an engaging cast and some savvy pop-culture references that are skillfully woven into the narrative rather than left hung out to dry. Ready Player One is set in one of those dystopian Americas in which the one-percenters get richer while everyone else is left suffering — no, not 2018 but rather 2045. The only escape for the masses is the virtual-reality world of OASIS, where folks spend practically every waking hour indulging in their fantasies. James Halliday (Mark Rylance), who created the OASIS alongside former partner Ogden Morrow (Simon Pegg), has recently passed away, but not before revealing that there is an “Easter egg” hidden inside the virtual world and whoever solves the mystery will inherit ownership of Halliday’s empire. Naturally, there’s a soulless bureaucrat, Nolen Sorrento (Ben Mendelsohn), who uses all the resources available to him through his conglomerate Innovative Online Industries (IOI) in an effort to crack the case and take over the OASIS; just as naturally, there’s an ordinary kid, 18-year-old Wade Watts (Tye Sheridan), who bests him at almost every turn. Wade has help, though. In his online avatar guise of Parzival, he’s friends with Aech (Lena Waithe), Sho (Philip Zao) and Daito (Win Morisaki), and their outfit is soon joined by riot grrrl Art3mis. Wade falls for Art3mis, and more so after he meets Samantha (Olivia Cooke), the actual human behind the avatar. In the OASIS, they battle the likes of King Kong and Mechagodzilla while receiving much-needed assistance from Ted Hughes’ Iron Giant. Tye Sheridan in Ready Player One (Photo: Warner) The film references come at the audience at warp speed (mostly ‘80s, but also some ‘70s and ‘90s), and if the cultural co-opting was frequently a lazy trigger on the printed page, a way to get easily impressed folks to mistake nostalgia for gravitas (“Wow, Cline mentions both Back to the Future and Knight Rider! This is the bestest book ever!”), there admittedly is some of that taking place on screen as well. But unlike a book, where every word can have equal import, the screen allows for background action that can be taken as mere asides, which is the case with many of the visual cues here. And while a few iconic films and characters take center stage at select points, they’re actually employed in imaginative and story-specific ways: A popular horror yarn from the 1980s receives its own showcase, while the sudden appearance of a slasher-flick fave provides the movie with one of its biggest laughs. (And as an Animal House fan, I appreciated the shout-out to Faber College.) Dating back to his prime period, Spielberg has not only championed children on screen but has also ensured that they’re affable rather than annoying (I would take the empathic Elliott from E.T. The Extra-Terrestrial over the insufferable Kevin McCallister from Home Alone any day of the week). With Ready Player One, that tradition continues, as the quintet representing the human side of the online avatars prove to be an engaging bunch. Sheridan (best known for Mud) and Cooke (the dying girl from Me, Earl and the Dying Girl) are charming in the central roles, and it’s just a shame that the roles of Waithe, Zao and Morisaki weren’t larger. On the older side, Mendelsohn does well enough within the confines of a stock villain, while Rylance (who won an Oscar for Spielberg’s Bridge of Spies) wisely maximizes the charming aspects of his rather problematic character, a dreamer largely oblivious to the nightmarish real world. At 140 minutes, Ready Player One could stand some judicious trimming, with its length particularly felt during the protracted third act. Certainly, the first snippet of film that should have been excised is when Wade tells Sorrento that “A fanboy knows a hater when he sees one,” an awful, awful line designed solely to inspire high-fives among white geeks who feel persecuted by a world that dared allow the creation of a female Ghostbusters film. But while fanboys will blindly worship the movie and haters won’t even bother seeing it, the truth rests in between these extremes. On balance, Ready Player One is a diverting slice of entertainment, offering enough surface thrills to justify its existence in a world already overloading on nostalgic feints. Posted on March 30, 2018 0 By Matt Brunson Reviews Posted in Reviews Tagged #Reviews Next Post View from the Couch: The Black Scorpion, The Outer Limits, The Seven-Ups, etc. Previous Post View from the Couch: The Twilight People, etc.
cc/2020-05/en_middle_0061.json.gz/line1853
__label__cc
0.574787
0.425213
The Alienist 1×10 Review: Castle in the Sky Posted by Farid-ul-Haq On March 28, 2018 0 Comment TNT’s The Alienist aired the season finale this week with ‘Castle in the Sky.’ While the ending to the mystery was predictable, I liked seeing the growth of the three leads and the groundwork laid for a possible second season. I was provided a screener of ‘Castle in the Sky’ for review. The opinions are my own. I enjoyed watching The Alienist. The first season wasn’t without a number of faults, but it still made for good TV. I am glad that ‘Castle in the Sky’ was able to tie everything up in a satisfying manner. Even if we don’t get a second season, the story felt complete. Everyone got a moment to shine in the finale, and by the end of it all, they felt like different people (in a good way) from the ones we met during the premiere. John Moore (Luke Evans) displayed a lot of personal growth over the course of the 10-episode first season. He transformed from someone who drowned his sorrows in alcohol into a man who thought about others and didn’t let his past keep him down anymore. ‘Castle in the Sky’ opened with John rushing to the scene of the murder. Of course, he thought it was Joseph who had been killed. I liked seeing the guilt he felt over not being able to protect Joseph. I don’t know about all of you, but I wouldn’t mind if a second season showed John adopting Joseph. His affection toward the young boy even surprised Sara (Dakota Fanning) during the tense scenes at the reservoir. Talking about Sara, we all knew she was going to shoot a gun sooner or later, and she finally did in ‘Castle in the Sky’ to save John and Kriezler (Daniel Brühl). While I liked getting to know more about her past (she had to help her father kill himself) when bonding with Laszlo, I do think the two mended their relationship too soon. Perhaps she decided to forgive Laszlo because she realized he was dealing with father issues just like her? What I really didn’t like was Kriezler deciding not to involve Sara in his plan to confront Japheth at the reservoir. Laszlo divided Team Alienist on purpose at the last second and it just felt weird, especially when he talked about seeing them all as friends later in the episode. Though we saw Kriezler become more open during the season, he still has a lot of work to do. Some thoughts and questions: Laszlo being able to see what happened to Joseph without having a lot of clues made no sense to me. It was awesome seeing Sara figure out where Kriezler was going. However, I would have liked more of an explanation. Her deduction felt too rushed. John needs to adopt Joseph! Japheth’s CG facial tick was very distracting. We got no explanation about why Japheth turned out the way he did. I don’t know if such a decision was made to annoy Kriezler or the writers weren’t sure how to answer such a question in a satisfying manner. Laszlo’s one-sided conversation with his father didn’t do anything for me. John being sexually assaulted was never addressed. Sigh! Don’t use sexual assault for mere shock value, The Alienist. John should have died or at least be gravely injured when Japheth bashed his head into a brick wall. Fun Fact No.1: I saw the actor who played Japheth during the second episode of the queer-centric CBS show Instinct starring Alan Cumming. I went to IMDb because he looked familiar. His name is Bill Heck. Fun Fact No.2: Bill Heck also starred in the queer-centric film Pit Stop which everyone should watch. In the end, the characters made The Alienist an enjoyable show for me. I didn’t find the mystery portion too interesting. It kind of fizzled out near the final few episodes. However, if we do get a second season (the ratings seem okay), I hope the writers, while continuing to focus on character growth, also create a more interesting mystery for Team Alienist to unravel. What did you think of The Alienist? Did ‘Castle in the Sky’ serve as a satisfying finale for you? Let us know. "I'm Fine" Season 3 Review: Offering Compelling Queer Narratives Boomerang 1x1 & 1x2 Review: "Pilot" & "Game Night" Sina Grace Calls Out Marvel's Lack Of Support For Queer Titles and I'm Not That Surprised Kids' Cartoon "The Bravest Knight" Will Feature Openly Gay Main Character TOPICS dakota fanningdaniel bruhlluke evansqueer representationthe alienistthe alienist reviewTNT Previous:“Daphne & Velma” on Digital, Blu-Ray, and DVD This May Next: 10 Times Apple & Onion’s Foodiverse Served Up Well-Done World Building "Iceman" Issue 5 Finishes An Amazing Story By Sina Grace - Comic Book Review Blink and You Probably Missed the MCU's "First Gay Character" Netflix "Mindhunter" Season 2 Premiering This August! Stranger Things Season Three Said "Gay Rights!"
cc/2020-05/en_middle_0061.json.gz/line1856
__label__cc
0.734951
0.265049
Where next in the fight over Muskrat Falls and rate mitigation? Published on August 8, 2018 in Opinion/To Each Their Own by Hans Rollmann On Friday, a group of protesters gathered at the Public Utilities Building in St. John’s, as they have for the past few weeks, protesting current and anticipated power rate hikes as a result of the Muskrat Falls project. Earlier this week, meanwhile, a coalition of over two hundred prestigious academics and authors signed a letter to Prime Minister Justin Trudeau, calling for a halt to the Muskrat Falls project, in light of the risk of irrevocable damage it poses to the environment and culture of Indigenous-led communities in Labrador. On the Island: power rate hikes. On the Labrador: threats to health, safety, and culture. The thing that binds these two acts of protest is Muskrat Falls. It’s a scandal that has united the people of the province in scorn, derision and outrage against a bad deal signed and supported by successive provincial governments, which threatens the very future of the province. If they are to have an impact, it is imperative these two movements join together. Labradorians have been fighting the Muskrat Falls project since the earliest days of the project’s announcement (in contradiction to media and government reports which ignored much of the early opposition to the project). Islanders, despite some solidarity efforts with the Labradorians, are only now entering panic mode, as the prospect of unsustainably high power bills hits home. The two movements are deeply connected, but they need to unite more strategically than they have. The letter to Prime Minister Trudeau points to a useful strategy: the entire project hinges on federal support. The federal government is the body which has quietly facilitated this project, yet has lurked in the shadows through most of it. The federal government provided the loan guarantee as well as RCMP and military initiatives to harass and quash protestors in Labrador. The federal government has issued countless platitudes about its commitment to Indigenous reconciliation: here is an opportunity for it to put its actions (and dollars) where its mouth is. Islanders protesting the power hikes need to get behind this. It’s not just about rate mitigation. It’s about a project that threatens the economic future of Islanders as well as the economic future, and lives and health, of Labradorians. Many Labradorian land protectors have not given up hopes of stopping the project, as evidenced by the letter to Trudeau. Islanders shouldn’t settle for a few dollars of rate mitigation either. Island protests could back up the appeal to Trudeau by concentrating protests on federal targets in the capital city. MPs Nick Whalen and Seamus O’Regan, along with Lieutenant-Governor Judy Foote, ought to feel the pressure (why in the world didn’t protestors crash her garden party last week, for instance?). Federal offices in downtown St. John’s could be targeted as well. If those calling on the federal government to stop the Muskrat Falls project are successful, federal intervention would also necessarily involve intervention against rising energy costs, since these are part and parcel of the bad deal which the federal government countenanced. The federal government failed in its fiduciary duty to exercise proper and due judgement on the Muskrat Falls project. That government must be held to account until they take action to correct their failures. There’s another missing ingredient to the fightback against rising energy rates and the Muskrat Falls project. The labour movement needs to rouse itself and get involved in this struggle. Unions might not be the mighty powerhouses they were in the ‘70s and ‘80s, but they are still the most organized and coordinated progressive social movement this province and country has. They need to lend their support to the growing numbers of private citizens who are protesting the current state of affairs. After all, any pay increases unions might have won for their members over the past decade will be eaten up in no time by the rising energy bills their members will have to face. Rising energy costs are an attack on the working people of this province and on their working conditions. Indeed, higher energy bills could be construed as an indirect form of pay cuts. If unions are serious about defending the interests of working people in this province, they need to throw their backing behind the protests against rate hikes and against Muskrat Falls itself. Many NAPE members eagerly grabbed up the severance payouts their union negotiated with the government this past year. But even those payouts won’t help most of them make it through a single winter of higher energy costs due to Muskrat Falls. Unions need to join the effort to quash this project, and the higher energy bills it is causing, without delay. After all, late summer and early fall is a lovely season for a general strike, don’t you think? Tags: energy costsindigenousMuskrat FallsNewfoundland and Labradorprotestspublic utilities boardreconciliation For years, an anonymous Twitter account mocked accident victims, berated grieving parents, and terrorized women. Today Advocates say a replacement for Her Majesty's Penitentiary—dating to 1859—will improve safety for both inmates & Indy Inks (8 January 2020) NEWFOUNDLAND AND LABRADOR, for your crimes of NOT DOING MUSKRAT FALLS PROPERLY AT ALL, we sentence Make Them Pay for Muskrat Falls It’s not about a hotel From Manitoba to Newfoundland – why understanding the significance of the treaty relationship is so important Talking about the weather in Windsor Lake… Previous Story Previous post: Science fiction helps us understand the future as well as past and present Next Story Next post: Waste, weeds, and poetry Latest from Opinion Dwight Ball is Untouchable If Dwight Ball has learned anything amid all the turmoil and unrest Ecological Ethics and Oil in Newfoundland and Labrador Ecological ethics confronts petroculture because it does not view the world through Andrew Scheer is a Lab-Grown Meat Puppet in Jason Kenney’s Plan to be Prime Minister The reason Jason Kenney is in Ontario on the federal campaign trail Keeping It In the Ground Is directly targeting offshore oil production the most effective way to fight Remembering Judy Lynn Ford & the Power of Student Action On October 17th, 1980, Judy Lynn Ford was struck and killed by For years, an anonymous Twitter account mocked accident victims, berated Advocates say a replacement for Her Majesty's Penitentiary—dating to 1859—will
cc/2020-05/en_middle_0061.json.gz/line1858
__label__wiki
0.544506
0.544506
The Destruction of a Ruin Cara DuBois August 27, 2015 Recommended Reading: Teju Cole meditates on the destruction of the Baalshamin temple in Palmyra, Syria at The New Inquiry. “The destruction of a ruin is like the desecration of a body. It is a vengeance wreaked on the past in order to embitter the future.“ Cara DuBois is an intern for The Millions. She is the managing editor of Concrete Literary Magazine at Emerson College, where she is pursuing a BA in Writing, Literature, and Publishing. She tweets at @Cara_DuBois. New Margaret Atwood Coming in September C. Max Magee March 11, 2013 MaddAddam, the third book in Margaret Atwood’s trilogy that began with Oryx and Crake and The Year of the Flood will be out in the U.S. in September. Bonus: the cover of the book’s Australian edition. Catching Mr. Harvey Nick Moran July 15, 2013 Stephen Moss caught up with AD Harvey, the “independent scholar” who tricked an entire discipline into believing Charles Dickens met Fyodor Dostoevsky. (If you missed Eric Naiman’s initial piece on Harvey’s trail of deception and trickery, you’d do well to acquaint yourself now.) Tuesday New Release Day: Choi, Aw, Zambrano, Roth, Banville C. Max Magee July 2, 2013 New this week: My Education by Susan Choi, Five Star Billionaire by Tash Aw, Loteria by Mario Alberto Zambrano, The Unknowns by Gabriel Roth, and a new edition of a previously hard to come by early collection of stories by John Banville, Long Lankin. Stay tuned for our big second-half preview with many, many more anticipated books, coming in less than a week. Jane Friedman’s AMA Nick Moran November 10, 2012 Janeites Unite Rhian Sasseen October 10, 2012 An Earthquake-Proof Library Kate Gavino February 13, 2019 Japanese architect Shinsuke Fujii has designed a floor-to-ceiling bookshelf that's meant to withstand the shocks of an earthquake. Kate Gavino The Deletionist Nick Moran June 16, 2013 “The Deletionist is a concise system for automatically producing an erasure poem from any Web page. It systematically removes text to uncover poems, discovering a network of poems called ‘the Worl’ within the World Wide Web.” Nabokov Speech Published in English for the First Time Matthew Schantz August 2, 2012 In 1925 Nabokov delivered a colorful talk on boxing to a circle of Russian émigrés living in Berlin. Yesterday, that pugnacious passage was published for the first time in English. Matthew Schantz
cc/2020-05/en_middle_0061.json.gz/line1862
__label__wiki
0.571488
0.571488
Daily Reading – November 25, 2019 Home > Reading > Daily Reading – November 25, 2019 1 Chron. 27:1–34 27:1 What follows is a list of Israelite family leaders and commanders of units of a thousand and a hundred, as well as their officers who served the king in various matters. Each division was assigned to serve for one month during the year; each consisted of 24,000 men. 2Jashobeam son of Zabdiel was in charge of the first division, which was assigned the first month. His division consisted of 24,000 men. 3He was a descendant of Perez; he was in charge of all the army officers for the first month. 4Dodai the Ahohite was in charge of the division assigned the second month; Mikloth was the next in rank. His division consisted of 24,000 men. 5The third army commander, assigned the third month, was Benaiah son of Jehoiada the priest. He was the leader of his division, which consisted of 24,000 men. 6Benaiah was the leader of the thirty warriors and his division; his son was Ammizabad. 7The fourth, assigned the fourth month, was Asahel, brother of Joab; his son Zebadiah succeeded him. His division consisted of 24,000 men. 8The fifth, assigned the fifth month, was the commander Shamhuth the Izrahite. His division consisted of 24,000 men. 9The sixth, assigned the sixth month, was Ira son of Ikkesh the Tekoite. His division consisted of 24,000 men. 10The seventh, assigned the seventh month, was Helez the Pelonite, an Ephraimite. His division consisted of 24,000 men. 11The eighth, assigned the eighth month, was Sibbekai the Hushathite, a Zerahite. His division consisted of 24,000 men. 12The ninth, assigned the ninth month, was Abiezer the Anathothite, a Benjaminite. His division consisted of 24,000 men. 13The tenth, assigned the tenth month, was Maharai the Netophathite, a Zerahite. His division consisted of 24,000 men. 14The eleventh, assigned the eleventh month, was Benaiah the Pirathonite, an Ephraimite. His division consisted of 24,000 men. 15The twelfth, assigned the twelfth month, was Heldai the Netophathite, a descendant of Othniel. His division consisted of 24,000 men. 16The officers of the Israelite tribes: Eliezer son of Zikri was the leader of the Reubenites, Shephatiah son of Maacah led the Simeonites, 17Hashabiah son of Kemuel led the Levites, Zadok led the descendants of Aaron, 18Elihu, a brother of David, led Judah, Omri son of Michael led Issachar, 19Ishmaiah son of Obadiah led Zebulun, Jerimoth son of Azriel led Naphtali, 20Hoshea son of Azaziah led the Ephraimites, Joel son of Pedaiah led the half-tribe of Manasseh, 21Iddo son of Zechariah led the half-tribe of Manasseh in Gilead, Jaasiel son of Abner led Benjamin, 22Azarel son of Jeroham led Dan. These were the commanders of the Israelite tribes. 23David did not count the males twenty years old and under, for the Lord had promised to make Israel as numerous as the stars in the sky. 24Joab son of Zeruiah started to count the men but did not finish. God was angry with Israel because of this, so the number was not recorded in the scroll called The Annals of King David. 25Azmaveth son of Adiel was in charge of the king’s storehouses; Jonathan son of Uzziah was in charge of the storehouses in the field, in the cities, in the towns, and in the towers. 26Ezri son of Kelub was in charge of the field workers who farmed the land. 27Shimei the Ramathite was in charge of the vineyards; Zabdi the Shiphmite was in charge of the wine stored in the vineyards. 28Baal-Hanan the Gederite was in charge of the olive and sycamore trees in the foothills; Joash was in charge of the storehouses of olive oil. 29Shitrai the Sharonite was in charge of the cattle grazing in Sharon; Shaphat son of Adlai was in charge of the cattle in the valleys. 30Obil the Ishmaelite was in charge of the camels; Jehdeiah the Meronothite was in charge of the donkeys. 31Jaziz the Hagrite was in charge of the sheep. All these were the officials in charge of King David’s property. 32Jonathan, David’s uncle, was a wise adviser and scribe; Jehiel son of Hacmoni cared for the king’s sons. 33Ahithophel was the king’s adviser; Hushai the Arkite was the king’s confidant. 34Ahithophel was succeeded by Jehoiada son of Benaiah and by Abiathar. Joab was the commanding general of the king’s army. (NET Bible) Ps. 119:153–160 119:153 ר (Resh ) See my pain and rescue me! For I do not forget your law. 154Fight for me and defend me! Revive me with your word! 155The wicked have no chance for deliverance, for they do not seek your statutes. 156Your compassion is great, O Lord. Revive me, as you typically do! 157The enemies who chase me are numerous. Yet I do not turn aside from your rules. 158I take note of the treacherous and despise them, because they do not keep your instructions. 159See how I love your precepts! O Lord, revive me with your loyal love! 160Your instructions are totally reliable; all your just regulations endure. 1 Cor. 10:1–13 10:1 For I do not want you to be unaware, brothers and sisters, that our fathers were all under the cloud and all passed through the sea, 2and all were baptized into Moses in the cloud and in the sea, 3and all ate the same spiritual food, 4and all drank the same spiritual drink. For they were all drinking from the spiritual rock that followed them, and the rock was Christ. 5But God was not pleased with most of them, for they were cut down in the wilderness. 6These things happened as examples for us, so that we will not crave evil things as they did. 7So do not be idolaters, as some of them were. As it is written, “The people sat down to eat and drink and rose up to play.” 8And let us not be immoral, as some of them were, and twenty-three thousand died in a single day. 9And let us not put Christ to the test, as some of them did, and were destroyed by snakes. 10And do not complain, as some of them did, and were killed by the destroying angel. 11These things happened to them as examples and were written for our instruction, on whom the ends of the ages have come. 12So let the one who thinks he is standing be careful that he does not fall. 13No trial has overtaken you that is not faced by others. And God is faithful: He will not let you be tried beyond what you are able to bear, but with the trial will also provide a way out so that you may be able to endure it. The Holy Bible: English Standard Version. Wheaton, IL: Crossway Bibles, 2016. [Luther writes]: “The meaning of the prophet is that Christ uses no other power against the world than only the Word of God, as we daily see that he acts against the sin, the sinner, and the devil with nothing but the Word, and yet by means of the Word he has converted and subjected the whole world and till the last day his own will defend themselves against all temptation with the Word and defeat all the attempts of devil, esh and world.” —Compare Luther’s words to Spalatin of 1521 over against Hutten’s oveer to defend the gospel by the sword … Through the Word the world has been conquered, the church was preserved, through the Word it will also be renewed; but the anti-Christ also, as he began without external power (manu), will also be destroyed without external power, through the Word.” (75) About the Reading the Word of God Guide
cc/2020-05/en_middle_0061.json.gz/line1863
__label__wiki
0.823954
0.823954
Bands and new music for fans of Red City Radio Emo/post-hardcore by Solitary Set We're Solitary Set from Baltimore, MD, though we all moved here from other places originally. We've been playing hardcore and pop punk for our entire lives, but with this band we wanted to try something different. Most of us have families and we're not as interested in screaming into a microphone or smashing our heads through walls as we used to be. Solitary Set is a little quieter, a little more introspective, and a little more mature, just like us. Red City Radio by Basement Sound We are five dads who love to play music together. What we love the most is getting our songs inside of people's domes and hearing them sing back to us on stage. teenage-bottlerocket Boredwalks Hey we are BOREDWALKS, punk rock band from Plymouth. Our sound is along the lines of alkaline trio, the wonder years, arms aloft, red city radio and a touch of blink 182. There's music history in the band with some members coming from arizona law and crooked little sons. Check us out Enjoy Cheers Arms aloft Love Forty Down Hey there, we are Love Forty Down from Ulm, Germany. We have a passion for melodic punk rock with rough vocals. Almost every time we write a song it ends up being somewhere between “punk rock romance” and “fist-in-the-air-sing-alongs”. Our Souls A motley crew of spare parts from other bands that no one cared for or cared about. Our Souls is a DIY 5 piece punk band from Leicester who released their first EP last year. Recorded in a ballet shoe factory and front room, and all for the cost of £0. Bargain. nothington Heartland Punk The Petty Saints Hey Guys, We're The Petty Saints fresh out of San Diego, CA with our first record. If you like Punk played with heart....and hate working the 9-5 grind...give us a listen! We hope you enjoy the record!!! Nostalgia punk/orgcore High Home Hey! We're High Home (formerly known as The Bryan Adams), a two-piece melodic punk band playing nostalgia-tinged heartland punk. If reminiscing wistfully on your youth is your thing, you'll fall in love with our EP, "Teenage Summer", a 12-minute blistering drive down memory lane.
cc/2020-05/en_middle_0061.json.gz/line1868
__label__cc
0.641814
0.358186
Tag Archives: Juninho A Letter to Hans Backe: Time is Running Out The New York Red Bulls are in dire times. This statement could have been repeated countless times this season. Each time Hans Backe would have replied, ‘things will be alright and the team would get through it.’ Well, Mr. Backe, this is your last chance. Tagged David Beckham, Hans Backe, Joel Linpere, Juan Agudelo, Juninho, LA Galaxy, Landon Donovan, Los Angeles Galaxy, Major League Soccer, Mike Magee, MLS, MLSCup, New York Red Bulls, Rafa Marquez, RBNY, Thierry Henry, Tim Ream New England Revolution draw with Los Angeles Galaxy in season opener By Cory Ritzau of Prost America CARSON, Calif. – The New England Revolution came into the Home Depot Center for their season opener and were fortunate to earn one point after a soggy, 1-1, tie with the Los Angeles Galaxy in Southern California. An early Sharlie Joseph goal could only be equalized by the hosts, as three separate times the Galaxy had apparent goals called back by the referee. The season could not have started any better for the Revolution. New England got on the board in the 3rd minute with a Joseph header, taking an early 1-0 lead against the LA Galaxy. After a giveaway by Leonardo in the early going, Zack Schilawski got tangled with the Galaxy defenders but did well enough to earn a corner. The ensuing corner by Marko Perovic was cleared back to his feet and his second cross found Joseph sliding behind the defense unmarked for an easy header to the back of the net. Tagged A.J. Soares, Bruce Arena, David Beckham, Juninho, Landon Donovan, Los Angeles Galaxy, Major League Soccer, Marko Perovic, Matt Reis, New England Revolution, Shalrie Joseph, Steve Nicol, Zack Schilawski
cc/2020-05/en_middle_0061.json.gz/line1876
__label__wiki
0.84044
0.84044
Tagged album review All You Need To Know About Hov’s ‘4:44’ Digital Entertainment, Exclusives, feature, featured, Hip Hop Music | Listen To and Download Hip Hop Tracks In recent years, it's been rare to hear a track with JAY-Z on it. So, when 4:44 dropped last night, many in the Hip-Hop world tuned in. Hov's thirteenth studio album may be his last and it showcases some of ... Read Article Review: Syd’s First Solo Album, “Fin” is Humbly Satisfying Deniqua Syd delivers and she's more confident than she's ever been. The Internet, whose music has evolved across several different hip hop platforms, from the group’s very first project, Purple Naked Ladies in 2011,... Read Article Take The ‘Stairs’ To Dubai With Brooklyn’s G4SHi KC Orcutt feature, Hip Hop Music | Listen To and Download Hip Hop Tracks, Hip Hop Music Videos | Official Videos and Performances, Listen Now, Mixtape Reviews, New Hip Hop Music | New Hip Hop Singles and Remixes, New Music In a cultural landscape desperately seeking authenticity, talent and genuine passion, Brooklyn’s G4SHi is leading a revolution entirely his own, with both middle fingers up and his signature gold-adorned grin g... Read Article Review: “Diamond Mind” EP By Pearl Gates Hip Hop Music | Listen To and Download Hip Hop Tracks, Hip Hop Music Reviews, Mixtape Reviews, New Music With Diamond Mind, the ambitious debut EP of newcomer Pearl Gates, the rapper succeeds in introducing his well-rounded nature as a taste-making musician. He also surrounds himself with the best company, includi... Read Article Lessons From The West Coast Architect: Why Dr. Dre’s “Compton” Is Remarkable brirezy Hip Hop Music | Listen To and Download Hip Hop Tracks, Hip Hop News | Trending Hip Hop Stories It's been 16 years since the west coast hip hip legend Dr. Dre dropped a new album. No it's not the highly anticipated "Detox" but it's still a great piece of art. "Compton" new available on Apple Music is o... Read Article
cc/2020-05/en_middle_0061.json.gz/line1877
__label__wiki
0.506385
0.506385
REVIEW: Moira Buffini’s ‘Blavatsky’s Tower’ 3 Crate Productions, Chapter by Sam Pryce April 9, 2015 · by guys1 · in Uncategorized. · The effects of social isolation have never been more relevant in today’s oh-so-social digital world. With social media companies swallowing more and more of our personal data, it’s certainly the right time to revisit a play that asks why a father might lock up his family in a top-floor flat, away from that world and the ‘crushed’ that live in it. Such a play is this 1998 work from the English playwright Moira Buffini: a tragicomic tale, ‘Blavatsky’s Tower’. Revived by the exuberant folks at 3 Crate Productions, the resonating themes and jet-black humour of ‘Blavatsky’s Tower’ are unmistakably relevant. On the twenty-fifth floor of an ugly tower block, the ‘architect and visionary’ Hector Blavatsky, now blind and close to dying, lives with his three children – Roland, an embittered, resentful young boy engaged in writing his ‘Theory of the Universe’ whilst rotting his brain with hours of television; Ingrid, a sensitive girl who obediently takes note of each of Blavatsky’s bizarre visions; and Audrey, the only family member who has ever ventured outside the house (and has clearly become ‘crushed’ by it too). When Audrey brings home an aloof Dr. Tim Dunn to help her dwindling father, the true damage done to these children by such isolation becomes clear. The play reaches dark conclusions about family ties and how the society in which we live affects our treatment of others. As dark and odd a tale it may sound, it is also very funny. Moira Buffini’s playful style means that the darkest moments are handled with rib-tickling absurdity, occasionally too much. In this play, it seems Buffini’s crowd-pleasing sense of humour cannot reach its full potential due to the rather bleak subject matter in ‘Blavatsky’s Tower’. Her style is much more suited to the sell-out, West End farces like Handbagged and Dinner for which she is now known, performed to packed-out theatres and five-star reviews. So, regardless of all the loose-ends that are left dangling here, this play is undoubtedly entertaining. Under Peter Scott’s direction, those moments of bleak farce are elevated, making for a painfully funny evening. And this is thanks in no small part to the consistently good troupe of actors on show. Emma McNab and Hannah Lloyd have a humorous rivalry as the sisters, Ingrid and Audrey, which soon swells into a near-homicidal contempt for the other. Ben Tinniswood has a suitably aloof air as Dr. Tim Dunn, delivering his funniest lines with a dazzling command of timing. A lot of the raucous laughter though is down to Tom Hurley as Roland, comically frantic and poisonous in manner. Finally, Anthony Leader adds some theatrical class to the evening as Blavatsky, portraying him as a Prospero-like figure, highlighting both the menacing and the moving aspects of an old man aware that this is not his world anymore. A lot of fun is had in this production – a lot of water spilt, a lot of bellies tickled, even a yoghurt pot flew into the audience at one point. But beneath the laughter, there sits a truly dark message about human nature in an enclosed space. Take a trip up to Blavatsky’s Tower if this sounds like your sort of thing. Oh, and by the way, take the stairs. ‘Blavatsky’s Tower’ is at Chapter Arts Centre, Cardiff until 11th April. ← REVIEW: Howard Barker’s The Dying of Today The Other Room, Cardiff by Sam Pryce Review These Trees are Made of Blood Theatre Bench Southwark Playhouse →
cc/2020-05/en_middle_0061.json.gz/line1883
__label__cc
0.718793
0.281207
War cycle influences Posted on December 20, 2013 by Thundering Heard They admit to financing terrorism and they get fined $32,000. Where if I were to do that, I would go to jail for life. –Everett Stern, a former HSBC compliance officer on the fine levied on HSBC for funneling hundreds of millions of dollars to Hezbollah Scientists tell us that when cycles pull in opposite directions, they can nullify one another. They call it wave cancellation: But when cycles push in the same direction, the effects are amplified. A storm surge is one example: As they blow across the ocean’s surface, the winds that create waves accelerate during a storm, causing the cycle of ocean waves to have far greater wave heights. These waves combine with the high tide waters of the tidal cycle, and a storm surge ensues with sometimes devastating results, such as the damage at Tacloban from Typhoon Haiyan: The so-called Great Recession is another example: Thundering Heard talked about two cycles–the highly reliable 25-year recession/depression cycle for the USA described in What is the Transition? Conclusion; and the cycle of Pluto moving from Sagittarius into Capricorn described in A Forecast for the Next Eleven Years, still in effect through 2024–that combined to make the financial crisis of 2008 very deep and long-lasting, with many saying that these cycles started a depression that is still going on today. There are other cycles, even larger ones, that contributed to the Great Recession/depression, but I haven’t yet had time to explain those, though I plan to soon. Does the existence of a cycle mean that something must happen? In human affairs, no, often because larger cycles can mute or nullify smaller cycles, represented in this graph, showing that the cycle represented in red might be nearly unnoticeable at times because of the dominant cycle in blue: However, when larger and smaller cycles point in the same direction, the results can be awe-inspiring. We have such a situation now relating to war. I know of at least five cycles pointing in the direction of war. Two have been discussed before. One is the Wheeler Index of War and Political Change, discussed here and here, whose troughs have coincided with great precision with the starts of World War 1, World War 2, the War in Viet Nam, and the massive political changes that transformed Russia and China in 1989. The next trough in that cycle is due in 2014. Another cycle pointing to war in the 2014-2016 period was discussed here. Again, I know of other cycles that point to major war in the near term, but even if I documented those to the hilt, would it convince us all that that major war must happen? Probably not. But clearly, the influence of these cycles is being strongly felt. Over the last couple of decades, the talk of war has primarily been talk of smaller regional wars. But recently, talk of superpower war has been ramping up. Here’s one from the Yale Journal of International Affairs, not exactly some emotion-laden incendiary blog, about war between the US and China: Who Authorized Preparations for War with China? The Pentagon has concluded that the time has come to prepare for war with China, and in a manner well beyond crafting the sort of contingency plans that are expected for wide a range of possible confrontations. Russia will use nukes in case of a strike – official Russia Stations Tactical, Nuclear-Capable Missiles Along Polish Border China Declares “Willing To Engage In A Protracted Confrontation” With Japan As “Prime Target” US Challenges China, Flies B-52 Bombers Over New Air Defense Zone Japan Dispatches F-15s, E-767s And P-3 Into China’s Air Defense Zone, China Scrambles Su-30 In Response China Re-Escalates, Deploys Warplanes To Air Defense Zone China Slams Abe’s “Malicious Slander”; Warns Japan Is “Doomed To Failure” First Glimpse Of China’s Nuclear Submarine Fleet US, Chinese Warships “Nearly Collide” In South China Sea Hold on: how can two massive ships, visible to the naked eye and certainly to radar from hundreds of miles away, “nearly collide”? South Korea Unveils It’s Own Air Defense Zone, Overlapping China’s And Japan’s Japan Press: “China-Japan War To Break Out In January” Japan to bolster military, boost Asia ties to counter China Japan will boost its military spending in coming years, buying early-warning planes, beach-assault vehicles and troop-carrying aircraft, while seeking closer ties with Asian partners to counter a more militarily assertive China… Abe’s government also vows to review Japan’s ban on weapons exports, a move that could reinvigorate struggling defense contractors like Mitsubishi Heavy Industries Ltd and Kawasaki Heavy Industries Ltd. Is War With China Inevitable? And of course, the Middle East doesn’t want to be left out of the headlines: Israeli Generals Preparing For “Short, Sharp” War Against Hezbollah US Drones Taliban Leader; His Troops Vow Bloody Revenge; Pakistan Government Furious At America Syrian Army Base Rocked Again By Overnight Explosions, Israel Implicated Regional War Scenario. NATO-US-Turkey War Games Off the Syrian Coastline The Saudis and Israelis are seething that the US and Europe are negotiating with Tehran. Perhaps that is why the role the Saudis played in helping to set up the 9/11 attacks is beginning to get some airplay? Inside the Saudi 9/11 coverup However, I don’t think they need to seethe, a quick look at these Iran negotiations says there is something more than fishy about it. First, there were meetings and it looked like there was an agreement, but at the last minute, the US insisted on lots of changes. This happened when some of the negotiating teams were already at the airport on the assumption that an agreement had been reached. So that first agreement was scuttled. The parties met again a few weeks later and announced an agreement which was really an agreement to come together again to negotiate the real details. The parties each went back to their countries saying they got what they wanted, despite the fact that these claims were contradictory, as documented here by CNN: Iran nuclear deal: One agreement, wildly different reactions Iran’s Rouhani: “We Are Not Dismantling Our Nuclear Facilities; Iran Will Maintain Its Uranium Enrichment Programme” One thing that was clearly promised to the Iranians was no new sanctions. As soon as the detailed negotiations got started, the US broke that promise: Iran Quits Nuclear Talks After US Expands Blacklist Sanctions Iran has quit nuclear talks with world powers, accusing Washington on Friday of going against the spirit of a landmark agreement reached last month by expanding its sanctions blacklist. Last I heard, Iran is back at the table. I’m happy to hear that. But given the antics of all of the parties, I’m not especially optimistic about the outcome of these talks. They sound like the endless US budget talks where agreements are reached to maintain the status quo and do the real negotiations later. And the Europeans look like they want to play their part in adding to the warmongering tone: Facing Triple-Dip Recession, France Set To Deploy US-Made Drones In West Africa It appears that the more oil and gold they find in West Africa, the more troops keep showing up. All of the above shows why it is very helpful to know which human affairs cycles are ending and which are gearing up: knowing the influences that are pressuring people, behaviors start to make more sense. Not rational sense: no one could possibly claim it is rational for Japan and China to be threatening war over rights to small, uninhabited islands. But behavioral sense: one can see how the players are playing their parts. Probably unconsciously, since most people, unfortunately, consider cycles analysis to be some kind of voodoo. Of course, anyone who knows what cycles are in play can be conscious about them, sidestepping negative influences, and hopping on board positive trends, some of which were mentioned here. But at least we can rest assured that warmongering will be starved for financing: US Government regulators fined big bank HSBC for allowing “hundreds of millions of dollars” to be transferred to Hezbollah. The fine? $32,000. I guess HSBC had to dig real deep into their petty cash drawer to pay that one. The regulators said HSBC, the bank recently fined $1.9 billion for facilitating money transfers for the drug cartels, came to them voluntarily with this violation of international rules, so the regulators probably sat around and said, “Oh, isn’t that sweet, HSBC is so honest, such nice people, we can’t be mean to them.” HSBC Gets Slap On The Wrist For Helping To Finance Terrorists A major U.S. bank has agreed to a settlement for transferring funds on the behalf of financiers for the militant group Hezbollah, the Treasury Department announced on Tuesday. Concluding that HSBC’s actions “were not the result of willful or reckless conduct,” Treasury’s Office of Foreign Assets Control accepted a $32,400 settlement from the bank. Treasury noted, as did HSBC in a statement to HuffPost, that the violations were voluntarily reported. Everett Stern, a former HSBC compliance officer who complained to his supervisors about the Hezbollah-linked transactions, told HuffPost he was “ecstatic and depressed at the same time.” “Those are my transactions, I reported them,” he said, satisfied that the government was taking action. But, he added, “Where I am upset was those were a handful of transactions, and I saw hundreds of millions of dollars” being transferred. Stern said he hopes the government’s enforcement actions against HSBC have not come to an end with the latest settlement. “They admit to financing terrorism and they get fined $32,000. Where if I were to do that, I would go to jail for life,” he said. We sure all know what Hezbollah plans to do with those hundreds of millions–add to their existing arsenal that already includes 80,000 to 100,000 rockets and missiles. No wonder the Israeli generals are in a panic to act soon, which of course falls right in line with the timing of the war cycles. But I do wonder who Hezbollah will be buying their new weapons from, that is, who will be the real recipients of that money. As usual, the Dark Forces want to make some big bucks off the carnage of war they are fomenting–right in line with the cycles. Posted in War is a Racket | Tagged acceleration, Cycles, War is a Racket | 3 Replies
cc/2020-05/en_middle_0061.json.gz/line1888
__label__wiki
0.644783
0.644783
Pakistan rejects Indian protest over Azad Jammu & Kashmir interim Constitution Act 2018 ISLAMABAD: Pakistan has categorically rejected India’s protest against the Azad Jammu and Kashmir Interim Constitution Act 2018 and its fallacious and baseless claim over the Indian occupied State of Jammu and Kashmir as an integral part of India. In a statement, Foreign Office Spokesman said the Indian claim has no legal basis and continues to be contradicted by the situation on ground since the last seven decades. He said the entire state of Jammu and Kashmir is a disputed territory. The statement said Kashmir's disputed status is enshrined in the relevant United Nations Security Council resolutions, which stipulate that the final status of Jammu and Kashmir will be determined through the democratic method of a transparent, free and fair plebiscite under the auspices of the United Nations to ascertain the wishes of the Kashmiris. The Spokesperson said Indian intransigence to implement UN Security Council resolutions in letter and spirit continues to hold hostage peace and development in the region. The spokesman said instead of making frivolous protests and issuing legally untenable and uncalled for statements, India should take steps to vacate its illegal occupation, fulfill its international obligations and expedite resolution of the Jammu and Kashmir dispute in line with the UN Security Council Resolutions. PM Imran Khan gave a strong message to US President Donald Trump over conflict against Iran PM Imran Khan orders high profile inquiry committee for probe 466 employees of the PIA found guilty of fake degree PM Imran Khan held meeting with Facebook Chief Operations Officer Pakistani PM Imran Khan held meeting with Executive Chairman of World Economic Forum PM Imran Khan and Ivanka Trump had informal meeting on sidelines of WEF summit 2020 Positive development reported from FATF for Pakistan Mysterious black ominous circular cloud spotted in Lahore
cc/2020-05/en_middle_0061.json.gz/line1889
__label__cc
0.731549
0.268451
Integrating MATLAB and C/C++, Part 2: Visualizing and Testing C/C++ Code From the series: Integrating MATLAB and C/C++ Andy Thé, MathWorks Most software developers start in environments like Visual Studio® and Eclipse™ to initially develop and debug C/C++ code. While those environments are quite powerful, they tend to lack the ability to visualize and verify numerical data. By integrating MATLAB® into the software development process, developers can visualize, verify, and prototype functionality natively from environments like Visual Studio and Eclipse. Fixed-Point Designer MATLAB Coder Series: Integrating MATLAB and C/C++ Part 1: Introduction Learn how MATLAB can help to accelerate product development workflows. Part 2: Visualizing and Testing C/C++ Code Visualize and verify code optimizations using MATLAB as a testing framework. Connect MATLAB to environments like Visual Studio and Eclipse to help with debugging C/C++ code. Part 3: Using C/C++ Code with MATLAB MATLAB can integrate existing C/C++ code to perform simulations and prototypes that leverage existing code investments. Part 4: C/C++ Code Generation and Integration Use MATLAB when developing new algorithms to generate C/C++ code that integrates and leverages existing code bases. Part 5: Fixed-Point Designer Convert floating point to fixed point code with MATLAB . Use special data types and tools to determine correct types and word lengths to meet numerical accuracy requirements and target hardware constraints. Part 3: Using C/C++ Code with MATLAB Integrating MATLAB and C/C++, Part 3: Using C/C++ Code with... Integrating MATLAB and C/C++, Part 4: C/C++ Code Generation... Integrating MATLAB and C/C++, Part 5: Fixed-Point Designer Integrating MATLAB and C/C++, Part 1: Introduction Integrating MATLAB into your C/C++ Product Development... Automatically Converting MATLAB Code to C Code Calling MATLAB from C Code MATLAB for C/C++ Programmers MATLAB and C/C++: The Perfect Combination for Signal... Signal Processing Design Using MATLAB and C/C++ Visualizing Random Walk Data, Part 3 Technical Computing with MATLAB, Part 4: Automating Plots... Cleaner Code in MATLAB, Part 1 Visualizing a Simple Saddle Point Algorithm in MATLAB Visualizing Retention Data over Time in MATLAB Analyzing and Visualizing Data with MATLAB Integrating MATLAB in Capstone Projects MATLAB Unit Testing Framework
cc/2020-05/en_middle_0061.json.gz/line1893
__label__cc
0.723368
0.276632
Richi's blog Ultra short throw projector Watching TV can be really expensive if you turn on the TV only for a couple of hours every year. We still have to pay the full CHF 460 annual fee even if we use it only 4 to 5 hours a year. That’s an insanely high CHF 100 per hour. What we do more often is watching videos on the beamer. I enjoy the big screen experience even if the picture is not as sharp as the fancy new 4k TV’s that you see in every store now. But lately our old beamer started accumulating pixel errors. The LED lamp of the five year old Acer K10 was still perfectly fine, but the DLP chip wore out apparently. As it also only supported analog signals, it was about time for a replacement. I wanted something bigger, brighter with at least FullHD resolution. But then it would no longer fit into the small wooden box under the ceiling. So a bit further back, it should be possible to get the cabling from the fridge. This turned out to be not as easy as I first imagined. That’s when I found out about ultra short throw projectors. They make all the cabling much much easier. Instead of transmitting the signals across the room, everything is conveniently in one place just like with a regular TV. Because my wive wanted to be able to watch TV (just in case) and our old TV was not working any more with everything switching to digital, I decided for an LG PF1000U. Most ultra short throw projectors have only WXGA resolution. This was one of the few FullHD ones. As it later turned out, the built in TV tuner was of no use, being for terrestrial signals only. I had to buy a cable tuner separately. As with most bigger acquisitions, I checked where I could buy it with BitCoin. Unfortunately, I couldn’t find a merchant in Switzerland. And the offers from Germany seemed like too much hassle with customs. So I ordered from a regular Swiss retailer, and paid using bitwa.la. Watching movies with it is really a pleasant experience. The picture is a lot better than before, and it does 3D very well, even with $12 shutter glasses from China. Compared to my very first beamer that I built myself from an overhead projector and a flatpanel monitor, it’s worlds apart… Winter is not over yet Once more I was lucky, picking the perfect day to go speedflying in Andermatt. I could complete a couple of flighs like the following one: click here for a screen filling version SIX fintech hackathon I learned of hackathons before. It sounded interesting, but either they were too far away, the topic was not interesting enough, or the date was already booked. This time was different. The topic is really what made it interesting enough. FinTech is about new technology in finance. I’m sure there was innovation in the financial industry in the last 50 years, but it was not very visible, and not as fast as in other industries. Recently I read about an employee in a bank that was asked upon his retirement, what was the biggest change in the last 40 years in his job. His answer was : “air conditioning”. With the advent of BitCoin, the financial sector started feeling some pressure to innovate. I don’t really know how the term FinTech was born, but this all might have contributed. So one thing was clear for me about the hackathon from the beginning: The project had to be about BitCoin. SIX is probably one of (if not the) biggest service providers in Swiss finance. They run the Swiss stock exchange, most card terminals in brick and mortar shops and PayNet where people can receive electronic invoices in their online banking. These are only the most visible products. They organized the hackathon for the first time a year ago. This time it was in two locations: Zürich and London. Watching last years videos I realized that the event would be organized much better than I expected. And the actual event was even better than the videos promised. So I went to the Schiffbau which is a former ship building factory turned into theater. Everything was prepared, and we were welcomed with a dinner. The opening ceremony included a very entertaining speech from an editor of the Wired magazine. Next were presentations for the four workshops. I watched “Blockchain, Smart Contracts and Beyond” and “Cognitive Computing in Fintech”. Both were interesting, but not exactly what I expected. Some teams were already formed, the others went to the match making session. Everybody who had an idea for a project could present it in a few sentences. Then the teams were formed. The Idea I presented to implement a bridge between PayNet and BitPay didn’t spark a lot of interest, so I helped implementing another endeavor. Our team set out to implement a bridge between PayMit and BitCoin, thus we named it BitMit. I knew the name was familiar, but it took me a while to remember that BitMit was also the long defunct Marketplace that worked like eBay, but with BitCoin. The responsibilities were quickly found: Iwan would implement the IOS app, Mark would implement the management dashboard, Roger was responsible for the Presentation of our project and I implemented the backend. We received an API for PayMit that came with an example app. The app had buttons for buying certain products. So Iwan replaced the buttons for different denominations of popular crypto currencies. When a button was clicked, the app would first execute the payment using the PayMit API and then communicate with our BitMit backend. Finally it displays a receipt including the BitCoin transaction ID. Apparently working with Apple’s XCode is a very special experience that is far from intuitive. The back-end was responsible for providing a simple API for the IOS app, interacting with the BitCoin blockchain and managing a BitCoin hot wallet. We chose python and flask to do the task. Most members in our team were familiar with python and flask. I only implemented a very small project with flask a few years ago, but that knowledge was almost enough for the task at hand. I wanted to make use of electrum servers to have it lite weight. But Friday and Satturday we wanted to use the BitCoin testnet, and unfortunately there are no electrum servers for testnet. So I went with BitCoinCore. At first we were not so sure where the backend would run. My notebook would be good enough for the time being. But then the guy from IBM offered to have it running on their cloud. He helped me setting everything up. When connecting with ssh to the ubuntu machine, I didn’t even realize that it ran inside a docker container. And the beast was fast! With the 48 cores and a fast internet connection, the BitCoin blockchain was synchronized in less than six hours. Compliance and auditing is very important for Banks. Thus our Service has to have a means of keeping track what is going on. Mark implemented the front-end using React. I certainly heard this buzzword before, but never saw actual code. It’s quite cool how simple the code looks when the task fits the framework. The presentation or pitch was allowed two minutes max. And a gong would terminate it abruptly on stage. The first iterations were roughly twice that long. It was hard to cut it down to the right duration. Too valuable all the information we wanted to communicate. Roger had a very good opening, which I don’t even know if it was still part of the final pitch. Before entering the final, we gave the pitch a couple of times. Most important was the presentation to the jury. After the pitch the judges could ask us questions. One guy obviously had no clue about how BitCoin works. When this guy was later presented as member of the board and announced the winners, I felt our chances dramatically dwindling. I took a video of the pitch Roger and Iwan gave for the final on the main stage. It is streaming from the ipfs. Our project might be not the most novel idea, but it fills a need. Other projects that were presented sound very funny at first but after thinking it through you don’t think anybody would use it. Still others had only fancy slides but nothing functional to show. But there were also projects that made a really good impression. That is probably the expected outcome from a hackathlon. For me it was a fun and entertaining experience. I will surely participate in other hackathlons. A big thanks to SIX for organizing the event and for all the good food and drinks we enjoyed. An interesting fact that I observed was the computers used by the participants. About 90% of them were from apple. Most of the remaining computers ran some kind of flavor of linux. And I saw a single one running Windows. The Librem 5 phone is still at an early stage Flying AdHoc Network Technical inspection with the Tesla When a product is better than the description Driving around the adriatic sea Raul on Resetting the Logitech K810 bluetooth keyboard ulrichard on locally encrypted remote storage Erik Christensen on Resetting the Logitech K810 bluetooth keyboard Tom on Resetting the Logitech K810 bluetooth keyboard Driving around the adriatic sea – Richi's blog on Road trip to Norway with the Tesla
cc/2020-05/en_middle_0061.json.gz/line1894
__label__cc
0.628826
0.371174
A digital wallet and more Encrypt and store your credit cards or other sensitive images inside cover photos Store Undercover Pics anywhere and share with friends. Get Started - Free Forever! But I don't have anything to hide You might think that you have nothing to hide until your email account gets hacked or one of your other accounts gets phished which is very common these days. If a hacker gains access to one of your accounts, they'll have access to all of your scanned documents and images that contain your personal information such as your social security number, bank account numbers, and signatures. We learned this the hard way which is why we created Undercover Pics. Most of us have these types of images in our email sent box and on our hard drives which are completely unprotected if a hacker is able to gain access to them. Undercover Pics is like having insurance for when these unfortunate circumstances occur. Unlike other privacy apps, Undercover Pics protects and encrypts each individual file, so that the file itself is always protected outside of any application. It's like each file is protected inside it's own battle tank that can travel through enemy territory. Store protected photos on any device Other secure messaging apps offer end-to-end encryption which only protects your photos inside their application. Undercover Pics goes beyond end-to-end encryption by protecting each individual file outside of any application. This means that you can save Undercover Pics anywhere on your phone, computer, email, or network at the office. It doesn't matter where and there's no apps to install. An Undercover Pic doesn't draw attention to itself because only YOU know that there's something hidden inside. To everyone else, it just looks like a regular photo. Security through Encryption The secret photo is not only hidden inside a cover photo, it's also protected under a shield of state of the art AES Encryption algorithms which are currently labeled as sufficient to use in the US government for the transmission of TOP SECRET information. Secure Password Storage Your passwords are stored in one-way, irreversible, bcrypt hashes which means that only you, or the person that knows the true password, can decrypt and view your secret photos. Your privacy is very important to us and we take it very seriously. Your unprotected secret photos aren't stored on the server after an Undercover Pic is created so you never have to worry about your sensitive images falling into the wrong hands. Find out when new features and updates are released. {{ form.subscribeBtnLabel }} Overview Security How it Works Our Story FAQ Plans & Pricing In the News Terms of Service Privacy Policy © 2018 undercoverpics.com
cc/2020-05/en_middle_0061.json.gz/line1898
__label__wiki
0.964719
0.964719
# Trending Ragnar’s sons grow up in ‘Vikings’ Marta Dusseldorp reflects on ‘A Place to Call Home’ Did you see Ragnar’s ‘Vikings’ doppelgänger? Todd Lasance (from left), Daniel Lissing, Indiana Evans and Hamish Michael in "Crownies." (Acorn TV) Reviews: ‘Crownies’ and ‘Janet King’ on Acorn TV Curt Wagner February 13, 2017 Acorn TV gives its viewers a rare opportunity to witness the evolution of a critical hit, Janet King, when its predecessor, Crownies, premieres Feb. 13 on the streaming service. “Crownies” debuted Down Under in 2011 to mixed reviews. But in 2014, the Australian legal drama morphed into “Janet King.” That sequel now has two highly praised seasons under its robe and a third in the works. “Janet King” is a favorite among Acorn viewers, which explains why the service is giving “Crownies” a subtitle, “Janet King: The Early Cases.” But for purposes of this review, let’s stick with “Crownies.” It follows five young solicitors working alongside hardened senior Crown lawyers in the Office of Public Prosecutions in Sydney. These newbies play hard in their personal lives while they wrestle with moral and ethical dilemmas in their professional roles. Think early “Grey’s Anatomy,” but with robes and white wigs instead of scrubs. Like a lot of melodrama, “Crownies” struggles to find an even tone, shifting from flirtatiously sexy to dramatically emotional to just silly. No show, for example, should spend so much time on an office bird kidnapping. The writing is a bit uneven, too. The bad bedroom banter between crownie Ben McMahon (Todd Lasance) and judge’s associate Julie Rousseau (Chantelle Jamieson) would turn off the horniest of Lotharios. That being said, their exchange in an earlier sexcapade is hilarious and even sexy; I so appreciate learning how bonobo chimpanzees say hello. McMahon and his pals—Erin O’Shaughnessy (Ella Scott Lynch), Lina Badir (Andrea Dementriades) Tatum Novak (Indiana Evans) and Richard Sirling (Hamish Michael)—each get their own storylines that range from fine to fantastic throughout the season. Having devoured 10 of the 22 episodes, I’m obviously enjoying “Crownies.” It does a decent job of juggling many characters and plot lines while making pointed commentary on the limitations of the justice system. But the series comes into greater focus when the spotlight shines on a seemingly minor character, seasoned prosecutor Janet King. As Janet, the endlessly charismatic Marta Dusseldorp steals the show. The slow reveal of Janet’s personal life overshadows much of the more frivolous stories. I can imagine the show’s creators, Greg Haddrick and Des Monaghan, on seeing early footage of Dusseldorp’s scenes, screaming, “This is our show, mate!” While “Crownies” is good, “Janet King” is great. The two, eight-episode seasons unfold like novels, with chapters offering unexpected detours that ultimately serve the larger main story. Andrea Demetriades (from left), Todd Lasance, Ella Scott Lynch, Hamish Michael and Indiana Evans in “Crownies.” (Acorn TV) Lewis Fitz-Gerald and Marta Dusseldorp in “Crownies.” (Acorn TV) Marta Dusseldorp and Aimee Pedersen in “Crownies.” (Acorn TV) “Janet King” is equally riveting as a courtroom drama and mystery, with the title character demonstrating expertise as a lawyer and investigator. Dusseldorp is up to the task, too, giving Janet unshakeable strength professionally while showing vulnerability in her personal life. She’s as committed to her character as Janet is to uncovering the truth and getting justice. While rare, the Strong Female Character isn’t completely unknown on TV these days. Dusseldorp’s take feels real and three-dimensional. Also, the show’s matter-of-fact approach to Janet’s sexuality is refreshing; it’s just part of the character’s makeup and doesn’t make the series a “lesbian show.” Dusseldorp is surrounded by many of the best characters from “Crownies.” They are now the supporting players in Janet’s tale, which gives Acorn viewers a chance to watch all the characters and their relationships evolve. This brings up one other joy I find in streaming older international shows: recognizing now familiar actors in their earlier roles. Lasance, for example, played Julius Caesar in the “Spartacus: War of the Damned.” He also appeared in “The Flash” and “The Vampire Diaries.” Fans of Hallmark’s “When Calls the Heart” will see much more of Daniel Lissing in “Crownies.” Acorn TV is a great place for before-they-were-famous spotting, and “Janet King” is one of the best series streaming on the service. “Crownies,” while not essential, is a lot of fun. A chat with Marta Dusseldorp Acorn TVCrowniesJanet King Curt Wagner writer/editor/owner When he was a kid, Curt Wagner used to crawl behind the couch where his parents were sitting to watch TV when he was supposed to be in bed. When he was supposed to be doing homework, he'd watch TV through the space between the door and the wall. Needless to say, Curt got into a lot of trouble. But now the former TV columnist for RedEye Chicago is taking his love of TV and lounging around to the next level by writing about TV full time on his own website. May 2017 TV premieres, finales, movies, specials Curt Wagner April 27, 2017 Acorn TV October 2016 premieres Curt Wagner October 5, 2016 July 2016 TV premieres, movies, specials Curt Wagner June 30, 2016 Acorn TV June premieres: ‘Loch Ness,’ ‘The Heart Guy’ Curt Wagner May 25, 2017 April 2016 TV premieres, specials, movies Curt Wagner March 30, 2016 Acorn TV September 2017 premieres: Doc Martin, 19-2 Curt Wagner August 27, 2017 Follow Show Patrol Ragnar's sons grow up in 'Vikings' TV Show Patrol ©2015 ALL RIGHTS RESERVED | Privacy Policy
cc/2020-05/en_middle_0061.json.gz/line1900
__label__wiki
0.658323
0.658323
Crime, Homepage, Politics, Security Police Finally Arrest Democratic Mega-Donor Ed Buck, After Years of Ignoring Deaths Linked to ‘Violent Sexual Predator’ A US businessman has been described as a “violent, dangerous sexual predator” after a man nearly died in his West Hollywood home, following two identical deaths. Ed Buck, a prominent Democratic donor, was arrested on Tuesday and charged with battery causing serious injury, after years of accusations that he preys on homosexual black men. He is accused of injecting a 37-year-old man with methamphetamine, according to court documents in the latest charge. The man survived the overdose but two gay black men have died in similar circumstances in Mr Buck’s apartment. Gemmel Moore, 26, died of a methamphetamine overdose in the building in July 2017 and Timothy Dean, 55, died in the same way in January 2019. Prosecutors declined to file charges in 2017 over Moore’s death, citing a lack of evidence. Officials now argue, in court filings, that Buck targets vulnerable men and invite them to his home. “Buck is clearly a predator with no regard for human life,” prosecutors said. “His behaviour is malicious and beyond reckless. “His fetish led to the grooming and eventual death of Gemmel Moore. Undeterred, defendant Buck then engaged in the exact same behaviour with Timothy Dean, leading to his untimely death. Shockingly, defendant Buck continued his path of destruction, nearly causing another fatal incident. “His deadly behaviour has not stopped.” It only took a couple dead bodies. READ MORE: Trump promises 'substantial' middle-class tax cut in Baltimore speech to GOP lawmakers ENABLERS: Here's the List of Morally-Bankrupt Democrats Who Took Cash from Ed Buck; A Who's Who of Hypocrites
cc/2020-05/en_middle_0061.json.gz/line1907
__label__wiki
0.853721
0.853721
Tag: Jack Bauer Return of the inflatable mushroom.. or is it a lightbulb? – VCSE’s Racing Digest #35 Commonwealth Games cycling The 20th Commonwealth Games was bookended by its track and road cycling events. With a different mix of events included in comparison to the Olympics there wasn’t quite the same slew of medals seen at London 2012, but that also had a lot to do with the current state of GB track cycling. London was the last hurrah for the riders who had carried the success of the track programme on the shoulders since the beginning of the last decade. Sir Chris Hoy who would see the track events take place in his eponymously named velodrome had originally planned to retire at the games. Victoria Pendleton retired immediately after the London games and was a media presence at the games this time while her sometime nemesis Anna Meares continues to dominate the women’s sprint. Venue for 2014 Commonwealth Games – The Sir Chris Hoy Velodrome Part of the decline in British track cycling’s fortunes since London are put down to the four year Olympic cycle that sees the principal riders of the track team peak in line with that event. In other words; forget about the results now and look forward to Rio. So far the fall off in results doesn’t appear to be having an impact on the popularity of the event. Track meets featuring the medal winners from London like Jason Kenny, Laura Trott and Joanna Rowsell are assured to be a sell out, even if the crowd don’t always get the result they want. The cheers for the household names are always the loudest, irrespective of the outcome in their particular event. The decline has been most keenly felt in the men’s sprint. Hoy had been replaced by the younger Kenny in London, but since he took the Olympic gold his results have been patchy. Physically smaller than Hoy, Kenny wins his races with bike handling and guile more so than outright power, but he’s often struggled to make the final in meets in the last year. He took Silver in Glasgow, losing here to the New Zealand rider Sam Webster. One half of track cycling’s ‘golden couple’ Kenny’s girlfriend Laura Trott took her own Commonwealth gold in the points race, narrowly beating Elinor Barker. In contrast to the emotions shown by some of the home nations medal winners across the Glasgow games Trott had been embroiled in a bit of a social media spat ahead of the games by appearing to downplay the status of the event in comparison to the Olympics. Trott failed to say she had been outright misquoted in the Daily Mail interview, but she didn’t have quite the same profile at these games and seemed happy enough when she thought she had missed out on the winners medal in the immediate aftermath of the points race. The women’s team pursuit where Trott had won the first of her Olympic golds with teammates Roswell and Dani King was missing in Glasgow. The dominant rider of the trio, Rowsell took the individual gold in a display that cements why she’s the current world champion in the event also. One of the successful elements of the track programme (the whole games in fact) was the integration of the paralympic events within the schedule. Scotland’s Craig MacLean took two golds with Neil Fachie in the tandem events after returning to the track. MacLean had been one the very early successes of the GB track programme and his return makes you wonder of Hoy could do something similar in Rio. The likelihood is not, but there’s surely some merit in the MacLean model allowing further integration of paralympic sport as well as the prospect of raisin para sports profile yet further. It’s hard to mention MacLean as a rider returning in search of former glories without mentioning Bradley Wiggins having another tilt on the track. Wiggins returned to anchor the men’s team pursuit squad. Working with the team for barely a week before the games Wiggins seemed happy with a silver medal. As with the sprint the benchmark for success is gold in Rio in two years time. Wiggins is also extremely realistic about what can be achieved, he was similarly sanguine about his silver medal in last years world championship time trial defeat to Tony Martin. Wiggins missed the individual time trial and road race in Glasgow and offered some thinly veiled thoughts on his road racing future in a wide ranging interview the day after the team pursuit. Describing the road scene as “..very political” he confirmed that he no longer expected to lead a team in a grand tour. Out of contract with Sky at the end of this season this admission would appear to limit where Wiggins could go next year, if indeed he does continue to race on the road. He’s been announced as a late call up to Sunday’s Ride London event, an indicator of the fact the Wiggins is box office as far as race organisers (if not Sky) are concerned. With Mark Cavendish choosing to pull out of the race as he continues to recover from his injury sustained at this years Tour it’s possible that Cavendish’s appearance money has been redirected in Wiggins direction. Back to Wiggins plans for next year, the choice seems to be remaining with Sky on the basis that they will be more likely to accommodate his track plans or to do a (likely) very lucrative one year programme with another team who will bank on his marketability. This could open up any number of teams. With Jens Voigt retiring Trek might see the benefit of providing Wiggins with a birth to defend his Tour of California title and he could be a useful counterpoint to Fabian Cancellara in the classics. VCSE has mentioned BMC in the past, but that seems as unlikely as a move to Orica Greenedge who definitely wouldn’t be supportive of Wiggins building up to the track in Rio where Australia will also be targeting medals. Garmin, or whoever Garmin become next season when they hook up with Cannondale as a bike supplier might still be an option but as things stand it’s entirely possible that Wiggins will stay with Sky or even walk away from road cycling altogether. Wiggins retains the capacity to surprise us and whatever he ends up doing it may well be something that no one predicted! Continue reading Return of the inflatable mushroom.. or is it a lightbulb? – VCSE’s Racing Digest #35 Posted on August 11, 2014 Categories Road Racing, Track Cycling, Women's CyclingTags 2014 Tour de France, Adam Blythe, Alberto Contador, Alex Dowsett, Anna Meares, Ben Swift, Benat Intxausti, BMC, Bradley Wiggins, Cannondale, Commonwealth Games 2014, Craig MacLean, Dani King, David Millar, Eileen Roe, Elinor Barker, Emma Pooley, Fabian Cancellara, Garmin, Geraint Thomas, Giorgia Bronzini, Jack Bauer, Jason Kenny, Jens Voigt, Joanna Rowsell, Jon Izaguirre, Laura Trott, Lizzie Armitstead, Marianne Vos, Mark Cavendish, Movistar, Nairo Quintana, Neil Fachie, NFTO, Omega Pharma Quick Step, Orica Green Edge, Peter Kennaugh, Peter Sagan, Petr Vakoc, Philippe Gilbert, Rafal Majka, Ride London 2014, Roman Kreuziger, Scott Thwaites, Sir Chris Hoy, Team Net App, Team Sky, Team UK Youth, Tinkoff Saxo, Tony Martin, Tour de Pologne, Tour of California, Trek Factory Racing, Victoria Pendleton, Vuelta a Espana, Wiggle Honda1 Comment on Return of the inflatable mushroom.. or is it a lightbulb? – VCSE’s Racing Digest #35 Tour de France week 2 review – VCSE’s Racing Digest #33 Nibali running out of rivals As the 2014 Tour de France entered its first rest day speculation turned to who would be the next rider to bring a challenge to Vincenzo Nibali’s reclaimed race lead. Nibali had handed off the yellow jersey that he had claimed with his stage 2 victory in Sheffield to Lotto’s Tony Gallopin for a whole day before he took it back with an emphatic win atop the La Planche de Belle Filles. Can he overtake Nibali? – Alejandro Valverde Alberto Contador’s exit, like that of Chris Froome beforehand, had removed the Tour of its pre-race favourites and potentially leaves this years edition in search of a narrative beyond a seemingly locked on Nibali overall victory in Paris on Sunday. Sky touted Richie Porte as their new team leader, but this was a rider who had seemed out of sorts ever since he was switched from a defence of his 2013 Paris Nice title. That decision was an early indicator that Sky would be backing a solitary horse this season in Froome, although Porte was unfortunate to miss a further opportunity to lead when he missed the Giro through illness. Dave Brailsford has a reputation as a straight talker, however it’s hard to see that continue if he suggests that a rider is “..climbing better than ever” and said rider (Porte) folds on the first day of alpine climbing. The Tasmanian looked as if he knew he was a folorn hope as he was the first of the depeleted GC contenders to loose the wheel on the stage to Chamrousse. Porte fell from second place to sixteenth and with more than ten minutes lost to Nibali conceded that he wouldn’t be a factor in this years race any longer leaving Sky looking for a plan C. As Nibali took his third stage win the GC shake up saw Alejandro Valverde move into second place and three French riders in the top ten. Valverde still occupies second place and perhaps more in search of story than a basis in reality it’s been suggested that he will challenge Nibali in the Pyrenees. With one Pyrenean stage down Nibali the Movistar attack has looked toothless so far. It’s certainly true that Nibali’s Astana teammates are seen as the chink in his otherwise impressive armour, but the truth is they haven’t performed any better or worse than domestiques on the other squads. Valverde had supporters in hand as the peloton climbed the Porte de Bales while Nibali had none, but by the time the latter crested the summit Valverde had been dropped. The two were back together at the finish, won in fine style from the break by Mick Rogers, but the chance for Valverde to take back some seconds had been missed. Another rider leaving the Tour in the Alps was Garmin’s Andrew Talansky. The American had suffered a number of crashes including a spectacular coming together with Simon Gerrans at the finish of stage 7. In pain ahead of stage 11 Talansky was unable to make it back into the peloton and at one point was being gapped further by his teammates drilling the pack on the front. He made the time cut, just, after a period sat on the roadside where he either begged to continue or was persuaded to carry on. The truth of that isn’t clear, but if Talansky ever does a biography there’s a chapter that could write itself. He finished the stage, but was gone the next day. Yesterday’s stage saw a twist to the developing story of the French GC challenge. AG2R have two riders in the top ten at opposite ends of the age scale. Leading the young riders classification at the start of the day was Roman Bardet and he was in the last of the podium places also. His teammate Jean Christophe Peraud was in sixth place, but post stage moved to fourth. It hasn’t always been clear who is leading the team, perhaps the plan was to see who could rise to the challenge across a three week grand tour. Peraud had been very unlucky last year with crashes and broken bones. His stated aim is to finish on the podium in Paris, but that is the goal of the younger rider too. The chances are that this particular story has a few more changes of direction in it yet, but Peraud is the stronger time trial rider and he could end up heading the two. It’s perhaps less clear if there will be an AG2R rider on the podium. Bardet lost third place and the young riders jersey to FDJ’s Thibaut Pinot yesterday.The story of his descending travails have been repeated ad infinitum this year, but it was his climbing that did for Bardet yesterday. It would be interesting to know if Pinot’s motivation for attacking on the climb to Port des Bales yesterday was too gap Bardet or to build an advantage on the descent against riders (like Bardet) who are still stronger going downhill. Perhaps it was both? Outside of the Nibali / Valverde contest, it’s the battle for supremacy among the French riders that creates the most interest. While the VCSE predictions have been pretty poor this year with neck stuck firmly out it’s got to be a Nibali win on Sunday. You have to suspect that Valverde will be happy with second and he has the teammates to protect his second place over the last of the mountain stages before his superior time trial ability will cement the position in place for Paris. Of the French riders it’s less clear. It seems likely that there will be a Frenchman on the podium in 2014,it’s just a question of who. There might yet be another reversal of fortune if Tejay Van Garderen can take back some time today and tomorrow, but that seems like a long shot. A repeat of his 2012 fifth place seems the best to hope for. Best of the Plan B’s Tinkoff Saxo have given an indicator of just how strong they would have been in support of Alberto Contador with two stage wins since his withdrawal on stage 10. Mick Rogers win yesterday was proceeded by a victory for Rafal Majka on stage 14. Both of the wins have come from breaks, but the crucial thing is that the Tinkoff riders have beens strong enough to stay away. In contrast Sky have struggled to really be a factor since the demise of Froome and Porte. Garmin had Jack Bauer come within metres of a stage win on Sunday after another long break that had echoes of Tony Martin’s glorius failure at last years Vuelta. AG2R lead the teams classement built on the platform of Bardet’s and Peraud’s high placings, but perhaps the team that’s managed a high profile through improvising results this year is Lotto. Andre Greipel has taken a stage win, but Tony Gallopin’s day in yellow was followed by the same rider taking a stage win. Another rider having a good Tour is Katusha’s Alexander Kristoff who now has two stage win’s under his belt from the lumpier stages. Marcel Kittel has struggled with the climbs, but will no doubt come good for the main event in Paris on Sunday. Greipel should be in second, but Kristoff is in the form of his life and may scramble to the next best title after Kittel. Two more stages in the Pyrenee’s including the iconic climbs of the Peyresourde, Tourmalet and Hautacam should provide some interesting viewing. Expect Europcar to get into the breaks as the team don’t have anything to show for the race so far in their first year on the world tour. VCSE predicts a breakaway win for both stages as Nibali will probably have his hands full covering Valverde. Movistar may yet go for it on the Hautacam stage tomorrow, but it feels more likely that Valverde will want to be conservative and protect his second place. This years race has been full of surprises though and none the worse for it. It feels like it could only be misfortune that could rob Nibali of his first Tour de France win and that would make him one of a select band to have won all three grand tours. The excitement is likely to come from the French GC battle and the final day’s fireworks on the Champs Elysee. Posted on July 23, 2014 Categories Road RacingTags 2014 Giro d'Italia, 2014 Tour de France, AG2R, Alberto Contador, Alejandro Valverde, Alexander Kristoff, Andre Greipel, Andrew Talansky, Astana, Chris Froome, Dave Brailsford, Europcar, FDJ, Garmin, Jack Bauer, Jean Christophe Peraud, Katusha, Lotto, Marcel Kittel, Mick Rogers, Movistar, Paris Nice, Rafal Majka, Richie Porte, Roman Bardet, Simon Gerrans, Team Sky, Tejay Van Gardaren, Thibaut Pinot, Tinkoff Saxo, Tony Gallopin, Vincenzo Nibali, Vuelta a Espana 2013Leave a comment on Tour de France week 2 review – VCSE’s Racing Digest #33
cc/2020-05/en_middle_0061.json.gz/line1920
__label__cc
0.723557
0.276443
Grouped Link Dayforce Recruiting Privacy Notice This notice describes how we collect, use, share, and secure information within the Dayforce Recruiting product. The primary purpose of this product is to collect recruiting information on behalf of prospective employers. When you fill out an application and hit “submit”, the information you provided in the application is provided to a prospective employer. We do not control the privacy practices of the prospective employer. This notice covers only our practices with respect to your use of the Dayforce product. Ceridian HCM, Inc and its subsidiaries Dayforce Europe Limited, Ceridian Canada Ltd., Ceridian Australia Pty Ltd, and Ceridian Mauritius Ltd. (“Ceridian”) participate in the U.S.-E.U. Privacy Shield Framework . For more about this program and the transfer of data outside the E.U. please refer to the Cross Border section of this notice, below. We collect both personal and non-personal information from you. “Personal Information”, means a data element or combination of data elements that can be used to directly or indirectly identify you. ”Non-personal information” means information that does not directly or indirectly identify you, and including Personal Information that has been de-identified or anonymized. We may collect information from you in the following ways: By Asking - We may collect some information from you by asking that you provide it to us. For instance, if you apply to a job posting you may be asked to provide email address, contact information, educational history or work experiences. Cookies - Many sites use “cookies,” which are small text files that reside on your computer to identify you as a unique user. We may use cookies on our website to allow us to, among other things, measure activity and to personalize your experience. For instance, cookies may enable us to remember your viewing preferences without requiring you to re-type a user name and password. Cookies may also allow us to track your status or progress when requesting products, services, or information. If you choose, you can set your browser to reject cookies or you can manually delete individual or all of the cookies on your computer by following your browser’s help file directions. However, if your browser is set to reject cookies or you manually delete cookies, you may have some trouble accessing and using some of the pages and features that are currently on our website, or that we may put on our website in the future. Web Beacons - A web beacon is an electronic file on a Web page that allows us to count and recognize users who have visited that page. Among other things, a web beacon can be used in HTML-formatted email to determine responses to our communications and measure their effectiveness – for instance, if you get an email from us and click on a link in that email to go to our website. You can generally avoid web beacons in email by turning off HTML display and displaying only the text portion of your email. Web beacons may also provide the type of information provided by cookies concerning your use, preferences, and activity on a website. Web Server Logs - The computers that deliver our web pages to you may record information. For example, a web server log may record the search terms you enter on our websites, the link you clicked to bring you to the web page, your IP address, or cookies that are set on your browser. Other Sources - Other companies may provide us with the contact information of individuals who they think may be interested in, or benefit from, our products or services. We use information collected from you to deliver recruiting services to our clients and to you. We may also use information collected during your use of the product to personalize your experience, or to improve the product, our website or our customer service, and to process transactions. We may share information about you with third parties in certain circumstances including in the following situations: Affiliates - We may share information with companies that we own or control, that are owned or controlled by us, or that are under common ownership or control. Business Transition - In the event that we, or any portion of our assets, are acquired, we may share all types of information with the acquiring company. On-line Applications & Tools - We may offer tools, widgets, or applications on our website, such as search engine functionalities, that are powered by third parties. If you use those applications or tools, any information that you provide may be shared with the third party that provides that functionality. The third party’s use of that information is subject to their privacy policy. Law Enforcement - We may report to law enforcement agencies any activities that we reasonably believe to be unlawful, or that we reasonably believe may aid a law enforcement investigation into unlawful activity. In addition, we reserve the right to release your information to law enforcement agencies if we determine, in our sole judgment, that either you have violated our policies, or the release of your information may protect the rights, property, or safety of Dayforce, or another person. Legal Process - We may share your information with others as required by, or permitted by, law. This may include sharing your information with governmental entities, or third parties in response to subpoenas, court orders, other legal process, or as we believe is necessary to exercise our legal rights, to defend against legal claims that have been brought against us, or to defend against possible legal claims that we determine in our sole discretion might be brought against us. Partners - We may share information with other companies that provide products or services to the recruitment process. Service Providers - We may share information with companies or individuals that provide us with services. These services may include, among other things, providing products or services to you on our behalf, creating or maintaining our databases, researching and analyzing the people who request information from us, preparing and distributing communications, responding to inquiries or as part of the recruiting process. Choice and Consent Ceridian provides notice as to the purposes for which personal information is collected, used, retained, and disclosed. By using this product, you are unambiguously consenting to the collection, use, disclosure and sharing of your provided personal information as described in this notice. An organization may contact you to obtain your specific consent to contact references, to conduct background checks, to obtain sensitive information, and/or for employment verification. Retention and Disposal Ceridian retains personal information only as long as necessary to fulfill the stated purposes or as legally required and thereafter appropriately disposes of such information. Access and Quality Unless Ceridian is permitted or required by law to prohibit access, you may request access to your personal information by contacting Ceridian in the manner set out in the “Enforcement” section of this notice. We will respond to your request within the time limit set out by the applicable privacy legislation and, if applicable, will provide you with an estimate of the of the cost to you associated with administering and responding to your request. How We Secure Information We take reasonable and appropriate measures to help keep information secure, and to help prevent it from becoming disclosed to individuals who are not described in this notice. Even so, no security system is perfect and we cannot promise, and you should not expect, that your information will remain secure in all circumstances. Individuals may raise concerns or complaints regarding their Personal Information with Ceridian by completing this FORM and submitting it via email to: Privacy@Ceridian.com or by mailing it to our Chief Privacy Officer at Ceridian HCM, Inc. 3311 E. Old Shakopee Road, Minneapolis, MN 55425, Tel: 952-853-8100. If an individual files a complaint, Ceridian will investigate the matter or suspected failures to comply with this notice or Ceridian’s Privacy Principles. Ceridian will respond to the individual within 45 days of receiving the complaint. Ceridian will take all appropriate action to remedy any such issues. If the matter cannot be settled, Ceridian agrees to cooperate with the dispute resolution system set forth below. If individuals feel that their complaint was not satisfied, they may file a formal complaint, free of charge, with the regulatory bodies below. In Canada, the Privacy Commissioner of Canada or the Privacy Commissioner in the applicable province Gatineau, Quebec K1A 1H3 In the U.S., the Attorney General in the applicable state In the E.U., the United Kingdom’s Information Commissioner’s Officer or their member state Data Protection Authority. Information Commissioner: Mr. Christopher Graham c/o ICO International Team Water Lane, Wycliffe House Wilmslow-Cheshire SK9 5AF Phone: +44 1 625 54 5 246 Email: International.Team@ico.org.uk To contact the DPAs directly see http://ec.europa.eu/justice/data-protection/bodies/authorities/eu/index_en.htm In Switzerland, the Swiss Federal Data Protection and Information Commissioner Office of the Federal Data Protection and Information Commissioner FDPIC Telephone: +41 (0)58 462 43 95 Telefax: +41 (0)58 465 99 96 Regarding Privacy Shield, complaints should be filed with the entities in the following order: Ceridian, the applicable EU Data Protection Authority, the Department of Commerce, the FTC, and finally the Privacy Shield Panel. Ceridian will conduct periodic assessments to confirm the accuracy of this notice and verify its adherence to Ceridian’s Privacy Principles. In addition, Ceridian will deploy internal auditing measures to monitor its compliance with the Principles and to address all questions or complaints. We may update this privacy notice to reflect changes to our information practices. If we make any material changes to our notice, those changes will apply to information collected after the effective date listed. We encourage you to periodically review this page for the latest information on our privacy policies. Cross Border Transfers Ceridian and its subsidiaries process Personal Information for employers with employees around the world who have contracted for certain services with Ceridian. When rendering such services, the relevant Personal Information is processed in accordance with this notice. For data transfers to the U.S. from the E.U. Ceridian complies with the U.S.-E.U. Privacy Shield Framework regarding the collection, use, retention and disclosure of personal information from the E.U. and E.E.A. to the U.S., and certifies its adherence to the Privacy Shield Privacy Principles of notice, choice, onward transfer, security, data integrity, access, enforcement, and the applicable supplemental principles. To learn more about the Privacy Shield Principles please visit https://www.privacyshield.gov About Ceridian Ceridian HCM, Inc. is a global leader in human capital management whose product offerings include the award winning, cloud-based Dayforce product. Click here to learn more about Careers at COCC © 2019 Ceridian HCM, Inc. All Rights Reserved.Privacy Policy
cc/2020-05/en_middle_0061.json.gz/line1922
__label__cc
0.562629
0.437371
Eye banking and screening for Creutzfeldt-Jakob disease Robert H. Kennedy, R. Nick Hogan, Paul Brown, Edward Holland, Richard T. Johnson, Walter Stark, Joel Sugar Objectives: To quantify the risk of Creutzfeldt-Jakob disease (CJD) among cornea donors, evaluate supplemental screening strategies, and address concerns about the adequacy of current methods of screening tissue donors in the United States. Methods: Reported data on deaths due to CJD and from all causes were used to estimate the rate of CJD among cornea donors. The impact of increased screening on risk of CJD and donor supply was evaluated. Results: Only 1.3 of the approximately 45000 cornea donors in the United States each year might be expected to have CJD. Most of the estimated risk (91%) is due to preclinical (asymptomatic) disease and therefore could not be eliminated by screening for signs or symptoms. If only the highest-risk age group (60 to 69 years) were screened and specificity were 90%, more than 21000 otherwise acceptable donors would incorrectly be excluded over a period of 17.5 years to correctly exclude a single donor with symptomatic CJD. Conclusions: Currently, the risk of CJD transmission following cornea transplantation is remarkably low. Screening for symptoms of CJD would have minimal impact on safety, but would reduce donor supply and likely result in many patients not receiving needed treatment. Archives of Ophthalmology Asymptomatic Diseases Corneal Transplantation Kennedy, R. H., Hogan, R. N., Brown, P., Holland, E., Johnson, R. T., Stark, W., & Sugar, J. (2001). Eye banking and screening for Creutzfeldt-Jakob disease. Archives of Ophthalmology, 119(5), 721-726. Eye banking and screening for Creutzfeldt-Jakob disease. / Kennedy, Robert H.; Hogan, R. Nick; Brown, Paul; Holland, Edward; Johnson, Richard T.; Stark, Walter; Sugar, Joel. In: Archives of Ophthalmology, Vol. 119, No. 5, 2001, p. 721-726. Kennedy, RH, Hogan, RN, Brown, P, Holland, E, Johnson, RT, Stark, W & Sugar, J 2001, 'Eye banking and screening for Creutzfeldt-Jakob disease', Archives of Ophthalmology, vol. 119, no. 5, pp. 721-726. Kennedy RH, Hogan RN, Brown P, Holland E, Johnson RT, Stark W et al. Eye banking and screening for Creutzfeldt-Jakob disease. Archives of Ophthalmology. 2001;119(5):721-726. Kennedy, Robert H. ; Hogan, R. Nick ; Brown, Paul ; Holland, Edward ; Johnson, Richard T. ; Stark, Walter ; Sugar, Joel. / Eye banking and screening for Creutzfeldt-Jakob disease. In: Archives of Ophthalmology. 2001 ; Vol. 119, No. 5. pp. 721-726. @article{31b5005a6ca545a899a63d3e8dd6bf9d, title = "Eye banking and screening for Creutzfeldt-Jakob disease", abstract = "Objectives: To quantify the risk of Creutzfeldt-Jakob disease (CJD) among cornea donors, evaluate supplemental screening strategies, and address concerns about the adequacy of current methods of screening tissue donors in the United States. Methods: Reported data on deaths due to CJD and from all causes were used to estimate the rate of CJD among cornea donors. The impact of increased screening on risk of CJD and donor supply was evaluated. Results: Only 1.3 of the approximately 45000 cornea donors in the United States each year might be expected to have CJD. Most of the estimated risk (91{\%}) is due to preclinical (asymptomatic) disease and therefore could not be eliminated by screening for signs or symptoms. If only the highest-risk age group (60 to 69 years) were screened and specificity were 90{\%}, more than 21000 otherwise acceptable donors would incorrectly be excluded over a period of 17.5 years to correctly exclude a single donor with symptomatic CJD. Conclusions: Currently, the risk of CJD transmission following cornea transplantation is remarkably low. Screening for symptoms of CJD would have minimal impact on safety, but would reduce donor supply and likely result in many patients not receiving needed treatment.", author = "Kennedy, {Robert H.} and Hogan, {R. Nick} and Paul Brown and Edward Holland and Johnson, {Richard T.} and Walter Stark and Joel Sugar", journal = "JAMA Ophthalmology", publisher = "American Medical Association", T1 - Eye banking and screening for Creutzfeldt-Jakob disease AU - Kennedy, Robert H. AU - Hogan, R. Nick AU - Brown, Paul AU - Holland, Edward AU - Johnson, Richard T. AU - Stark, Walter AU - Sugar, Joel N2 - Objectives: To quantify the risk of Creutzfeldt-Jakob disease (CJD) among cornea donors, evaluate supplemental screening strategies, and address concerns about the adequacy of current methods of screening tissue donors in the United States. Methods: Reported data on deaths due to CJD and from all causes were used to estimate the rate of CJD among cornea donors. The impact of increased screening on risk of CJD and donor supply was evaluated. Results: Only 1.3 of the approximately 45000 cornea donors in the United States each year might be expected to have CJD. Most of the estimated risk (91%) is due to preclinical (asymptomatic) disease and therefore could not be eliminated by screening for signs or symptoms. If only the highest-risk age group (60 to 69 years) were screened and specificity were 90%, more than 21000 otherwise acceptable donors would incorrectly be excluded over a period of 17.5 years to correctly exclude a single donor with symptomatic CJD. Conclusions: Currently, the risk of CJD transmission following cornea transplantation is remarkably low. Screening for symptoms of CJD would have minimal impact on safety, but would reduce donor supply and likely result in many patients not receiving needed treatment. AB - Objectives: To quantify the risk of Creutzfeldt-Jakob disease (CJD) among cornea donors, evaluate supplemental screening strategies, and address concerns about the adequacy of current methods of screening tissue donors in the United States. Methods: Reported data on deaths due to CJD and from all causes were used to estimate the rate of CJD among cornea donors. The impact of increased screening on risk of CJD and donor supply was evaluated. Results: Only 1.3 of the approximately 45000 cornea donors in the United States each year might be expected to have CJD. Most of the estimated risk (91%) is due to preclinical (asymptomatic) disease and therefore could not be eliminated by screening for signs or symptoms. If only the highest-risk age group (60 to 69 years) were screened and specificity were 90%, more than 21000 otherwise acceptable donors would incorrectly be excluded over a period of 17.5 years to correctly exclude a single donor with symptomatic CJD. Conclusions: Currently, the risk of CJD transmission following cornea transplantation is remarkably low. Screening for symptoms of CJD would have minimal impact on safety, but would reduce donor supply and likely result in many patients not receiving needed treatment. JO - JAMA Ophthalmology JF - JAMA Ophthalmology
cc/2020-05/en_middle_0061.json.gz/line1924
__label__wiki
0.840637
0.840637
Sherpalo Snapdeal launches its seller experience enhancement platform, Sherpalo Snapdeal, India’s largest online marketplace in terms of sellers, unveiled its new platform, code-named Sherpalo, to enhance seller experience on its platform.Biswarup Gooptu | ET Bureau | Updated: December 12, 2015, 10:04 IST Snapdeal, India’s largest online marketplace in terms of sellers, unveiled its new platform, codenamed Sherpalo, to enhance seller experience on its platform, the New Delhi-headquartered company announced on Thursday. Sherpalo, according to a company-issued statement, provides a single window access to all seller services, a list that includes - on-boarding, training, product listing, inventory, order and returns management, advertising, third-party services, capital assistance and help centre - that will make it more convenient for them to manage and optimise their online operations. “With over 2,00,000 sellers now using our marketplace to grow their business, our endeavour is to use technology to help them in becoming more successful and to scale their business effectively. The guiding principle behind introducing this easy and intuitive panel is our promise of ‘Online Business Made Easy’,” said Vishal Chadha, senior vice-president - Market Development at Snapdeal. According to the statement issued by the company, the Sherpalo platform enables listing verification process through image classification, algorithmic score of image quality and allows sellers to click and add products via mobile, making cataloguing extremely easy for them. “We are excited to launch ‘Sherpalo’ for our sellers. Similar to the process we followed to refresh our customer interface earlier this year; we have mapped seller journeys on Snapdeal and tailored the interface to suit their needs effectively. We are confident that the new interface will make it extremely convenient for small and medium enterprises to grow their businesses on Snapdeal,” said Anand Chandrasekaran, chief product officer at Snapdeal. The platform also allows sellers to access self-learning videos and generates performance reports, helping identify areas of improvement in operations, according to the press release. “The new seller platform provides world class experience with complete visibility and better planning tools to enable our sellers to manage their businesses even better, leading to higher business growth, liquidity and profitability,” Chadha was quoted in the press release. The refreshed seller panel is available on both web and app platforms. The launch of the Sherpalo platform is the latest in a slew of initiatives announced by Snapdeal over the course of the year. The company has a stated objective of bringing on board 1 million micro, small and medium enterprises (MSMEs) on to its platform over the next three years. In July earlier this year, the e-tailer announced that it would provide instant loan approval facility on its seller financing platform, Capital Assist, which was launched in August 2014, and which provides its sellers access to funding to meet working capital needs, among others, as they look to expand their businesses. Also in July, it relaunched a previous acquisition - Shopo - as a mobile app-focused, zero commission goods and services marketplace, targeted at the country’s vast, yet under-penetrated MSME sector. Founded in 2010 by Wharton alum Kunal Bahl and IIT Delhi graduate Rohit Bansal, Snapdeal, which is valued at over $5 billion after its latest round of funding, counts marquee strategic investors, such as SoftBank, Foxconn Technology Group and Alibaba Group, amongst its backers. Tags : Internet, Sherpalo, e-commerce Trending in Internet Oyo may cut more jobs to shore up bottom line How technology is changing your neighbourhood store Mastercard in talks to invest in Pine Labs
cc/2020-05/en_middle_0061.json.gz/line1929
__label__wiki
0.840887
0.840887
Report: Self-driving car startup Aurora is raising capital at a $2B valuation Kate Clark @kateclarktweets / 1 year Early last year, LinkedIn co-founder and prolific venture capital investor Reid Hoffman called Chris Urmson “the Henry Ford of autonomous vehicles (AV).” The vote of confidence and big check from Hoffman, coupled with a team of deeply knowledgable AV entrepreneurs, has catapulted his company, Aurora Innovation, squarely into “unicorn” territory. Aurora, the developer of a full-stack self-driving software system for automobile manufacturers, is raising at least $500 million in equity funding at more than a $2 billion valuation in a round expected to be led by new investor Sequoia Capital, according to a Recode report. A $500 million financing would bring Aurora’s total raised to date to $596 million and would provide a 4x increase to its most recent valuation. The company, founded in 2016, raised a $90 million Series A last February from Hoffman’s Greylock Partners and Index Ventures . Hoffman and Index general partner Mike Volpi joined Aurora’s board as part of the deal. Greylock and Index are Aurora’s only existing investors, per PitchBook data. The young business has a lean cap table often characteristic of startup’s led by experienced entrepreneurs able to secure financing deals briskly from top VCs. Aurora’s C-suite is chock-full of veteran AV workers. Urmson, for his part, formerly headed up the self-driving vehicles program at Google, now known as Waymo. Chief technology officer Drew Bagnell was head of perception and autonomy at Uber and Sterling Anderson, Aurora’s chief product officer, directed the autopilot program at Tesla from 2015 to 2016. “Between these three co-founders, they have been thinking and working collectively in robotics, automation automotive products for over 40 years,” Hoffman wrote in a blog post announcing Aurora’s Series A funding. In addition to the high-caliber of the founding team, Aurora’s collaborative approach to building self-driving cars has attracted investors, too. The company has partnered with a number of automotive retailers to integrate its technology into their vehicles and make self-driving cars a “practical reality.” Currently, Aurora counts Volkswagen, Hyundai and Chinese manufacturer Byton as partners. 2018 was a banner year for VC investment in U.S. autonomous vehicle startups. In total, investors poured $1.6 billion across 58 deals, nearly doubling 2017’s high of $893 million. Around the world, AV startups secured $3.41 billion, on par with the $3.48 billion invested in 2017, per PitchBook. Though we are just days into 2019, LiDAR technology developer AEye has completed a previously announced $40 million Series B. The Pleasanton, Calif.-headquartered company raised the funds from Taiwania Capital, Kleiner Perkins, Intel Capital, Airbus Ventures and Tychee Partners. And last week, Sydney-based Baraja, another LiDAR startup, brought in a $32 million Series A from Sequoia China, Main Sequence Ventures’ CSIRO Innovation Fund and Blackbird Ventures. Lidar startup AEye raises $40M Series B led by the Taiwanese government’s investment firm
cc/2020-05/en_middle_0061.json.gz/line1930
__label__wiki
0.795229
0.795229
Tennis Atlantic Because Matches Are Never Played in the Media Tent Meet Our Journalists And Contributing Professionals Advertising Inquiries and Partnership Opportunities Steen Kirby (Editor/ATP) Steve Fogleman (Editor/ATP/WTA) Niall Clarke (WTA/ATP) Dan Evans All posts tagged Dan Evans Angelique Kerber edges Halep in Eastbourne Posted in: ATP, Eastbourne, LTA, On Site, WTA. Tagged: 2019 Nature Valley International, angelique kerber, ATP Eastbourne, British Tennis, Dan Evans, Eastbourne International, Kiki Bertens, Kyle Edmund, Nature Valley International, Simona Halep, WTA Eastbourne. Leave a comment Eric Han for Tennis Atlantic Quarterfinal day here at the Eastbourne International gave the fans plenty of excitement as it not only featured the top seeds of the tournament, but also home crowd favourites Kyle Edmund and Dan Evans. The marquee match arguably was on the women’s as two former world no.1’s, Angelique Kerber and Simona Halep, battled it out for a place in the semifinals tomorrow. Eventually, the current reigning Wimbledon champion, Kerber, defeated Halep comfortably in straight sets 6-4 5-3. After the match, Simona Halep commented on how good Kerber played today: “She played really well today. I didn’t play bad. I think that I missed a little bit too much in some points, important points, and I didn’t take my chances. Also, in the second set, first game, I had 40-15 on my serve and I couldn’t take the game. But in my opinion, it was a good match. When asked about her expectations about looking forward to Wimbledon: “Expectations are pretty okay in my head, but I don’t put pressure. Just match by match, and we will see how good I can be on grass this year. Meanwhile, the battle of the Brits took place as British no.1 Kyle Edmund played his countryman Dan Evans. After dropping the first set 6-1, Edmund upped his intensity and won the subsequent two sets 6-3 6-4 and booked his place in the semifinals. In his press conference after his match, Edmund said: “A poor start in terms of getting in the match. Like, you could say, yeah, credit to Dan for sort of putting his stamp on it. But also, I think I could have done a lot better and a lot more to stop that or put a bit more of my stamp on it.” “But the best thing from that is to react to it, and I did. Just got more engaged. Put my sort of personality and engagement into the match and my game almost. I have good ability to be aggressive and take control of rallies and games, so it was really good for me, obviously not playing a lot of matches” Other notable results worthy of mention are the third seed Kiki Bertens beating the eighth seed Belarusian, Aryna Sabalenka, in a three-set thriller 6-4 3-6 6-4. On the men’s side, two youngsters battled it out as Taylor Fritz beat Hubert Hurkacz of Poland 6-4 7-6. Tomorrow’s semifinal on the men’s side will be Brit Kyle Edmund taking on America’s Taylor Fritz and qualifier Thomas Fabbiano playing America’s Sam Querrey. On the women’s side, the two semifinal matches will be the defending Wimbledon champion, Angelique Kerber taking on Tunisia’s Ons Jabeur and Czech’s Karolina Pliskova playing Kiki Bertens of Netherlands. Konta beaten by Ons Jabeur in Eastbourne on Day 4 Posted in: ATP, Eastbourne, LTA, On Site, WTA. Tagged: 2019 Eastbourne International, 2019 Nature Valley International, atp, ATP Eastbourne, British Tennis, Dan Evans, Eastbourne International, Jo Konta, Kyle Edmund, Nature Valley International, Ons Jabeur, Taylor Fritz, Thomas Fabbiano, wta, WTA Eastbourne. Leave a comment The biggest shock on Day 4 at the Eastbourne International was British women’s number one, Johanna Konta, beaten by world no. 62, Ons Jabeur in straight sets 6-3 6-2. After the match, Konta analysed her match and said: “Well, to be honest, I mean, I think I just played an opponent who played very well today. I didn’t feel like I actually did too much wrong. Actually, I don’t think I did anything wrong. There is very few things I could have tried differently or more of, but to be honest, I actually thought I did quite well in the amount of questions I asked my opponent today, and she just was answering them every time.” “It’s just she played incredibly well. She was able to get back balls from different positions of the court and hit winners from different positions of the court. Any changes of rhythm that I actually tried to give, yeah, she was just able to find her range and find her game from any balls that I gave her, which obviously makes it quite difficult for me not to be able to kind of put her on the back foot at all.” When asked about whether she tried to change anything strategically in the game, Konta said: “I tried to obviously sometimes slow down the balls a bit because I know she absorbs pace very well. And then I tried to speed it up, because I tried to get at it that way. I tried to sometimes go through the middle a bit more. She was moving around the ball quite well. So then I tried to move it out wide.” “She was moving well out wide (smiling). So then I tried to use slower slices. I tried to use faster slices. I actually thought I varied my serve quite well. I went through pretty much every serve I can hit.” On the men’s side, the top two seeds were eliminated. America’s Taylor Fritz defeated the number one seed, Guido Pella in three close sets, 6-4 3-6 6-4. Also, the number two seed Laslo Djere was eliminated by qualifier Thomas Fabbiano in two tiebreak sets 7-6 7-6. Looking ahead to Thursday, the marquee match on the women’s side will be former world no. 1 Simona Halep taking on defending Wimbledon champion, Angelique Kerber. On the men’s side, it is the battle of the Brits, as British no.1 Kyle Edmund playing against his compatriot Dan Evans. Edmund commented about his upcoming Evans match “He’s seeing the ball well. It’s another opportunity for me just in the match itself, forgetting about Dan… I just gotta get out there and play my best, really. Last few days I have been in a good place playing. I liked how I transferred that to the match court today. Hopefully I can keep improving.” “Dan’s game is obviously, backhand probably 75% is slicing or something. I think there will be a bit more longer rallies with Dan because he slows up the ball a lot more.” British Players Jo Konta and Dan Evans Win in Eastbourne Posted in: ATP, Eastbourne, LTA, On Site. Tagged: 2019 Eastbourne International, 2019 Nature Valley International, 2019 WTA Eastbourne, angelique kerber, British Tennis, caroline wozniacki, Dan Evans, Eastbourne International, Jo Konta, Johanna Konta, Nature Valley International, Simona Halep, WTA Eastbourne, wta tennis. Leave a comment British no.1 Johanna Konta came through two tough sets today 6-4 7-6, against Greece’s Maria Sakkari to advance to the next round at the Eastbourne International. After the match, Konta said: “Maria played well, to be honest. Yeah, no, I’m pleased I was able to stay calm and also just a good perspective. I don’t think anything major happened. It was important to see it that way and see the good things that I was doing. Yeah, I mean, it could have easily gone to a third set, so I definitely wasn’t taking anything for granted out there. Yeah, just pleased to have just, yeah, kept a good perspective and just competed well.” “I’m very pleased to come through that. I think there was so little in it and in both sets. Our points actually felt that she was playing better than me, so I was just really pleased that I was able to stay with her and create a few opportunities and take a few of them. So, yeah, pleased I have come through.” She will face Tunisia’s Ons Jabeur in the third round, who she played back in 2015 in Sydney qualifying- a match that the Brit won comfortably in straight sets 6-2 6-2. British player Dan Evans also came through today by beating Moldova’s Radu Albot 7-6 6-2. In the press conference, he said: “Today I felt a bit flat at the start but got into it. You know, I hung around a lot last week, played dubs. So I was a bit lethargic at the start, but I thought I got going and I’m pretty happy with the end of that match. Yeah, it was a good match. It’s a great week for me.” When asked about his thoughts about being back again competing in Eastbourne, Evans commented, “Yes, I mean, it’s nice to being back here, having another good match on grass before Wimbledon. That’s why I’m here. I like to play here on (the) grass, so I try to enjoy every match and every moment right now.” Defending Wimbledon champion Angelique Kerber had a tricky match-up as she played former top world 10 player, Samantha Stosur, but nevertheless prevailed in straight sets 6-4 6-4. In her press conference, she discussed the differences between winning her maiden Grand Slam title in Australia and winning Wimbledon last year. “I think after I won Australia, a lot of things change. I mean, especially in Germany. It was so huge that someone after Steffi won the first Grand Slam, and, yeah, without expectation, I played in Australia and everything.” “And of course then to winning Wimbledon as my third Grand Slam was even more special, because it was not just that I had the lucky draw or I just won my first one. It was my third one. And Wimbledon was always the tournament that I really would like to win one day.” Other notable mentions are sixth seed Simona Halep taking out Taiwan’s Hsieh Su-wei 6-2 6-0 and Caroline Wozniacki beating Andrea Petkovic 6-4 6-4. 2017 ATP Dubai Preview and Predictions (@DDFtennis) Posted by Admin on February 27, 2017 Posted in: ATP, Dubai, Steen Kirby. Tagged: 2017 ATP Dubai, 2017 ATP Dubai Predictions, 2017 ATP Dubai Preview, 2017 Dubai Duty Free Championships, 2017 Dubai Duty Free Tennis Championships Predictions, Andy Murray, Andy Murray Dubai, ATP Dubai, ATP Dubai Predictions, ATP Dubai Preview, Dan Evans, Dubai Duty Free Championships, gael monfils, roger federer, Roger Federer Dubai, Stan Wawrinka, Stan Wawrinka Dubai. Leave a comment 2017 ATP Dubai Preview and Predictions Steen Kirby, Tennis Atlantic The ATP World Tour returns to the Middle East for ritzy 500 level action in Dubai, where a host of elite ATP players are vying for the title. Here is your preview with predictions of the Dubai tennis championships. ATP World Tour 500 Surface: Hard Prize Money: $2,429,150 Top 4 seeds (ATP ranking in parentheses) 1: Andy Murray (1) 2: Stan Wawrinka (3) 3: Roger Federer (9) 4: Gael Monfils (12) A solid field features in Dubai, including three top-10 ranked Grand Slam champions. First round matches to watch: Philipp Kohlschreiber vs. (8)Gilles Muller Kohli has yet to find rthymn this season while Muller hasn’t had great draws since winning Sydney. Despite the h2h in favor of the German, Muller should be able to serve well enough to gain a narrow victory in this one. (3)Roger Federer vs. Benoit Paire Federer has never lost to Paire, and of course he won the Australian Open. Paire meanwhile has dropped three straight matches after posting an ATP semi a couple of weeks ago. Still this is a great style matchup between one handed backhands, Paire likely doesn’t believe he can win this, but this is a form check match for Federer. Daniel Evans vs. Dustin Brown Brown hasn’t played well since injuring his back, but he’s still a dangerous serve and volleyer if the surface plays quick. Evans is in the midst of a tremendous 2017, and will look to continue to the momentum in this tournament stop. His one handed backhanded should be good enough to gain a victory, but Brown is a tricky opponent. Top Half: Andy Murray will start his journey in Dubai against Malek Jaziri, who always gets local crowd support. He should win that match, and then defeat either Guillermo Garcia-Lopez or more likely Viktor Troicki to reach the quarterfinals. Waiting for him in the quarters should be Muller/Kohlschreiber, but Daniil Medvedev is an intriguing dark horse. The Russian has two quarterfinals and an ATP final this season. He’s posted rapid improvements at a young age, and I have him outgunning Muller before falling to Murray in the quarters. Seven-time Dubai champion Roger Federer will face a qualifier or Mikhail Youzhny after taking on Paire. Federer should beat the veteran Youzhny, and then face the finalist in Marseille Lucas Pouille. Pouille found form in France and should put away a struggling Adam Pavlasek, then J.L. Struff or a qualifier to reach the quarterfinals. A fresher Federer has the edge on Pouille. Bottom Half: Defending champion Stan Wawrinka starts his title defense against Damir Dzumhur, with Jiri Vesely or Marcel Granollers to follow. None of the players in this section are in great form, Wawrinka should be fresh and focused though. In the quarterfinals Tomas Berdych, 8-3 in 2017, looms. Berdych faces a qualifier first, with Robin Haase or a qualifier to follow in a weak section. Wawrinka leads the h2h with Berdych 11-5 and has dominated the matchup recently, he should reach the semifinals. Two talented shotmakers, Roberto Bautista Agut and Gael Monfils, should face off in the quarterfinals. Monfils faces wild card Mohamed Safwat, with Evans/Brown to follow, while RBA will face a struggling Karen Khachanov, with Florian Mayer or Fernando Verdasco to follow. Only RBA has form in this section and should reach the quarters. Monfils has a 3-0 h2h against RBA and is the favorite to reach the semifinals. Dark Horse: Daniel Evans The Monfils/RBA section is the weakest part of the draw, creating an opening for Evans to perhaps reach the quarterfinals or better if he plays his best tennis. The Brit is a solid part of the ATP tour at this point, but with his game still improving, he could become more than that. Federer d. Murray Wawrinka d. Monfils Federer has won five straight against Murray, while Wawrinka has a 3-2 h2h edge over Monfils. Given his form in Melbourne, Federer is the favorite against the world #1. Federer d. Wawrinka Federer has a 19-3 h2h win over Wawrinka and a h2h this year, we could see an all-Swiss final, and Roger will be the favorite. 2017 Australian Open Week 2 Men’s Preview and Predictions Posted in: ATP, Australian Open, Steen Kirby. Tagged: 2017 Australian Open, 2017 Australian Open Week 2, Andy Murray, australian open, Australian Open Predictions, Australian Open Preview, Australian Open week 2, Dan Evans, david goffin, denis istomin, gael monfils, Grigor Dimitrov, Jo-Wilfried Tsonga, Kei Nishikori, milos raonic, rafael nadal, roger federer, Stan Wawrinka. Leave a comment Week 1 at the 2017 Australian Open is in the books, and what a week it’s been. World #1 Novak Djokovic fell to a stunning five set defeat in round 2 at the hands of qualifying wild card Denis Istomin, who started the tournament ranked outside of the top 100. That opens up the bottom half of the draw, and makes it more likely that we’ll have a new Grand Slam champion, and perhaps finalist as well. Here is your look ahead to week 2, with predictions for what’s to come. Round of 16 matches (1)Andy Murray vs. Mischa Zverev Murray hasn’t dropped a set through three matches. Illya Marchenko and Sam Querrey both gave it a good effort, while teenager Andrey Rublev didn’t play quite as well, but regardless, the world #1 is the favorite to take his first ever Aussie Open title. Zverev continues a late career breakthrough, he stunned John Isner 9-7 in a 5th set in round 2, and also earned wins over Guillermo Garcia-Lopez and Malek Jaziri. Zverev’s serve and volleying has been difficult to stop thus far, but Murray is a tremendous returner, and is a clear favorite in this match with a 3-0 h2h. (17)Roger Federer vs. (5)Kei Nishikori Federer has beaten Nishikori the past three times they met, and hasn’t dropped a set outside of his round 1 victory against Jurgen Melzer. Noah Rubin and Tomas Berdych were both dominated by the Swiss maestro, who is fit, and highly motivated at age 35. Nishikori struggled with his serve, needing five sets to put away Andrey Kuznetsov in round 1, but has looked much better in matches against Jeremy Chardy and Lukas Lacko that were both completed in straights. Nishikori has the game to trouble Federer, but the Swiss veteran is a clear favorite, his aggressive ball striking should be superior in this one. (4)Stan Wawrinka vs. Andreas Seppi Wawrinka has won the last three meetings against Seppi, and although he’s had a shaky start, dropping sets in two of his three matches, he’s still a dangerous player left in the draw. Stan the man needed five sets against big hitter Martin Klizan, beat Steve Johnson in straights, and then narrowly avoided five sets against Viktor Troicki, winning a fourth set tiebreak. Seppi should be a bit exhausted as he dropped sets against both Paul-Henri Mathieu and Steve Darcis. In round 2, Seppi stunned Nick Kyrgios 10-8 in the 5ht set, coming back from two sets down to defeat the home favorite. Seppi’s steady play contrasted with Kyrgios roller coaster form, and eventually frustrated the young gun into defeat. Seppi’s steadiness will likely trouble Wawrinka as well, but Wawrinka should tighten his game up and hit enough winners to prevail. (12)Jo-Wilfried Tsonga vs. Dan Evans The former AO finalist Tsonga got a huge win over Jack Sock in four sets in his last match, and he’s also defeated Thiago Monteiro and Dusan Lajovic to reach the second week. The in-form Evans is playing the best tennis of his career. The new top 50 player has won seven of his last eight matches, behind a powerful and versatile one-handed backhand. Evans upset Bernard Tomic, and also Marin Cilic in four sets, in consecutive matches, he also beat Facundo Bagnis in round 1. Tsonga is a good attacking player, but Evans motivation has been something to watch recently. I’m going with an upset, and have Evans reaching a first ever slam quarterfinal. (6)Gael Monfils vs. (9)Rafael Nadal Nadal leads the h2h 12-2. Having lost weight, Rafa is playing better on hard courts than he has in recent years, and he looks fit, and newly aggressive on his groundstrokes, taking the ball earlier in rallies. The Spaniard needed five sets to defeat a powerful Alexander Zverev in round 3, as he outlasted the young gun with strong defensive play. Rafa also had easy wins against Florian Mayer, and Marcos Baghdatis in round 1 and 2. Monfils has wins against Jiri Vesely, Alexandr Dolgopolov, and Philipp Kohlschreiber, dropping just a set to Dolgopolov. The Frenchman is playing quite well right now, but I don’t think he’s good matchup for Nadal, given Nadal’s top spin tends to push him back and away from the baseline. (13)Roberto Bautista Agut vs. (3)Milos Raonic Milos Raonic is suffering from flu, but leads the h2h 4-0 against RBA and is playing well, with his serve, volleys, and groundstrokes all clicking. Raonic defeated Dustin Brown, Gilles Muller, and Gilles Simon through three rounds, dropping just a set to Simon. RBA dropped a set to David Ferrer, but he’s in a great form, having posted routine wins against Guido Pella and Yoshihito Nishioka. RBA is 7-0 to start the season, but unless his return game improves considerably, Raonic has to be the favorite. (8)Dominic Thiem vs. (11)David Goffin Thiem has won three of his last four matches against Goffin and the young Austrian continues to cement himself as a top 10 player. Wins against J.L. Struff, Jordan Thompson, and Benoit Paire allowed him to reach the second week, even though he dropped sets in all three matches. Goffin is also a picture of steady tennis, after slipping past Reilly Opelka in five sets in round 1, he had no trouble with Radek Stepanek, and Ivo Karlovic, winning those matches in straight sets. The qualifier Opelka’s versatile game bothered Goffin, and Thiem isn’t the easiest opponent. That said, Thiem was having problems on serve in his last match, and seems to still be suffering from shoulder problems. Goffin is a clear favorite. (15)Grigor Dimitrov vs. (WC)Denis Istomin Outside of a bad set against Hyeon Chung in round 2, Grigor Dimitrov has been playing great, posting eight straight wins, including routine victories over Chris O’Connell and Richard Gasquet. Most people expected Gasquet to put up a better showing, but Dimitrov simply dismantled him, playing especially well on return games. The draw has opened up, thanks to Denis Istomin. Istomin was nearly defeated in a pre-qualifier to gain a wild card to the AO, but instead he played the match of his life, handing Novak Djokovic his worst defeat since 2008 with a confident five set victory. Djokovic started the match slow, and never was able to gather momentum, Istomin’s great ball striking and confident serving allowed him to overcome leg cramps to win two tiebreaks, and the fifth set. Djokovic was especially poor on return and spewed errors. Istomin’s first victim was Ivan Dodig in round 1, and Pablo Carreno Busta lost to Istomin in round 3, falling in five sets, after taking the 4th set. Istomin has proven that he may be set for a return to being an ATP regular, but Dimitrov is the more consistent and higher ranked player. Istomin’s run should end in the round of 16. Predictions for the remaining rounds Murray d. Federer in 4 Wawrinka d. Evans in 3 Raonic d. Nadal in 5 Dimitrov d. Goffin in 4 Murray will have a difficult match against Federer, but the fresher, younger, and better player at this point in their careers should prevail. Wawrinka’s backhand is better than Evans, and his experience should win out. Raonic and Nadal is a tough match to call, but on hard courts I’ll still go with Raonic. Dimitrov should have more upside than Goffin given his recent form. Murray d. Wawrinka in 4 Raonic d. Dimitrov in 5 Murray and Raonic should be clear favorites to reach the final, Dimitrov is a wild card to reach his first ever slam final though, depending on Raonic’s health. Murray d. Raonic in 4 Raonic’s serve is a great weapon, but Murray’s elite return game neutralizes that. The World #1 should win his first ever Australian Open title, defeating Raonic just like he did in the Wimbledon final. Sock and Muller Claim Rare ATP Titles in Run Up to Melbourne Posted in: ATP, Auckland, Steen Kirby, Sydney. Tagged: 2017 ATP Auckland, 2017 ATP Sydney, Apia International Sydney, ASB Classic, ATP Auckland, ATP Recap, ATP Sydney, Dan Evans, gilles muller, Gilles Muller Sydney, Jack Sock, Jack Sock Sydney, Joao Sousa. Leave a comment ATP Auckland Jack Sock rose to a career high top 20 ranking with his second career ATP title. The 24 year old American continued his red hot start to the 2017 season by claiming the championship in Auckland, where he reached the final last year. Sock’s win over Joao Sousa was a thrilling contest ending 6-3 5-7 6-3. Sock went up a set thanks to great returning and looked set to win in straights, but Sousa fought back for a late break with some tremendous shotmaking. Sousa would then go up a break in the third, but he surrendered two further breaks in the third set to hand Sock the hard fought trophy. Sousa beat Albert Ramos, Brydan Klein, Robin Haase, and Marcos Baghdatis to reach his eight career ATP final, dropping to a 2-6 career record in those finals. Sock moved to a 2-5 career ATP final record thanks to wins over Ryan Harrison, Jeremy Chardy, and Steve Johnson. Three of his four match wins this week came in three sets, as the Auckland crowd certainly enjoyed watching him battle. Marcin Matkowski and Aisam Ul-Haq Qureshi defeated Jonathan Erlich and Scott Lipsky in the doubles final. ATP Sydney Gilles Muller won his first ever ATP title at 33 years of age with a 7-6 6-2 victory over Britain’s Daniel Evans. Muller started the Sydney tournament as one of the best players to never win a title, and ended it as a very happy ATP champion. Muller was 0-5 in previous ATP finals, but Evans, playing in his first ever ATP title at age 26, wasn’t up to the task of dismantling his effective serves. Muller dropped sets against Alexandr Dolgopolov, and Matthew Barton before going on to defeat Pablo Cuevas, and Viktor Troicki in straight sets. Evans had three set contests all week, defeating Thiago Monteiro, Marcel Granollers, Dominic Thiem, and Andrey Kuznetsov. His one hand backhand continues to improve and he appears set to secure his place on the ATP stage in 2017. His win over Thiem was one of the best of his career, as he outlasted the Austrian late in the match. Dutch pairing Wesley Koolhof and Matwe Middelkoop defeated Jamie Murray and Bruno Soares in the doubles final. Garcia-Lopez Upset, Verdasco Advances, Tuesday @bbtatlantaopen Posted in: Atlanta, ATP, BB&T Atlanta Open, On Site, Steen Kirby. Tagged: 2016 ATP Atlanta, 2016 BB&T Atlanta Open, ATP Atlanta Tuesday, atp. atlanta, BB&T Atlanta Open, BB&T Atlanta Open Tuesday, Bjorn Fratangelo, Dan Evans, fernando verdasco, Guillermo Garcia-Lopez, Horacio Zeballos, Julien Benneteau, Sergiy Stakhovsky, Taylor Fritz, tobias kamke, Yoshihito Nishioka. Leave a comment Garcia-Lopez Upset, Verdasco Advances, Tuesday at 2016 BB&T Atlanta Open Steen Kirby, Tennis Atlantic\ The Spaniards at the 2016 BB&T Atlanta Open, Guillermo Garcia-Lopez, and Fernando Verdasco had mixed results on Tuesday when both were in action on stadium court. A lengthy rain delay made the match between Garcia-Lopez and Horacio Zeballos take most of the afternoon, as Zeballos prevailed in an upset victory 6-3 6-7 6-4 over the Spaniard in two and a half hours of match play. Both players got off to a shaky start, but were able to hold their serves until the eight game of the match, where Zeballos broke Garcia-Lopez, and held the next game at love to capture the first set. Garcia-Lopez struggled mightily with his serve all match, his first serve percentage was under 50%, and the quality of his serves was lacking. Both players also hit a number of slow, and high spinners from their backhand side, as they didn’t seem entirely comfortable on hard court compared to clay. The hot conditions also took their toll on the volunteers, as well as the players, as a ball girl passed out in the first set, causing a delay. Despite his troubles on serve, Garcia-Lopez didn’t waver in the second set, saving a break point in his opening service game, and breaking Zeballos, who also served poorly, but methodically, to go up 3-1. Zeballos would break back, but had to save four set points to send the match into a second set tiebreak. Zeballos lost three straight points from 5-4 up in the tiebreak, and the match was sent into a third set. Garcia-Lopez played a poor third set however, as he was broken at love with a miserable game serving 1-2, and Zeballos would go 5-4 up, before rain came, and the Argentine had to wait over an hour to try to serve the match out. He was broken easily when the players returned to court, and Garcia-Lopez was given a second life, however, he was broken and lost the match in the next game serving 4-5, as Zeballos converted his second match point/break point opportunity. The frustrated Garcia-Lopez slammed his racquet on the ground, as Zeballos let out a roar of excitement. It was just not to be for GGL on the day. The win improves Zeballos to 11-5 in hard court matches this season, and he has reached the second round of an ATP main draw for the second tournament in a row. Fernando Verdasco had better luck on the day against Dusan Lajovic, winning 7-6 6-4. A cagey match saw neither player earning a break point chance early and the first set going to a tiebreak. Verdasco took the initiative when needed, and then broke Lajovic midway through the second set, and held serve after facing two break points in the next game to go up 4-2. Lajovic was nearly ousted quicker than he was as he could have went down a double break, but he saved three break points to hold, and Verdasco went on to serve it out 6-4. Verdasco’s forehand was all he needed to dictate play on a hard court and smack winners when needed. French veteran Julien Benneteau played his best match of the season to earn a 6-4 6-2 win over J.P. Smith. Benneteau has just two ATP main draw wins this year now, but his game has clearly picked up. Benny didn’t face a single break point, as Smith meekly conceded three breaks in total and was wiped off the court. Lucky loser Tobias Kamke made the best of his luck after the withdrawal of Ivan Dodig, upsetting Sergiy Stakhovsky 7-6 7-6 to reach the round of 16 in two hours. Stako blew two set point chances in the first set tiebreak, and he faced pressure on his serve most of the day, as his serve and volley skills were lacking consistency, while Kamke was more consistent with his groundstrokes on the day. Stako’s struggles this season continued as his high risk style of play saw him getting passed at the net when it mattered. Stako was playing better in the second set and went up 4-2, looking prepared to force a third set, but he was broken back in the next game, and had to save break points serving 4-4 and 5-5 to eventually force a second set tiebreak. Kamke dominated that tiebreak, going 5-0 up, and he would eventually take it 7-2. Yoshihito Nishioka showed signs of improvement in dealing with American heat, as he got past Dan Evans 6-2 6-7 7-6 in a match that also saw a lengthy rain delay late in the third set that paused play for over an hour. In Washington, Nishioka wilted in the hot conditions, but this time it was Evans struggling with his fitness, as the British man earned no break point chances in the first set, and was broken twice with relative ease, including at love serving 2-5. Evans went down a set and a break twice in the second set, and looked ready to hit the showers when he was 4-2, and 5-3 down. Nishioka got tight serving the match out and after having to save three break point chances against Evans, he found himself dominated in the second tiebreak, going down 4-0, and losing it 7-2. Nishioka had two more bp chances early in the third, and rain came at 4-3 in the third. Nishioka found himself broken when he returned to court, and Evans had three match point chances from 40-15 up in the next game. However, Nishioka’s speed got him back into the match, and after saving a fourth match point chance in his next service game, Nishioka converted his second match point chance to take the victory in three hard fought sets to the delight of a few local Japanese fans. Last, but certainly not least, Americans Taylor Fritz and Bjorn Fratangelo were big winners on the day. Fritz dominated college standout Austin Smith 6-2 6-2, despite loud chants for Smith throughout the match. The young American’s power from the baseline was too much for the Georgia Bulldog. Fratangelo rolled past Igor Sijsling 6-1 7-6. Early in the first he broke, and had to save six break point chances in an extremely long first service game, but Sijsling wilted from there. Fratangelo went a set and a break up, although he couldn’t serve it out, the Dutchman never really got a shot at a third set, as the American had the match in hand. In the lone ATP doubles match on the day, Chris Eubanks and Zack Kennedy upset Thiago Monteiro and Nishioka in a narrowly fought third set tiebreak, as the pairing of local NCAA players produce some late magic to stay in the tournament. Wednesday Preview Americans will feature in all of the four singles matches that are set to take place today at the BB&T Atlanta Open. Big men Kevin Anderson and Reilly Opelka will battle with their big serves, while Tim Smyczek and Donald Young fight it out for a much needed quarterfinal berth after that. In the night session, John Isner starts his quest for a fourth ATP Atlanta title against Adrian Mannarino, and Fritz will face Fratangelo in a battle of young Americans. Five ATP doubles matches will take place as well. BATennis World Brit Watch Sports Carretennis Last Word on Sports Tennis Matchstat: Tennis Stats NYT: Straight Sets Parenting Aces Steve G Tennis Tennis Abstract Tennis Panorama Tennis Results Tennis View Magazine The Tennis Nerds World Tennis Magazine Zoo Tennis Most Read Posts This Week US Open Wild Card Playoffs just 2 weeks away at College Park Reviewing Wimbledon Champion Serena Williams' "Masterclass" 2015 WTA @CitiOpen Preview and Predictions #CitiOpen Tennis Atlantic's 2016 @ITA College Tennis Conference Power Rankings Taylor Townsend Claims USTA French Open Wild Card SWIG Flasks: Mans’ Best Friend Get Tennis Atlantic Served To Your Inbox Click "Subscribe" to follow Tennis Atlantic and receive notifications and links to our latest content via email. Tennis Live Scores 24/7 on Flashscore.com
cc/2020-05/en_middle_0061.json.gz/line1933
__label__wiki
0.588876
0.588876
Real Name: James Douglas Muir Leno Date of Birth: 28 April 1950 Birthplace: New Rochelle, New York, USA Official Website: http://www.delafont.com/comedians/Jay-Leno.htm Other Works: Host of "The Tonight Show" since May 1992. 7D, The (2014, Animated Series) Crystal Ball Cars (2006, Animated Film) Jay Limo Christmas Is Here Again (2007, Animated Special) Narrator Dilbert (1999, Animated Series) Jay Leno "The Delivery" Elf: Buddy's Musical Christmas (2014, Animated TV Special) Fake Santa #1 Fairly OddParents, The (2001, Animated Series) Crimson Chin / Charles Indigo Nega Chin Family Guy (1999, Animated Series) Jay Leno "Patriot Games," "Underage Peter" Happily Ever After: Fairy Tales for Every Child (1995, Animated Series) Jay Frog "The Frog Prince" Ice Age 2: The Meltdown (2006, Video Game) Fast Tony Ice Age: The Meltdown (2006, Animated Film) Fast Tony Igor (2008, Animated Film) King Malbert Mickey and the Roadster Racers (2017, Animated Series) Billy Beagle Phineas and Ferb (2007, Animated Series) Colonel Contradiction "Phineas and Ferb Save Summer" Robots (2005, Animated Film) Fire Hydrant Scooby-Doo and the Goblin King (2008, Animated Direct-to-Video Film) Jack O'Lantern Simpsons, The (1989, Animated Series) Jay Leno "The Last Temptation of Krust," "To Courier with Love" South Park (1997, Animated Series) Jay Leno "City on the Edge of the Future" Kitty "Cartman's Mom is a Dirty Slut" We're Back! A Dinosaur's Story (1993, Animated Film) Vorb
cc/2020-05/en_middle_0061.json.gz/line1934
__label__cc
0.500324
0.499676
President Ghani calls on Afghan investors in Qatar to invest in Afghanistan 22 May, 2016 by Wadsam President Mohammad Ashraf Ghani is on a two-day visit in Qatar at official invitation of Emir of Qatar to participate in the ‘Stability and Welfare for all Summit’. The president with Emir of Qatar Tamim bin Hamad Al Thani and conferred on boosting bilateral ties, particularly in the arena of business and trade. Ghani met with Afghan and Qatari businesspeople and called on Afghan investors in Qatar to invest in Afghanistan. In the visit, President Ghani is accompanied by several other top officials including national security advisor Hanif Atmar, Minister of Urban Development Affairs Syed Sadat Mansoor Naderi, Minister of Agriculture Asadullah Zamir, Senior Presidential Advisor Dr. Humayun Qayumi and Abdul Salam Rahimi, head of the administrative office of the President. It is expected that after the visit, the president will fly to Iran to sign Chabahar Port agreement. afghanistanHanif AtmarPresident Ashraf GhaniQatar Price of Afghani and gold declines, flour and rice goes up Price of gold and Afghani currency went down during the outgoing week in Kabul city. Abdul Basir, a jeweler in India funds construction of polyclinic in Kabul Chief Executive Officer (CEO) Abdullah Abdullah inaugurated a polyclinic at the Indira Gandhi Hospital in Kabul on Thursday. The construction Afghan Finance Ministry receives aid to pay public employees’ salaries The United States Agency for International Development (USAID) pledged USD 75mn in aid to Afghan government to pay the salaries
cc/2020-05/en_middle_0061.json.gz/line1938
__label__cc
0.584046
0.415954
Gwyneth Paltrow Movie List 20 Jun, 2010 list Gwyneth Paltrow was once more famous for being engaged to Brad Pitt than for her acting, but since the time that the relationship ended in 1997 she has gone on to forge a strong career as a highly skilled actress. Her career really took off after being awarded an Academy Award for her role in Shakespeare in Love in 1999. Surprisingly, it was that role that led people to believe that she was a British actress (she was actually born in Los Angeles). The following is a list of movies that Gwyneth Paltrow has be involved in over her career: Actress (Movie Title/Year/Character) Thanks for Sharing (2012) Phoebe The Avengers (2012) Pepper Potts Contagion (2011) Beth Emhoff Country Strong (2010) Kelly Canter Iron Man 2 (2010) Pepper Potts Two Lovers (2008) Michelle Rausch Iron Man (2008) Pepper Potts Classical Baby (I’m Grown Up Now): The Poetry Show (2008) (TV) The Good Night (2007) Dora Shaller Running with Scissors (2006) Hope Finch Love and Other Disasters (2006) Hollywood Jacks Infamous (2006) Kitty Dean Proof (2005) Catherine Sky Captain and the World of Tomorrow (2004) Polly Perkins Sylvia (2003) Sylvia Plath View from the Top (2003) Donna Jensen Possession (2002) Maud Bailey Austin Powers in Goldmember (2002) Gwyneth Paltrow / Dixie Normous (‘Austinpussy”) Shallow Hal (2001) Rosemary The Royal Tenenbaums (2001) Margot Tenenbaum The Anniversary Party (2001) Skye Davidson Bounce (2000) Abby Janello Duets (2000) Liv The Talented Mr. Ripley (1999) Marge Sherwood Shakespeare in Love (1998) Viola De Lesseps A Perfect Murder (1998) Emily Bradford Taylor Hush (1998) Helen Baring Great Expectations (1998) Estella Sliding Doors (1998) Helen Quilley Emma (1996) Emma Woodhouse The Pallbearer (1996) Julie DeMarco Hard Eight (1996) Clementine Moonlight and Valentino (1995) Lucy Trager Se7en (1995) Tracy Mills Jefferson in Paris (1995) Patsy Jefferson Higher Learning (1995) (uncredited) Student Mrs. Parker and the Vicious Circle (1994) Paula Hunt Flesh and Bone (1993) Ginnie Malice (1993) Paula Bell Deadly Relations (1993) (TV) Carol Ann Fagot Applegarth Holland Cruel Doubt (1992) (TV) Angela Pritchard Hook (1991) Young Wendy Shout (1991) Rebecca Brad Pitt Movie List Robert Downey Jr. Movie List
cc/2020-05/en_middle_0061.json.gz/line1943
__label__wiki
0.648581
0.648581
Kevin Hart Breaks Silence on Car Crash in Emotional Video It's been a rough couple of months for actor Kevin Hart. The comedian posted an emotional video on Tuesday talking about his recovery process after he almost died in a car crash back in September. In video that he shared on Instagram, Hart detailed each moment of his recovery and the steps he had to take to get back on his feet. A post shared by Kevin Hart (@kevinhart4real) on Oct 29, 2019 at 8:51pm PDT In the clip, Hart says, "When God talks, you got to listen." The video shows the actor taking steps with a walker while nurses are on both sides helping him. “In this case, I honestly feel like God told me to sit down. You know, you’re moving too fast, you’re doing too much sometimes you can’t see the things you’re meant to see," Hart said. Back in September, the comedian suffered "major back injuries" in a car crash. ABC News reported that Hart was a passenger in his Plymouth Barracuda when his driver lost control and veered off the Mulholland Highway in Malibu Hills around 1 a.m. According to a drivers report obtained by ABC, the driver Jared Black, was not impaired at the time. “Black immediately lost control of the vehicle and the Plymouth left the road and rolled over down the northern embankment,” the report said. The report disclosed that the driver and woman were trapped in the car, while Hart left the scene to get help. TMZ posted photos of the tragic accident showing the car nearly destroyed after landing upside down in an embankment beside the road.
cc/2020-05/en_middle_0061.json.gz/line1947
__label__wiki
0.560236
0.560236
The gravity of theory Sep22 by weegingerdug On Friday, Theresa May gave her considered response to the entirely predictable rejection of her Chequers Plan by the EU. The rejection should not have come as a surprise to anyone who was paying attention. The EU has been signalling ever since the Chequers Plan was cobbled together that it wasn’t going to be acceptable. For the past two years it has been patiently and consistently explaining that the four freedoms are indivisible, and the British Government can’t pick and choose those parts of them that happen to suit the interests of maintaining some sort of semblance of unity within the British Conservative party. It’s just unfortunate that the British Government counts amongst those who weren’t paying attention, and so it reacted to the EU’s refusal in much the same way that a toddler reacts when it goes in a huff and knocks its sippy cup off of the high chair and then discovers that there’s such a thing as gravity. Only with somewhat less maturity and more of a sense of entitlement. There are a number of ways to react when you discover the existence of gravity. You could do what Isaac Newton did. Newton was a busy man, in between taking the credit for the work of Astronomer Royal John Flamsteed, nursing a pathological hatred for Robert Hooke and Gottfried Leibniz and trashing their reputations at every opportunity, and ensuring that part time dildo manufacturer William Chaloner was hanged and publicly disembowelled for the crime of counterfeiting a few coins, he sat down and worked out a detailed and rigorous exposition of the nature of gravity which underpinned all scientific understanding on the phenomenon for hundreds of years after his death. Think of Sheldon from The Big Bang Theory, only with the power to have people tortured to death, and you’ve got a rough idea. And you’d think that, being a nasty and petty minded vindictive git who allowed his grudges to become all-consuming, Newton would have been an ideal role model for the Conservative party. Or you could do what the baby in the high chair did, which was to throw its dummy after the sippy cup and have a hissy fit while screaming that it wasn’t fair and threatening that if it didn’t get its own way, it was going to soil its nappy. The British Government went for option B. That’s where we currently are with Brexit. The British Government is threatening the EU that it had better come up with a compromise plan that the UK can agree to, or the UK is going to pee in its pants. And then the EU will be sorry. Over two years after the Brexit vote, with just six months to go until Brexit day, with just four weeks to go until time runs out for reaching agreement, this is what passes for a plan. Not only do our Westminster rulers have no concept of the theory of gravity, they have no concept of the gravity of theory. The Brexists are full of the I-told-you-so’s, but none of them have the foggiest idea what to do either, other than wish the Irish border out of existence and tell themselves that everything will work out just fine because they’re British and being British means being better and having Union flegs plastered on everything in Tesco. Brexit might cause a few problems for people who don’t manage hedge funds, but hey, blue passports. And anyway, it’s all the fault of the EU for refusing Britain’s perfectly reasonable demands for unicorns, cherry bedecked cake, and a Schrodinger’s Irish border that simultaneously exists and doesn’t exist at the same time. We won the war you know. The blame for this mess lies entirely with the British political establishment. Largely it lies with the Conservatives, who have selfishly put party interest before all other considerations and who have failed miserably to engage with the realities of Brexit. But a portion of blame also lies with the Labour party, which has equally spent the past two years consuming itself in internal battles and refusing to confront the realities of Brexit or to challenge the Conservatives’ lack of planning in any meaningful way. It was telling that today, when the British Brexit befuddlement finally crashed into reality, the Labour party couldn’t find anyone to go on Channel 4 news and speak about it. It has always been obvious that the EU was never going to agree to a division of the four freedoms. It was always obvious that the EU was never going to agree to any border on the island of Ireland, a position which the UK agreed to last year when it consented to the so-called backstop. However instead of engaging with these realities and preparing the country to accept a concession, the Prime Minister and the British political establishment have wasted the last nine months in posturing and party in-fighting. And now that the EU is taking the initiative and laying down to the UK precisely what the UK had agreed to, Theresa May is acting all surprised. Now Theresa May is telling us all that no UK Prime Minister would ever consent to a customs border down the Irish Sea, because that would be tantamount to the partition of the UK. Her concern about retaining Northern Ireland as an integral part of the UK is not unrelated to her dependence on the DUP’s votes in the House of Commons. Just today, a reader of this blog (thank you Michael Bruce) pointed out to me that Winston Churchill, that PM so beloved of the Tories, offered to give up Northern Ireland to Eamon De Valera in 1940 when he was courting the support of the Irish State in exchange for Irish support in the war against Germany. The episode is detailed in the book Operation Sealion by Leo McKinstry. Northern Ireland, just like Scotland, is and always has been disposable if it’s in the interests of the British state. That’s why it’s Scotland which hosts Westminster’s nuclear viagra, because if there happens to be a serious accident at Faslane, it won’t affect anywhere that the Tories really care much about. Theresa May’s concern for the integrity of the UK is so much cant. That’s the biggest single argument in favour of independence. We are governed by people for whom our interests and concerns are at the very best minor considerations, and which all too often don’t even figure in their calculations at all. The Brexit process exposes that. Brexit has been carried out entirely in the interests of sections of the Conservative party. This is a process which has no positive outcome, and you can be certain that the people who are going to suffer the negative consequences will not be those people in the Conservative party who argued most strongly for it. That’s why Scotland needs a government which is answerable to the people of Scotland, and which the people of this country can remove from office when they do not respond to our concerns. We need to teach the Tories the gravity of the theory of political accountability, and we can only do that in an independent Scotland. ← When they try to silence us it means we’re winning Labour rips up the Claim of Right → 57 comments on “The gravity of theory” chicmac says: As a retired physicist I think you are being a tad unfair on Newton. He was a great intellect and a major promoter of the concept of rationally based science over the alchemy, astrology and quackery that had hitherto been credulous components of the ‘scientific’ world. Having said that, he was no doubt the object of lionization by the English promoteratti of the period (and ever since). How much he was complicit in that is moot. IMO, not much. However, if we are going to list those who’s ideas have been assigned to Newton then we cannot miss out Scot James Gregory. Newton virtually admitted in his own notes that it was after reading Gregory’s work on the calculus (published in Padua) that he came to his own version of theory of the calculus (fluxions). It is also well known (amongst physicists) that the invention of the reflecting telescope attributed commonly to Newton has far stronger claim by Gregory who had published detailed designs for it before Newton’s telescope. I could go on but it is very late. I don’t deny Newton possessed a great intellect. He was still a dick though. Q.E.D He certainly had a lot of ‘issues’. In particular, after his, possibly heavy metal poisoning induced, mental breakdown the vigour with which he pursued the punishment of coin counterfeiters in his role as Master and Guard of the Royal Mint was excessive to the point of psychopathy even by the ‘hung for stealing a loaf’ standards of his time. His latter self-interest judgement was questionable too. Despite, presumably, insider knowledge of economics and business through his work in introducing the gold standard for currency and such, he was suckered into investing heavily in the South Sea Bubble* and lost a great deal of money. * The South Sea Bubble was the first major scam which involved the collusion of business and political perpetrators. The business model premise, which involved the, licensed from Spain, exploitation of the slave trade in South America was known by the perpetrators to be flawed from the start, since no great capacity for slavery existed there. It was the first deliberate national money grab scam. It dwarfed the Scottish Darien scheme of a few years earlier in terms of investment lost and the Darien scheme had a viable commercial business plan. The establishment of a cargo transference facility on the American isthmus, in the days when there was not the technical capability to dig the future Panama canal, made sense and was only defeated by Anglo-Spanish political machinations and underestimation of local tropical disease risk. It was at least an honest endeavour. Crikey, you get a better class of vile cybernat on this site. The gravity of theory | speymouth says: […] Wee Ginger Dug The gravity of theory On Friday, Theresa May gave her considered response to the entirely predictable […] Waiting for Scotland says: I would only amend your last words with “…via an Independent Scotland.” Which is no certainty, but is becoming increasingly likely. But moving the nukes, and cleaning up the site, is a bill that Whitehall and No.10 are utterly terrified of. It almost happened four years ago. They almost stumbled into defeat in 2014, and it scared the willies out of them. Thinking of it, it can be reasonably be argued the media strategy of orchestrating an unending dirge of “Scotland is shite” is solely designed to undermine the confidence of Scots in themselves and in their fledgling government. All Scots – including those who are born here, have chosen to make Scotland their home, and across the entire political spectrum of this land. We have all been victims of this deliberate policy of cultural suppression and psychological warfare for the past four years. The poor benighted souls that are our fellow country men and women, who have been duped by this strategy, are still a sizeable portion of the electorate. Obdurate in the extreme in some cases. There are some who will never read the writing on the wall. But it has become vital to separate ourselves from this Union. Compounded with the disaster that is Brexit, England and Wales will drown in debt. And Scotland will simply become the source of paying off that debt. We all will become denizens of a failed state. It’s ironic really. The lunatics and dementia ridden pensioners will get exactly what they all wish for -returning to a 1950’s sized economy. We must be on our guard. They have a history of resorting to clubs when cornered. They will stop at nothing to prevent Scottish independence. It is a threat to their ill gotten gain. In the end, that is all that the British establishment really cares about. Glen Garry says: Don’t worry; once the shelves run bare and they run out of food/grass there will be a refocus of minds amongst the better together herd of frightened sheep…”Help!…where’s that Collie?” John Lamb says: “They will stop at nothing to prevent independence” i fear that statement is oh so true. The Tory party are the outward face of government and appear to be in some disarray but don’t be fooled, I suspect there are cold calculating minds in Whitehall who know exactly what needs to be done to keep their vital resource rich colony. “Winston Churchill, that PM so beloved of the Tories, offered to give up Northern Ireland to Eamon De Valera in 1940 when he was courting the support of the Irish State Ludges in exchange for Irish support in the war against Germany.” That’ll go down well in a few ‘Ludges’ up and down West Central Scotland. You are spot on though re Theresa May.. she is a bit of a cant. Lanark says: It seems strange that De Valera would pass up the chance of Irish unity. He built his party and political career on it after all. His main reason for doing so? Well he didn’t want those brightly coloured folks in bowler hats to become citizens of the Irish state. Understandable. And when the Irish refused Churchill’s overtures, he threatened invasion. J Galt says: The British Army had just been thrown out of the continent with their tails between their legs in the space of 3 weeks. Could it be that De Valera didn’t believe Churchill’s bluster of ultimate victory? Could it be that De Valera didn’t believe Churchill‘s offer of Irish reunion? indeed who’d believe that snake. Independent Womanpported says: The Ludge members won’t believe you. They (a group of young lads I happened to be talking to) refused to believe that the Pope had a thanksgiving mass sung after the Battle of the Boyne. alanm says: Q… when is a club not a club? A… when it’s a racket. Leaving aside the rights and wrongs of EU membership for a moment, should it not be possible to hand in your membership card at any time and stay on good terms with the remaining members? In this case the answer is a resounding NON. We’re effectively being told that we must continue to obey club rules and continue to pay our subs if we want to stay healthy and keep trading. Reminds me of the line from Hotel California “you can check out any time you like but you can never leave.” Obviously it is possible but not with the Tories. There has been internal party animosity to anything which gives ordinary people protection as the EU has done. Why anyone seriously would leave a ‘club’ which has so many benefits, is what you should be concentrating on. If we are outside of that ‘club’ we lose out, it’s as simple as that! Robert Louis says: No, what the ‘UK’ is trying to do is akin to saying you hate the way your golf club is run and don’t like the fees, so you are going to leave. Then you say, but we really like the subsidised bar and sunday roasts in the club house, so we’ll keep coming for that. The golf club politely replies, saying ‘then you will need to be a member of the golf club’. Those benefits are for MEMBERS only. You cannot leave the golf club, tell everyone you hate the way it is run, yet still expect to drink in the member fee subsidised bar. That, however, is exactly what the UK Government wants to do with the EU. It is utterly untenable. Beyond stupidity. Well when you’re faced with a spoilt brat that want’s their cake and eat it what do you do? The UK started the process of leaving – why should the EU have to do anything to accommodate these eejits – just get yersel tae f**k! And I hope they stick to that. Illy says: Also, if the EU *don’t* make brexit hurt for the UK, then the EU dies. So the EU were obviously always going to make brexit hurt. It’s quite simple for the EU. If a country is better off by leaving the EU, then there is no point to the EU. So naturally they’re not going to favour a deal for the UK that makes the UK better off outside the EU. Yet the UK government wanted all the benefits of the Eu without being a member so the eu must of been good for them when they was a member if they originally wanted to keep all the benefits stupid English got greedy now it’s bit them in the backside. Jim Morris says: Britain operates the largest group of off-shore tax havens in the world. These places are essential for reducing the tax burden and social responsibility of the rich and super/mega rich. The EU plan to outlaw tax evasion from April 1st 2019 through the Eu Finance Bill which after years of discussion and planning comes into effect that day. The Tories and New Labour have had no contribution to this because their paymasters said: We are leaving the EU! The “consultative” referendum was the surprise vehicle of justifying this decision. Ealasaid says: Exactly. To see just how deeply the UK is embedded in tax evasion around the world watch this video on YouTube when you have time (1h20min). We are talking £trillions! The Spider’s Web: Britain’s Second Empire (Documentary) selkie says: They may make demands for Unicorns but they’re not getting ours. deelsdugs says: Another brilliant post Paul. Yesterday, I nearly responded to a post on fb which an acquaintance in Manchester had staked her empathy on the unjust and inhumane manner in which TM had been dealt at the EU meetings…stating that she was ‘not commenting on the political aspect, merely humanity, that TM had been treated in such a disrespectful way and that we should all get behind her and give her the support as she was the only one who was brave enough to take the job on…’ then there were the comments such as, ‘behind you 100%’, ‘don’t really want to get involved with politics but I do agree with you’… Jeezo, the britnats are drowning in their belief that TM is actually competent… She gate-crashed an informal, non-Brexit meeting then lectured the attendees. WTF did she expect? Capitulation? Reality check. Finally starting to see how blockheaded the English people can be it’s like banging your head against the wall with them as some of them still believe they are right when the evidence says they are wrong. Clapper57 says: Yes Robert, watch any debate and irrespective of any concerns raised and facts given they still refuse to accept the obvious obstacles and practicalities of UKOK being able to have SAME arrangement with the EU that we had pre Brexit vote…..and having this WITHOUT contributing financially and accepting ALL of the freedoms of EU membership. Delusion drives this supposed ‘democratic’ mass mania darn sarf which has been instigated and driven mostly by both the media and irresponsible self serving politicians darn sarf…Ruth does what she is telt so can include her in darn sarf agreements. Have any of these “ordinary” people, who seem so determined to leave the EU , ever considered and listed what they expect and want post Brexit on a personal level . Have any of them considered potential impact on both their own and their families lives. If , as they say, they have made an informed decision then surely they must be confident on how their lives will be post Brexit …..perhaps that is something the media , who have been grossly negligent in ignoring this aspect, should have been addressing in a more forceful manner . I suspect some of them will just continue to quote the Rule Britannia headlines courtesy of the biased press as opposed to giving honest and subjective reasons that they feel would benefit them on a personal level in living in a country no longer a part of the EU. It is worth also mentioning that the certainty the Brexiteers have expressed, that a UKOK outwith the EU will be more prosperous and give more opportunities for them is NOT PROVEN…. and they fail to consider that post Brexit they will be at the mercy of a ruthless Tory government who are no longer bound to rules and regulations courtesy of the EU which actually PROTECTED their, the Brexiteers, rights. Watch political discussions and note that Brexit loving politicians and members of the public Brexit fan club constantly interrupt those who challenge Brexit and they do this hiding behind a supposed people’s ‘democratic will’ which they have hijacked to enforce their case. There is indeed no fool like a gullible fool…..they are signing off on the dotted line without looking at the small print…which we all know can be a recipe for disaster further down the line…which seems to be what Brexit is turning out to be….i.e. a disaster…however on a lighter note ….how lucky are we, in Scotland, that we have a way out ….because we have actually made an informed decision and it is one that does not include enduring any more of this mess that was NOT created or wanted by us….up North ! Ayup! The EU have made their position on the four freedoms abundantly clear over the past two years. Just as the UK government and their media have spent the same period telling folks that Brexit would be a sooperdooper slam dunk and the EU would come round to essentially granting the privileges of membership without actually being members because… reasons. In that period both central government ministers and the media have regularly insulted the EU and its representatives. They reduced the diplomacy of nations to gaming analogies, reducing the interests and lives of populations to cards and pots. People’s lives and livelihoods. Over two years to find out that what the EU said on day one? They actually meant it and would stand by it. UK government and their go to meeja however, they had invested in a narrative. That narrative is now ash. Their response? Shock and outrage. Or rather faux shock. Faux outrage. Faux hurt. Hurt that their ‘bluff had been called’ and their appalling attitudes had been returned in kind. And so the rewriting of history begins. Cue the demonisation of the EU’s leadership and representatives. WHEN the UK suffers inevitable outcomes of this Tory pissing contest, it’ll all be Johnny Furriners fault. They did it deliberately. They hated and envied us so much. How dare they treat our PM in such a way… etc. etc. etc. Not – We screwed up big time and dropped those in our care into a societal and economic mincer of our own making. Not – We catastrophically divided our populations and undermined trust in our own institutions to suit our own personal agendas. Divided and undermined to the point by the by, where the word ‘united’ became a sick joke. These folk took people into a multi-national ballot (The UK being comprised of more than one nation) with ZERO plan for an exit strategy which would protect the interests of the populations involved. A ballot which would carry hefty constitutional and economic consequences for ALL concerned. They then proceeded to enact one of the most shameful, deceitful and misleading campaigns in the UKs post war political history. Kinda why you have whitepapers and agreements on outcomes produced before you go to ballot you’d have thought. (shrugs) Their choice. And it was their choice that brought our populations to this place. No. Brexit was always going to fail at a ‘negotiating’ table. Mainly because the UK had nothing to bargain with that would persuade the EU to effectively break itself apart. Some knew that, some didn’t and others simply didn’t care regardless. Also? Unity of purpose is, you’d think, fairly essential in any joint diplomatic or negotiating scenario. The EU has it and the unfortunately named ‘United’ Kingdom doesn’t. Mainly because the UK is anything but united. Not in its politics and not in its society. Who knew? Helluva handicap to take into that world and a helluva price to pay for a Tory pissing contest. SandyW says: The second best thing about Wee Ginger Dug, after Paul’s articles, are your responses Sam. Very well said. The only “pissing” being done is the Tories “pissing” themselves with laughter at the stupidity and gullibility of the voters. After the Coalition Government we handed Cameron a majority, enabling him to call for a referendum, albeit a consultative one. Then, when May called a snap election we left her as Prime Minister with the backing of the DUP. Brexit is a financial must for the tax avoiders and off-shore banking havens. The Tories (of every political colour) are carrying out their masters’business. On the news tonight the UK government are saying that the EU now has to step back from the abyss. What abyss do they need to step back from? None than I’m aware of Anne. The only folk teetering on the edge of anything? That would be mainly the folk on these islands and some of us (cough) are backing away from that edge. That’s what those english supremacist propagandists report they make out the other sides the problem when it’s really them and the fact there’s people stupid enough to swallow it without question makes me mad. A Q.E.D. moment. https://www.independent.co.uk/news/uk/politics/brexit-theresa-may-speech-eu-no-deal-chequers-plan-leaders-a8549346.html Bravo. What a truly excellent piece of writing. Then there is the killer sentence; ‘We won the war you know’. That really says it all. Apologies for being off topic – but I know there are a few supporters of Scottish Gaelic here and I wish to share the good news regarding my mother tongue (and 1st professional language) of Cymraeg/Welsh. I hope this encourages all lovers of minority languages of this Disunited Kingdumb – especially fellow ‘Celtophones’. “A survey by the Office of National Statistics (ONS) suggests 874,700 people [in Wales] are able to speak the language, up from 726,600 in 2008.” https://statswales.gov.wales/Catalogue/Welsh-Language/annualpopulationsurveyestimatesofpersonsaged3andoverwhosaytheycanspeakwelsh-by-localauthority-measure A wee victory against the BBC. Please raise your glasses. This morning, BBC Wales featured the ONS story that there had been an increase in the number of my mother tongue (and 1st professional) language of Cymraeg/Welsh speakers in Cymru/Wales from 726,600 in 2008 to 874,700 people now, 10 years later. They headed the piece with a 1950’s style signpost, which to all intents and purposes was monolingual English (as they were back then). An irate phonecall from me to BBC HQ and a promise to refer the matter to the Head Honcho of BBC Wales online followed (apparently the “Complaints Department” is not open on weekends). Subsequently, some time this afternoon, (I’ve been out), the picture has been removed for a stock one featuring solely the word “Cymraeg”. Thus, the photo used is 100% Welsh in language. Pints of Brains SA all round! Here’s to us, Celtophones! “Who’s like us?” PS I was wise enough to make screenshots of both photos. It goes to show (as if we didn’t already know it) that Aunty Beeb can amend graphics, text, photos at any time – often, if we are not careful, without our knowledge. I am a history buff Sion and have been reading a lot about language in these islands over the last 2000 years. Good to hear about a rise in Cymraeg. Fully aware that chicmac is a retired physicist, and that my knowledge of that Black Art lies somewhere between a faint childhood memory of an experiment involving glass beads and paraffin wax, and having watched Matt Damon’s ‘The Martian’ twice, I seem to recall that light bends when influenced by the gravity pull of a big chunk of matter, like a planet, or a Brexit crock of ordure. May bent the truth and light in her ‘my country’ rant yesterday. The EU is not threatening her Government. Arlene and the DUP are. It is reported that we should all rally behind her because the EU 27 ‘humiliated’ her in Salzburg. Chris Cairns’ excellent take on the Chequers Fudge over on WoS where Professor Two Jobs WATP ‘It’s The Law!’ Adam unelected List Tory Tomkins flogging the Chequers dead horse while Rees Mogg looks on with smoking gun just about sums it up. Tusk revealed that the EU had rejected the Chequers Deal weeks ago, and informed HMG at the time; yet May lies to the ‘British people’, implying that she only knew on Thursday that the EU says ‘Non’. If only someone had addressed all of this months ago, say in December 2016, to present alternative proposals where Scotland, and if they chose, the rest of the UK could remain in the Single Market, and Customs Union. well, NS Government sent such a document to David Davis via Mike Russell in January 2017, and Davis threw it in the bin. God, if only we had been on this site discussing all of this for 27 months we might have avoided Eurmageddon. It is difficult not to conclude that the Brit Nat politicians, Up Here and Down There have just gone stark staring bonkers. It is akin to trying to fix a fault on your TV by taking it to bits checking out the connections, then looking at the bits and realising that you haven’t a clue how to put it back together again. The UK is in bits. It is impossible to put it back together. ‘Bye, England and Wales. I’m sure that a goatherder in the Macedonian Hills will buy one o those coffee makers that they are making in Birmingham. Huh! Oh and the EU leaders, if they insulted anyone? Didn’t insult the British people. I’d say they allowed the UK government and their media to humiliate and insult themselves. Personally, I don’t feel the least bit insulted. Not entirely sure Mr Hunt is qualified to speak on some folks behalf tbh. Might also be appreciated if he didn’t put words in folks mouths. (shrugs) Also? Just in case you thought Labour were any different. Just sayin’ like. Alasdair Macdonald. says: It is looking as if the MOGGIES have won and that the UK will ‘crash out’. I look forward to hearing what the ‘Moggies’ do at the Tory conference. More infighting I am sure. To me the whole ‘opera’ is a farce. The UK being part of the EU for ages was part of the effort to write and agree the Maastricht and Lisbon treaties. The fact that they seem to have forgotten everything amazes me. It is simply politics and media manipulation. They have not forgotten they just want to get party agreement knowing the EU situation. Like many of you as soon as I heard what was in the Chequers joke document I new instantly the EU could never accept it. So does the cabinet. I have never scene a bunch of numpties like this in my whole life. An excellent summation from the dug. I would include, in the blame for this mess, the mainstream media, complicit, without exception, in an abject failure to either understand or analyse Brexit. The facts have been available for some time, such as from EU via the notices to stakeholders (search for EU Brexit preparedness notices) but, instead, the msm produce endless vapid nonsense, preferring to focus on the drama of personalities, confusing the production entertainment with the production of news and preferring the quick fix of bis-bash politics to any serious analysis. If I want to read a comic, I prefer the topper to a red top because the numbskulls is based on real characters. The msm then has the gall to complain that the msm is not respected. This is because the real information and analysis is taking place elsewhere; the Irish Times perhaps or in blogs such as sluggerotool, mainlymacro, chrisgreybrexitblog and eureferendum (No URLs as adding them triggers moderation and, possibly, automatic rejection). The Baroque Cycle novels by Neal Stephenson contains, amongst it motley collection of characters and supposed events in the late 17th and early 18th century, an alternative take to Sir Isaac Newton, some of which may be based on fact. Derek Grainge says: Anyone remember “Just William” and the fragrant Violet? “‘i will scream and scream until i am sick” Teresa’s position has precedent. scottishmomus says: Reblogged this on scottishmomus. Rhisiart Gwilym says: Paul, a small but vital point. You write: “Northern Ireland, just like Scotland, is and always has been disposable if it’s in the interests of the British state.” I suggest that should read ‘in the interests of the English state’. We need to be clear that the ukstate is the shagged-out fag-end, along with a few small scraps of land scattered across the world, of the English empire, still awaiting it’s salutary final dissolution – which Scottish independence will help to usher in, of course. The rest of the nations of The Isles* were swept up into the rise of English imperialism, and contributed generations of cannon-fodder for the vicious English imperial wars, because we were amongst the earliest victims of English imperialism. Empires always recruit such naifs from amongst their defeated, newly-incoporated provinces. Doesn’t make the main source of the imperialism any more dilute. In this case it was always – and still is – the insane scheme to “make the world English”, the better to make it all lootable. This comment isn’t meant as any sort of racist hatred of the English people. In my book, the common citizens of any rising infant imperial state racket are always the very first victims of the imperialist gangsters-in-charge (the gics). And so it has been with our poor bloody English neighbours for centuries, along with the rest of us in The Isles. Class-solidarity across national boundaries always trumps crude ethnic nationalism. We – the common plebs of Britain and Eire – are ALL the victims of the English gic-class’s still-just-smouldering-on imperial instincts. The Official Tory party in Paedominster is their political wing, obviously (the B’liarist rump of Corbyn-haters in the parliamentary Labour party being the Unofficial Tories, of course). It’s noticeable that even despite the constant recruitment of compradors-on-the-make from the Celtic nations – Dafydd LLwyd-Sior, aka ‘LLoyd-George’, from my own nation being a prime example – the English gic-class always remains unmistakably ‘upper-class’ English in its overall nature – and in its world-looting purposes. That’s why the empire’s compradors in Scotland sound so ludicrous, with their laughable attempts to ape the English ‘gentry’s’ manners and accents, in defiance of their real Scots inheritance. I know that this is all a small aside from the main thrust of your post. But – ye ken – the Rectification of Names (qv) is always important. Let’s call the English empire by its right name… * Historian Norman Davies’ politically-neutral name for the whole Britain-Eire archipelago. Labour have officially lost the plot. NEW: Labour will commit to opposing #indyref2 in next UK manifesto. Party sources claim it will give Jeremy Corbyn a mandate to refuse to give @scotgov the power to hold another referendum if Labour wins power. Announcement due at conference. More @BBCWeekendGMS — Nick Eardley (@nickeardleybbc) September 23, 2018 If they gain power what they’re saying is that a UK party should have a veto on the voting rights of the population of a nation partner. They’d deny your right to self determination and your right to decide the governance of your choice. A veto on your inalienable human right to choose. Labour – For the few NOT the many. That’s yer kinder more honest politics in action there people. Are we crystal clear on the nature of UK politics yet? But, Sam, there are lots more of them than we. If we don’t get back in tgheir Imperial box Ian Murray will don his butcher’s apron suit and lead a battalion of the First Light Westminster Rifles North and bayonet the wounded, or what ever. There has never been such arrogance and imperialism expressed as the nonsense that Dick Leonard uttered on Sunday’s Brewer’s Droop, and Yes But, Hang On A Minute, Let Me Be Clear, For The Avoidance Of Any Doubt, Brewer let him away with it. You are a colony. You are occupied by our Army, Navy, and Air force. We are 55 million, you are only five. We will ban you from anything we like. Jesus Christ Almighty. Where the fuck did they find Leonard? In the Union Mail Room addressing envelopes to the Comrades? He’s just won the Referendum for us. I repeat, from which wee Union Shop Steward Back Office did they get him? He is completely out of his depth, and would drown in a fruit fly’s belly button full of water. Donalda MacKinnon, what a tawdry little Brit Nat Branch of the Ministry of Truth your stockade on Pacific Quay has become. You and your team are fast becoming a laughing stock. Brewer shows all the signs of a man who cant be arsed any more. Also and mibbies just me? But I’d say they’ve just handed the Scottish government one of those open goals opportunities. Can you imagine going into ANY national ballot on a ticket of ‘vote for me, I’m going to take away your rights’? This reeks of playing to the anti democratic stands in Scotland and the gutter press readers in middle England who’d end Holyrood in a heartbeat if they thought they could. You YES yet? Yep Macart…..always said that “For the Many” was England and “Not the FEW” was Scotland… Richard Leonard just confirmed that today …..perhaps that will now be clearly defined for those Scots who support remaining in the union and who thought they had democratic rights in UKOK… that their democratic rights as a UKOK citizen are to be LIMITED and RESTRICTED as dictated by a UNIONIST party. We will ALLOW you to vote for this but NEVER again vote for that….how democratic of them…wow Brexit aside, democracy really is in jeopardy…………… if you live in Scotland ! How ironic if the Labour delegates vote for a second EU people’s vote and it is then adopted by Labour…..reasons ?……….will of the English really…..yet again…..cause Scotland already voted to remain so we do not need to participate in this charade….how are Labour going to sell this to Scots….LIE probably, cause to justify it they cannot use an honest argument while denying OUR right to another Indy Ref……mind you double standards is par for the course for all Unionist parties…………is it not !! o/t – We have seen Kezia – the dick Leonard – Wullie ,Every Scottish unionist under the sun get Air time , and it’s amazing what crawls out from beneath the rocks up here when offered a wee stint in the sunshine their own personal 2 minutes of fame . Where are the SNP ? , is there a General blackout of the Party who actually form the Scottish Government ,if its a self imposed ploy to let the others make a total arse of themselves ok fine , if they are being blocked that is an entirely different matter and they should be raising merry bloody hell . and using their position in the parliament to insist this is addressed immediately . The Unionists are scoring and our goalkeeper has been marked absent Wakey bloody Wakey . I doubt that any Pro Independence politician or activist could keep a straight face, or resist the temptation to burst out laughing if asked to appear on TV or Radio to comment on May, Corbyn, Leonard The Scarf ,’Kez’, or Dominic Raab’s take on Brexit. They have gone completely stark staring mad. Clare M says: I’m reminded of an episode of The Goon Show (dad was a fan) where Eccles is acting as jailer to Grytpype-Thynne. Grytpype moves and Eccles, startled says “don’t move or I’ll blow my brains out!”…
cc/2020-05/en_middle_0061.json.gz/line1952
__label__wiki
0.84263
0.84263
In this Jan. 15, 2020, photo, Sen. Susan Collins, R-Maine, talks to reporters on Capitol Hill in Washington. In the dawn of what may be her toughest reelection fight, veteran Collins has parachuted into familiar terrain _ the pressure-packed middle of an issue, this time the impeachment of President Donald Trump. (AP Photo/Susan Walsh) Impeachment lands Sen. Collins in familiar spot: crosshairs WASHINGTON (AP) — Facing perhaps her toughest reelection fight, veteran Sen. Susan Collins has parachuted into familiar terrain — the heart of a hot-button issue, this time President Donald Trump's impeachment. With Senate trial proceedings starting Tuesday, the moderate Maine Republican says she'... This image from video released courtesy of The Root and G/O Media shows Rep. Ayanna Pressley in a video posted Thursday, Jan. 16, 2020, announcing that she has gone bald due to alopecia. The freshman Massachusetts' Democrat made a touching video for The Root, the African American-focused online magazine, in which she revealed her bald head. (Courtesy of The Root and G/O Media via AP) Rep. Ayanna Pressley goes public with alopecia and baldness NEW YORK (AP) — Rep. Ayanna Pressley, whose hair twists have been an inspiration to young girls and part of her personal identity and political brand, said Thursday that she has gone bald due to the auto immune condition alopecia. The freshman Massachusetts Democrat made a touching video for The... California targets highly paid corporate executives SACRAMENTO, Calif. (AP) — California is considering raising taxes on some of the country's largest companies, but the size of the tax increase would depend on how much its highest-paid executive make compared to its employees. The bigger the gap, the bigger the tax increase. The bill by Democratic... Sen. Jeff Yarbro, D-Nashville, debates a proposal allowing faith-based adoption agencies to decline to place children with same-sex couples because of their religious belief without facing penalties on the first day of the 2020 legislative session Tuesday, Jan. 14, 2020, in Nashville, Tenn. (AP Photo/Mark Humphrey) Tennessee governor says he will sign anti-LGBT adoption bill NASHVILLE, Tenn. (AP) — Tennessee Gov. Bill Lee announced Tuesday that he'll sign into law a measure that would assure continued taxpayer funding of faith-based foster care and adoption agencies even if they exclude LGBT families and others based on religious beliefs. The GOP-controlled Senate gave... Filmmaker Zach Meiners speaks at a rally on Tuesday, Jan. 14, 2020, in Frankfort, Ky., in support of legislation aimed at effectively banning the practice of conversion therapy in Kentucky. Conversion therapy attempts to change a person's sexual orientation or gender identity. (AP Photo/Bruce Schreiner) Bills seek to end 'conversion therapy' in Kentucky FRANKFORT, Ky. (AP) — Twice a week for four years when he was in high school, gay student Zach Meiners underwent “conversion therapy,” a practice that attempts to change a person's sexual orientation or gender identity. Once the sessions ended, it took almost 10 years before he started “to heal and... California rejects unique intersex surgery ban for some kids SACRAMENTO, Calif. (AP) — California lawmakers have rejected what would have been a first-of-its-kind ban on medically unnecessary treatment for infants born with ambiguous or conflicting genitalia. The measure would have banned all procedures on intersex children 6 and under unless the Medical... Gun rights protesters hold signs prior to the start of a meeting of the Senate Judiciary committee at the Capitol in Richmond, Va., Monday, Jan. 13, 2020. The Committee passed several bills related to gun laws. (AP Photo/Steve Helber) Push to ban assault weapons in Virginia meets resistance RICHMOND, Va. (AP) — Some top Virginia Democratic senators are expressing reservations about plans to ban assault weapons — a key part of the new Democratic majority's gun-control proposals and one that's drawn fierce resistance from gun-rights advocates. “A lot of people don't really understand... FILE - In this Sept. 19, 2019, file photo, Michelle Carter, center, arrives for a parole hearing in Natick, Mass. The state's highest court upheld Carter's 2017 involuntary manslaughter conviction in the suicide death of her despondent boyfriend, to whom she had sent insistent text messages urging him to take his own life. The state Parole Board also denied her request for early release. (AP Photo/Steven Senne, File) Supreme Court rejects appeal in texting suicide case WASHINGTON (AP) — The Supreme Court on Monday left in place the conviction of a Massachusetts woman who sent her boyfriend text messages urging him to kill himself. Michelle Carter is serving a 15-month sentence after being convicted of involuntary manslaughter in the 2014 death of her boyfriend,...
cc/2020-05/en_middle_0061.json.gz/line1956
__label__wiki
0.950943
0.950943
John Allen Nelson Cast Interviews at 24 Season 5 DVD Launch Party By 24 Spoilers , January 21st, 2007 · 14 comments Here’s a video interview with the 24 cast done at the 24 Season 5 DVD party which took place last month. Kiefer Sutherland, Carlo Rota, Jean Smart, John Allen Nelson, James Morrison, and new Season 6 cast members Adondi Maropis, Rena Sofer, Powers Boothe are interviewed. Roger Cross mentions there was a hilarious gag reel,… View Article 24 cast show up to season 5 DVD launch party By 24 Spoilers , December 5th, 2006 LOS ANGELES — At a 24 party, the dead are among the living. At Monday’s launch of the Fox thriller’s Season 5 DVD (Fox Home Entertainment, $59.98), held at Hollywood nightspot Les Deux, more than a few of the actors present represented characters who have succumbed during the five-year run of the high-octane, high-casualty series…. View Article Here are all twelve audio commentaries from the 24 Season 5 DVD. 24 Season 5 Episode 1 commentary by director Jon Cassar and writer Howard Gordon: 24 Season 5 Episode 1 commentary by director Jon Cassar and Kiefer Sutherland (Jack Bauer): 24 Season 5 Episode 4 commentary by writers Joel Surnow and Michael Loceff: 24… View Article 24 Spoilers » John Allen Nelson
cc/2020-05/en_middle_0061.json.gz/line1960
__label__cc
0.520031
0.479969
Inicio / Regístrate La selección de los Editores Gigapíxeles Selecciones del Editor More Regístrate/Inicio Comparte este panorama This panorama can be embedded into a non-commercial site at no charge. Leer más ... For commercial use, contacta con nosotros Rome Colosseum spherical panorama Aleksandr Reznik Copyright: Aleksandr Reznik Resolution: 15592x7796 Subida: 07/09/2011 Número de vistas: Tags: rome; italy; roma; italia; colosseum; coliseum Roger Berry Delhi Spice Market Andrea Biffi vintage carriages in Beauvais Museum court Amber Fort Elephants Mehrangarh Fort, Overview of Jodhpur Sahneh The North Pole 90°N-4 The World : Europe : Italy : Lazio : Rome Overview and HistoryAll roads lead to Rome, the capital of Italy, current football world champions, where western civilization really got cookin' and Christianity gained its foothold on an empire.According to legend, the city was founded on the Palatine Hill by Romulus and Remus, just after they finished wiping wolf's milk from their lips. Romulus killed his brother Remus in a fight over who had the right to name the city, hence "Rome" and not "Remo". He attained divine status after his death, being given the name "Quirinus," the root of which you can see in the Quirinale Palace.The Quirinale Palace is the home of the President of the Italian Republic. Its fountain has two ancient statues of Castor and Pollux, sons of Zeus, the famous twins of the Gemini constellation.Rome is famous for its seven hills: Aventine, Caelian, Capitoline, Esquiline, Palatine, Quirinal, Viminal. Vatican City is on Vatican Hill which is not one of the seven hills. It's its own state, too, not technically under the authority of Italy. It's also the smallest country in the world.Within Vatican City you can find the Pope of course, the Basilica of St. Peter and also Michaelangelo's masterpiece -- the painted ceiling of the Sistine Chapel. This painting is a fresco, which means the paint is part of the actual plaster. The painter mixes plaster and pigment at the same time and had to finish the work before the plaster dried, and by the way he was laying on his back to do it. Call me crazy but I think the requirements for being an artist have declined in their stringency of late. Vatican City has an insane amount of pure-gold artwork as well.Since Rome predates the Christian era, you will find many examples of gods and goddesses who were worshipped in the Pantheon, or, "Temple to All the Gods." This is the oldest domed building still standing in Rome, dating to 35 B.C and first reconstructed in 126 A.D. It's been in continuous use since it was built, and has been a Catholic church since 700 A.D.Students of history may also enjoy the Roman Forum, around which the ancient city first developed. This area included the Senate and Republican government, and a central marketplace where everyone came for news, supplies, gossip and everything else. It's between Palatine hill and Capitoline hills, a swampy spot that was drained during the Forum's construction. Doomed to repeat history, or fascinated by its roots? Take your pick.All roads lead to Rome except this one, it leads to the Colosseum. Forget Youtube, Netflix and getting laid. REAL entertainment comes from the Colosseum. Do you know why we have popcorn and movies today? Because first they had Bread and circus at the Colosseum, baby! Fake pirate battles in an ocean of real blood! Two vs. one gladiator ambushing with Neptune's tridents and deadly spiked nets! Here's the interior.If this is what you see around you, you'd better hope to find a sharp sword in your hand to go with it.Now nevermind all that old stuff, welcome to the Hippodrome, race fans! Besides being the coolest panorama on the whole site, the Circus Maximus was where they had the chariot races and judges who knew how to take a bribe for pole position.But let's zoom back out for a second. Rome is located on the Tiber river. Crossing the Tiber are many bridges dating back several centuries, for instance Ponte Cavour, Ponte Umberto, and the Saint Angelo bridge.Rome offers an enviable array of Renaissance and Baroque architecture due to its luck; like Prague and only a few other cities, it escaped major damage during WWII.Now here are a few little things to get you there so you can investigate the more than 2500 years of history which continue to seep into out modern times.Getting ThereFiumicino Airport provides international access for flights into Italy. You can connect to it by bus, train or taxi. The train takes about thirty minutes and costs five euro or so.There's a smaller airport called Ciampino, which handles mostly charter flights, and has a bus line running to meet the Metro.TransportationThe historic center of Rome is less than two miles from the central Colosseum and Piazza di Spagna, so you might as well walk there. The bus network is very extensive but the Metro is probably easier to get your head around. It's called the Metropolitana and it makes a loop around, rather than through, the city. Basic tickets cost one euro. Night buses run between midnight and four am when the metro stops.You can also hop onto one of the many tourist buses for a guided ride around Rome. These prices are a lot higher than the metro, but it's an activity more than just a ride.Now if you really want to do as the Romans do, rent yourself a Vespa scooter and drive it one-handed, shouting.People and CultureYou don't have to have a lot of money to have good style. That's Italian culture in a word.I'll go up against Paris right here and say that Italians have style all sewn up. Rocking a scooter in a red dress and stiletto heels? Come on.Here are a few piquant expressions which further the idea:"Finish that pasta so Nonna doesn't have to put it away.""It's sugar sweet and as big as your hand.""People do not age at the table."And concerning the stereotype that Italians all talk with their hands:"Mathematics is not a matter of opinion."Just imagine how funny it was, the first time that one sprung out.Things to do & RecommendationsFirst of all, go back and see all the panoramas in the top section. After you've been through the places and back, try these:Modern art at Gallery Nuovo Pesa.Worm through the Aseq esoteric library on your way to Limonaia Cafeteria for lunch.After lunch, pick up a few things at the most popular market in Rome, Piazza Vittorio.Be glad you're there and not eating only memories in the Traianei Market ancient Roman market.Some other gems in the city: the Trevi Fountain and its marketplaceFor a little more religious history, visit the 18th century Rococo style Plaza of St. Ignacio. Saint Ignacio was the founder of the Jesuits or Society of Jesus, the largest male religious order in the Catholic church.There are also some beautiful green spaces in Rome, like the historic park Il Pincio and Villa Borghese parks. Look at those cherry blossoms!For music lovers, the Auditorium is the main music hall in Rome.Text by Steve Smith. Hazte PRO Buscar un fotógrafo EL DERECHO DE AUTOR DE LAS IMÁGENES Y FOTOGRAFÍAS PERTENECE A SUS CORRESPONDIENTES FOTÓGRAFOS.
cc/2020-05/en_middle_0061.json.gz/line1962
__label__wiki
0.795155
0.795155
Conor Mcgregor arrested after smashing a fans phone Conor Mcgregor was arrested monday after smashing a fans phone in Miami Florida. McGregor was arrested on charges of felony strong-armed robbery and criminal mischief after the fan said he picked up the phone and walked away with it. The phone is believed to be valued at around a $1000 along with the valuable memories and photos the person had. Mcgregor continues getting into trouble and was also recently charged with assault, attempted assault and criminal mischief in April ,after he and others allegedly attacked a bus carrying UFC fighters
cc/2020-05/en_middle_0061.json.gz/line1965
__label__wiki
0.504974
0.504974
Global Healthsites Mapping Project 1 Project Overview 2 Goals & Deliverables 3 Why Not Use OSM Directly? 4 Mapping Timeline 5 Area of Interest 6 Healthsites.io <> OpenStreetMap 7 Data Model 7.1 Simplified 7.2 Complete 8 Tag Proposal 9 Health Boundary Debate 10 Tagging Examples 11 Data Identifiers 12 Data Creation 12.1 Data Imports 12.2 Ground Survey 12.3 Crowdsourcing 13 Data Extracts 13.1 Healthsites.io 13.2 Humanitarian Data Exchange 13.3 Export Tool 14 Sustainability Plan 15 Contact Information When a natural disaster or disease outbreak occurs there is a rush to establish accurate health care location data that can be used to support people on the ground. This has been demonstrated by events such as the Haiti earthquake and the Ebola epidemic in West Africa. As a result, valuable time is spent establishing accurate and accessible baseline health data. Healthsites establishes this data and the tools necessary to upload, manage and make this data easily and readily accessible. Through collaborations with users, trusted partners and OpenStreetMap, the Global Healthsites Mapping Project aims to capture and validate the location and contact details of every health facility, and make this data freely available under the Open Data License(ODBL). The project outlined in this wiki focuses on the development of an OpenStreetMap data model that can be used in Healthsites.io to capture the data for both platforms. This wiki page also outlines some examples for best practices when tagging health facilities, as well as providing overall context to the Healthsites initiative and linking to other pages for creating and sharing this data. Goals & Deliverables The overall aim of Healthsites is to have a system that enables long term curation and validation of the location of all health facilities across the globe. The data will enable users to discover what health facilities exist at any location, along with the services and resources provided. Core to the above goal, is also ensuring that this global dataset of health facility data is easily accessible to everyone. Healthsites will use OpenStreetMap as the data store and make the data available online through an API, as well as other formats such as GeoJSON, Shape files, KML, CSV. The goals and deliverables of the project outlined in this wiki page, is to ensure that the alignment of data between Healthsites and OpenStreetMap is done appropriately, following the Organised Editing Guidelines from the OpenStreetMap Foundation. Why Not Use OSM Directly? Our approach with Healthsites is to provide a domain specific view of OSM data, focussing on the needs of people who wish to work with health facility data. The aim is to provide a directed experience where all interactions with the Healthsites.io website are health facility focused, where the user does not need to be aware and understand the full extent of the larger OSM project and all it has to offer. For example, dashboards are provided for visualisation of OSM health facilities, broken down by country or aggregated to the world for easier understanding and access to the data. Healthsites provides a number of methods to make data easily accessible to users, through custom forms for capturing facility attributes, which are aligned with the recommendations for OSM tagging laid out in this wiki page. Health facility focused export tools so that the user does not, for example, need to learn how to use Overpass to extract health facility data from OSM. And API’s have been developed so that users can easily incorporate health facility data into their own applications. We believe in OSM and are passionate about seeing the healthsite data in OSM becoming the main point of reference, and we aim to leverage our work in Healthsites.io to help achieve this, while carefully catering to the specific needs of users of health facility data. Mapping Timeline In response to the Ebola outbreak of 2014, Healthsites was launched at the Global Partnership for Humanitarian Impact and Innovation (GPHI2) in 2016. GPHI2 promotes the development of innovative solutions to humanitarian challenges by harnessing the creative capacity of International Committee of the Red Cross partners to respond to the needs of conflict victims. Following the launch of the site, presentations and advocacy for sharing health facility data were made to a number of organisations including WHO​ Health​ Data​ Forum​ in​ Geneva, WHO​​ Expanded Programme on Immunization ​​(EPI) and Department​​ of​​ Immunization, Senegalese​ Ministry of​ Health, Le​ Centre​ des​ Opérations d’Urgence​ Sanitaire​ (COUS Senegal), International Federation of the Red Cross, London​ School​ ​of Hygiene​ and​ Tropical Medicine​​, MSF Manson​ Unit, Group​ on Earth Observations​ and UNITAR. A highlight of this work was the inclusion of a recommendation to share health facility data by the United Nations Committee on the Peaceful Uses of Outer Space. 80. (c) Member States are strongly encouraged to promote open data-sharing policies and participatory approaches to developing and improving access to all geospatial information relevant to global health, whenever possible. Healthsite.io data was then made available through the Humanitarian Data Exchange platform, with the Global Healthsites Mapping Project set up as an organisation. Healthsites has also supported the Ebola response in the DRC through the Health data collaborative established by CartONG. In 2018 Healthsites was awarded funding through the Digital Square Global Goods program. Part of the work carried out through this funding, is focused on piloting an upgraded system in Saint Louis, Senegal. This will include the surveying of health facilities on the ground starting July 15, 2019 and will focus on the collection of key information as outlined in the data model below. Together with Geomatica, students from the Université Gaston Berger, SIG Santé community, CartONG and OpenStreetMap Senegal, a collaborative focused on health facility data is formed. The collaborative will identify use cases, with the support of the Ministry of Health, that will drive the development of the data. During this period we will work with and encourage the Ministry of Health to share their health facility data with OpenStreetMap. To read more about the pilot in Saint Louis, Senegal, please jump to the Ground Survey section under Data Creation. The Healthsites.io initiative is global in scope. A pilot data collection effort on the ground in Senegal is taking place in July 2019, which will look at using a localised version of the OpenStreetMap data model put together for Healthsites.io. More information can be found on their dedicated OSM wiki page, please jump to the Ground Survey section under Data Creation to read more about the pilot in Saint Louis, Senegal. Healthsites.io <> OpenStreetMap The data will flow both ways from Healthsites.io to OpenStreetMap, and from OpenStreetMap to Healthsites.io. On the sign up to the Healthsites.io page, users will register using OAuth against the OSM authentication provider. Each data change (create/update/delete) to a health facility on the Healthsite.io platform will be written directly to the OSM database using the OSM API, with the OSM credentials associated with the logged in user on Healthsites.io. Changes to health facility data made outside of the Healthsites.io platform, and directly to OSM are replicated back in near-real time to a Healthsites.io mirror of all health facility data found in OSM. This is achieved using docker-osm, developed by Kartoza which takes the high frequency diffs produced on OSM and applies them to a PostgreSQL / PostGIS database hosted on Heathsites.io. Changes made locally on healthsites.io are first pushed to OSM via the OSM API and then replicated back to our docker-osm instance using the same mechanism described above. Our aim with this architectural approach is to make OSM the main storage location of all the health facility data available on Healthsites.io and at the same time facilitate large queries, extracts and general innovation around the body of OSM health facility data, whilst having minimal impact and load on the services offered by OSM. The diagram below illustrates the high level architecture as pertains to interactions between OSM and Healthsites.io. The OSM data model put together for Healthsites was initially based off of several data models used in various HOT projects across South America, Africa and Southeast Asia. The initial list of tags was then compared to the data model that Healthsites.io was already using to ensure that the same attributes were still being captured, but also offered some suggestions for additional key information that should be captured for health facilities. This was based on the numerous collaborations with HOT project partners over the years and their data needs. The overall idea is to use existing OSM tags where possible and only propose new tags where necessary. A lot of research went into the development of the Healthsites OSM data model, including the review of existing HOT data models and OSM data models available on the OSM wiki. Verification of the tags usage through the OSM wiki, Tag Info and Tag History, with further analysis on tags using OSMFilter for certain areas of interest, helped identify values generally applied in a local area. The last step involved in the creation of the Healthsites OSM data model was discussing and assessing the health facility components and the associated tags to capture this data, with partners Médecins Sans Frontières (MSF) International and CartONG, who have both conducted many projects focused on the data collection of health facilities across the globe. There are two data models outlined below. The first is the ‘Simplified’ OSM model, which is the minimum mandatory attribute information required for a health facility. The second is the ‘Complete’ model, which outlines all the tags that should be used to capture a complete list of vital information for health facilities. Mandatory Healthsite OSM Model 1 amenity clinic, doctors, hospital, dentist, pharmacy For describing useful and important facilities for visitors and residents 2 healthcare doctor, pharmacy, hospital, clinic, dentist, physiotherapist, alternative, laboratory, optometrist, rehabilitation, blood_donation, birthing_center A key to tag all places that provide healthcare (are part of the healthcare sector) 3 healthcare:speciality biology, blood_check, clinical_pathology, diagnostic_radiology, medical_physics, medical_engineering, radiology A key to detail the special services provided by a healthcare facility. To be used in conjunction with the 'healthcare=*' tag. For example 'healthcare=laboratory', and 'healthcare:speciality=blood_check' 4 name <name of health facility> The primary tag used for naming an element 5 operator <name of operator> The operator tag is used to name a company, corporation, person or any other entity who is directly in charge of the current operation of a map object 6 source <source of data> Used to indicate the source of information (i.e. meta data) added to OpenStreetMap Wish List Healthsite OSM Model 6 operator:type public, private, community, religious, government, ngo, combination This tag is used to give more information about the type of operator for a feature 7 addr:full <full address> Used for a full-text, often multi-line, address for buildings and facilities 8 contact:phone <phone number> The contact tag is the prefix for several contact:* keys to describe contacts 9 operational_status operational, non_operational, unknown Used to document an observation of the current functional status of a mapped feature 10 opening_hours <days/times of opening> Describes when something is open or closed. There is a specific standard format for this data https://wiki.openstreetmap.org/wiki/Key:opening_hours/specification 11 beds <number of beds> Indicates the number of beds in a hotel or hospital 12 staff_count:doctors <number of doctors> Indicates the number of doctors in a health facility 13 staff_count:nurses <number of nurses> Indicates the number of nurses in a health facility 14 healthcare:equipment ultrasound, mri, x_ray, dialysis, operating_theater, laboratory, imaging_equipment, intensive_care_unit, emergency_department Indicates what type of speciality medical equipment is available at the health facility 15 dispensing yes, no Whether a pharmacy dispenses prescription drugs or not. Used to add information to something that is already tagged as amenity=pharmacy 16 wheelchair yes, no Used to mark places or ways that are suitable to be used with a wheelchair and a person with a disability who uses another mobility device (like a walker) 17 emergency yes, no This key describes various emergency services 18 insurance:health none, public, private, unknown This key describes the type of health insurance accepted at the healthsite 19 water_source well, water_works, manual_pump, powered_pump, groundwater, rain Used to indicate the source of the water for features that provide or use water 20 electricity grid, generator, solar, other, none Used to indicate the source of the power generated 21 url <url of source data> Specifying a url related to a feature, in this case the wiki page if it is linked to an organised mapping effort, both through surveying and importing 22 source <source of data> Used to indicate the source of information (i.e. meta data) added to OpenStreetMap Please note that the source tag is very important to help identify where the data came from, was it a data import? If so, than something along the lines of healthsites-import-<country>-<year> should be used and the link to the OSM wiki project page should be added as the URL value to help provide data users context and confidence when utilising the information. Similarly, please do the same if the data was collected through a ground survey, use healthsites-survey-<country>-<year> as the source value and the OSM wiki project page as the URL value, or if the data is crowdsourced use healthsites-crowdsourced-<country>-<year> as the source value and leave the URL blank. Tag Proposal The tags that are being proposed as part of the development of an OSM data model for Healthsites.io include ‘staff_count:doctors’, ‘staff_count:nurses’, ‘healthcare:equipment’ and ‘insurance:health’. The ability to be able to record how many staff members, particularly doctors and nurses were available at a health facility is extremely important in an emergency situation, where government officials, for example would want to identify a site that can handle the influx of a certain number of patients. Therefore the introduction of ‘staff_count:doctors’ and ‘staff_count:nurses’ was necessary for capturing this information. Propsed OSM Tags 1 staff_count:doctors <number of doctors> Indicates the number of doctors in a health facility https://wiki.openstreetmap.org/wiki/Proposed_features/Tag:staff_count:doctors 2 staff_count:nurses <number of nurses> Indicates the number of nurses in a health facility https://wiki.openstreetmap.org/wiki/Proposed_features/Tag:staff_count:nurses 3 operational_status operational, non_operational, unknown Used to document an observation of the current functional status of a mapped feature https://wiki.openstreetmap.org/wiki/Proposed_features/Tag:operational_status 4 healthcare:equipment ultrasound, mri, x_ray, dialysis, operating_theater, laboratory, imaging_equipment, intensive_care_unit, emergency_department Indicates what type of speciality medical equipment is available at the health facility https://wiki.openstreetmap.org/wiki/Proposed_features/Tag:healthcare:equipment 5 insurance:health no, public, private, unknown This key describes the type of health insurance accepted at the health facility https://wiki.openstreetmap.org/wiki/Proposed_features/Tag:insurance:health The extensive wiki page Healthcare 2.0 put together by OSM user Fabi2 was reviewed and re-purposed where it made sense. We wanted to ensure that the work by Fabi2 was not overlooked and although very detailed, only extracted the parts that were required by the Healthsites.io model. The tags ‘staff_count:doctors’ and ‘staff_count:nurses’ was initially proposed by Fabi2, but unfortunately the whole page has been listed as abandoned. There are 882 features using both of these tags, based on the statistics from Tag Info, which is predominantly based in Africa. Looking at Tag History, it looks as though there was an initial bulk import but the use of both tags has steadily increased over time. The use of ‘health_amenity:type’, which is also a tag that was proposed by Fabi2 as part of Healthcare 2.0, is a tag that is used to capture the type of speciality medical equipment available at a health facility. This information is also important for deciding where a patient will be sent based on their needs and whether or not a health facility has the proper equipment to support those needs. The ‘insurance:health tag’, was not proposed as part of Healthcare 2.0 but is an important piece of information for health facilities, as it is a way of indicating what type of health insurance is accepted and will help patients determine whether or not they are covered for care at the site. Utilising parts of Healthcare 2.0 bit by bit is an easier way to isolate and incorporate new tags for the addition of key information for health facilities in OSM. Please see the table below for the dedicated wiki pages for the full proposal of each tag. Health Boundary Debate During the development of the OSM data model for Healthsites.io, several discussions were held regarding the inclusion of a health boundary to help identify the boundaries of a health division within a country. This was initially proposed by Claire Halleux in 2016, which focuses on the use of a ‘boundary=health’ tag, along with ‘health_level’, ‘name’ and ‘ref’. It should be noted that health boundaries appear to be different from administrative boundaries in a significant number of countries. Health Boundary Tags 1 boundary health A tag for health divisions limits and relations 2 health_level <health level> A tag to describe the level of the health division, working in a similar way as admin_level=* 3 name <health division> The name of the health division The use of health boundaries has been applied in the Democratic Republic of Congo, but has not been applied in other countries. The biggest hurdle is coming up with a level category for each country, as these will vary from place to place. From the countries surveyed so far, there seems to be 3 to 4 active levels of health divisions and the DRC decided to use even numbers for describing their different health levels. This strategy allows them to create additional intermediate levels in the future, with limited consequences as they can use the odd number in these cases. The use of tags that can be applied to objects such as villages, health facilities or smaller health divisions, in order to identify which health division they are part of was also proposed as part of the health boundary discussion. Health Level Tags 1 is_in:health_level2 <health division> The name of the health division of level 2 including the object Tagging Examples Some examples for using the OSM Healthsites.io data model for tagging health facilities has been added below as a guidance to anyone who is looking to contribute data, as well as use the data. Please note that how the tags are used are not restricted to this method, and we encourage individuals that have found special use cases to share them here so that we can all understand how to better capture health facility data. Data Identifiers Data in OpenStreetMap can be created through a number of methods. This includes, but is not limited to the importing of existing open datasets, the remote digitisation of building footprints and the collection of detailed attribute information on the ground through surveying. Populating the data needs to be traceable not only by the username, but also by the changeset comment, a source attribute tag and ideally a URL link to the data source and/or OSM wiki page detailing the organised editing efforts. OSM Username <name of osm user> Changeset Comment #healthsites Source Tag healthsites-import-<country>-<year> heathsites-survey-<country>-<year> healthsites-crowdsourced-<country>-<year> Data Creation Data Imports The section covers the importing of existing open datasets of health facilities. There are a number of things to consider when planning an imports, such as the suitability of a dataset, its completeness, data accuracy, is the data is up to date and most importantly if it has the correct license to match the OSM ODbL license. Imports should be carried out with more care and sensitivity than other edits in OSM, as it can have significant impacts on both existing data and the local mapping community. A methodology must be developed and strictly followed, and there are various Import Guidelines created by the OSM community, which should be taken into account while developing the import process: Community Buy-in License Approval Import Review The main tools used for importing existing datasets into OSM is the Tasking Manager and JOSM, but data can also be imported through a CSV file on Healthsites.io. The intention is that batch uploads will be carried out by medical data administrators around the globe as we work together to build a complete and current dataset of health facilities. If you are carrying out a data import please be sure to create an OSM wiki page following the Import Guidelines linked above, and add the page details to the table below so anyone wanting to use the data can gain context and confidence in doing so. In general our strategy is to avoid bulk imports to OSM in favour of rather performing atomic transactions (i.e. single record transactions) to the OSM database via the OSM API. However there is one scenario where bulk imports will be used. In some cases, institutions (e.g. a national health ministry) may make available to the healthsites.io platform a complete health facility dataset for their country or region. In such cases we will import these data into OSM in bulk using the user’s OSM credentials. We will have in place logic to try to eliminate any duplicate records (initially based on location and facility name) and report such duplication candidates to the user performing the import. Non-conflicting records will be imported directly into OSM. Methodology for performing bulk uploads: Creation of an OSM account specifically for the bulk import - e.g. Rwandan-MoH-import. Signing of an authorisation letter from e.g. the ministry of health for the country providing bulk data. The bulk importer must review a guidance document on the implications of doing a bulk import. Creation of an OSM wiki page describing the bulk import project. Linking of the bulk import page to the bulk import table below. The authorisation letter will be attached to the bulk import page on OSM wiki. Ground Survey This section covers the collection of health facility information on the ground through surveying the site directly, generally as part of an organised mapping effort. There are several ways to collect data in the field and it will vary by context, but it will generally include the following: Development of an OSM data model Recruiting a mapping team and providing training Preparing the relevant data collection tools Allocating appropriate transport for the area Authorisation from district officials to survey the area of interest Producing field maps to help guide the team on the ground Managing data being collected on the ground Data validation and spot checks, followed by a Final round of validation before uploading the data into OSM Tools that can be used for the data collection include but are definitely not limited to OpenDataKit, OpenMapKit, Field Papers, GPS units and OMK Server. Customised survey forms, based on a project data model are created for OpenDataKit through a simple spreadsheet. The use of customised forms ensures that the data collected by the mappers during the survey is consistent, with a set of standardised tags for each map feature. This makes the data collection workflow much more streamlined and greatly helps reduce the potential for error. If you would like to organise a ground survey focusing on the data collection of health facilities, please use the Senegal OSM project page linked below as a template and reach out to Mark Herringer or Tim Sutton who can help provide some guidance. Otherwise, if you feel confident to go ahead than please be sure to create an OSM wiki page for your surveying project, and add the page details to the table below so anyone wanting to use the data can gain context and confidence in doing so. Year Duration Location Organisation Wiki Page 2019 July - August Senegal Geomatica Cartong Openstreetmap Senegal Adding details about a health facility through crowd-sourcing, is a surveying technique that focuses on local communities capturing information associated with key features in their environment. This generally involves going out in person to map a level of detail that cannot be seen from aerial imagery. This is necessary for creating a detailed and accurate map. By going in person, they are ‘ground truthing’ the data by directly observing it and ensuring its accuracy. This is not an organised editing effort, but generally an enthusiastic mapping individual who wants to add information about a health facility that they frequent, is in their vicinity or they have good knowledge about. As this is not an organised effort, an OSM wiki page does not have to be created but the detailed attribute information can simply be added to the health facility following the data model above! Healthsites.io Data extracts per country are available on Healthsites.io, which can be found by going to the map page and browsing the country list on the left panel. Clicking on the name of any country listed will show a dashboard for that country which includes a link for downloading the associated data as a shapefile. Health facility data can be downloaded from the Humanitarian Data Exchange (HDX) platform. Healthsites is registered as the Global Healthsites Mapping Project and hosts country datasets for health facilities, which can be downloaded as a GeoJSON, CSV and/or Shapefile. Export Tool The Export Tool is another platform where health facility data can be easily downloaded. Developed by the Humanitarian OpenStreetMap Team, the Export Tool is an open service that creates customised extracts of up-to-date OpenStreetMap data in various file formats, including GeoPackage (.gpkg), Garmin (.img), Google Earth (.kml), OSM (.pbf), MAPS.ME (.mwm), OsmAnd (.obf) and MBTiles (.mbtiles). Healthsites is developing a social enterprise business model to fund health facility mapping and validation. We invite citizens, organisations and Ministries of Health to share baseline health facility data to OpenStreetMap and collaborate around the Ministries Health strategy and prioritised use cases. If you would like to get in touch with the project lead, please contact Mark Herringer or Tim Sutton via their OpenStreetMap user accounts. Alternatively you can send a message through the contact form at the Healtsites.io website. The OpenStreetMap Foundation Organised Editing Guidelines wiki page. Retrieved from "https://wiki.openstreetmap.org/w/index.php?title=Global_Healthsites_Mapping_Project&oldid=1884403"
cc/2020-05/en_middle_0061.json.gz/line1968
__label__cc
0.610502
0.389498
PyDSTool PyDSTool is an integrated simulation, modeling and analysis package for dynamical systems, written in Python. It is being developed at Cornell University by Robert Clewley, Drew LaMar, and Erik Sherwood. For full documentation see our wiki site. To download, please go to the SourceForge files page, where you can read the release notes. The source code is available under the terms of the BSD license. The PyDSTool software is "research code" in a Beta stage of development, and should not be treated as a complete or comprehensive dynamical systems package, with the associated expectation that its design and implementation have thoroughly stabilized and have been well tested. We have added features as and when we have had a use for them in our own research, and have omitted many important features that we would love to add if time permits us, or if our research so demands. You might like to submit feature requests, or you may also like to contribute to the code yourself. We are also interested to hear your opinions about the possibility of adding some of our classes to SciPy (perhaps in modified form). Please contact us at the SourceForge open discussion forum or via email. Features implemented Efficient and state-of-the-art ODE / DAE / discrete map simulation tools (using dynamically-linked and automatically generated C code, if external compiler available) (see wiki page) Hybrid model and event-driven simulation support (see wiki page) Simulations and analysis can be forced to be "bounds safe", e.g. for "non-negativity preservation" (see wiki page) Bifurcation analysis and continuation tools in-built, via PyCont Support for data-driven modeling (see wiki page) Interactive command-line / script-based interface "Index-free" and context-heavy data structures, including an enhanced version of arrays (see wiki page) Symbolic expression utilities (including evaluation, substitution, derivatives, some simplification) (see wiki page) Easy to build complex models using hierarchical object-oriented data structures that contain composable model specifications (see wiki page) Memory management utilities, data import & export (inc. basic SBML conversion and LaTeX markup via the SloppyCell package) Modular code design allows easy expansion to support other algorithms (contributions welcome) Data structures and toolkits for parameter estimation / model fitting and other time-series and data-driven problems Seamless use with tools in SciPy, etc. through dynamic typing Additional toolboxes for specific applications, including biomechanical modeling, computational neuroscience, and systems biology (see wiki page) Many tutorial examples and documentation available online at the wiki Users of PyDSTool need to be familiar with working in interactive, command-line environments such as UNIX and Matlab, including the writing of simple command scripts. There is presently no graphical interface for PyDSTool. Our emphasis is on the interactivity of a command-line and the rapid prototyping possibilities of script-based computing. In building a core library of Python classes, supporting many fundamental concepts in dynamical systems modeling, we provide more than just a glue with which to interface multiple tools. Our classes involve storing and maintaining a "context" that carries a lot of useful mathematical baggage. Through interaction with our Python environment at the script level, users can build complex models in a structured way, and have access to mathematically intuitive information about the models, using the intrinsic context of all the Python objects at the heart of their computations. Our UI model is for users to interactively "query" objects for basic information (known in Python-speak as introspection), and also to be able to treat them as unitary objects of computation for use with tools and utilities such as optimizers, parameter estimators, and so forth. We believe it is crucial for users to be able to combine the application of tools in a nested or interleaved fashion, in order to make the most flexible and dynamic manipulations of a model. Such rich combinations are practically impossible in disjointed software environments, and we believe our community is eager to be able to smoothly set-up and maintain such situations for their own modeling projects. It is a challenge to cleanly and efficiently interface different legacy algorithms with the core Python code in order to maximize the use and re-use of the context associated with the core objects. Users are provided with an interface for the specification of both simple and complex dynamical systems models, using minimal programming syntax, and a range of options in converting these abstract specifications into instantiated numerical solvers for a specific system. Within the same interactive session, users have immediate access to analysis tools for continuation, parameter estimation, optimization, and so on. These tools are each tailored for use with the core PyDSTool structures to ensure the user has to write as little additional computer code as possible. Extensive documentation for the project has been provided online on this wiki. A key aspect in the design of PyDSTool is the provision of adequate diagnostic information and querying utilities for data structures and computations. Users can expect helpful information regarding the status of their model development and computations beyond the guidance of the online documentation, through in-built querying commands and detailed error messages. The object-oriented nature of the software also provides inherent protection of the users’ conceptualization of data-flow and control in their PyDSTool scripts. In our design we have emphasized modularized data structures and interface design that facilitates data-driven approaches to the modeling of physical processes, and we have built upon standard numerical, scientific and graphics libraries for Python (for instance, SciPy and Matplotlib). These, in turn, make use of well-established and efficient legacy codes for numerical integration of ODEs, and for dealing with linear algebra, optimization, and root solving (for instance, the LAPACK and MINPACK Fortran libraries). These legacy codes are typically interfaced using SWIG. The low-level languages of these codes provide the computational speed that Python itself lacks, in the places for which computation is most intensive. All of the code involved in the PyDSTool project is open source, and we have aimed to create as few dependencies on external software packages as possible. In particular, the package can be used with Microsoft Windows, Mac OS X and Linux machines. On top of the third-party libraries we have added several new tools and capabilities. We have enhanced legacy numerical integration code for ordinary differential equations to perform various additional tasks of use in hybrid systems modeling, implemented at the C-code level for maximal efficiency. This includes supporting discrete event detection during dynamical evolution. Adding arbitrary user-specified event detection to a model permits ODEs and maps to be used in combination as "hybrid" dynamical systems. Also, the inclusion of data-based time series inputs to a dynamical system’s evolution equations is a feature that aids data-driven modeling. Utilities have been added that allow the movement of data and model specifications both in and out of PyDSTool, for sharing in other software environments. As well as basic importing and exporting of numerical data as text files, this also includes more systems-level interfacing. For instance, a user can export a dynamical model’s definition to a Matlab environment in which Automatic Differentiation is available for parameter sensitivity calculations (via the package ADMC++). Also, PyDSTool can be interfaced with the systems biology modeling package SloppyCell, through which PyDSTool inherits access to an interface with the Systems Biology Markup Language (SBML) for model specification, and the LaTeX mathematical markup language. Further interfaces to packages are in active development, such as to the original DsTool and to other simulation tools such as XPP or NEURON. PyDSTool (last edited 2010-11-30 00:06:48 by ZacharyGraham)
cc/2020-05/en_middle_0061.json.gz/line1969
__label__cc
0.520943
0.479057
zen echoes “Zen Echoes is an exquisite book reflecting the power of the female voice in Zen.”—Joan Jiko Halifax, abbot, Upaya Zen Center “Zen Echoes is a valuable and unique addition to the growing literature, in English, of Chan. Beata Grant has done a thorough and masterful job of clear translation, with plenty of notes to explain the many references, of forty-three Zen koans (some familiar, many important, but not so familiar) with verse commentaries by three women Chan masters. As Grant points out, there isn’t anything feminist or even “female” about those verses. They are simply brilliant poetic teachings, from Chan’s most developed eras, by three great masters who happen to be women. A text to ponder and savor. With a useful foreword by Sue Moon, and introduction by the translator.”—Norman Fischer, author of What Is Zen? Plain Talk for a Beginner’s Mind Classic Koans with Verse Commentaries by Three Female Zen Masters Beata Grant Too often the history of Zen seems to be written as an unbroken masculine line: male teacher to male student. In this timely volume, Beata Grant shows us that women masters do exist—and have always existed. Zen Echoes is a collection of classic koans from Zen’s Chinese history that were first collected and commented on by Miaozong, a twelfth-century nun so adept that her teacher, the legendary Dahui Zonggao, used to tell other students that perhaps if they practiced hard enough, they might be as realized as her. Nearly five hundred years later, the seventeenth-century nuns Baochi and Zukui added their own commentaries to the collection. The three voices—distinct yet harmonious—remind us that enlightenment is at once universal and individual. In her introduction to this shimmering translation, Professor Grant tells us that the verses composed by these women provide evidence that “in a religious milieu made up overwhelmingly of men, there were women who were just as dedicated to Chan practice, just as advanced in their spiritual realization, and just as gifted at using language to convey that which is beyond language.” Beata Grant is professor of Chinese and Religious Studies (Department of East Asian Languages and Cultures) at Washington University. She lives in St. Louis, Missouri. Other books by Beata Grant: Daughters of Emptiness Sculpting the Buddha Within Chen-Chiu: The Original Acupuncture The Ceasing of Notions Buddhism of the Heart The Book of Mu The Book of Equanimity Awesome Nightfall The Art of Just Sitting A Buddhist Response to the Climate Emergency The Buddha’s Dream of Liberation A New Buddhist Path Touching Ground Ecodharma Zen on the Trail Did you ever wonder why R2-D2 is always calm and cool under pressure, the key to the rebellion’s survival, and the one who never fails to save the day? Could it be because he’s secretly a Zen master? Discover your inner R2—and the truth about who you really are! This delightful and illuminating romp unfolds in the form of a fictional dialogue between the author—a die-hard Star Wars devotee with a deep connection to Zen—and two cosplayers dressed as C-3PO and R2-D2 who insist on being called by their character names. Along the way, you’ll come to see what everyone’s favorite astromech can teach us about peace, happiness, and life’s true meaning. Sculpting the Buddha Within is the first major biography of Shinjo Ito, the founder of the Shinnyo-en tradition of Buddhism and one of the twentieth century’s most innovative spiritual teachers. Ito was schooled in Shingon, the millennium-old esoteric Buddhism of Japan, and used that as the basis for developing a unique lay practice grounded in the principles and concepts of the Mahayana version of the Nirvana Sutra. Ito’s wish was to help his practitioners see their own potential for goodness so that they, too, would be inspired to work diligently to shape and give form to their inner buddha. Rather than encouraging his followers to believe in a fixed system of practice or beliefs, Ito taught how to live life in accordance with one’s buddha nature—and the gratitude, creativity, and happiness latent within it. “Intimacy is based on the willingness to open ourselves to many others, to family, friends, and even strangers, forming genuine and deep bonds based on common humanity. Koshin Paley Ellison’s teachings share the way forward into a path of connection, compassion, and intimacy.” Each of us has an enormous capacity for love—a deep well of attention and care that we can offer to ourselves and others. With guidance that is both simple and wholly transformative, Koshin Paley Ellison, Zen teacher and psychotherapist, shows us how to uncover it: pay attention, be of service, and be with others. With this inspiring and down-to-earth book, drawn from the Zen precepts and illustrated with anecdotes from Koshin’s own life and practice, you’ll learn how to explore and investigate with your own core values, identify the mental habits that could be unconsciously hurting yourself and others, and overcome isolation. Each chapter closes with a contemplation to help integrate the teachings into your life. This book is about getting back in touch with your values, so you can live energetically, authentically, and lovingly. This is an invitation to close the gaps we create between ourselves and others—to wake up to ourselves and the world around us. It’s time to live wholeheartedly. Women played major roles in the history of Buddhist China, but given the paucity of the remaining records, their voices have all but faded. In Daughters of Emptiness, Beata Grant renders a great service by recovering and translating the enchanting verse—by turns assertive, observant, devout—of forty-eight nuns from sixteen centuries of imperial China. This selection of poems, along with the brief biographical accounts that accompany them, affords readers a glimpse into the extraordinary diversity and sometimes startling richness of these women’s lives. A sample poem for this stunning collection: The sequence of seasons naturally pushes forward, Suddenly I am startled by the ending of the year. Lifting my eyes I catch sight of the winter crows, Calling mournfully as if wanting to complain. The sunlight is cold rather than gentle, Spreading over the four corners like a cloud. A cold wind blows fitfully in from the north, Its sad whistling filling courtyards and houses. Head raised, I gaze in the direction of Spring, But Spring pays no attention to me at all. Time a galloping colt glimpsed through a crack, The tap [of Death] at the door has its predestined time. How should I not know, one who has left the world, And for whom floating clouds are already familiar? In the garden there grows a rosary-plum tree: Whose sworn friendship makes it possible to endure. —Chan Master Jingnuo Chen-Chiu: The Original Acupuncture is based on an historic Chinese acupuncture text that remains vital to this day: the Ling-Shu-Jing. Dr. Claus Schnorrenberger, who has produced a well-known translation of Ling-Shu-Jing, here applies his personal medical experience—as a lecturer, and moreover, as an orthodox Western physician and Chinese acupuncturist/herbalist—to the principles of the text. The result is a new view of the prevailing Western perceptions of Chinese medicines. The author calls into question such concepts as Chi, the meridians, and even acupuncture itself, in order to correct erroneous translations still in use by many to this day. Chen-Chiu provides an epistemological reflection on what Chinese medicine and acupuncture really mean, and adds new contrast and insight into Western and Eastern views of healing. This, the author rightly contends, is essential for the successful integration of Chinese medicines in the West. Schnorrenberger’s book is well-balanced and much-needed, appropriate not only as a reference for students and practitioners of Chinese medicine, but also as a learning aid for patients, health-care workers and administrators, Western physicians, and more. Among the writings from the Dunhuang Caves, discovered in the mid-twentieth Century, are the Zen equivalent of the Dead Sea Scrolls—ancient texts unknown for centuries. The Ceasing of Notions is one such text. It takes a unique form: a dialogue between two imaginary figures, a master and his disciple, in which the disciple tenaciously pursues the master’s pity utterances with follow-up questions that propel the dialogue toward ever more profound insights. And these questions prove to be the reader’s very own. Soko Morinaga brings alive this compact and brilliant text with his own vivid commentary. This volume also includes a generous selection from Morinaga’s acclaimed autobiography, Novice to Master: An Ongoing Lesson in the Extent of my Own Stupidity. Jeff Wilson started his walk on the Buddha’s path as a Zen practitioner—taking up a tradition of vigorous self-effort, intensive meditation, and meticulous attention to rectitude in every action. But in Jeff’s case, rather than freeing him from his suffering, he found those Zen practices made him nothing short of insufferable. And so he turned to Shin Buddhism—a path that is easily the most popular in Zen’s native land of Japan but is largely unknown in the West. Shin emphasizes an “entrusting heart,” a heart that is able to receive with gratitude every moment of our mistake-filled and busy lives. Moreover, through walking the Shin path, Jeff comes see that each of us (himself especially included) are truly “foolish beings,” people so filled with endlessly arising “blind passions” and ingrained habits that we so easily cause harm even with our best intentions. And even so, Shin holds out the tantalizing possibility that, by truly entrusting our foolish selves to the compassionate universe, we can learn to see how this foolish life, just as it is, is nonetheless also a life of grace. Buddhism of the Heart is a wide-ranging book of essays and open-hearted stories, reflections that run the gamut from intensely personal to broadly philosophical, introducing the reader to a remarkable religious tradition of compassionate acceptance. The word “mu” is one ancient Zen teacher’s response to the earnest question of whether even a dog has “buddha nature”. Discovering for ourselves the meaning of the master’s response is the urgent work of each of us who yearns to be free and at peace. “Practicing Mu” is synonymous with practicing Zen, “sitting with Mu” is an apt description for all Zen meditation, and it is said that all the thousands and thousands of koans in the Zen tradition are just further elaborations of Mu. This watershed volume brings together over forty teachers, ancient and modern masters from across centuries and schools, to illuminate and clarify the essential matter: the question of how to be most truly ourselves. Includes writings from: Dogen • Hakuin • Dahui • Thich Thien-An Zenkei Shibayama • Seung Sahn • Taizan Maezumi • Sheng Yen Philip Kapleau • Robert Aitken • Jan Chozen Bays • Shodo Harada Grace Schireson • John Daido Loori • John Tarrant Barry Magid • Joan Sutherland … and many more! The Book of Equanimity contains the first-ever complete English language commentary on one of the most beloved classic collections of Zen teaching stories (koans), making them vividly relevant to spiritual seekers and Zen students in the twenty-first century. Continually emphasizing koans as effective tools to discover and experience the deepest truths of our being, Wick brings the art of the koan to life for those who want to practice wisdom in their daily lives. The koan collection Wick explores here is highly esteemed as both literature and training material in the Zen tradition, in which koan-study is one of two paths a practitioner might take. This collection is used for training in many Zen centers in the Americas and in Europe but has never before been available with commentary from a contemporary Zen master. Wick’s Book of Equanimity includes new translations of the preface, main case and verse for each koan, and modern commentaries on the koans by Wick himself. Awesome Nightfall: The Life, Times, and Poetry of Saigyō captures the power of Saigyō’s poetry and this previously overlooked poet’s keen insight into the social and political world of medieval Japan. It also offers a fascinating look into the world of Japanese Buddhism prior to the wholesale influence of Zen. Shikantaza—or “just sitting”—is one of the simplest, most subtle forms of meditation, and one of the most easily misunderstood. This peerless volume brings together a wealth of writings, from the Buddha himself to Bodhidharma and Dogen and many of modern Zen Buddhism’s most influential masters, all pointing directly to the heart of this powerful practice. Edited by one of America’s pre-eminent Zen teachers, this book is a rich resource for wisdom seekers and scholars alike. Never before have so many teachers from all Buddhist traditions—Zen, Vajrayana, Theravada, Vipassana; from the West and the East—come together to offer a unified response to a matter of utmost urgency. This watershed volume is at the same time a clarion call to action and a bright beacon of hope. With contributions from: His Holiness the Dalai Lama, the Seventeenth Karmapa, Sakya Trizin, Dudjom Rinpoche, Chatral Rinpoche, Ato Rinpoche, Dzongsar Khyentse Rinpoche, Thrangu Rinpoche, Dzigar Kongtrul Rinpoche, Chokyi Nyima Rinpoche, Ringu Tulku Rinpoche, Tsoknyi Rinpoche, Robert Aitken, Joanna Macy, Bhikkhu Bodhi, Joseph Goldstein, Taigen Dan Leighton, Susan Murphy, Matthieu Ricard, Hozan Alan Senauke, Lin Jensen, and Thich Nhat Hanh. Explore the three great teachings of the Buddha with this plain-English primer: • The First Turning of the Wheel: Insight into the nature of suffering—and the way out of it—from the four noble truths and the eightfold path • The Second Turning of the Wheel: Teachings on emptiness from the Heart Sutra and the Diamond Sutra • The Third Turning of the Wheel: Guidance for practitioners and teachings on awakened Buddha nature In clear language, James William Coleman guides us through the ancient sutras that preserve the Buddha’s message, illuminating their meaning for today’s world and tying the Buddha’s wisdom together for us. The book concludes with chapters from two great teachers, Reb Anderson from the Zen tradition and Lama Palden from the Tibetan Buddhist tradition, on how to use meditation to bring the Buddha’s wisdom into our daily lives. David R. Loy addresses head-on the most pressing issues of Buddhist philosophy in our time. What is the meaning of enlightenment—is it an escape from the world, or is it a form of psychological healing? How can one reconcile modern scientific theory with ancient religious teachings? What is our role in the universe? Loy shows us that neither Buddhism nor secular society by itself is sufficient to answer these questions. Instead, he investigates the unexpected intersections of the two. Through this exchange, he uncovers a new Buddhist way, one that is faithful to the important traditions of Buddhism but compatible with modernity. This way, we can see the world as it is truly is, realize our indivisibility from it, and learn that the world’s problems are our problems. This is a new path for a new world. From October 16, 1973, to August 17, 1974, Tim Testu walked all the way from San Francisco to Seattle, bowing his head to the ground every three steps. And that’s not even the best part of his story. Tim Testu was one of the very first Americans to take ordination in Chinese Zen Buddhism. His path—from getting kicked out of school to joyriding in stolen boats in the Navy to squatting in an anarchist commune to wholehearted spiritual engagement in a strict Buddhist monastery—is equal parts rollicking adventure and profound spiritual memoir. Touching Ground is simultaneously larger than life and entirely relatable; even as Tim finds his spiritual home with his teacher, the legendary Chan master Hsuan Hua, he nonetheless continues to struggle to overcome his addictions and his very human shortcomings. Tim never did anything halfway, including both drinking and striving for liberation. He died of leukemia in 1998 after packing ten lifetimes into fifty-two years. This landmark work is simultaneously a manifesto, a blueprint, a call to action, and a deep comfort for troubling times. David R. Loy masterfully lays out the principles and perspectives of Ecodharma—the Buddhist response to our ecological predicament, a new term for a new development of the Buddhist tradition. This book emphasizes the three aspects of Ecodharma: practicing in the natural world, exploring the ecological implications of Buddhist teachings, and embodying that understanding in the eco-activism that is needed today. Offering a compelling framework and practical spiritual resources, Loy outlines the Ecosattva Path, a path of liberation and salvation for all beings and the world itself. Prepare to be inspired, motivated, and encouraged. Evoking the writings of Gary Snyder, Bill Bryson, and Cheryl Strayed, Zen on the Trail explores the broad question of how to be outside in a meditative way. By directing our attention to how we hike as opposed to where we’re headed, Ives invites us to shift from ego-driven doing to spirit-filled being, and to explore the vast interconnection of ourselves and the natural world. Through this approach, we can wake up in the woods on nature’s own terms. In erudite and elegant prose, Ives takes us on a journey we will not soon forget. This book features a new prose poem by Gary Snyder.
cc/2020-05/en_middle_0061.json.gz/line1970
__label__cc
0.630773
0.369227
Avoid the Seven Mistakes Job Seekers in Their 50s Make How to sell yourself in a digital work world, sharpen your interview skills and write a look-at-me résumé by James A. Martin, AARP | Comments: 0 Hero Images/Getty Images Job search may have changed since you last looked. Older job seekers should avoid these common mistakes. Searching for a job at any age puts most people on a bullet train to Stressville. When you’re 45 or more, a job search can be particularly daunting. If you haven’t looked for a job in years, guess what? Things have changed. A lot. Here are seven of the most common mistakes midlife job hunters make—with tips from recruiters and career experts on how to sidestep them. 1. You Consider Your Age a Detriment, Not an Asset At midlife, job seekers often assume potential employers will view their age as a liability, say career coaches and recruiting professionals. But, “the biggest mistake you can make is to disqualify yourself based on the biases of others,” says Ninh Tran, co-founder and chief marketing officer of recruiting platform Hiretual.com. Counter potential ageism by stressing your energy, how you’ve kept current with trends and technologies and the value of your experience, advises consultant and author Barry Maher. Don’t let an interviewer assume you’ll retire soon. Maher suggests saying, “I’m looking for a company I can stay with and grow,” and “one of the benefits of having a little experience under my belt is that I know what I want in life. I’m not going to jump around from company to company, trying this job and that job.” Tran adds that age is associated with experience and wisdom, so it’s important “to be likable, be yourself, and if you get the rejection letter, move on to a different company that will appreciate your qualities.” 2. Your Résumé Details Your Early Work History—or Ignores It Completely While plenty of companies hire workers over 45, age discrimination remains a widespread problem, making it tricky for job applicants to know how much past experience to include during the application or interview process, or in their résumés. How do you show the depth of your experience without looking old? A brief overview of what you did 20–30 years ago is plenty, says Jane Goodall, résumé writer and career consultant, and you don’t need to give specific dates for jobs from that long ago. “Yes, you may have saved your employer 35 percent in overhead costs back in 1984. But what are your current stats? Life is different, business is different. Focus on the now by emphasizing skills, successes and experience from the past 10 to 15 years that are relevant to the job you’re seeking.” At the same time, it’s a mistake to only include the most recent decade of your career on your résumé, adds Karla Jobling, chief operating officer of search and recruitment firm BeecherMadden. “As a professional headhunter, it makes me wonder what you might have to hide, which means I’m immediately questioning your honesty,” she explains. “Or, if you’ve made it to the interview stage, I’m annoyed that you’ve not been upfront to begin with. It tells me you didn’t trust that I would be able to see past your age and look at your skills for the job. You then have to work twice as hard to impress me.” Take just a paragraph to summarize your job experience from more than 15 years ago, focusing on skills and successes that are relevant to the job you’re seeking, says Susan Peppercorn, a career management coach for Positive Workplace Partners. “Many mature job seekers have experienced mergers and acquisitions, change of management, competitive threats and corporate reorganizations, which are as relevant today as they were back in the day.” 3. You Don’t “Get” LinkedIn LinkedIn is a hugely important social media network for professionals, and experts advise job seekers of all ages—particularly those 45+—to become proficient at optimizing their profiles and using its tools. Carl Court / Getty Images Optimize your LinkedIn profile and get the most out of LinkedIn's tools. For example, if you aren’t familiar with the basics of sending a LinkedIn InMail, it’s easy to accidentally send a message before you’ve finished writing it, says Sonja Hastings, a recruiter for Optimal Sales Search. This can happen when you tap the return or enter key. Deselecting the “press enter to send” button in your LinkedIn message can prevent this error. “I’ve had job candidates make this mistake, and then they follow up with ‘I don’t know to use LinkedIn,’” Hastings adds. Not being proficient on LinkedIn makes you look out of touch and unwilling or unable to learn new skills, he notes, all of which can be “the kiss of death for some careers,” especially those in sales and marketing. The remedy? “Get familiar with LinkedIn. Test out the inbox and send a few InMails to friends for practice. Don’t wait to test it out on job leads.” See also: 10 Ways You Didn’t Know LinkedIn Could Find You a Job Also, be aware that many companies now find and contact potential job candidates through LinkedIn rather than going through recruiting firms, says Jenny Hargrave, founder of U.K.-based InterviewFit, which provides interview preparation services. So if your LinkedIn profile is half-baked, or nonexistent, you’re potentially losing out. 4. Your Résumé, Email Address and Terminology Are Outdated Résumé formats have changed with the rise of the applicant tracking system (ATS)—software that quickly sorts electronically submitted job applications and résumés by looking for relevant keywords. But job seekers in their 50s, especially those who’ve not looked for a job in a while, may submit résumés that aren’t ATS-compatible, which don’t emphasize keywords or mention the skills and requirements of the position being applied for, says Goodall. (LiveCareer offers tips on optimizing résumés for ATS.) “Job candidates often unknowingly show potential employers that they’re older and a bit out of touch by how they format their résumés, present information and use outdated language,” says Lela Reynolds, senior career consultant for Resume Strategists Inc. “Take a hard look at your résumé and eliminate common language giveaways such as ‘references available upon request,’” she recommends. Other tips: Don’t insert two spaces after a period, as “only one space has been preferred since the death of the typewriter,” Reynolds says. Don’t include “http://www” before a website name or write “internet” instead of “web” or “digital,” as all of this makes you look like you’re stuck in 1996. Also avoid using outdated terminology for your industry, either in your LinkedIn profile or on your résumé, adds Joanne Meehl, owner of Joanne Meehl Career Services. “A client of mine whose old field was once called telecom changed the terminology to digital communications and included that phrase in the summary and skills areas of his résumé and on his LinkedIn profile,” she says. “It de-aged him and it worked, as he was found on LinkedIn and then hired.” Even your email address can hurt your image, Reynolds adds. “Don’t use revealing numbers like your birth year in your email address, and avoid an AOL, Hotmail or Yahoo email address on your résumé.” Those services are considered outdated, Reynolds says. “To look more current, create a Gmail address with your first and last name,” she advises. “If your name is common and you need to use a distinguishing number, don’t choose one that reflects your age or birth year.” 5. You’re Inflexible on Salary If you’ve been in your profession for decades, no doubt you’ve reached a high-income bracket. Consequently, you may expect a fatter salary than a perfectly qualified, younger competitor—which can be a mistake. “I’ve seen how some recruiters avoid candidates in their 40s and up, not because they’re not experienced or capable, but because their salary expectations might be too high,” says Alexander Grosu, project manager of TestUP, which offers pre-employment tests for companies. If you suspect salary might limit your chances at being considered for a job you really want, address this upfront, advises Grosu. In your cover letter, mention what motivates you about the job beyond the salary, such as the opportunity to learn new skills, be part of a new initiative the company is undertaking or collaborate on a specific team. While it’s important to show flexibility regarding salary (if indeed you can be flexible), don’t get into specifics early on, as you could leave money on the table. Once you’ve emphasized your expertise in efficiently handling the situations you’d likely face in the job, you’ll have more bargaining power, which can translate into a more desirable salary, adds Michele Mavi, director of Internal Recruiting and Content Development, Atrium Staffing. Try to get a realistic sense of what the typical salary is for the job, taking industry, geographical, and the size of the organization into account, says Reynolds. Online resources such as Glassdoor can help. Ultimately, deciding what you can and can’t accept in terms of salary is a highly personal decision based on multiple factors, Mavi says, such as the realities of your economic situation and whether the job is something you truly want to do, even if it means less money. You may have to balance how badly you want or need a job with the salary offered, she adds. And that can depend upon your circumstances. If you’re out of work and need the money, you should show you’re flexible on salary, she points out. If your kids are grown and gone, your house is paid for, and you’re going for a job that will truly fulfill you, you can also be more flexible if necessary. “If you aren’t familiar with the basics of sending a LinkedIn InMail, it’s easy to accidentally send a message before you’ve finished writing it, when you tap the return or enter key.” 6. You’ll Only Look for Full-Time Jobs or Consider Permanent Positions Maybe you want or need a full-time, permanent position (or as permanent as any job is today). But “many employers are looking to hire experienced workers for project assignments or temporary jobs, which can turn into full-time jobs,” notes Art Koff, founder of RetiredBrains, a job resource for boomers and retirees. So look at temporary as well as permanent job listings, keeping in mind temporary gigs usually don’t offer benefits, he notes. In most cases, it’s to your advantage to let a hiring manager know you’d accept a permanent position on a temporary, contract basis, in order to demonstrate your abilities, Koff says, adding that a time frame for the contract position should be set, such as two or three months, after which, if all parties agree, you can be converted to a full-time staffer. Any suggestion that you’d accept a job on a temporary basis should only happen toward the end of your interview with the hiring manager, Koff continues. It can be risky to bring it up with a recruiter, Koff advises, as you might not be viewed as a serious candidate. “And you’ll never reach the hiring manager if the recruiter doesn’t feel you’re an appropriate candidate,” he says. 7. You Don’t Mention Your Software Skills As famed Silicon Valley venture capitalist Marc Andreessen pronounced, “software is eating the world,” turning practically every business into a software-driven enterprise. So it’s a mistake not to list specific software programs among your skills on job applications, LinkedIn profiles, résumés and during interviews, says retained search consultant and executive résumé writer Donna Svei. Recruiters often perform keyword searches on software vendors and programs on digitally submitted résumés, job applications and on LinkedIn, she explains. Some keyword search examples include Microsoft Excel, Microsoft PowerPoint or Salesforce. If you don’t have software skills, it’s time to acquire them through training. Should you land a job interview, you want to avoid making excuses such as, “My company didn’t train me in that,” or mention that a subordinate or younger staff member did that for you, says Meehl. Instead, show prospective employers that you’re still learning new skills to keep yourself current. “Be prepared to describe where you used specific applications, how you learned them and how your use of software helped your previous employer increase sales, reduce costs, accelerate processes,” Svei adds. Finally, remember it’s not about you. It’s about the employer. In job interviews, midlife job seekers sometimes make the mistake of focusing too much on what they’ve done and how they’ve done it, notes career consultant and Life Reimagined expert Rich Feller, Ph.D. While this is important, you should also talk about how you’ve collaborated with others, the value you added to the team and how those achievements translated into success. Telling stories that show your tech savvy, ability to learn, years of experience, and most important, how you’ll make your potential boss’s life easier can help you overcome any potential age-related concerns. More Job Search Tips 17 LinkedIn tips for job seekers ASK OUR EXPERTS: Have you ever experienced age discrimination in your job search or at work?
cc/2020-05/en_middle_0061.json.gz/line1972
__label__wiki
0.984134
0.984134
As celebrities and people around the world follow the Australian bushfires, is our national reputation at risk? By Bridget Judd Photo: Pink said on social media that she would donate $500,000 to firefighting services. (Reuters: Lucas Jackson) Related Story: 'It's the build-up of fuel load': Libs MP in tense exchange with Piers Morgan over climate change Related Story: 'We all face a climate disaster': Australian stars highlight bushfire plight at Golden Globes Related Story: 'Shut up and sit on the back bench': Business lobby group frustrated with Coalition climate change sceptics Related Story: 'My chef fled to Melbourne': Fires scare off more than tourists in East Gippsland Some 4,600 kilometres across the pond, a humble Fijian coffee shop is urging its customers to "caffeinate generously". As scenes of apocalyptic red skies and injured wildlife are broadcast to horrified onlookers across the globe, Weta Coffee has pledged its support — and profits from Monday's sales — to Australia's firefighting efforts. The Pacific may seem like an unlikely source of solidarity in light of Australia's chequered relationship with its neighbours on climate action and our tug-of-war with China over foreign aid in the region. But it's not about politics for owner Mue Bentley Fisher, who insists "the connections are deep". Photo: Mue Bentley Fisher (left) and Darren Bentley Fisher are co-founders and directors of Weta Coffee, which is raising money for Australia's firefighting efforts. (Supplied: Mue Bentley Fisher) "We want to help a member of our Pacific family in need," she says. "All politics aside, we're all concerned about the devastation in Australia... There isn't anyone in Fiji who doesn't have some sort of connection to Australia." Australia isn't used to being the target of philanthropy — we see ourselves as donors not recipients, despite the comparable decline in our foreign aid budget But as the nation's east coast braces for weeks of fires, one thing is clear: the world is watching — with its heart, and pockets, open. 'The rest of the world is utterly perplexed' Nearby Papua New Guinea, which has since established its own fundraising appeal, has offered to deploy 1,000 soldiers and firefighters to Australia, while an online fundraiser has raised in excess of $41 million from donors as far as Romania. But while few would argue that our fire services shouldn't receive extra funding, or that those most affected don't need the support, the bushfire crisis and subsequent influx of foreign aid has raised questions about Australia's global standing. External Link: @TimCostello tweet: As happened in Jan 2004 when Aussies were glued to the tragedy in the Asian tsnunami - this summer we are transifxed by our own nationak disaster. "In terms of our reputation, I think the rest of the world is utterly perplexed," said former World Vision CEO Tim Costello. "The LA Times, I think back in 2009, had a front page saying, 'if you want to see the future of climate change, look at Australia'. "I remember people scoffing in Australia. Well, 10 years on, the world has seen what is going on down there." An international talking point The unfolding scenes have proven a lightning rod for national and international concerns around the warming climate, and the subsequent political response to it. Australia's plight was again catapulted into the global consciousness when Russell Crowe used his Golden Globes acceptance speech to call for climate change action — a sentiment echoed by Australian actress Cate Blanchett, who labelled the bushfire crisis a "climate disaster". Video: Russell Crowe uses Golden Globes win to call for action on climate change (ABC News) An attempt by Liberal backbencher Craig Kelly to downplay those arguments on UK television backfired when he was accused of being a "climate change denier" with his "head in the sand" by weather expert Laura Tobin and broadcaster Piers Morgan. "[International media] were predicting this [climate change]... International press, they reported it, and followed our tardy action on climate change, our dodgy accounting to get credits, our strange argument that because we're 1.4 per cent of emissions we can't make a difference," Mr Costello said. "This strange perception that because we're small, we won't lead, I think has the world perplexed." Video: Liberal MP Craig Kelly and Piers Morgan clash over bushfire crisis (ABC News) The economic cost of the bushfire crisis The potential reputational damage to Australia as a result of the bushfire crisis is not limited to international headlines, however. According to Terry Rawnsley, the head of economic analysis at SGS Economics and Planning, the economic cost to fire-affected regions could be up to $1.9 billion this financial year, while the national economic output is predicted to have been hampered to the tune of $500 million. Morrison's fires response has put his political judgement in question Within the Government, there is widespread acknowledgement that Scott Morrison's Midas touch has gone missing, writes David Speers. Mr Rawnsley said those figures were based on the number of reported insurable losses and previous bushfire modelling, including the 2018 Tathra fires. He said while smaller communities would bear the brunt of the economic impact, the bushfire crisis has "definitely had an impact on Australia's global image". "It's definitely front page news across the world, and it's not really the image you want to be presenting when you want tourists to come to Australia," Mr Rawnsley said. "Even people around skilled labour thinking about coming to Australia, it might give them pause for thought. "And also, it might create longer-term uncertainties about companies wanting to invest here if there is a perceived climate change risk for investment." Infographic: The striking image of a kangaroo fleeing from a burning house was front page news in the United Kingdom. (The Guardian) It comes amid a warning from a major investor group that companies should expect shareholders to apply pressure over climate change risks into the future. Emily Chew, the chairwoman of Climate Action 100+ — whose members include Allianz, QSuper, AustralianSuper and AMP Capital, among others — told the Australian Financial Review that it was not "going to go away as a topic in the minds of the public". 'Celebrities can play a great role' In light of the bushfires, Tourism Australia has paused parts of its star-studded Matesong advertising campaign, and the local and national tourism sectors are bracing for the anticipated impact of the crisis. Gabby Walters, an associate professor at the University of Queensland and an expert in crisis management for the tourism industry, said no-one would be immune from the potential implications. External Link: @Pink tweet: I am totally devastated watching what is happening in Australia right now with the horrific bushfires. "It doesn't matter if you're affected by the fires or not — if you're in Australia, according to the rest of the world, it could mean you're on fire," Dr Walters said. The added call to action by celebrities — including US singer Pink, Australian country star Keith Urban and tennis star Ash Barty — has only galvanised international interest. "Drawing awareness is good, we need that awareness for the donations and for safety," said Dr Walters, describing it as a "double-edged sword" for tourism. "The other side of the sword is that yes, it does create some image and reputational damage [for Australia]. So it's about encouraging those celebrities to not disappear now. "Celebrities can play a great role... but all they need to do is get on their social media and say 'come pay us a visit'." According to David Beirman, a senior lecturer in tourism at the University of Technology Sydney, the domestic tourism industry will eventually recover — but it will take time. "I did a project recently for Tathra ... which had a terrible bushfire in 2018 [and] it recovered very effectively," Dr Beirman said. "The difference here is, there's probably 100 different Tathras in Australia today." Topics: disasters-and-accidents, fires, bushfire, environment, climate-change, government-and-politics, climate-change---disasters, australia, nsw, vic, united-states, fiji Contact Bridget Judd Latest tweets from the Victorian Country Fire Authority Posted October 17, 2013 15:43:49 | Updated October 30, 2013 16:47:48 A 'signature of climate change': Residents fearful of toxic fumes from peat fire in Gippsland
cc/2020-05/en_middle_0061.json.gz/line1973
__label__cc
0.716289
0.283711
Transfer Advising Center Transfer Advising Center Overview Transfer Advisors Getting Started in the College Transfer Program Meeting with University Representatives 8-Semester Plans: A-B Tech to 4-Year College/University Interested in Engineering? College and University Links Comprehensive Articulation Agreement Degree Checksheets (A.A., A.S, A.F.A, A.E.) Guaranteed Admissions Programs Pathways Project for the Associate of Arts and Associate of Science Degrees Enroll in an Academic Program Arts and Sciences Overview University of North Carolina at Asheville Schedule an appointment to meet with a UNC Asheville representative by clicking on the link below Appointment meetings are held in the A-B Tech Transfer Advising Center (Bailey 039) on Tuesdays from 2:00pm until 4:00pm and Thursdays from 11:00am until 1:00pm. UNC Asheville and A-B Tech are proud to sponsor the Bulldog Trailblazer Promise: A Direct Entry Program. Apply to the program. For more information about the Bulldog Trailblazer Promise, schedule an appointment with the UNCA representative or contact the A-B Tech Transfer Advising Center. Contact Office of Undergraduate Admissions admiss@wcu.edu Office located in the Transfer Advising Center, Bailey 029. Appointments can be reserved with this online scheduling application. Mars Hill University We would love for you to join the Mars Hill Community and experience the Mountain Lion Family! A representative from our Traditional, Adult, and Graduate populations is available in the Transfer Advising Center on the 2nd Tuesday of each month from 11:00 until 1:00. Please call 828-689-1206, for an appointment, or just drop by. You may also visit us at www.mhu.edu to learn more about Mars Hill University. Kara Mugrage Transfer, Adult, and Graduate Admissions Counselor Email: kmugrage@mhu.edu Representatives available in the Transfer Advising Center on the first and third Monday of each month during spring and fall semesters from 12:30 until 2:30. Warren Wilson is a liberal arts college grounded in social responsibility, where hard work and community are more than just words. With 20 majors, 17 concentrations, 28 minors, four special advising areas, and two graduate degrees, you can take your interests in any direction you want. Some of our top, most popular majors include Environmental Studies, Art, Conservation Biology, Pre-Vet, Art, Global Studies, Psychology, just to name a few. Please check out all of our programs by going to: www.warren-wilson.edu/academics/programs. Spring Application Deadline: December 15 Fall Application Deadline: July 15 Representatives available on the second and fourth Wednesday of every month, 10:30 a.m. - 1 p.m. in Bailey 039 Contact Adult, Commuter & Transfer Services to make an appointment: 423-439-5641; acts@etsu.edu If you want to know how your credits will transfer to ETSU, visit their Transfer Equivalency Page. Lees-McRae College Meet with a Lees-McRae College representative on Fridays, 10:00 a,m. - 2:00 p.m. in the Transfer Advising Center, Bailey 039. For more information on our online programs or main campus transfer: https://issuu.com/lees-mcraecollege/docs/transfer_brochure To apply and find our more information about our campus nestled in the Blue Ridge or specific academic information please visit, www.lmc.edu or call 828.898.5241.
cc/2020-05/en_middle_0061.json.gz/line1975
__label__cc
0.561638
0.438362
Dulwich: (08) 8431 1488 McLaren Vale: (08) 8323 7600 (08) 8431 1488 - Dulwich (08) 8323 7600 – McLaren Vale How we build great businesses Building great businesses Strategy and Culture Wealth Advice Wealth Advice Tax Building great businesses Strategy and culture Client stories Audit Accounting Client Story: Amorini Ainsley Coggins As a South Australian family-owned business with over 40 years’ experience in the industry, Amorini has seen steady growth and prosperity thanks to a strong company culture and effective use of automation. Here’s a look at their story. After being CEO of his father-in-law’s kitchen business, Steve Bosley started Amorini in 2004. Since then, sons Chris and Mitch have entered the business and Amorini has become a substantial joinery component supply business. Today, they buy joinery components from across Europe, New Zealand, Asia and Australia. As a supply business buying overseas, the company has been exposed to exchange rate fluctuations over the years, which has been one of their biggest challenges, as well as initially being overly reliant on the South Australian market. However, the company has seen steady growth since 2004 and now has a team of 35 people. Thanks to both the efficient systems they’ve developed and high levels of automation, they are able to supply 50 kitchens a week on average around the country with a lean, sharply focused team. Mitch Bosley says that investing heavily in systems and automation – they call it the ‘Amorini Edge’ – has been extremely important to them. The company has systems in place for all manner of business operations to help manage workflow, sales, design, procurement, retail and delivery. “I encourage other businesses to invest in systems and processes,” he says. “When there are mistakes or problems, it’s not a single person’s fault – it’s the fault of the system, which is up to us to fix.” Today, the average age of the Amorini workforce is 30, which means that the team is extremely young, vibrant, innovative, and plugged in to taking risks and trying new ways of doing things. “This has served us really well to help keep the business moving,” says Bosley. Another vital element in their success has been hiring great people and developing a company culture that is focused on helping others grow. For instance, the team hired a refugee from Syria who couldn’t speak English but needed a job. Originally employed in the warehouse, he worked his way up through the ranks and is now the Warehouse Coordinator. About Accru Harris Orchard’s role and involvement The family members behind the Amorini business have been clients of Accru Harris Orchard for over 25 years. As the business has grown, they’ve improved their systems and streamlined many processes, including their internal accounting systems. Accru Harris Orchard has been instrumental in helping Amorini with succession planning in getting ownership transferred to sons Chris and Mitch. The team has also attended workshops by Jessica Fazackerley on lean manufacturing, which led to them further enhancing techniques such as their visual management practices. “With a 25-year relationship, we feel like the Accru Harris Orchard team is part of the family,” says Bosley. “They provide us added benefits not offered anywhere else. Providing way more than typical accounting services, we get access to a range of experts, coaching programs and workshops. Accru Harris Orchard always thinks about the future and supports us in constantly improving the business.” The family is looking to use their great logistics and systemised approach to ‘Uberise’ the joinery industry, changing how people buy joinery components and growing the Amorini business without adding expenses or resources. “We believe this model suits the online world we’re in,” says Bosley, who also notes that having a young workforce has really helped to spot opportunities like this and embrace them. Currently, the team is in the middle of developing and furthering their online kitchen shop, where customers soon will be able to buy a whole kitchen – not just benchtops – online across Australia through their website www.amorini.com.au. With a strong interest in the environment, the owners are also involved in a Kickstarter campaign called Zero Co which focuses on eliminating single-use plastic from kitchens and homes. “Just like our work with Accru Harris Orchard,” says Bosley, “these projects help us look forwards, not backwards.” To learn more about how Accru Harris Orchard can assist you and your business, contact us today. Ainsley has a logical brain and likes things to balance. Coupled with a natural ability for maths (first evident early in school reports!) a career in accounting was always likely. A straightforward manner is one of Ainsley’s major strengths. Clients appreciate her down-to-earth attitude and ability to explain things clearly. As part-owner of a business outside of work, Ainsley appreciates the day-to-day challenges, stresses and strains that business owners face. It means she cuts to the chase and makes the complex simple. Her biggest enjoyment is getting a positive outcome where a client doesn’t think this is possible. Often clients present a problem or a situation where they believe the only outcome can be negative. But Ainsley makes it her personal challenge to turn a negative into a positive whenever possible. Ainsley has had particular success being thrown in at the deep end as an outsourced CFO and is able to hit the ground running in any situation. Her organisational skills come in really handy but it’s really her ability to create immediate empathy with clients that means she is trusted as a safe pair of hands. Building a family business Building great businesses - literally Building a ‘zero leak’ business
cc/2020-05/en_middle_0061.json.gz/line1978
__label__wiki
0.563584
0.563584
AFC to Quinn: Expand Medicaid, implement AIDS Strategy to mitigate budget cuts This page is archived and may not contain current information or working links. AFC on June 13, 2011 sent a letter to Illinois Governor Pat Quinn with recommendations on how to implement the state FY 2012 budget, which begins July 1. The recommendations include implementing a Medicaid expansion for people with HIV and leveraging the National HIV/AIDS Strategy, and touch on issues related to expanding accountability and transparency for state-funded HIV programs. The Honorable Pat Quinn Governor, State of Illinois 100 W. Randolph, Suite 16-100 Dear Governor Quinn: Thank you for your staunch support of services and funding for the state’s most vulnerable citizens, including people with HIV. Because of your support of the historic tax increase enacted in January, the state’s finances are far more secure than they otherwise would have been. However, we recognize that FY 2012 will be an exceptionally difficult budget year, and you face agonizing decisions about programs to continue or cut. As you know, state-funded HIV services fared better than expected, but we remain extremely concerned about the potential impact on the lives and health of people with and at risk of HIV. Overall Illinois Department of Public Health () state HIV funding was cut by $1.5 million or 5% from FY 11. However, this funding reduction will be exacerbated by increased pressure on the AIDS Drug Assistance Program (ADAP). To make long-term headway against the AIDS epidemic in the face of these budget challenges, we urge you to take immediate advantage of two new opportunities: Consider applying for a Medicaid Section 1115 waiver to cover people with HIV before they are so sick that they become disabled. On June 6, 2011, the released a streamlined waiver application and approval process to provide early treatment for people with HIV. The waiver would allow Illinois to lower long-term health costs by providing early, more comprehensive treatment services for people with HIV; obtain increased federal matching funds for the state’s HIV Medicaid expenditures; and strengthen safety-net health providers by establishing a source of payment for undercompensated care. Fully leverage the , which President Obama released a year ago, to reduce new HIV cases, improve health outcomes for people with HIV, and reduce health disparities. We commend Dr. Mildred Williamson, Chief of the IDPH HIV/AIDS Section, for establishing a comprehensive process to gather community input and develop an implementation plan for Illinois. However, we urge high-ranking members of your Administration to engage other state agencies in the planning process to fully coordinate the state’s fight against HIV. Specifically, we ask you to convene at least two meetings of leaders of key state agencies in the late summer and fall of 2011 to review the draft plan and determine roles for their respective agencies. State HIV portfolio recommendations: Although we oppose combining all HIV-related budgetary lines in IDPH into one lump sum, as happened in the final budget, we believe this provides IDPH an opportunity to establish new collaborations to maximize available resources. The state’s AIDS response must consist of a comprehensive array of coordinated activities that directs services to hardest-hit communities with an array of evidence-based activities that yield maximum results. We recommend that the state: Publicly establish the percentages of state HIV funding that will be allocated to HIV prevention, care, and supportive services such as housing; Publicly lay out the criteria and rationale upon which the funding allocation decisions are made; Publicly describe targeted investments planned for hardest-hit communities with evidence-based interventions and accountability mechanisms to leverage these investments into population-level results; Publicly and transparently publish expected outcomes for each domain, such as the number of high-risk people with HIV who will be identified as HIV positive and linked to care, and report on progress towards achieving those goals. With declining available resources, the need for heightened transparency and accountability is greater than ever to engender confidence in the strategic investments made by the state to advance the fight against HIV/AIDS. ADAP recommendations: Earlier this year, IDPH announced that eligibility for new ADAP enrollees would be reduced from 500% of the federal poverty level to 300%. AFC remains staunchly opposed to this change but also recognizes the state’s fiscal challenges. Inadequate federal funding unacceptably weakens the program. We are committed to helping inform state decision-making and the community as Illinois faces these challenges. SB 1802 will require IDPH to establish a waiting list for individuals who are unable to access ADAP services. We urge IDPH to immediately establish this wait list when FPL is reduced for new applicants above the 300% FPL threshold and release on its website weekly the number of people on the waiting list. Thanks to a creative collaboration between the Departments of Insurance and Public Health, Illinois can leverage the Illinois Pre-existing Condition Program (IPXP) to provide comprehensive benefits to people with HIV who have been denied ADAP coverage at a significantly lower cost. While we applaud IDPH and DOI for coordinating IPXP and HIV programs, we urge the state to strongly consider setting a cap on the number of people for whom IDPH will provide assistance or providing only limited assistance. We are concerned that additional resources will be diverted from HIV prevention and care programs that assist the most vulnerable clients. Department of Human Services Programs: Finally, AFC is deeply concerned about cuts to Department of Human Services homeless prevention (reduced by $915,000 or 38%) and emergency housing assistance funding (reduced by $4.38 million, or 52%). These programs help people stay in their homes by assisting with rent, utilities, or other expenses. Thousands of people around the state, including people with HIV, will face homelessness as a result of these budget cuts. We urge you to closely monitor and track the impact of these funding reductions. Thank you for your long-standing commitment to health care and social services that improve the lives of low-income people. We look forward to further discussing the budget implementation issues mentioned here and others. You can reach me at dmunar@aidschicago.org or (312) 334-0933. David Ernesto Munar CC: Mr. Jerry Stermer Dr. Damon Arnold Dr. Tere Garate State Sen. Heather Steans State Rep. Sara Feigenholtz State Rep. Greg Harris State Rep. Camille Lilly Categorized under Advocacy, Health insurance and Illinois. 2017 Policy and Legislative Victories By Raven Feagins As advocates, we work hard to ensure the rights of our communities are protected... HIV, hepatitis C and the hope for health equity by Ashley Brown UPDATE: In November 2018, the Illinois Department of Health and Family... AFC and national partners file complaint against Humana and other discriminatory insurers AFC partners with Center for Health Law and Policy Innovation of Harvard Law School launching groundbreaking... AFC and Howard Brown Health laud Illinois Medicaid for expanding access to HIV treatments The AIDS Foundation of Chicago (AFC) and Howard Brown Health commend the recent decision by Felicia... AIDS Foundation of Chicago lauds Get Covered Illinois for reducing the uninsured rate in Illinois The AIDS Foundation of Chicago (AFC) applauds Get Covered Illinois and the Illinois Department of Insurance... Harvard and AFC identify best IL health care plans for people with HIV The deadline to enroll in health care coverage is approaching fast. The AIDS Foundation of... Revolutionary PrEP program in Illinois halted by governor before launch This article is the first in AFC’s Cuts to the Cascade series, which focuses on the people,... HIV advocates find discriminatory HIV drug pricing by Illinois insurance companies Are you having trouble paying for your HIV medication? Do you feel your insurance company’s high...
cc/2020-05/en_middle_0061.json.gz/line1980
__label__cc
0.509723
0.490277
Global stability for the prion equation with general incidence MBE Home Optimal design for parameter estimation in EEG problems in a 3D multilayered domain 2015, 12(4): 761-787. doi: 10.3934/mbe.2015.12.761 A nosocomial epidemic model with infection of patients due to contaminated rooms Cameron Browne 1, and Glenn F. Webb 1, Mathematics Department, Vanderbilt University, Nashville, TN 37240, United States, United States Received May 2014 Revised January 2015 Published April 2015 A model of epidemic bacterial infections in hospitals is developed. The model incorporates the infection of patients and the contamination of healthcare workers due to environmental causes. The model is analyzed with respect to the asymptotic behavior of solutions. The model is interpreted to provide insight for controlling these nosocomial epidemics. Keywords: antibiotic resistance, Bacterial infection, next generation matrix., local stability, Lyapunov functional. Mathematics Subject Classification: Primary: 92C60; Secondary: 34D2. Citation: Cameron Browne, Glenn F. Webb. A nosocomial epidemic model with infection of patients due to contaminated rooms. Mathematical Biosciences & Engineering, 2015, 12 (4) : 761-787. doi: 10.3934/mbe.2015.12.761 M. Bani-Yaghoub, R. Gautam, Z. Shuai, P. van den Driessche and R. Ivanek, Reproduction numbers for infections with free-living pathogens growing in the environment,, Journal of biological dynamics, 6 (2012), 923. Google Scholar H. Freedman, S. Ruan and M. Tang, Uniform persistence and flows near a closed positively invariant set,, Journal of Dynamics and Differential Equations, 6 (1994), 583. doi: 10.1007/BF02218848. Google Scholar D. T. Gillespie, Exact stochastic simulation of coupled chemical reactions,, The journal of physical chemistry, 81 (1977), 2340. doi: 10.1021/j100540a008. Google Scholar E. S. McBryde and D. L. McElwain, A mathematical model investigating the impact of an environmental reservoir on the prevalence and control of vancomycin-resistant enterococci,, Journal of Infectious Diseases, 193 (2006), 1473. doi: 10.1086/503439. Google Scholar M. McKenna, Clean sweep,, Scientific American, 307 (2012), 30. doi: 10.1038/scientificamerican0912-30. Google Scholar D. J. Morgan, E. Rogawski, K. A. Thom, J. K. Johnson, E. N. Perencevich, M. Shardell, S. Leekha and A. D. Harris, Transfer of multidrug-resistant bacteria to healthcare workers? gloves and gowns after patient contact increases with environmental contamination,, Critical care medicine, 40 (2012), 1045. doi: 10.1097/CCM.0b013e31823bc7c8. Google Scholar S. Nseir, C. Blazejewski, R. Lubret, F. Wallet, R. Courcol and A. Durocher, Risk of acquiring multidrug-resistant gram-negative bacilli from prior room occupants in the intensive care unit,, Clinical Microbiology and Infection, 17 (2011), 1201. doi: 10.1111/j.1469-0691.2010.03420.x. Google Scholar W. H. Organization et al., Antimicrobial Resistance: Global Report on Surveillance 2014., geneva, (2014). Google Scholar S. Petti, G. A. Messano, A. Polimeni and S. J. Dancer, Effect of cleaning and disinfection on naturally contaminated clinical contact surfaces,, Acta stomatologica Naissi, 29 (2013), 1265. doi: 10.5937/asn1367265P. Google Scholar N. Plipat, I. H. Spicknall, J. S. Koopman and J. N. Eisenberg, The dynamics of methicillin-resistant staphylococcus aureus exposure in a hospital model and the potential for environmental intervention,, BMC infectious diseases, 13 (2013). doi: 10.1186/1471-2334-13-595. Google Scholar Z. Shuai, J. Heesterbeek and P. van den Driessche, Extending the type reproduction number to infectious disease control targeting contacts between types,, Journal of mathematical biology, 67 (2013), 1067. doi: 10.1007/s00285-012-0579-9. Google Scholar Z. Shuai and P. van den Driessche, Global stability of infectious disease models using lyapunov functions,, SIAM Journal on Applied Mathematics, 73 (2013), 1513. doi: 10.1137/120876642. Google Scholar H. L. Smith, The Theory of the Chemostat: Dynamics of Microbial Competition, vol. 13,, Cambridge university press, (1995). doi: 10.1017/CBO9780511530043. Google Scholar P. Strassle, K. A. Thom, J. K. Johnsonm, S. Leekha, M. Lissauer, J. Zhu and A. D. Harris, The effect of terminal cleaning on environmental contamination rates of multidrug-resistant< i> acinetobacter baumannii< /i>,, American journal of infection control, 40 (2012), 1005. Google Scholar PBS, PBS frontline: Hunting the nightmare bacteria, 2013,, URL , (). Google Scholar P. Van den Driessche and J. Watmough, Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission,, Mathematical biosciences, 180 (2002), 29. doi: 10.1016/S0025-5564(02)00108-6. Google Scholar X. Wang, Y. Xiao, J. Wang and X. Lu, A mathematical model of effects of environmental contamination and presence of volunteers on hospital infections in china,, Journal of theoretical biology, 293 (2012), 161. doi: 10.1016/j.jtbi.2011.10.009. Google Scholar X. Wang, Y. Xiao, J. Wang and X. Lu, Stochastic disease dynamics of a hospital infection model,, Mathematical biosciences, 241 (2013), 115. doi: 10.1016/j.mbs.2012.10.002. Google Scholar M. Wolkewitz, M. Dettenkofer, H. Bertz, M. Schumacher and J. Huebner, Environmental contamination as an important route for the transmission of the hospital pathogen vre: modeling and prediction of classical interventions,, Infectious Diseases: Research and Treatment, 1 (2008), 3. Google Scholar Mudassar Imran, Hal L. Smith. The dynamics of bacterial infection, innate immune response, and antibiotic treatment. Discrete & Continuous Dynamical Systems - B, 2007, 8 (1) : 127-143. doi: 10.3934/dcdsb.2007.8.127 Shunfu Jin, Wuyi Yue, Zhanqiang Huo. Performance evaluation for connection oriented service in the next generation Internet. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 749-761. doi: 10.3934/naco.2011.1.749 Robert E. Beardmore, Rafael Peña-Miller. Rotating antibiotics selects optimally against antibiotic resistance, in theory. Mathematical Biosciences & Engineering, 2010, 7 (3) : 527-552. doi: 10.3934/mbe.2010.7.527 Avner Friedman, Najat Ziyadi, Khalid Boushaba. A model of drug resistance with infection by health care workers. Mathematical Biosciences & Engineering, 2010, 7 (4) : 779-792. doi: 10.3934/mbe.2010.7.779 Simeone Marino, Edoardo Beretta, Denise E. Kirschner. The role of delays in innate and adaptive immunity to intracellular bacterial infection. Mathematical Biosciences & Engineering, 2007, 4 (2) : 261-286. doi: 10.3934/mbe.2007.4.261 Jairo Bochi, Michal Rams. The entropy of Lyapunov-optimizing measures of some matrix cocycles. Journal of Modern Dynamics, 2016, 10: 255-286. doi: 10.3934/jmd.2016.10.255 Ai-Guo Wu, Ying Zhang, Hui-Jie Sun. Parametric Smith iterative algorithms for discrete Lyapunov matrix equations. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-17. doi: 10.3934/jimo.2019093 Jóhann Björnsson, Peter Giesl, Sigurdur F. Hafstein, Christopher M. Kellett. Computation of Lyapunov functions for systems with multiple local attractors. Discrete & Continuous Dynamical Systems - A, 2015, 35 (9) : 4019-4039. doi: 10.3934/dcds.2015.35.4019 Carlos Arnoldo Morales, M. J. Pacifico. Lyapunov stability of $\omega$-limit sets. Discrete & Continuous Dynamical Systems - A, 2002, 8 (3) : 671-674. doi: 10.3934/dcds.2002.8.671 Luis Barreira, Claudia Valls. Stability of nonautonomous equations and Lyapunov functions. Discrete & Continuous Dynamical Systems - A, 2013, 33 (7) : 2631-2650. doi: 10.3934/dcds.2013.33.2631 Yuming Chen, Junyuan Yang, Fengqin Zhang. The global stability of an SIRS model with infection age. Mathematical Biosciences & Engineering, 2014, 11 (3) : 449-469. doi: 10.3934/mbe.2014.11.449 Haifeng Hu, Kaijun Zhang. Stability of the stationary solution of the cauchy problem to a semiconductor full hydrodynamic model with recombination-generation rate. Kinetic & Related Models, 2015, 8 (1) : 117-151. doi: 10.3934/krm.2015.8.117 Jifeng Chu, Meirong Zhang. Rotation numbers and Lyapunov stability of elliptic periodic solutions. Discrete & Continuous Dynamical Systems - A, 2008, 21 (4) : 1071-1094. doi: 10.3934/dcds.2008.21.1071 Sigurdur Freyr Hafstein. A constructive converse Lyapunov theorem on exponential stability. Discrete & Continuous Dynamical Systems - A, 2004, 10 (3) : 657-678. doi: 10.3934/dcds.2004.10.657 Feng Wang, José Ángel Cid, Mirosława Zima. Lyapunov stability for regular equations and applications to the Liebau phenomenon. Discrete & Continuous Dynamical Systems - A, 2018, 38 (9) : 4657-4674. doi: 10.3934/dcds.2018204 Jifeng Chu, Jinzhi Lei, Meirong Zhang. Lyapunov stability for conservative systems with lower degrees of freedom. Discrete & Continuous Dynamical Systems - B, 2011, 16 (2) : 423-443. doi: 10.3934/dcdsb.2011.16.423 Georges Bastin, B. Haut, Jean-Michel Coron, Brigitte d'Andréa-Novel. Lyapunov stability analysis of networks of scalar conservation laws. Networks & Heterogeneous Media, 2007, 2 (4) : 751-759. doi: 10.3934/nhm.2007.2.751 Volodymyr Pichkur. On practical stability of differential inclusions using Lyapunov functions. Discrete & Continuous Dynamical Systems - B, 2017, 22 (5) : 1977-1986. doi: 10.3934/dcdsb.2017116 Vitalii G. Kurbatov, Valentina I. Kuznetsova. On stability of functional differential equations with rapidly oscillating coefficients. Communications on Pure & Applied Analysis, 2018, 17 (1) : 267-283. doi: 10.3934/cpaa.2018016 Hermann Brunner, Chunhua Ou. On the asymptotic stability of Volterra functional equations with vanishing delays. Communications on Pure & Applied Analysis, 2015, 14 (2) : 397-406. doi: 10.3934/cpaa.2015.14.397 Cameron Browne Glenn F. Webb
cc/2020-05/en_middle_0061.json.gz/line1981
__label__cc
0.604629
0.395371
Raza Mansha Mr. Raza Mansha is graduate from University of Pennsylvania and has an experience of around 23 years in business management, corporate strategies, commercial insights and project management. He also has directorship in Nishat Paper Products Company Limited, Nishat Developers (Private) Limited, Nishat (Gulberg) Hotels and Properties Limited and DG Cement. He has served in Information Technology Committee, Business Strategy & Development Committee and HR&R Committee in MCB. Mr. Raza Mansha is also a director and chairman in MCB Islamic Bank Limited and director in Nishat Hotels & Properties Limited, Nishat Dairy (Private) Limited, Nishat Agriculture Farming (Private) Limited, MNET Services (Private) Limited, Euronet Pakistan (Private) Limited, Nishat (Raiwind) Hotels & Properties Limited and Nishat (Aziz Avenue) Hotels & Properties Limited and has served as director in Sui Northern Gas Pipeline Limited.
cc/2020-05/en_middle_0061.json.gz/line1988
__label__wiki
0.990229
0.990229
Swiss A220 flights resuming as engines pass inspection Swiss Bombardier CS100, © Bombardier Swiss to suspend A220 operation ZURICH - Lufthansa Group airline Swiss expects to resume mostly normal service with its fleet of Airbus A220 jets on Thursday after temporarily grounding the jets for safety checks of their engines, it said on Wednesday. The glitch caused significant disruption in the airline`s schedule. The inspections of Pratt & Whitney engines came after a Geneva-bound Swiss jet had to divert to Paris on Tuesday. French air crash investigators classified the engine problem that disrupted the Swiss flight shortly after departure from London Heathrow as a "serious incident" and said it would be investigated by the U.S. National Transportation Safety Board. "On Tuesday afternoon and overnight 17 C Series/A220 aircraft have been inspected. The engines are in perfect condition, so 12 aircraft have returned to regular flight operations. Another five planes will follow at midday on Wednesday," Swiss said in a statement. "We continue to assume that flight operations can be carried out largely regularly again from Thursday," the airline owned by Germany's Lufthansa added. The Airbus A220 single-aisle airliner was formerly known as the Bombardier C Series. In Seoul, Korean Air Lines Co Ltd said it had launched inspections on its fleet of 10 A220 planes after a request from U.S. engine manufacturer Pratt & Whitney. Tuesday's engine incident was the third involving the same airline and model of jet in as many months and resulted in a small amount of debris being scattered as the aircraft landed at Paris Charles de Gaulle, an airport source told Reuters. It came just hours after France's BEA agency launched an unusual appeal for 150 volunteers to scour an uninhabited wood in eastern France for a titanium engine part dating from the first blowout in July, which affected a Geneva-London flight. A second incident in September caused a Swiss A220 to divert to Geneva, but on that occasion the engine's housing contained fragments torn loose from the engine, the BEA said. Swiss said this week's inspections had forced it to cancel more than 100 flights, affecting around 10,000 passengers. The Swiss Federal Office of Civil Aviation said it had not ordered the grounding for engine checks. Tuesday's incident highlighted scrutiny of the performance of new-generation Geared Turbofan engines developed by Pratt & Whitney, a unit of United Technologies Corp. A spokesman for the engine maker said it was recommending additional checks for versions of the engine that power the Airbus A220 - an engine known as the PW1500G - and a rival Brazilian jet, the Embraer 190/195-E2. © Reuters, aero.uk | Image: BEA, Swiss | 16/10/2019 13:26
cc/2020-05/en_middle_0061.json.gz/line1992
__label__cc
0.523412
0.476588
Patriot Warrior 2017 U.S. Air Force Capt. Vincent Alipio, assigned to the 349th Medical Squadron, Travis AFB, Calif., observes through his eclipse glasses as the moon passes in front of the sun during a total solar eclipse at Young Air Assault Strip, Fort McCoy, Wis., Aug. 21, 2017, while participating in exercise Patriot Warrior. More than 600 Reserve Citizen Airmen and over 10,000 soldiers, sailors, Marines and international partners converged on the state of Wisconsin to support a range of interlinked exercises including Patriot Warrior, Global Medic, CSTX, Diamond Saber, and Mortuary Affairs Exercise (MAX). Patriot Warrior is Air Force Reserve Command's premier exercise, providing an opportunity for Reserve Citizen Airmen to train with joint and international partners in airlift, aeromedical evacuation and mobility support. This exercise is intended to test the ability of the Air Force Reserve to provide combat-ready forces to operate in dynamic, contested environments and to sharpen Citizen Airmen's skills in supporting combatant commander requirements. ( U.S. Air Force Photo by Tech. Sgt. Efren Lopez ) Tags: Calif., 4CTCS, 4th Combat Camera, TRAVIS AFB, 349th Medical Squadron, GLOBAL MEDIC, Volk Field Air National Guard Base, Young Air Assault Strip, Efren Lopez, The Total Force Training Center, PW17, Patriot Warrior 2017, U.S. Air Force Capt. Vincent Alipio, Camp Douglas, CSTX, Fort McCoy, AFRC, Air Force Reserve Command Photo by: Tech. Sgt. Efren Lopez | VIRIN: 170821-F-AF679-904.JPG
cc/2020-05/en_middle_0061.json.gz/line1994
__label__cc
0.711345
0.288655
Motza Motza (or Motsa) (Hebrew: מוֹצָא) is a neighbourhood in the western edge of Jerusalem, Israel, located 600 metres above sea level. In the Judean Hills, surrounded by forest, it is a relatively isolated place connected to Jerusalem by the Jerusalem-Tel Aviv highway and the winding mountain road to Har Nof. Originally, the first modern Jewish neighbourhood outside the Old City, Motza is located on the site of a Biblical village of the same name, mentioned in Joshua 18:26. It was the scene of a violent attack in the 1929 Palestine riots. In 1854, farmland was purchased from the nearby Arab village of Qalunya (Colonia) by a Baghdadi Jew, Shaul Yehuda, with the aid of British consul James Finn. Jewish families from Jerusalem joined the enterprise, one of which ran a tile factory, among the earliest industry in the region. Despite preparation for groundbreaking and deciding on the name Motza for the place, legal complications prevented settlement, though a traveller's inn was established at the site in 1871 by Yehoshua Yellin, a notable figure of the Old Yishuv. He built the inn on the foundation of an older Roman building. A B'nai B'rith official eventually solved the legal problems, and finalized a deal in which the Motza residents could pay for their plots in long-term payments. This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Motza Shed No Tears, Meduza I Will Rise, Meduza Touch The Sky, Meduza Hounds Of Hell, Meduza Curse Of Pharaoh, Meduza Burn In Hell, Meduza Twilight Of My Mind, Meduza Land Of Forgotten Dreams, Meduza Holy Ground, Meduza Now And Forever, Meduza Sleep, Meduza Don't Bank So Close To Me, Midas R0xx0r, Midas Prepatchday, Midas Hey Dewd, Midas Mattyas, Mattyas Mi Amor, Mattyas Missing You, Mattyas I'll Be Alright, Mts Like A Prayer, Madhouse Fallen, Metus The Time Has Come, Metus Trial Of Flames, Metus Grief, Metus My Way, Metus Pride, Metus Adam's Grief, Metus Our Sinful Realm, Metus Apostasy, Metus New Dawn, Metus Prophecy, Metus ENDLESS LIFE, Metus Faith, Metus Among The Dead, Metus At The Gates, Metus Vanishing Love, Metus Solitude, Metus Silence, Metus Suffering, Metus Deliverance, Metus Simplicity, Metus My Enemy's Myself, Metus Aapeiron, Metus Hope, Metus Decision, Metus Rebel, Metus Brothers, Metus Fields Of Light, Metus And Now I Regret, Metus Lake Of Fire, Metus Shed No Tears One heart of fire, another made of ice What I once I though was true, has shown to be lies I know you've been mistreated You have been hurt But treating me this way Won't take away your pain No tears, I'll cry for you Although my heart's bleeding I won't shed a drop 'Cause you are no worth it You are nothing to me My life is passion, your life is full of rules You think that passion's something made just for fools [A:] There's nothing more to say now [S:] Nothing to say [A:] You've had your chance [S:] You've had your chance [A:] You threw away the key that opens up my heart [S:] My heart Shed no tears. Latest News for: motza Motza retires from Health Department Board The People's Defender 05 Mar 2018 Front row, from left, Fred Roessler, Carol Motza, and Joe Himes; Back row, from left, Dr ... Carol Motza, a longtime Adams County Health Department board member, is retiring after 25 years of service to the community ... William Hablitzel, praised both Motza’s work ethic and her efforts to bring about positive changes in Adams County communities.... So you've made a motza with Bitcoin. What now? Canberra Times 21 Dec 2017 If you are holding a life-changing pile of paper gains, consider selling and bitcoin keeps going up, or not selling and it plunges. What would you regret more? ... ....
cc/2020-05/en_middle_0061.json.gz/line1997
__label__wiki
0.744606
0.744606
Stockholm Syndrome (band) Stockholm syndrome (disambiguation) Four (One Direction album) Stockholm (disambiguation) Stockholm (film) Stockholm (Jean-Louis Aubert album) Stockholm Syndrome is an American Rock music band formed in Athens, Georgia as a collaboration between Dave Schools of Widespread Panic and Jerry Joseph of Jerry Joseph and the Jackmormons. The two enlisted Los Angeles drummer Wally Ingram (Jackson Browne and Sheryl Crow), San Francisco guitarist Eric McFadden (who had previously worked with Keb' Mo', Primus, Les Claypool, and the P Funk All Stars), and German keyboardist Danny Dziuk. Dziuk however, has since been replaced on tour by Gov't Mule keyboardist Danny Louis. Originally intended as a one-time studio side-project for the musicians, the band released an album in 2004, Holy Happy Hour, and then went on a nationwide tour in support of the album. The band has toured intermittently since then and on February 16, 2010 they released a live EP, "Stockholm Syndrome Live at Streetlight Records," which was recorded during an in-store performance at Streetlight Records in Santa Cruz in September 2009. The band has said that they have gotten another full-length album ready for release. This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Stockholm_Syndrome_(band) Stockholm syndrome, or capture-bonding, is a psychological phenomenon described in 1973 in which hostages express empathy and sympathy and have positive feelings toward their captors, sometimes to the point of defending and identifying with the captors. These feelings are generally considered irrational in light of the danger or risk endured by the victims, who essentially mistake a lack of abuse from their captors for an act of kindness. The FBI's Hostage Barricade Database System shows that roughly eight percent of victims show evidence of Stockholm syndrome. Stockholm syndrome can be seen as a form of traumatic bonding, which does not necessarily require a hostage scenario, but which describes "strong emotional ties that develop between two persons where one person intermittently harasses, beats, threatens, abuses, or intimidates the other." One commonly used hypothesis to explain the effect of Stockholm syndrome is based on Freudian theory. It suggests that the bonding is the individual's response to trauma in becoming a victim. Identifying with the aggressor is one way that the ego defends itself. When a victim believes the same values as the aggressor, they cease to be perceived as a threat. This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Stockholm_syndrome Stockholm syndrome is a psychological condition. Stockholm syndrome may refer to: Stockholm Syndrome (band), an American rock-music band Stockholm Syndrome (group), a Swedish pop-dance duo Stockholm Syndrome (Backyard Babies album), 2003 Stockholm Syndrome (Derek Webb album), 2009 "Stockholm Syndrome", by Yo La Tengo from the 1997 album I Can Hear the Heart Beating as One "Stockholm Syndrome" (Muse song), by Muse from the 2003 album Absolution "Stockholm Syndrome" (Blink-182 song), by Blink-182 from the 2003 album Blink-182 "Stockholm Syndrome", by Milburn from the 2006 album Well, Well, Well "Stockholm Syndrome", by That Handsome Devil from the 2009 EP Enlightenment's For Suckers "The Stockholm Syndrome", a 2013 single by CLMD vs. Kish released on their own label, Up North Recordings, with Sony Music "Stockholm Syndrome", by One Direction from their 2014 album Four This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Stockholm_syndrome_(disambiguation) Four is the fourth studio album by English-Irish boy band One Direction, released on 17 November 2014 by Columbia Records and Syco Music. Two singles were released from the album, "Steal My Girl" and "Night Changes", both achieving platinum status in the US, and scoring the band their tenth and eleventh UK top-ten hits. The album received generally positive reviews from music critics. It debuted at number one in 18 countries, including the United Kingdom, Australia and the United States. The album was also One Direction's last with member Zayn Malik, who announced he was leaving the band on 25 March 2015. In August 2015, Four became the band's fourth consecutive album to sell in excess of 1 million copies in the United States. The band became the first band to have their first four albums debut at number one in the United States. Background and development On 27 April 2014, it was confirmed that One Direction were working on their fourth studio album. Louis Tomlinson and Liam Payne worked on the majority of the album with songwriters Julian Bunetta, John Ryan, and Jamie Scott, but members Harry Styles and Zayn Malik also co-wrote tracks with Bunetta, Ryan, Scott and producer Johan Carlson. Niall Horan, the fifth member of One Direction, was unable to be involved in writing due to a leg injury. This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Four_(One_Direction_album) Stockholm is the capital of Sweden and can refer to the city proper, as well as several different geographical and administrative divisions in and around the city: Stockholm City Centre Stockholm Municipality (City of Stockholm) Stockholm County, the county containing the city of Stockholm Metropolitan Stockholm, a metropolitan area consisting of municipalities within the county Stockholm urban area, the central urban area of Metropolitan Stockholm Stockholm may also refer to: Stockholm, Saskatchewan Stockholm Airport (Papua New Guinea) Stockholm, a small village in Ronneby Municipality, Blekinge County Stockholm, a small village in Perstorp Municipality, Skåne County Stockholm Township, Crawford County, Iowa Stockholm, Maine Stockholm Township, Minnesota Stockholm, New Jersey Stockholm, New York Stockholm, South Dakota Stockholm, Wisconsin Stockholm (town), Wisconsin Bridgeport, New Jersey, formerly known as New Stockholm This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Stockholm_(disambiguation) Stockholm is a 2013 Spanish drama film directed by Rodrigo Sorogoyen. A guy (Javier Pereira) tries to get a girl (Aura Garrido) he meets at a party to like him. She refuses, but he does not give up until he manages to change her mind. After they spend the night together, she discovers he is not like she thought. Javier Pereira - Él Aura Garrido - Ella Jess Caba - Amigo Susana Abaitua - Amiga 1 Lorena Mateo - Amiga 2 Miriam Marco - Amiga 3 Helena Sanchis-Guarner - Chica Javier Santiago - Chico Stockholm at the Internet Movie Database This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Stockholm_(film) Stockholm a French solo album by Jean-Louis Aubert. It includes the singles Océan and Le Jour Se Lève Encore. [Intro] (0:13) Stockholm (3:29) Océan (4:24) Le jour se lève encore (3:38) La p'tite semaine (4:14) Juste pour aujourd'hui (5:38) Vivrant poème (3:35) Abandonne-toi (3:43) Je crois en tout, je n'crois en rien (4:34) Le milieu (4:39) La suite (4:02) Tombe de haut (4:45) Fais ton voyage (4:40) Baltic (4:54) Gordon Cyrus : electronic drum, bass, effects, mix Gunnar Norden : violins Doc Matéo : Multi-instruments, mix Richard Kolinka : drums Ski : Electronic drum on Océan Le Baron : Guitar on Le Jour se Lève Encore Olive : Guitar on La P'tite Semaine Tony Allen : Drum on Abandonne-toi Mats Asplen : synth on Je Crois en tout, Je n'Croix en rien Raphael : Album mix Jean-Louis Aubert Official Website This page contains text from Wikipedia, the Free Encyclopedia - https://wn.com/Stockholm_(Jean-Louis_Aubert_album) Radio Stations - Stockholm Radio Sydväst Varied Sweden Radio Bohuslän 106,2 Uddevalla Varied Sweden SR P2 Varied Sweden Radio zirzamin Rock,Alternative,Rap Sweden K103 Göteborgs Studentradio College Sweden SR P2 Klassisk Jul Varied Sweden RadioCyber Varied Sweden FM-tuner 91.1 MHz Stockholm Järva World Sweden SR P4 Värmland Varied Sweden Lite FM 101.1 Pop Sweden SR P4 Kalmar Varied Sweden Karlstads Nya Radio 92,2 FM Varied Sweden SR P4 Väst Varied Sweden Gold 102,4 80s,70s,60s Sweden RedMercury.se Alternative,Experimental,Electronica Sweden Cityradion Jämtland Top 40 Sweden Radio Nacka Varied Sweden Gimme Indie Alternative Sweden Guldkanalen 60-tal 60s Sweden Trucknet Radio Country,News,Public Sweden Stockholm Närradio 88.0 World Sweden SR P4 Halland Varied Sweden Coola Hits Pop Sweden Rocket 95.3 Rock Sweden SR Extra02 Sports Sweden Uppsala Studentradion 98.9 College Sweden Radio Nybro Adult Contemporary Sweden SR P4 Uppland Varied Sweden Radio Kiruna Varied Sweden Radio 1 Stockholm Talk,Discussion Sweden Radio Hamsafar World Middle East Sweden Radio Trelleborg Talk Sweden Radio Lidingö Varied Sweden SR P4 Dalarna Varied Sweden Radio Campus Örebro College Sweden Stockholm Närradio 101.1 World Sweden Radio Seven Dance Sweden SR P4 Västmanland Varied Sweden OneFm 107.2 Åre Östersund Varied Sweden SR Radioapans knattekanal Varied Sweden Radio Roslagen Varied Sweden Radio10 Classic Christian Contemporary,Christian Sweden DansBandsDax Varied Sweden Radio Gellivare Varied Sweden SR P4 Gotland Varied Sweden Iran On Air World Middle East Sweden SR P1 Spenarna Talk Sweden Eyes in the Dark released: 2012 Don't Stop Now Goodbye Tomorrow The Young and the Free Bad by Design stockholmeco.com stockholmtoday.com informationstockholm.com bandpunkfunk.com soulbandstore.com stockholmgames.com stockholmdaily.com stockholmstage.com stockholmadvertising.com stockholmcleaners.com stockholmfurniture.com bandcolor.com soulbandsupply.com stockholmsocial.com soulbandshop.com stationstockholm.com stockholminternationalschool.com stockholmoffices.com fitnessstockholm.com Latest News for: stockholm syndrome (band) Muse's Matt Bellamy buys his favourite guitar workshop in Devon NME 08 Jun 2019 The band are ... “The blockbuster concludes as the band tear into the beastly opening of ‘Absolution’ gem ‘Stockholm Syndrome’, there’s a puff of smoke before the giant robo-skeletal frame of Murph emerges from the back of the stage; jaws chomping as he claws at the crowd.... Muse brings lasers, cyborgs and lots of neon to The Forum Daily Bulletin 12 Mar 2019 The band took over and sold out The Forum on Monday night in Inglewood and it was quite the spectacle ... Before it headed into a medley of songs that included “Assassin,” “New Born” and “Stockholm Syndrome,” that enormous robot/skeleton/monster started to emerge from behind the band.... Muse sets Utah souls alight with otherworldly sci-fi show Provo Daily Herald 01 Mar 2019 The sci-fi theme perfectly suited the band, with its cosmic lyrics, otherworldly sounds and Bellamy’s stratospheric voice ... The medley included “Stockholm Syndrome,” “Assassin,” “Reapers,” “The Handler” and “New Born,” giving Bellamy a chance to shred solo after amazing solo on his guitar, which he later smashed into a speaker onstage.... Arts & Culture Calendar: Jan. 31 to Feb. 6, 2019 The Recorder 31 Jan 2019 A showcase of four bands with new releases ... Kidnapped from her Upper East Side penthouse and held for ransom by a Norwegian death metal band, Mrs. Smith suffered the Stockholm Syndrome granting her extraordinary musical abilities ... Reprobate Blues Band ... Rice — an American Band with Nate Martel ... Creacion Latin Big >Band.... Review: Throw out common sense and have fun with NOLA Project's crazy 'Stockholm Syndrome' Which bring us to NOLA Project’s world premiere of a new play from Adam Szymkowicz (“Clown Bar”), titled “Stockholm Syndrome ... “Stockholm Syndrome” is a high-concept musical comedy with a clunky title that pretty much sums up the plot ... "Stockholm Syndrom".... Concert review: Harry Styles at The Forum Daily Bruin 14 Jul 2018 First up from his boyband days was “Stockholm Syndrome,” which Styles’ band rendered almost unrecognizable if not for the song’s catchy core tune and Styles’ voice ... Like “Stockholm Syndrome,” Styles’ solo version of the group’s ...... Review: Harry Styles takes more than one direction at Little Caesars Arena Macomb Daily 27 Jun 2018 Styles delivered �Sweet Creature� from a second stage at the back of the Little Caesars floor, along with a solo version of 1D�s �If I Could Fly.� He gave fans a further taste of his dormant band with �Stockholm Syndrome� and a retooled �What Makes You Beautiful,� also covering ...... Live Review: Yo La Tengo at the Wonder Ballroom, Sat June 2 & Sun June 3 Portland Mercury 04 Jun 2018 On Saturday, in addition to I Can Hear the Heart Beating as One favorites “Green Arrow,” “Stockholm Syndrome,” and the especially beloved “Autumn Sweater,” the band pulled from Electr-o-pura , Painful , and several other records to round out the setlist.... Harry Styles' One Direction tribute Montrose Press 30 Sep 2017 The 23-year-old singer has included new versions of the band's debut single 'What Makes You Beautiful', along with album track 'Stockholm Syndrome', on his setlist and his music director and producer Tom Hull, who is known as Kid Harpoon, revealed it was important to Harry to acknowledge 1D in his performances. He told Rolling Stone ... He explained ... .... Muse play final confirmed festival show of 2017 as they headline Life Is Beautiful NME 24 Sep 2017 The band currently only have four more live dates confirmed for the rest of the year, all of which are their own headline shows ... Later, after Stockholm Syndrome’, Bellamy threw his guitar on the floor before being handed a fresh instrument and immediately segueing into ‘Supermassive Black Hole’ ... ‘Stockholm Syndrome’.... Arcade Fire's 'Everything Now' darkly happy-go-lucky The Malta Independent 19 Aug 2017 ... (Pulp), Arcade Fire may have picked up a case of Stockholm syndrome, with abounding sonic similarities with those bands.... Review: Arcade Fire's 'Everything Now' darkly happy-go-lucky Reflector 26 Jul 2017 Working with co-producers Thomas Bangalter (Daft Punk) and Steve Mackey (Pulp), Arcade Fire may have picked up a case of Stockholm syndrome, with abounding sonic similarities with those bands. The title cut is one of the Montreal band’s most successful singles, it’s Abba-esque, ...... Review: Arcade Fire’s ‘Everything Now’ darkly happy-go-lucky Federal News Radio 26 Jul 2017 Working with co-producers Thomas Bangalter (Daft Punk) and Steve Mackey (Pulp), Arcade Fire may have picked up a case of Stockholm syndrome, with abounding sonic similarities with those bands. The title cut is one of the Montreal band’s most successful singles, it’s ......
cc/2020-05/en_middle_0061.json.gz/line1998
__label__wiki
0.963427
0.963427
4 News items available within Health, Management and 2014 Remove all filters from news overview Dr. John Byrd Joins Oncology Times as Clinical Advisory Editor November 03, 2014 — Press release Hanan Khalil Named Editor-in-Chief of International Journal of Evidence-Based Healthcare July 09, 2014 — Press release Professor Jeremy Chapman Named Editor-in-Chief of Transplantation May 09, 2014 — Press release Rosanne Raso Named Editor-in-Chief of Nursing Management February 03, 2014 — Press release
cc/2020-05/en_middle_0061.json.gz/line2000
__label__cc
0.583021
0.416979
Mind Over Matter® Brain Buzz Stand AheadTM Stand Ahead As the largest resource of information specific to women's brain health, we are sure you will find what you are looking for, and promise that you will discover new information. Everyday InformationFind tips, information and recipes related to brain health. Scientific InformationRead about the research, news and articles from the medical community. Caregiver InformationFind helpful advice on taking care of yourself while you care for others. most recent information most popular information Will You Get Dementia? Many May Not Understand Their Risk by Associated Press: Many older American adults may inaccurately estimate their chances for developing dementia and do useless things to prevent it, new research suggests. Almost half of adults surveyed believed they were likely to develop dementia. The results suggest many didn’t understand the connection between physical health and brain health and how racial differences can affect dementia risk. Substantial numbers of people who rated their health as fair or poor thought their dementia chances were low. At the same time, many who said they were in excellent health said they were likely to develop the memory robbing disease. Many said they tried at least one of four unproven memory-protecting methods, including taking supplements like fish oil and ginkgo. The most popular strategy was doing crossword puzzles. Mental stimulation is thought to help, but there’s stronger evidence for more challenging activities than puzzles — things like playing chess, taking a class, reading about unfamiliar topics, said Keith Fargo, who oversees research and outreach programs at the Alzheimer’s Association. He was not involved in the study. Research has shown that regular exercise, a good diet, limiting alcohol and not smoking make dementia less likely. Supplements have not been shown to help. “We really haven’t done a good job of getting the word out that there really are things you can do to lower your risk,” said Dr. Donovan Maust, the study’s lead author and a geriatric psychiatrist at the University of Michigan. The study was published online Friday in JAMA Neurology. It’s based on a nationally representative health survey of 1,000 adults aged 50 to 64. The survey asked people to assess their likelihood of developing dementia and whether they had ever discussed ways to prevent it with their doctor. Few people said they had, regardless of their self-rated risk for dementia. The results raise concerns because doctors can help people manage conditions such as high blood pressure and diabetes that have been linked with dementia risk, Maust, said. Among those who said their physical health was only fair or poor, a substantial 40 percent thought they were at low risk for Alzheimer’s disease or other dementia. Almost the same portion rated their chances as likely even though they reported very good or excellent physical health. More whites than blacks or Hispanics surveyed believed they were likely to develop dementia and almost two-thirds of blacks said they were unlikely. Only 93 blacks were surveyed, making it difficult to generalize those results to all U.S. blacks. But U.S. minorities face higher risks for dementia than whites — blacks face double the risk — and the Alzheimer’s Association has outreach programs that aim to raise awareness in black and Hispanic communities. “There’s lots of work to do … to educate the public so they can take some actions to protect themselves,” Fargo said. One in three seniors die with Alzheimer’s or other dementias, according to the Alzheimer’s Association. While there are no medicines or medical treatments proven to prevent it, rigorous European studies have shown that healthy lifestyles may help prevent mental decline. The Alzheimer’s Association is sponsoring similar U.S. research. It has long been known that vitamin D – often referred to as the “sunshine vitamin” – is one of the most essential vitamins for our overall health because it regulates calcium in the body... Here’s the Rub – Health Benefits of Saunas, Aromatherapy, & Massages SWEAT IT OUT Sauna bathing, a form of passive heat therapy, is a traditional activity in Finland that is primarily used for relaxation purposes and is becoming increasingly common in many other populations. The typical... Has anyone ever suggested that you take a deep breath to help you relax when you are feeling anxious or stressed? That advice has roots in the wisdom of ancient yogic teachings. Breathing – that... The material presented through the Think Tank feature on this website is in no way intended to replace professional medical care or attention by a qualified practitioner. WBHI strongly advises all questioners and viewers using this feature with health problems to consult a qualified physician, especially before starting any treatment. The materials provided on this website cannot and should not be used as a basis for diagnosis or choice of treatment. The materials are not exhaustive and cannot always respect all the most recent research in all areas of medicine. info@womensbrainhealth.org 30 St. Clair Ave W, Suite 900 3800 Oaks Clubhouse Dr., Suite 507 Charitable No.: 80099 3206 RR0001 | 501(c)(3) Tax-Exempt Organization Donation are deductible in accordance with U.S. and Canadian tax law. Privacy Statement Disclaimer Donate to WBHI Our Grey Matter Matters®. Donate to Women's Brain Health Initiative.
cc/2020-05/en_middle_0061.json.gz/line2001
__label__wiki
0.744753
0.744753
Home Features STOP NHS PRIVATISATIONS AND CUTS – urges BMA STOP NHS PRIVATISATIONS AND CUTS – urges BMA BMA delegates at their Annual Representation Meeting last June at the launch of the ‘Look After Our NHS’ campaign against privatisation The British Medical Association (BMA) has today unveiled a set of New Year’s resolutions for politicians to help them protect the future of the National Health Service (NHS). Top of the list is a resolution calling on politicians to stop wasting taxpayers’ money on unnecessary and expensive commercial sector solutions for the NHS in England. ‘These scarce resources should be invested in the NHS where they will provide better value for money and help more patients,’ said Chairman of Council of the BMA, Dr Hamish Meldrum. He added: ‘The political parties have been grappling with the current financial crisis and cuts in the public sector are being proposed from 2010 onwards. ‘The BMA is calling on politicians to resist the false economy of making quick savings by cutting front-line NHS services. ‘Instead we urge them to use our resolutions to protect and improve the health service. The government needs to value doctors and invest in their education and training. ‘The NHS is currently running at full capacity. Recessions add to the burden on the NHS and the unexpected is always around the corner. The health service needs to be prepared for all eventualities. ‘Looking ahead to 2010, the BMA also wants the government to focus on wider public health issues including alcohol misuse, tobacco control and obesity. ‘Dealing effectively with these problems could save millions of premature deaths in the future. We hope this government – and any future government – will adopt our resolutions.’ The BMA is urging all parties to make the following New Year resolutions and stick to them: ‘1. Stop wasting taxpayers’ money on poor value contracts between the NHS and private companies. ‘2. Don’t cut frontline services, or penalise NHS staff to bail the country out of the financial crisis which was not of their making. ‘3. Safeguard funding for medical research and the education and training of clinical staff. ‘4. Work towards creating a tobacco-free society by 2035. ‘5. Set a minimum price per unit of alcohol and ban all alcohol advertising in the media. ‘6. Support and develop general practice to deliver high-quality care for patients. ‘7. Discourage trusts from cutting the time consultants can spend on initiatives to improve quality, patient safety and cost effectiveness. ‘8. Don’t raise the cap on tuition fees in 2010 – a move which would send the cost of a medical degree soaring and dissuade the less well off to study medicine. ‘9. Address the BMA’s serious concerns over the quality and continuity of junior doctors’ training. ‘10. Compel the NHS to lead by example by reducing its carbon footprint.’ The BMA recently launched its manifesto for the forthcoming Westminster election. In this document, the BMA calls on all political parties: ‘to be realistic about what the NHS can deliver ‘to recognise that the UK needs investment in health more than ever ‘to pursue sound and evidence-based planning of services. The BMA believes these three principles underpin the New Year resolutions above. On December 22, the BMA put out the following briefing document, ‘NHS spending and the role of the private sector’. The BMA warns: ‘Funding for the NHS in England is expected to come under pressure after 2011, and there may be real term reductions in spending on health. ‘The BMA understands the need for efficiency, but believes that the focus should be on cutting the waste resulting from commercial provision of NHS services, rather than on cuts to frontline care. ‘The following paper lists reports of money wasted as a result of market-driven reforms in the NHS. ‘Private Finance Initiative (PFI) ‘Under the Private Finance Initiative, the private sector has been contracted to provide new hospitals and other infrastructure and then lease them back to the state for 25 or 30 years. ‘A 2007 report from the Association of Chartered Certified Accountants stated: “Unlike capital charges from non-PFI hospitals, the charges raised against PFI schemes represent revenue paid to private consortia and lost from the NHS. “More schemes will eventually ensure that more money leaves the NHS in this way. “In 2004, it was estimated that capital charges from PFI schemes were costing the taxpayer £125m per year.” ‘The 2008 National Audit Office report, Making Changes in Operational PFI Projects stated that “An estimated £180 million was paid by public authorities to PFI contactors to undertake (contractual) changes in 2006. ‘According to a report in the Daily Telegraph, “during the spending review period in 2011-2014, PFI repayments will rise to £4.18 billion – an increase of over £1 billion at current levels. “The inflexibility of PFI contracts means that it is more likely that hospitals will make cuts to services to meet their PFI repayments”. (Hospital to cut services to pay for £60bn private finance deal Daily Telegraph, 8 August 2009). ‘According to the Economist, “the Treasury recently established a unit to lend money to PFI projects that were experiencing difficulty in securing funds through the banks. In effect, public money is being used to prop up PFI projects”. (The Economist, print edition, 7 February 2009). ‘Research (published June 2009) carried out by Dr Chris Edwards of the University of East Anglia looked at one of the first PFI contracts agreed for Norfolk and Norwich University hospital (NNUH) and concluded that: ‘l £217 million could be saved if the contract were bought out from the private company that originally financed the deal. ‘l £2.4 billion could be saved on buying out the contracts of 53 PFI hospitals, assuming the same saving as NNUH (however, each hospital would have to be looked at in detail individually). ‘According to a BBC News report, “the University Hospitals of Leicester NHS Trust scrapped its PFI scheme due to spiralling costs. £23 million of public money had been wasted on initial preparations”. Hospitals scrap revamp plan, BBC News Online, 20 July 2007. ‘According to a Times report in 2008, “HSBC made almost £100million from managing National Health Service hospitals where contractors charge taxpayers inflated bills for simple tasks, such as £210 to fit an electrical socket. “The charges, paid at hospitals run by the bank’s subsidiary infrastructure company, raise questions about lax controls in Labour’s private finance initiative”. Hospitals run by HSBC, Times Online, 8 June 2008. Independent Sector Treatment Centres (ISTCs) ‘Independent Sector Treatment Centres (ISTCs) are owned and run by the private sector, but contracted to provide NHS treatment. ‘They typically carry out large volumes of supposedly simple surgical procedures such as hip replacements. ‘The BMA is concerned that ISTCs are receiving millions of pounds for work which is not being carried out and still being paid, as their income is guaranteed. ‘This means more money is being paid into the private sector for less work than the NHS was promised. ‘Information provided by the Department of Health to the Health Select Committee showed that across the first wave of ISTCs the cost of work carried out was 12 per cent more expensive than the same work carried out by the NHS. ‘According to a report in the Health Service Journal “more than three years after opening, the Greater Manchester surgical centre has still delivered only 63 per cent of contracted value”. ISTCs: Where are all the patients? HSJ, 18 Sep, 2008 ‘Research published in the British Medical Journal on 30 April 2009 by academics at the Centre for International Public Health Policy at the University of Edinburgh found that in the first 13 months after the Scottish Regional Treatment Centre (SRTC) began accepting patients it carried out work worth only 18 per cent of its £5.6m annual contract for referrals. They found that: ‘l there was “no evidence” to support claims that the centre was “efficient or good value for money”. ‘l the contract reporting requirements did not conform to NHS standards. ‘l Scottish health boards may have overpaid up to £3 million in the first year of the contract ‘l if the same findings apply in England then as much as £927 million or almost two thirds of the total first wave contracts worth £1.54 billion might have been overpaid to ISTCs. ‘The BMA believes NHS trusts are spending too much money on management consultants, often to help them with the burdens created by the development of the internal market. ‘The Royal College of Nursing has estimated that NHS trusts in England spent £350 million in the last financial year on external management consultants. ‘Figures recently published by the Department of Health in response to a Freedom of Information request, show departmental spending on consultancy projects for DH itself comes to over £125 million for 2008/09. ‘Costs for the three previous years came to: £132m in 2007-2008; £205m in 2006-2007; £133m in 2005-2006. ‘A 2009 report from the Management Consultancies Association estimated spending on management consultancy to the wider NHS for 2008 was £300 million. ‘A 2009 investigation by Pulse magazine found PCT spending on management consultants has more than tripled in the past two years. It analysed figures from 62 PCTs obtained under the Freedom of Information Act, and found: ‘l Each PCT is now spending an average of £1.217m on external companies: up from £361,000 since 2006-2007. ‘l The cost of legal and professional fees has also risen dramatically bringing the total paid to external companies to an average of £1.568m per PCT. ‘l NHS Tower Hamlets, hailed by ministers as a trailblazing PCT, reported the heaviest use of external consultants. It spent £5.682m on various projects in 2008, an eightfold increase since 2006-2007. Pulse, 20 May 2009’. Previous articleDOWN WITH RAJAPAKSE AND FONSEKA – Platform of Common Left candidate Dr Vickramabahu Karunaratne for Sri Lankan Presidential Election on January 26 2010 Next article2010 – year for revolutions! NEW YEAR MANIFESTO by News Line Editorial Board South African Telkom to sack 20% of workforce – executives getting rich by sacking workers says CWU ‘Wheels on the verge of falling off’ the ambulance service say Unite
cc/2020-05/en_middle_0061.json.gz/line2007