pred_label
stringclasses 2
values | pred_label_prob
float64 0.5
1
| wiki_prob
float64 0.25
1
| text
stringlengths 182
1.02M
| source
stringlengths 39
45
|
|---|---|---|---|---|
__label__wiki
| 0.573849
| 0.573849
|
Mobile World Congress 2017: Are Future Technologies Safe?
March 10, 2017 007admin Leave a comment
“Technology is very hard to predict.”
So said Reed Hastings, Netflix CEO, during his keynote at this year’s Mobile World Congress when asked what his forecast was for future technologies over the next five to twenty years.
This year’s Mobile World Congress (MWC) was full of tech that gets us excited about the future though. From 5G, which could be up to a thousand times faster than 4G, to new real-world VR applications, the event over the years has become so much more than just a showcase for mobile devices.
We were able to check it out, and have put together a list of some of the technologies that got us most excited, and that we feel will form a big part of our future lives.
As Hervé Lambert, Global Consumer Operations Manager at Panda Security, was quick to point out though, there is a flipside. As he put it, as these new technologies advance, cyber criminals “will become more specialized with each type of attack and will go deeper into the system.” For every new exciting piece of tech, there is of course, the question of cyber security.
How will this tech shape our future and will it be one where we can feel safe in the physical and digital world?
Robots / AI
Driving home the MWC’s futurist appeal, as well as the fact that the event is more than a simple mobile device exhibition, was the amount of robots on display this year. PaPeRo, the human companion robot was demoed by various companies. Its impressive face recognition capabilities can be utilized for public safety, even being able to track lost children in shopping malls.
At the Ubuntu stall, meanwhile, REEM and REEM-C were both on display. REEM-C, which was designed by Barcelona-based PAL Robotics, is a flexible full-size humanoid biped robot that is used for different types of research, including AI.
Being connected to the Internet of Things (IoT) obviously poses potential risks.
REEM-C, for example, weighs 80 kg. In a future where robots are more widely available, a malicious attacker could cause real damage by taking control of such a heavy piece of machinery.
AI and big data analysis is actually being used today to make people safer though. During a keynote speech at the MWC, Takashi Niino, CEO and president of the NEC Corporation, described how real-time analysis with face recognition technology is being used in Tigre, Argentina to reduce crime. The highly accurate face recognition technology can be used to identify criminals, and even to detect suspicious behavior. Since the “urban surveillance system” was implemented, vehicle theft has gone down by 80 per cent in Tigre.
“AI will soon become a reality of most people’s daily lives”
As always, there’s another side to the coin though. Whilst high-speed data analysis allows law enforcement to act more efficiently, it also does the same for cybercriminals. “Cyber crime is increasingly becoming automated and the number of incidents are escalating exponentially”, said Hervé Lambert. “AI will soon become a reality of most people’s daily lives, so it is very important that its development is overseen responsibly by engineers that are specialized in intelligent security.”
Virtual Reality (VR) / Augmented Reality (AR)
Virtual reality has been touted for a while as the next big thing in entertainment. We’ll be able to fully immerse ourselves in distant locations and invented realities. Arguably, its close relative, augmented reality (AR), is where the most life-changing innovation is going to take place though.
Several new VR/AR applications were on show at the MWC. Relúmĭno –which was on show at Samsung’s C-Lab VR projects stall– demonstrated an impressive practical application for VR. The Relúmĭno app, designed for Samsung’s Gear VR headset, acts as a smart visual aid for visually impaired people by remapping blindspots. The effect, when using the headset, can be described as seeing the world as a cartoon with edges and surfaces in your surroundings rendered as sharp black lines.
Other separate standalone projects, like Inflight VR, aim to enhance our inflight experience with VR entertainment. Flight notifications will appear at the bottom of the screen as you navigate the hand-tracking controlled system. LiveRoom, on the other hand, will allow people a more immersive retail experience with its AR capabilities, and can also be used to enhance the classroom experience.
What dangers do we face when it comes to VR/AR though?
VR and AR can be compared to social media, but on a whole other level. This means that when it comes to online privacy, the stakes will be much higher. An unfortunate example has already been seen of this in real life. Users have reported sexual harassment on VR, with inappropriate gestures by some gamers towards other players. Much like with social media, some users sadly see the anonymity afforded by their digital avatars as allowing them to act inappropriately in the digital world.
This type of problem could reverberate beyond just VR gaming though. It’s very likely that our digital avatars will become an even more important part of our lives in VR than they are now in the likes of Twitter and Facebook. If hackers can carry out ransomware attacks after retrieving information on social media, it’s possible that this type of attack will be an even bigger danger with VR in the future.
Connected and Autonomous Cars
One of the visions of the future presented at the MWC was one of people sitting back on their commute to work, in their driverless cars, as the vehicle safely takes control of everything.
Whilst this future may still be in the distance, some cars on display at the MWC are certainly taking us in that direction. Roborace showed off its “robocar” at the even, whilst Peugeot revealed its Instinct concept car, a futuristic and stylish vehicle that wouldn’t look out of place in a sci-fi movie. One of the Instinct’s capabilities is that it can change the ambience inside the vehicle, depending on the passenger’s mood. Stressed out after work? It’ll put you into a relaxed seating position and change the lighting to ‘ambient’.
As the car will connect to the IoT using Samsung’s Artik cloud platform, it will be able to seamlessly integrate your vehicle’s operating system with other devices. This could make your car remind you that a drive to the supermarket is in order, for example. Haven’t been keeping up with your fitness regime? Your car could encourage you to stop and jog the rest of your journey.
Of course there are potential risks when it comes to this technology. Though the technology doesn’t exist yet, there were many 5G demonstrations at the MWC. Most of these focused on reduced latency speeds, meaning that we’ll have a future where almost anything can be controlled in real-time. Could hackers take control of a vehicle that’s connected to the IoT and take it off course without the passenger realizing? It’s a scary prospect.
“Online security’s Achilles’ heel is the Internet of Things”
According to Panda Security’s Hervé Lambert, “online security’s Achilles’ heel is the Internet of Things”. It’s important for cyber security experts to keep up with tech innovations, as there’s no doubt that cyber criminals will too.
Lambert says that hackers aren’t the only worry though. It’s a possibility that in the future, “insurance companies could exploit driving data. This could include data about the way people drive and it could be used to increase insurance prices based on new criteria.” Insurers could have access to a huge amount of data, including where people drive and where they park.
Third-party data gathering could be taken to a whole new level. The IoT will massively benefit our lives, but sadly, it could also open a door to hackers and companies that are looking to financially exploit its users.
“Smart cities, smart factories, smart cars, and anything ‘smart’ will also create a necessity for smart security.”
There was so much tech on show at this month’s Mobile World Congress that will undoubtedly shape our futures and improve our lives in many ways.
Just as autonomous cars look to be brining sci-fi predictions to real life, IIT’s grapheme electrode prosthetic is set to change people’s lives in a way that was previously only imaginable on the big screen. Think Luke Skywalker’s robot hand in The Empire Strikes Back. Graphene, a material that is invisible to the naked eye, will allow electrodes to be embedded comfortably into a robot-like prosthetic hand; a big advance in prostheses.
Drones were also a big draw at the MWC. Though they can be used for games as well as to record things from a distance, their most prominently discussed capacity at the MWC was for use in security systems. Whilst the flying machines will allow efficient surveillance, we also face the Orwellian prospect of drone surveillance as a means for law enforcement. Will they keep us safe or be used to control us? Only time will tell.
When pushed to give an answer for his forecast of the future, Reed Hastings said, “[at Netflix] we’re not sure if we’ll be entertaining you or AI.” While such advances in artificial intelligence are still a long way away, the Mobile World Congress has shown this year that technology will increasingly become a seamlessly integrated part of our very existence. Though future predictions are largely positive when it comes to new technologies, there’s a negative side that also merits attention.
As Hervé Lambert puts it, “smart cities, smart factories, smart cars, and anything ‘smart’ will also create a necessity for smart security.”
Cyber security is undeniably a big part of the puzzle when it comes to a future of safe, smart, integrated cities.
The post Mobile World Congress 2017: Are Future Technologies Safe? appeared first on Panda Security Mediacenter.
Cybersecurityfeatured1hackersIoTMobile SecurityTechnology
Previous PostRHBA-2017:0479-1: openstack-cinder bug fix advisoryNext PostDAVOSET 1.3
Software and Security Information
Antivirus Vendors
Firewall Vendors
Microsft
Security Focus
Sun JDK
About Us Android Android corner Antivirus Apple Business Company Cryptography Cybercrime Cybersecurity data breach Encryption Facebook featured1 General google Government Hacking hacking news Hacks highlighted Internet of Things Internet Security Lifestyle Malware Microsoft Mobile Mobile Security News Panda Security Password Press Center Press Releases Privacy ransomware Scams Security Security News Social Media Technology Threats Tips Vulnerabilities Vulnerability Web Security
Hoverwatch Phone Tracker
Vuln: Dell iDRAC6 CVE-2015-7274 Arbitrary Command Execution Vulnerability
mupdf-1.10a-5.fc26
qemu-2.7.1-6.fc25
|
cc/2019-30/en_middle_0014.json.gz/line0
|
__label__cc
| 0.654466
| 0.345534
|
Revisiting the James Harden Trade
When the Oklahoma City Thunder traded James Harden, many pundits labeled this a move that would help the Thunder financially but hurt them on the court. The financial benefits are unquestionable but there is little evidence that losing Harden has weakened the Thunder's roster; last season, the Thunder posted the franchise's best regular season winning percentage since 1997-98, finishing first in the West. The Thunder seemed poised to make a run to the NBA Finals before Russell Westbrook suffered a season-ending knee injury in the first round of the playoffs. This season, even though Westbrook has missed 10 games after reinjuring his knee, the Thunder have improved their winning percentage from .732 to .771. It is worth noting that while the Thunder have thrived without Harden they definitely miss Westbrook; they are 21-4 with Westbrook this season and just 6-4 without him, which suggests that if Westbrook had stayed healthy then the Thunder would currently own the best record in the league (they trail the Indiana Pacers by just one game).
Generally, a team that loses a franchise player--whether through injury, free agency or a trade--takes a major step back in the standings. Harden is a very good player but he is not a franchise player, not a guy whose contributions are irreplaceable; the Thunder's record without him shows this to be true and the Rockets' record with Harden further indicates that he is not an elite player, for that is the flip side of this equation: not only have the Thunder thrived without Harden, but the Rockets have not become a powerhouse with Harden. The Rockets had a .515 winning percentage in 2011-12 (34-32 record in the lockout shortened season) and after adding Harden they improved slightly to a .549 winning percentage in 2012-13 (45-37 record in a full-length campaign); the difference between .515 and .549 amounts to three "extra" games over the course of an 82 game season. Harden's arrival did not have much postseason impact, either. The Rockets missed the playoffs in 2011-12 and they sneaked into the playoffs as the eighth seed in 2012-13. Harden's uninspiring 2013 playoff performance hardly lends credence to Houston GM Daryl Morey's assertion that Harden is a "foundational player." This season, the Rockets acquired Dwight Howard, who is without question a franchise player when he is healthy and motivated--but even with Howard playing at an All-NBA level (ranking third in rebounding, fifth in field goal percentage and seventh in blocked shots) the Rockets are currently just the fifth seed in the West, on pace to post a 52-30 record.
Harden produces gaudy scoring numbers but that is because he has the ball in his hands most of the time and he has a green light to shoot; his field goal attempts per minute have significantly increased since the trade. His scoring totals obscure some weaknesses in his game; not only is Harden a subpar defender who also turns the ball over far too frequently for someone whose primary job is to shoot the ball (Harden led the league in turnovers last season and he ranks seventh in the league this season) but he has a very limited scoring repertoire: he is a big guard who rarely posts up and who does not have a great midrange game, so he primarily relies on shooting three pointers and drawing fouls by driving wildly into the lane. "Stat gurus" will tell you that layups, free throws and three pointers are the most efficient shots--and, from a numerical standpoint, that is true--but the practical downside of how Harden plays is that top notch teams can contain him in the playoffs. All you have to do is blitz Harden on screen/roll plays to prevent him from shooting open three pointers and then also sag someone into the paint to take a charge/block a shot when Harden drives. Teams that execute such a game plan can force Harden into high-turnover, low shooting percentage games; we saw this in the 2012 playoffs when Harden shot worse than .400 from the field in 10 of his 20 postseason games and we saw this again in the 2013 playoffs when Harden struggled against his old team as Houston lost 4-2 even though Westbrook missed most of the series due to injury.
Labels: Daryl Morey, Houston Rockets, James Harden, Oklahoma City Thunder, Russell Westbrook
|
cc/2019-30/en_middle_0014.json.gz/line1
|
__label__cc
| 0.691749
| 0.308251
|
2moveabroad Move abroad, work abroad, study abroad and join the expats overseas
Moving abroad with children
Moving a car abroad
Moving abroad with pets
Preparing to move abroad
How To Move Abroad
Four Books for Moving Abroad
Best places to move for retirement
Temporary Move Abroad
Moving abroad to study
Foreign exchange programs
You may access the Site or Service in this case, “Site” or “Service” meaning 2moveaborad.com and all associated web pages, portals, and forum as a user. Access to certain components of the Site and selected features of the Service is free.
2moveabroad may change the Service from time to time, with or without notice, by adding, modifying, suspending, or discontinuing features of the Service. Your access to the Site and Service is expressly conditioned on your compliance with this Terms Of Use, the 2moveabroad Community Etiquette, the 2moveabroad Policy and any applicable laws.
2moveabroad reserves the right to cancel, suspend, or block access to the Site or Service at its sole discretion for violations of these terms, the 2moveabroad Community Etiquette, or for any other reason and without notice.
For the purposes of this Terms Of Use, Users and Subscribers may be referred to as “you”, and the Terms Of Use may be referred to as the “Agreement” or the “TOU”. The TOU is a legally binding contract between the Company and you; the Company may be also be referred to as “2moveabroad” in this Agreement. The 2moveabroad Privacy Policy and 2move Community Etiquette and any other agreement signed by a Subscriber, if applicable, are each incorporated into this Agreement by reference.
The Service is available only to Users who submit truthful and accurate information about themselves and maintain the accuracy of such information.
The Service is available only to Users who do not impersonate any person or entity or otherwise misrepresent their identity in a profile or elsewhere on the Site.
The Service is available only to those with a valid email address.
The Service is available only to those who agree not to authorize others to use their account, profile, or messages.
2moveabroad reserves the right to monitor User communications, and may disclose content and information about Users, including content contained within User communications, if 2moveabroad deems it reasonably necessary to: (1) conform to legal requirements or respond to legal process; (2) ensure User compliance with this TOU, the 2moveabroad Privacy Policy, and/or the 2moveabroad Community Etiquette; or (3) protect the rights, property, personal safety or interests of 2moveabroad, its employees, customers, or the public.
User Obligations Regarding User Generated Content
Any information, profiles, data, text, links, articles, software, photographs, graphics, video, music, sound, messages, or other materials that a User uploads, publishes or displays on the Site or in connection with the Service, whether publicly posted or privately transmitted shall be referred to herein as “User Generated Content”.
Users assume legal responsibility for all User Generated Content.
Users agree that no copyright, trademark, trade secret, publicity or privacy rights, or other intellectual property rights are being violated by your posting, transmission or sharing of any User Generated Content via the Site or Service.
Users agree not to post, transmit, or share User Generated Content on the Site or Service that User does not have permission to post, transmit or share.
2MoveAbroad Obligations Regarding User Generated Content
2moveabroad assumes no obligation to and does not routinely pre-screen User Generated Content posted via the Site or in connection with the Service. 2moveabroad does not guarantee the accuracy, integrity, appropriateness, quality, or validity of User Generated Content. User Generated Content does not necessarily represent the views or opinions of 2moveabroad and under no circumstances will 2moveabroad be liable in any way for any User Generated Content, including without limitation any loss or damage of any kind incurred as a result of the use of any User Generated Content posted, emailed, or otherwise transmitted via the Site. As such, you are solely responsible at your own expense for creating backup copies and replacing any User Generated Content you post or store on the Site or provide to us. Notwithstanding its lack of obligation, 2moveabroad may remove any User Generated Content at any time at its sole discretion, including User Generated Content that in the sole judgment of 2moveabroad violates this TOU or which may be offensive, illegal or violate the rights of any person or entity, or harm or threaten the safety of any person or entity. 2moveabroad assumes no obligation to maintain or store your content. 2moveabroad may delete, modify or restrict the display of User Generated Content at any time for any reason, including but not limited to change in Subscriber account level, Service cancellation, violation of the TOU or violation of the 2moveabroad Community Etiquette; once deleted, User Generated Content may not be retrieved.
2moveabroad does not claim ownership of User Generated Content and subject to the rights granted to 2moveabroad in this TOU, you retain full ownership of all of User Generated Content to the extent you would otherwise have intellectual property rights or other proprietary rights associated with it.
When you post User Generated Content to the Site, you authorize and direct 2moveabroad to make such copies as 2moveabroad deems necessary to facilitate the posting and storage of User Generated Content on the Site and provide the Service to you.
Your further authorize 2moveabroad to anonymize and aggregate User Generated Content, including data associated with your social media profiles, and use it, by way of example, for benchmarking, research and development, data products, or other marketing purposes. By choosing to post, upload, or transmit data to the Site, you grant the Company, its affiliates and partners an irrevocable, perpetual, world-wide, royalty free, non-exclusive license (with the right to sub-license) to use anonymized and aggregated User Generated Content, in all present and future media, and in any manner relating to the Site or Service.
In addition, with respect to User Generated Content that you elect to post or transmit on the community portions of the Site (“Interactive Content”), including your User Profile, 2moveabroad Blog, forum and the Q&A service, and any other future 2moveabroad sites or services that are designed to be viewed by the public or other Subscribers, you agree to grant to 2moveabroad, its affiliates and partners an irrevocable, perpetual, world- wide, royalty free, non-exclusive, transferable license (with the right to sublicense) to use, reproduce, translate, alter, publicly perform, publicly display, modify, adapt, publish, excerpt (in whole or in part) and distribute such Interactive Content, in whole or in part, in all present and future media and in any manner relating to the Site or Service (including, without limitation, in connection with the appearance of such Interactive Content on 2moveabroad and on the sites of our affiliates, partners and others with whom 2moveabroad may have business relationships relating to the Site) and the distribution and promotion of the Site. You further agree that 2moveabroad is free to use any ideas, know-how, concepts, techniques or other materials implied by Interactive Content.
You may remove Interactive Content from the Site at any time. If you choose to remove Interactive Content, any license granted above for the content shared by on you on the community portions of the Site will remain in effect and you acknowledge that 2moveabroad may retain archived copies.
Service Limitations
2moveabroad reserve the right to modify or discontinue the Service (or any part or feature thereof) at any time without notice. You agree that 2moveabroad shall not be liable to you or to any third party for any modification, suspension or discontinuance of the Service.
If you believe that your work has been used in a way that constitutes copyright infringement, or your intellectual property rights have been otherwise violated, please notify 2moveabroad at admin@2moveabroad.com
Special Conditions for International Use
As a consequence of the global nature of the Internet, you agree to comply with all local rules and laws regarding user conduct on the Internet and acceptable content. Specifically, you agree to comply with all applicable laws regarding obscene and indecent content and communications and those regarding the transmission of technical data exported from the Netherlands, United States or the country in which you reside.
admin4move
Join the social Expat Community
wind: 1km/h ESE
H 100 • L 91
Gregory Smith on 3 Money Saving Tips to Lower Moving Cost
3 Money Saving Tips to Lower Moving Cost on How to Pack A Pallet For Moving Abroad
3 Money Saving Tips to Lower Moving Cost | Expa... on 3 Money Saving Tips to Lower Moving Cost
How to Pack A Pallet For Moving Abroad | Expats... on How to Pack A Pallet For Moving Abroad
Survival guide for studying abroad on Four Books for Moving Abroad
What we’re talk about
Best places to move for retirement Explore Foreign exchange programs Gap Year How to Move Abroad How to move abroad International News Move Abroad Moving abroad for school Moving abroad to study Moving abroad with children Moving a car abroad News & Events Preparing to move abroad Retire Abroad Temporary Move Abroad
©2015 2moveabroad.com All rights reserved Terms of Service Privacy Policy
|
cc/2019-30/en_middle_0014.json.gz/line2
|
__label__cc
| 0.567585
| 0.432415
|
Literary texts
The Cambridge Dover Wilson Shakespeare
$27.99 (R)
Real Author: William Shakespeare
Sir Arthur Quiller-Couch
John Dover Wilson
$ 27.99 (R)
John Dover Wilson's New Shakespeare, published between 1921 and 1966, became the classic Cambridge edition of Shakespeare's plays and poems until the 1980s. The series, long since out-of-print, is now reissued. Each work is available both individually and as a set, and each contains a lengthy and lively introduction, main text, and substantial notes and glossary printed at the back. The edition, which began with The Tempest and ended with The Sonnets, put into practice the techniques and theories that had evolved under the 'New Bibliography'. Remarkably by today's standards, although it took the best part of half a century to produce, the New Shakespeare involved only a small band of editors besides Dover Wilson himself. As the volumes took shape, many of Dover Wilson's textual methods acquired general acceptance and became an established part of later editorial practice, for example in the Arden and New Cambridge Shakespeares.
The princess Elizabeth, daughter of King James I
The Tempest: introduction
A note on punctuation
The copy used for The Tempest
Facsimile from Sir Thomas More
The stage-history of The Tempest
Byzantine and Modern Greek Studies
NEW TO CAMBRIDGE IN 2016Byzantine and Modern Greek Studies is an internationally recognised, peer-reviewed journal…
African and Caribbean literature
Anglo Saxon and medieval literature
English literature: general interest
English literature 1700-1830
English literature after 1945
European and world literature: general interest
Latin American literature
Printing and publishing history
Renaissance and early modern literature
|
cc/2019-30/en_middle_0014.json.gz/line12
|
__label__wiki
| 0.570736
| 0.570736
|
Selected Discourses of Shenoute the Great
Community, Theology, and Social Conflict in Late Antique Egypt
Editors and translators:
David Brakke, Ohio State University
Andrew Crislip, Virginia Commonwealth University
Publication planned for: August 2019
availability: Not yet published - available from
Pre-order Add to wishlist
Shenoute the Great (c.347–465) led one of the largest Christian monastic communities in late antique Egypt and was the greatest native writer of Coptic in history. For approximately eight decades, Shenoute led a federation of three monasteries and emerged as a Christian leader. His public sermons attracted crowds of clergy, monks, and lay people; he advised military and government officials; he worked to ensure that his followers would be faithful to orthodox Christian teaching; and he vigorously and violently opposed paganism and the oppressive treatment of the poor by the rich. This volume presents in translation a selection of his sermons and other orations. These works grant us access to the theology, rhetoric, moral teachings, spirituality, and social agenda of a powerful Christian leader during a period of great religious and social change in the later Roman Empire.
Provides translations of previously unpublished works of Shenoute, the greatest author in the Coptic language
An expert introduction to the life and thought of Shenoute
Offers access to a wealth of hitherto unpublished sources for Christianity and society in late antiquity
'The book includes footnotes, a valuable bibliography, and a useful index of names, subjects, maps, and figures. Brakke and Crislip's book is a modern and accurate translation of Shenoute's Discourses, so that it is an important contribution in the spirituality of Shenoute and his form of monasticism. Meticulously researched, this competent book provides a starting point for new investigations of the role of Shenoute in the history of Egyptian asceticism. Undoubtedly, Selected Discourses of Shenoute the Great will become a significant landmark for researchers in the field.' Daniel Lemeni, Tealogia
contains: 7 b/w illus. 2 maps
Shenoute's life, times, and Discourses
Part I. Heretics and Other Enemies of the Church:
1. And it happened one day
2. As I sat on a mountain
3. I am amazed
Part II. Shenoute as Pastor and Preacher:
4. I see your eagerness
5. Some kinds of people sift dirt and Whoever seeks God will find
6. The idolatrous pagans, or And we will reveal something else
7. And let us also reprove
8. I answered
9. And after a few days
10. See how clearly revealed is the foolishness of pitiless people
11. Truly when I think
12. A priest will never cease
13. When the Word says
Part III. The Christian's Struggle with Satan:
14. In the night
15. Because of you too, O Prince of Evil
16. A beloved asked me years ago
17. As we began to preach
Part IV. The Conflict with Gesios:
18. Not because a fox barks
19. Let our eyes (translated by Stephen Emmel)
20. A26
21. God says through those who are His
22. God is blessed.
Editors and translators
David Brakke is Joe R. Engle Chair in the History of Christianity and Professor of History at Ohio State University. He is the author of Athanasius and the Politics of Asceticism (1995), Demons and the Making of the Monk: Spiritual Combat in Early Christianity (2006) and The Gnostics: Myth, Ritual, and Diversity in Early Christianity (2010). He is also editor and translator of Evagrius of Pontus: Talking Back: A Monastic Handbook for Combating Demons (2009).
Andrew Crislip is William E. and Miriam S. Blake Chair in the History of Christianity and Associate Professor of History at Virginia Commonwealth University. He is the author of two books on healing and monasticism in late antiquity, Thorns in the Flesh: Illness and Sanctity in Late Ancient Egypt (2012) and From Monastery to Hospital: The Transformation of Health Care in Late Antiquity (2005), as well as numerous articles and essays on early Christian life and thought.
Monasteries and the Care of Souls in Late Antique Christianity
Cognition and Discipline
Collecting Early Christian Letters
From the Apostle Paul to Late Antiquity
The Monks and Monasteries of Constantinople, ca. 350–850
Monastic Education in Late Antiquity
The Transformation of Classical Paideia
The Journal of Ecclesiastical History
Since 1950 The Journal of Ecclesiastical History has published original research articles, scholarly reviews, review…
Studies in Church History
NEW TO CAMBRIDGE IN 2016Studies in Church History is an annually published series comprising papers and communications…
Church History: Studies in Christianity and Culture
This quarterly peer-reviewed journal publishes original research articles and book reviews covering all areas of…
|
cc/2019-30/en_middle_0014.json.gz/line13
|
__label__wiki
| 0.516296
| 0.516296
|
Darwin, God and the Meaning of Life
How Evolutionary Theory Undermines Everything You Thought You Knew
Author: Steve Stewart-Williams, University of Wales, Swansea
availability: This ISBN is for an eBook version which is distributed on our behalf by a third party.
format: Adobe eBook Reader
Find out more about Cambridge eBooks
Adobe eBook Reader
You will be taken to ebooks.com for this purchase
Buy eBook Add to wishlist
If you accept evolutionary theory, can you also believe in God? Are human beings superior to other animals, or is this just a human prejudice? Does Darwin have implications for heated issues like euthanasia and animal rights? Does evolution tell us the purpose of life, or does it imply that life has no ultimate purpose? Does evolution tell us what is morally right and wrong, or does it imply that ultimately 'nothing' is right or wrong? In this fascinating and intriguing book, Steve Stewart-Williams addresses these and other fundamental philosophical questions raised by evolutionary theory and the exciting new field of evolutionary psychology. Drawing on biology, psychology and philosophy, he argues that Darwinian science supports a view of a godless universe devoid of ultimate purpose or moral structure, but that we can still live a good life and a happy life within the confines of this view.
Brings together philosophy and evolutionary psychology in a way that will open up debate between the two disciplines
Goes beyond the God question to consider the implications of evolutionary theory for all areas of philosophy
Topics covered include: God, life after death, whether we are superior to other animals, the meaning of life, voluntary euthanasia, and the proper treatment of other animals
'Steve Stewart-Williams explains how evolutionary thought challenges many deep-seated assumptions about God, morality, and human superiority and raises significant questions about such things as euthanasia, suicide, and the way we treat non-human animals. While it has become commonplace for many to equate Darwin's legacy with the stripping away of the moral and the good and to replace it with unpalatable 'Darwinist' alternatives that advocate amorality, nihilism, and a world where 'might makes right', Stewart-Williams carefully and entertainingly shows that, on the contrary, the world after Darwin remains meaningful, wondrous, and intrinsically moral.' Stephen Hill, Massey University
'This is an important, accessible, and timely book for anyone wishing to understand the implications of evolutionary theory for standard views of human nature, morality and religion.' Stephen Boulter, Oxford Brookes University
1. Darwin and the big questions
Part I. Darwin Gets Religion:
2. Clash of the Titans
3. Design after Darwin
4. Darwin's God
5. God as gap filler
6. Darwin and the problem of evil
7. Wrapping up religion
Part II. Life After Darwin:
8. Human beings and their place in the universe
9. The status of human beings among the animals
10. Meaning of life, RIP?
Part III. Morality Stripped of Superstition:
11. Evolving good
12. Remaking morality
13. Uprooting the doctrine of human dignity
14. Evolution and the death of right and wrong.
Steve Stewart-Williams, University of Wales, Swansea
Steve Stewart-Williams is a lecturer in evolutionary psychology at Swansea University. Before taking this position, he did his PhD at Massey University in New Zealand, and then did a postdoctoral fellowship at McMaster University in Canada. His research and writing covers a diverse range of topics, including the placebo effect, the philosophy of biology, and the evolution of altruism and mating behaviour.
Visit the Author's Blog_ Stewart-Williams
Science and Spirituality
Making Room for Faith in the Age of Science
Darwinism and its Discontents
Marketing Intelligent Design
Law and the Creationist Agenda
Debating Design
From Darwin to DNA
The Ape that Understood the Universe
How the Mind and Culture Evolve
Early modern philosophy
Eighteenth-century philosophy
Epistemology and metaphysics
Nineteenth-century philosophy
Philosophy: general interest
Philosophy of mind and language
Philosophy texts
Renaissance philosophy
Twentieth-century philosophy
|
cc/2019-30/en_middle_0014.json.gz/line14
|
__label__cc
| 0.742146
| 0.257854
|
Alan Flurry
Writer and Producer
What does green mean?
Posted on January 18, 2019 January 18, 2019 by alan
Alps drips dipping Rhine
With all honor to Vic, but something else loves the Alps but hates the snow:
After a prolonged summer drought, the bustling traffic at one of the shallowest points on the Rhine ground to a halt for nearly a month late last year, choking off a critical transport artery. The impact damped Germany’s industrial machine, slowing economic growth in the third and fourth quarters. It was the latest sign of how even advanced industrial economies are increasingly fighting the effects of global warming.
With its source high in the Swiss Alps, the Rhine snakes 800 miles through the industrial zones of Switzerland, Germany and the Netherlands before emptying into the sea at Rotterdam, Europe’s busiest port. It serves as a key conduit for manufacturers such as Daimler AG, Robert Bosch GmbH and Bayer AG.
When low water halted shipping this summer, steelmaker Thyssenkrupp AG was forced to delay shipments to customers like automaker Volkswagen AG as it couldn’t get raw materials to a mill in Duisburg.
Though not nearly as important a commercial waterway, we saw this on the Elbe during the summer of 2015. ‘What did we think would happen?’ is being displaced by ‘what do we do now?’ Imagine an average teenager in a ‘borrowed’ car, three drinks more than he’s used to, dashed from the drive-through without paying but not before dinging the BK awning and hitting the highway, sees a patrol car pass in the opposite the direction, hit the lights and squall a U-turn. Our answers in a pinch of what’s best to do next might not be the most trustworthy. If we had planned for this, sure, we probably would have had the drinks but maybe not taken the car so no dine-n-dash, cops or DUI fender scuffs. But we did do all those things, in that order, the lights are flashing and sirens blaring. So what do we do now? Our lines are open, higher-than-normal rates apply.
Categoriesclimate, Earth, economics, Transportation TagsAlps, Rhine, rivers, snow, Vic Chesnutt
Previous PostPrevious A Noteful Hope
Next PostNext The Young(ish) Fogey
A collision of double entendre has caught us in the crossfire of capitalism and self-preservation. We need to sort it out. But what does Green actually mean? We look at its use to determine what we mean by green: a color, the signal to ‘go’, money, envy, erogeneity, inexperience, eco-friendliness? Green is all of these things. But today, the word is tied by all its definitions into a package, a marketing vortex urging us to keep what we have and keep it all going. We have to go back to second grade and ask which of these does not belong? The purpose for this site seems self-explanatory, but I tried to sum it up in the very first post.
alan@alanflurry.com
About Alan Flurry
Alan Flurry is an Athens, Georgia-based writer and filmmaker. He is currently an editor and producer for the Franklin College of Arts and Sciences at the University of Georgia.
|
cc/2019-30/en_middle_0014.json.gz/line17
|
__label__cc
| 0.573236
| 0.426764
|
3 points by shader 315 days ago | link | parent
Yeah; I guess I didn't state it that clearly, but the sandboxing reference was from the reddit thread you linked
"Sandboxing is challenging partly because our boundaries for what is trusted shift imperceptibly over time. Browsers came out in a world where the desktop was considered the crown jewels, while browsers were considered untrusted. Over time local disk has disappeared (e.g. Chromebooks) while our lives are ruled by the browser. This has made the original design of browser security (shielding the local file system; cookies; single origin) if not obsolete then at least dangerously incomplete. So any sandboxing solution has to think about how to fight this gradual creep. No matter how you organize your sandboxes using Qubes or whatnot, something inside a sandbox is liable to become more important than other stuff inside that sandbox. And even outside that sandbox."
The idea of running tests against a live application, particularly an OS, is intriguing. It shouldn't be too hard though, since the code and its state don't have to be in the same place. So you could run the live code against separate testing data in a different sandbox or something...
Your specific example of memory management makes me think that vague "recursive subsets of resources" probably won't cut it for a lot of things. After all, if you make memory access too indirect, it would be very very slow; but if you try to use the actual CPU management interfaces, it may not allow the kind of control that we want...
How much do you really need the bootstrappable stack? There shouldn't be anything stopping you from using something that's already been bootstrapped, instead of raw hex code. E.g. existing C tools, etc. There's also the picolisp-based PilOS project; basically picolisp (which is mostly bootstrapped from an assembler they wrote anyway) running directly on the metal as a kernel. (https://picolisp.com/wiki/?PilOS)
Oh sorry, I did understand your sandboxing reference. Just meant I wasn't concerned with it when thinking about the memory allocator. Should have said, "I haven't been thinking about sandboxing.."
I'm less concerned about overhead because I'm primarily concerned about tests, which by definition don't run in production.
But I think in the case of memory allocation you can do several levels of sandboxing before you start hitting performance bottlenecks. You'd have no extra indirections when using memory, because its just a pointer and you just have an address. You'd only hit extra levels of indirection when you try to allocate and the allocator is out of memory. Then you may need to request more from your parent, who needs more from its parent, and so on, all the way down to the OS.
"How much do you really need the bootstrappable stack?"
My basic idea is that code is easier to quickly understand if you can run it and see it in operation in a variety of tiny slices. I think it would be easy to quickly modify codebases if you had access to a curriculum of logs of the subsystems you care about, click on any line to jump to the code emitting it, and so on. The curriculum would be created automatically while running tests (because tests are selected manually to capture interesting scenarios).
This idea requires being able to drill down arbitrarily deep into the traces, because we can't anticipate what a reader is trying to change. I may be trying to investigate why a certain sequence of operations causes my laptop to lock up. That may require drilling down inside a save operation to see the data structures inside the OS that perform buffering of disk writes. And so on.
Compilers are part of this infrastructure I want to drill down into. If I want to understand how the if keyword works, it does me no good if it terminates in some opaque binary that wasn't built on my computer. It's also only mildly nicer to find out that some code in this compiler I'm reading requires understanding the whole compiler. Metacircularity is a cute trick, but it's hell on comprehension. Any sort of coiling is bad. What noobs need is to see things laid out linearly.
I've looked at PicoLisp before. I even modeled Wart's memory allocator on PicoLisp. So it's great in many ways. But like all software today it's not really intended for end-users to look at the source code. Its code is intended for insiders who have spent months and years building up an intimate understanding of its architecture. That assumption affects how it's written and managed.
2 points by shader 314 days ago | link
"its just a pointer and you just have an address"
That could be true; I'm not really familiar with CPU facilities for memory isolation, but this is probably one of the most solved of the isolation challenges, since it does require CPU support.
"You'd only hit extra levels of indirection when you try to allocate..."
Good point. I wonder if there's any way to improve that, or if the worst case is rare enough that it's acceptable?
"This idea requires being able to drill down arbitrarily deep into the traces..."
That's a cool idea, and fits very well with the GNU objective of fully open and transparent source code. I'm not sure that bootstrapping is what is required to achieve that goal, however. What you really need is transparent source all the way down, which can be satisfied with self-hosted code, even if it's not bootstrapped. In fact, I'd argue that multiple layers of bootstrapping would make the drill-down process very challenging, because you'd have to cross very sharp API boundaries — not just between functions or libraries, but between languages and runtime environments. Making a single debug tool that handles all of that would be impressive, let alone expecting your users to understand it.
"Metacircularity is a cute trick, but it's hell on comprehension"
Metacircularity applies to interpreters built on interpreters, not compilers. I can agree that it makes things opaque though, because it reuses the existing platform rather than fully implementing it. A self-hosted compiler, even if written in its own language, could be fully comprehensible, however (depending on the quality of the code...). It's just a program that takes syntax and produces binary.
Interestingly, while writing this, I ran across the following paper, which may be of some interest: Avoiding confusion in metacircularity: The meta-helix (Chiba et al.) (https://pdfs.semanticscholar.org/4319/37e467eb9a516628d47888...) I'll read more of it tomorrow, and possibly make a separate post for it.
I do think it would be really cool and possibly also useful if every compiler was self-hosted, and could be drilled into as part of the debugging process. It would mean that you could read the code, since it would be written in the language you are currently using, and the same debugger should be able to handle it.
"But like all software today it's not really intended for end-users to look at the source code"
I haven't actually looked at picolisp's source much myself, but what would it take to satisfy your desires for "end-user" readable code?
Very interesting. I'm going to read that paper as well. And think about what you said about the difference between interpreting and compiling.
> what would it take to satisfy your desires for "end-user" readable code?
See code running. My big rant is that while it's possible to read static code on a screen and imagine it running, it's a very painful process to build up that muscle. And you have to build it from scratch for every new program and problem domain. And even after you build this muscle you screw up every once in a while and fail to imagine some scenario, thereby causing regressions. So to help people understand its inner workings, code should be easy to see running. In increasing order of difficulty:
a) It should be utterly trivial to build from source. Dependencies kill you here. If you try to install library version x and the system has library version y -- boom! If you want to use a library, really the only way to absolutely guarantee it won't cause problems is to bundle it with your program, suitably isolated and namespaced so it doesn't collide with a system installation of the same library.
b) It should be obvious how to run it. Provide example commands.
c) There should be lots and lots of example runs for subsets of the codebase. Automated tests are great for this. My approach to Literate Programming also helps, by making it easy to run subsets of a program without advanced features: http://akkartik.name/post/wart-layers. https://travis-ci.org/akkartik/mu runs not just a single binary, but dozens of binaries, gradually adding features from nothing in a pseudo-autobiographical fashion, recapitulating some approximation of its git history. In this way I guarantee that my readers (both of them) can run any part of the program by building just the parts it needs. That then lets them experiment with it more rigorously without including unnecessary variables and moving parts.
* http://akkartik.name/post/readable-bad
* http://akkartik.name/about
|
cc/2019-30/en_middle_0014.json.gz/line20
|
__label__cc
| 0.68104
| 0.31896
|
Home › Reunions › 1998 – Bend & Redmond, Oregon
WILLIAM CAZIER FAMILY REUNION
Bend and Redmond, Oregon
The family started to gather at Pioneer Park in Bend Oregon at 3:30 PM. The weather was a little on the cool side but good for being outside. The park is on the banks of a river with trees and lots of grass to play on. Turkey was cooked in handmade outdoor cookers. Salads, rolls and dessert were enjoyed by all that attended. About 45 were in attendance at this gathering.
Information for the next day’s activities was given out. Andy Cazier talked about the newsletter and how it is produced and asked if anyone had ideas for improving it, he would like to have some input.
On Saturday some of the families enjoyed some of the local sights, visited the volcanic park, caves and golfed.
The Genealogy meeting was held in the Redmond LDS church. Gail conducted the meeting. Vance Haws gave an invocation. We went around the room introducing ourselves and told whom we were descended from.
Bruce Bingham reported on his contact with Fern Rutledge. She is working hard on her husband’s genealogy and her health is better. Fern was the former family genealogist and did most of the work on the family compiled in the books.
Gail talked about working with and submitting information to the Ancestral File. It can be accessed in the Family History Centers. Note: At this time the Church is running a test web sight that you can access the Ancestral File information. The address is: http://www.familysearch.org/default.asp . If you discover an error in the Ancestral File send it to Gail and he can get it corrected. If we have too many people submitting files with names it has a greater chance of creating errors. Also if you have new names Gail will submit them for you.
The use of the Internet was discussed for doing Genealogy work. http://ancestry.com is a good place to go for researching names. A Cazier web page was discussed and at this time we will use Andy’s page at http://home1.gte.net/caziera until a need to grow beyond this is determined.
Gail obtained a large number of names from the Elizabeth line from Charles and Carrie Davis. We haven’t had a lot of information on this line before. Gail has been communicating with them sharing information.
Gail passed out a chart that showed the link to all the known Caziers. He commented that this might not be accurate any more, as new Caziers are being found that are not linked.
Where do we go from here? The next step should consist of a book being written on each of the children of William Cazier. Names were discussed and possible people that could be the coordinator for the project. Some suggestions were that James be coordinated by Don Cazier, Maranda and Elizabeth by Gail Cazier, David Crocket by Stanford Cazier and Charles Drake by Kem Cazier. Benjamin, Samuel and Rosannah had no recommendations.
Past Presidents Meeting
The Past Presidents meeting was held at the Redmond LDS church. The minutes were read and approved from last year’s meeting. The financial report was given as follows: On May 31st 1997 the accounts contained $2917.61. During the year expenses were $621.73. 286.34 for the Newsletter, and $335.39 for the 1997 Reunion. Deposits were interest of $57.97 and $599.00 for dues. For an ending balance of, $2952.85 on May 31st, 1998. The financial report was approved.
Andy explained the Mailing database and the gradual increase of the numbers of letters mailed. Currently about 575 active addresses are in the database and 100 that are lost and 31 that are deceased.
The family bylaws were reviewed nominations for president and potential reunion locations were discussed. David Cazier for president and Warm River Idaho for next years reunion sight will be nominated by the Past presidents.
Dinner and Program
The Family gathered at 6:00 PM at the Redmond LDS church for dinner and the evening information and entertainment. We dined on Roast Beef and Chicken with all the trimmings. After the meal Andy Cazier reported on the proceedings from last year, financial information reported and attendance taken. Roll call showed the following numbers present from the branches of William Cazier Family: James-0, Maranda-0, John-2, Benjamin-60, Elizabeth-0, Samuel-0, David-0, Charles Drake-2, Rosannah-0 for a total of 64.The turnout was smaller than most years but the fun was as good as always.
Then the business of the night started. It was stated that next years reunion was the 50th annual and would be held at Warm River Idaho, the location of the first one. Nominations were opened for the president of the organization. David Cazier (Gail Caziers son) was nominated and passed. Ivan and Don Cazier were nominated and passed for Vice President. Andy Cazier was nominated for Secretary Treasurer and Gail Cazier for Genealogist. Both passed.
Ed Gunkel was the oldest in attendance. Richard Perdue had the most children in attendance with 14.
The Perdue family sang a song and performed a skit from the production of, “Grease” named “First Day of School”. Shayla Matindal sang, as Terra Brock did cartwheels. A tin man and a crying doll were given out as prizes.
CAZIER REUNION 1999
This has been quite a year for evolving plans. The Church building that had been reserved for the use of the family in Ashton was closed for renovation and the Ashton LDS Stake Center was not available. So the main gathering place has been moved to the St. Anthony Stake Center.
We will gather Friday evening at about 4:00 p.m. at the St. Anthony LDS church building (see the map). The Warm River Park Pavilion was not available for our use on Friday night. A light supper will be available at the church. Additional information will be available for the next day’s activities.
The Warm River Park Pavilion has been reserved for our use on Saturday afternoon. Activities are being planned for the use of the pavilion for this time frame. To get to warm River State Park from St. Anthony travel North on Route 20 to Ashton, and turn right on Route 47, drive about five miles to the park. See the attached map.
Some places to stay
Comfort Inn 1565 W. Main, Rexburg, 83440 Tel: 208-359-1311.
Days Inn 271 S 200 W, Rexburg, 83440 Tel: 208-345-9222.
Super 8 Motel 231 W. Main, Rexburg, 83440 Tel: 208-356-8888
Weston Inn, in St. Anthony Telephone: 208 624-3711
Just a reminder that the “50 Years of Cazier Family Reunions” book will be available for purchase at the reunion. Also a video on the history of St. Anthony will be available for purchase.
If you have any suggestions for the improvement of the Newsletter, we would like your input. Any help at the reunions to record information for entering into the newsletter would also be appreciated. The newsletter will also be placed on my web page at http://home1.gte.net/caziera/ . Also if you have an e-mail address send it to me and I will add you to my Cazier distribution list. Note: registration can be done by e-mail.
On the address label is the last date I have a record of dues contributed from your family. The dues are still only $10 per year and can be sent to the Secretary Treasurer, Andy Cazier.
Registration Directions
In order to know how much food and how many hats to order, the registration information needs to be in by June 1, 1999. In order to simplify the registration this year, all registrations should be sent to me (Andy) at address below.
Contacting the family organization:
Current President David Gail Cazier
6343 Williamsburg Circle
Genealogist Gail A. Cazier
582 Gemini
Rexburg, ID 83440
E-mail gail.cazier@eudoramail.com
Secretary Treasurer Andrew L. Cazier
32241 24th Ave SW
E-mail caziera@gte.net
Telephone: 253 661-7758
|
cc/2019-30/en_middle_0014.json.gz/line52
|
__label__wiki
| 0.543793
| 0.543793
|
Love's Death
Oscar van den Boogaard
Title: Love's Death
Author: Oscar van den Boogaard
Original in: Dutch
Availability: Love's Death - US
Love's Death - UK
Love's Death - Canada
Mort de l'amour - France
Liebestod - Deutschland
Dutch title: Liefdesdood
Translated by Ina Rilke
B+ : stark novella of stark love lost
Neue Zürcher Zeitung C- 23/6/2001 Dorothea Dieckmann
Rev. of Contemp. Fiction A- Fall/2001 Jason D. Fichtel
Die Welt A 14/4/2001 Marita Keilson
"Was eine sehr einfache, sehr tragische Geschichte hätte werden können, wird also in bemühte, zusehends unplausible Konstruktionen, in Abrechnungen, Bilanzen und Parallelitäten gezwängt und in einer faden Schlussszene ganz verschenkt." - Dorothea Dieckmann, Neue Zürcher Zeitung
"Stylistically, Love's Death is astounding. Boogaard deftly stretches out time through acute attention to every detail, mirroring the attempts of the characters to keep ahold of something in the present. The narrative is told almost entirely in the present tense and at times with such sparseness, such directness, that the sense of loss permeating the text is truly experienced by the reader." - Jason D. Fichtel, Review of Contemporary Fiction
"Wie in Julias Herrlichkeit sind in Liebestod die Fäden der Erzählung kunst- und geheimnisvoll verschlungen." - Marita Keilson, Die Welt
Love's Death has four parts. The first centers on the events of a single day in 1973. The second and third take place some seven years later, in the winter of 1980. The final one is set in 1987.
The novel begins with a tragedy: Paul and Oda Klein's eight year old daughter, Vera, drowns in their neighbour's pool. The focus here is mainly on the neighbour, Inez, upon whom the child was foisted in the morning.
All was clearly not right in the Klein household before the death:
Sometimes Inez would find her asleep in their bedroom. The child would sneak into their house to take a nap. As if that were not possible in her own home.
The Klein's also do not seek solace in each other after the tragedy. Instead Paul flees, accepting an army posting in Suriname (formerly Dutch Guiana) and returning home only after seven years. Things don't improve upon his return: Oda puts him in Vera's old room rather than take him back in her bed -- and he is too weak to protest.
A minor tragedy then strikes next door, as their neighbour's house goes up in flames -- but illusory hope is found there as well, as a vision advances out of the burning building, a fifteen year old girl from the States who had been living with Inez and her husband, Hans. The Klein's volunteer to take in the girl. Her name is Daisy, and she is, of course, the same age Vera would have been were she still alive. Daisy does bring the household vaguely together, as both Oda and Paul dote on her, though they are constantly uncertain of how they should and can treat her. Independent-minded Daisy also has ideas of her own, navigating (in wide arcs) the territory between childhood and adulthood.
Another figure is also a presence -- Emil, a general in the army and a friend of Paul. Or rather "a buddy". He comes to the fore late in the novella, clearing up what was actually happening back in 1973.
It is an odd little novella, full of sad love. The loss of the child is, indeed, the death of love -- not merely the parental love for Vera, but considerably more. Not, as it turns out, that there was happiness in the cards had Vera lived. No, things were and are considerably darker than they appear.
Love fails throughout the novel. There is no happy affair here, except, perhaps, between Inez and Hans (though that isn't really clear). There's a fair amount of intimacy, but all the sex is one-off. And much of the intimacy is of a decidedly inappropriate nature.
The girls, Vera and Daisy, flail for love, easily seducing but ultimately no happier for it. The men, Emil and Paul, both hopelessly love Oda, but events make loving her practically an impossibility -- and also push them to find at least moments of happiness elsewhere. Van den Boogaard writes of Paul: "all he wants is to love her, he wants to love her every minute they are together: wholeheartedly, unabashedly, totally." But Oda won't have it, and clearly neither Paul's nor Emil's love for her were meant to be.
Van den Boogaard has written a fairly effective novella. Tragedy and melancholy are quite well done, and the efforts by those involved to fill the void left by the child's death ring fairly true. There are, however, also some decidedly creepy goings-on, especially those involving the two girls. Both Vera and Daisy are almost surreal ingénues and manipulators, and the death of innocence is rather uglier than it first appears.
The characters are odd too, and van den Boogaard's shifting focus does not help paint a clearer picture of them. The largely irrelevant Inez is too much of a focus in the first part, while Emil dominates the last simply so that he can recapitulate and explain the past.
Not one of the characters is entirely likable or sympathetic, except, perhaps (at least for much of the novel), the victim Vera. All are, at the very least, troubled -- often inexplicably so (especially the shadowy Vera). Paul, also, seems entirely too simple: "Order, armor, and routine" dominate the officer's life, and it is something that we are not allowed to penetrate. There is also never a satisfactory explanation of why he and Oda became a couple.
A quite powerful novella, Love's Death unfolds with some interesting twists and turns. It unfolds somewhat clumsily, but the writing is fairly solid. There are several surprises, and some shocking turns. A gripping read, it also leaves quite a sour aftertaste. There is little hope for love here, but unfortunately these characters don't really seem all that deserving of it.
The Capital Times (scroll down for review)
Review of Contemporary Fiction
Die Welt (German)
Oscar van den Boogaard:
Brief biography at Schrijversnet
Oscar van den Boogaard at the susijn agency
See Index of Dutch literature at the complete review
Dutch author Oscar van den Boogaard was born in 1964. He has written numerous novels. He lives in Brussels.
|
cc/2019-30/en_middle_0014.json.gz/line66
|
__label__wiki
| 0.710284
| 0.710284
|
Comparative Video 101
Selected Videos Of And Commentary About Some Classic Folk, Roots, And Americana Songs
¡Víva Las Mujeres Mexicanas! - "La Adelita"
Director Fred Zinneman's 1952 film High Noon is on the short list of the best westerns ever made, and in fact of the best American movies of all time. Beyond the taut drama of a decent man facing almost certain death as the clock ticks relentlessly toward noon, the film was decades ahead of its time in its depiction of good and evil, of racial prejudice, and of thoughtful and mature women. The latter aspect of the film featured the classic cinematic dichotomy between the fair-haired heroine, in this case actress Grace Kelly portraying Amy Fowler Kane, the prim Quaker bride of Gary Cooper's Marshal Will Kane, and the dark and passionate lady Helen Ramírez, played by the superb Mexican actress Katy Jurado. Ramírez owns the local saloon (purchased with money earned in a bordello) and was Kane's lover prior to his marriage.
Both women in the film are frightened by the prospect of Kane's imminent gunfight with four convicts whom he had sent to prison, and wife Amy vows to leave town rather than see her Will shot down. In a last desperate attempt to forestall the duel, Amy visits Helen an hour before the fight to enlist her aid in dissuading Kane from facing his enemies. Jurado's Helen listens in disbelief as Kelly's Amy announces her intention to depart, and then scorches the Quaker woman with her contempt by saying, "What kind of woman are you? How can you leave him like this?...If Kane was my man, I would never leave him like this. I would get a gun. I would fight."
When I first saw the movie on television some years later, that scene burned itself into my memory. I knew that in the Hollywood scheme of things (though clearly not in the subversive Zinneman's view), I was supposed to respond to the delicate, virginal, and ultimately sexless morality and beauty of the Kelly character. But it was Jurado's Helen and her fierce and undying love for the man who had been faithless to her that seized my imagination. "I would get a gun. I would fight" - now THAT was a woman.
And it is just such a woman who has been immortalized in the ever-popular Mexican corrído "La Adelita," a song as widely-known and as frequently sung in México as perhaps "This Land Is Your Land" is in the U.S. The song in its present form dates from the period of the 1910 Mexican Revolution in which Francisco Madero led a democratic rebellion against the dictatorship of Porfirio Díaz (though it may be based on an older tune). The lyrics exist in several significantly differing variants. Some portray Adelita as the beloved of an officer in the revolutionary forces whom he must leave to fight for freedom; in many others, however, she is the very personification of the soldadera, the strong and independent woman who goes to battle herself, both for liberty and for the man she loves. In other words - "I'd get a gun. I'd fight."
Both the authorship of the song and the woman depicted in it are of uncertain origin. Some research seems to suggest that there was a woman from Durango, possibly named Velarde, whose battlefield exploits provided the raw material for the song, but this is speculative and no hard evidence exists. Nonetheless, "Adelita" came to be a term used to describe any of the women who joined the military. One soldadera recalled in a 1979 interview:
The most popular lyric sung today makes only passing reference to Adelita's courage:
En lo alto de la abrupta serranía
acampado se encontraba un regimiento
y una joven que valiente los seguía
locamente enamorada del sargento.
(In the heights of a steep mountainous range
a regiment was encamped
and a young woman bravely follows them
madly in love with the sergeant.)
Popular entre la tropa era Adelita
la mujer que el sargento idolatraba
y además de ser valiente era bonita
que hasta el mismo Coronel la respetaba.
(Popular among the troop was Adelita
the woman that the sergeant idolized
and besides being brave she was pretty
that even the Colonel respected her.)
Y se oía, que decía, aquel que tanto la quería:
Y si Adelita se fuera con otro
la seguiría por tierra y por mar
si por mar en un buque de guerra
si por tierra en un tren militar.
(And it was heard, that he, who loved her so much, said:
If Adelita would leave with another man
I'd follow her by land and sea
if by sea in a war ship
if by land in a military train.)
Y si Adelita quisiera ser mi novia
y si Adelita fuera mi mujer
le compraría un vestido de seda
para llevarla a bailar al cuartel.
(If Adelita would like to be my girlfriend
If Adelita would be my wife
I'd buy her a silk dress
to take her to the barrack's dance.)
One of the earliest recordings of the song is from Trio González, waxed in 1917:
This rendition is in the original, simple, pure mariachi style - accompaniment by strings only, with a simple harmony in thirds around the melody.
A more contemporary mariachi sound, one in a style that you'd be more likely to hear in México today, is by Pepe Aguilar, a great singer in his own right but also son of the legendary Antonio Aguilar:
The trumpet flourish that opens the song is now an almost required element in modern arrangements of corridos, and the lushness of the instrumental accompaniment indicates how sophisticated (or you could say "commercial) traditional music in México has become, as is the case here.
A fine instrumental version here from Stephane Kubiak and orchestra:
Once again, the trumpets open the number, but note both the primacy of the strings (both violins and guitars) and the polka-like tempo throughout.
"Adelita" is one of a handful of genuine Mexican folk songs that has become popular in the U.S., especially in the southwest. Though English-language versions are rare, no less of a major pop vocalist than Nat "King" Cole gave the song a try in Spanish in the late 1950s:
Though Cole is singing only the chorus, he is showing a remarkable respect for and fidelity to the source song, very unusual for a norteamericano at the time.
Cole's version almost undoubtedly inspired the Kingston Trio's loose translation of one version of the lyric where Adelita is the passive lover and not the brave fighter:
This is clearly an anglicized version of the song, but while not copying the Spanish source, it too respects the song's origin in its own way - and it is no further afield from that than many of the KT's and other pop folk groups' renditions of English language traditional songs were.
And Mexican folk has also gone country and electric, as the next two versions demonstrate. First, the Country Roland Band combines "Adelita" with a familiar country tune:
And if you're ready for it - a Mexican punk version:
To such an end folk music seems to be coming worldwide. If you know Oysterband or the Dropkick Murphys or the Pogues or the Killigans, you'll recognize the trend of electrifying and rock-ifying songs that originally were neither.
Yet even in these last versions - which are not to my taste - something of the original spirit of La Adelita survives. I think that my personal favorite of these is the very first one in this collection, for its purity and its proximity in time to the actual inspiration for the song - who in my mind will always look like Katy Jurado: "I would never leave him like this. I would get a gun. I would fight."
Comparative Video 101 is a resource for performance videos of some of the classic popular folk songs of the last several decades with personal commentary on them by Jim Moran, a teacher of literature for nearly forty years and a folk musician and writer for a decade longer. He is also co-host of the "Roots Music And Beyond" radio program on KPFK-FM in Los Angeles.
Some of these posts appeared originally on the Kingston Crossroads message board, and many of the profiled songs were performed by the classic pop folk group the Kingston Trio.
The page will be updated once or more per month.
Your comments are welcome.
Important: Patience, Please
As of this writing in March of 2017, the Blogspot site that hosts CV101 has "deprecated" or made obsolete the old video code that I have been using since 2007 to make videos visible in these articles. That's ironic, since for several years Blogspot was not accepting the newer code that is now required, forcing me into a workaround that is now useless.
The upshot is this. Of the 222 posted articles, more than 200 include multiple YT videos, up to ten but averaging about seven per post - more than 1400 videos in all. The change has left me with the choice of either abandoning this project, which at its inception in 2006 elsewhere was a kind of pioneer in presenting embedded videos with commentary - or going into every single article and changing the code for every single video.
I hope that no one is surprised that I am choosing to do the latter. I do believe that there is some value in this site, and several hundred thousand people over the years have enjoyed it.
However - changing all those codes is going to take some serious time to complete, so I beg your indulgence. If you happen by here and find an article that intrigues you but that is missing all or some of the videos, please drop a short comment at the end of the post and I will get to the restoration as soon as I can.
As always, thanks for your attention to this project of mine.
Use the Google Search Bar above as you would use the Google web search. Enter the name of a song or artist, press "search," and the results will appear showing every mention of your search term in the 150+ articles on this blog. An alphabetical index of song titles is coming soon; until then, the Google Search This Blog will substitute for it.
La Plus Ça Change, Plus C'est La Même Chose - Shel...
For St. Patrick's Day: The Incomparable Clancy Bro...
Derroll Adams, John Stewart, And "Portland Town"
Note #2 On The Posted Articles
Since Blogspot/Google has recently begun including readership statistics as part of its service to bloggers like me, I have become aware that the readership for these pages is far more extensive and international than I had ever dreamed, usually approaching 1,000 visitors per week from literally all around the world. I am profoundly appreciative of the interest in these posts and glad that folk music fans find enjoyment and value in them.
There are currently more than two hundred articles here, and nearly all of the twelve hundred posted videos in those articles are from YouTube. Most readers will already know that because YouTube is another subsidiary of Google, the latter company is being sued for copyright infringement by a significant number of content providers like Sony-BMG and Warner's Music Group. YouTube/Google's normal response to infringement claims is to remove the disputed videos or ban them from certain countries in which the claims have been filed.
This, of course, has a profound effect on the content of posts like the ones in this blog. Videos that I have selected for any given article can be and often have been removed at any time without warning. I try where possible to replace deleted videos with other versions of the same performance or with similar renditions of the songs, though this is not always possible.
Policing the hundred plus posts to be sure that there are interesting and representative video performances is itself a major undertaking, one that involves a significant commitment of time. I hope that those of you good enough to stop by this blog will have a bit of patience. I review as many of the older articles as I can every week with the goal of maintaining the integrity of each, and sometimes this enables me to find newer, better, and more exciting performances of the songs profiled here.
Once again, thanks for the interest!
Kingston Trio Albums On Which The Songs Appeared
3rd Anni (9)
A-B (10)
AboveTheHungryI (2)
AtLarge (10)
BackInTown (6)
BestOf (1)
BobShaneSolo (2)
CloseUp (7)
College Concert (7)
GoinPlaces (8)
HereWeGoAgain (9)
HungryI (8)
KT996 (13)
LastMonth (12)
MakeWay (8)
NewFrontier (9)
NickBobJohn (8)
Other Albums (6)
Other Artists (20)
Other Groups (23)
OUAT (7)
SoldOut (8)
SomethinElse (4)
Something Special (7)
Stay Awhile (3)
StringAlong (8)
Sunny Side (5)
TimeToThink (9)
Unreleased (14)
YrEnd (12)
|
cc/2019-30/en_middle_0014.json.gz/line68
|
__label__wiki
| 0.721207
| 0.721207
|
Russian national carrier Aeroflot has been accused of banning up to 400 female flight attendants from their foreign routes because they are “too old, fat and ugly”.
OJSC Aeroflot – Russian Airlines, commonly known as Aeroflot, is the flag carrier and largest airline of the Russian Federation. Photo Credit: Aeroflot Archives
One attendant Yevgenia Magurina complained: “They told us all that only the young and thin will fly abroad for Aeroflot.”
Another complained at being weighed like cows by the airline which was once the largest in the world.
A group of angry cabin staff has written to Kremlin leader Vladimir Putin to complain about their alleged treatment, supposedly part of a “rebranding” exercise.
Calling themselves STS – the Russian abbreviation for “old, fat, ugly” – they say they are being prevented from flying on international routes, and instead given unfashionable domestic flights.
This means the experienced and loyal crew lose money, and miss out on layovers in exotic foreign destinations.
Magurina told the Russian service of RFE/RL that she had been flying for 15 years and was a senior cabin crew member on international flights.
But in August she was reassigned to internal routes because she was not thin enough under new rules.
“We were all photographed en masse and measured – some were even weighed,” she revealed.
“This was done under the pretext of company rebranding and ordering new uniforms for staff.”
She stated: “My life changed in the middle of August.”
Others had suffered before that, she said.
Some 400 flight attendants have been hit by the new rulings.
“They stopped putting anyone on international flights if they are older than 40 or take more than a (Russian) size 48 (UK – 16),” said Magurina.
Not only is she forced to fly domestic routes to destinations in such places as Siberia, but these are often night flights, or early morning departures, which means she and others cannot sleep properly before going to work.
“When I asked what’s going on, they told me these are the new rules of the game and that I was removed from international flights because of my clothes size – it mustn’t be more than a 46, and I’m a 48,” she said.
Igor Deldyuzhov, the president of a trade union representing flight crew, said there were many complaints of discrimination over age and appearance.
But staff were scared to go to court because they have children and mortgages and fear losing their jobs.
Flight attendants are desperately trying to lose weight in order to keep their international flight work, and the higher salary that goes with it, said Natalia, 42.
“Stewardesses were fainting from hunger at the controller’s office as they tried to meet the new criteria,” she said.
“But even if they managed to lose the weight they were told, ‘You still wouldn’t get to fly to the United States or Dominican Republic because you’re a little old,'”.
She asked: “Do you know how humiliating it is when they weigh you like some kind of cow?”
Aeroflot declined to comment on the claims.
A recent report stated that one per cent of its pilots are women.
Culled from Mirror.co.uk
This entry was posted in Uncategorized and tagged Aeroflot, Airline, Europe, Flight Attendants, Russia. Bookmark the permalink.
← Emirates Appoints New Regional Manager for West Africa
Thanks to makeup games and pafog and free wordpress themes.
|
cc/2019-30/en_middle_0014.json.gz/line83
|
__label__wiki
| 0.546964
| 0.546964
|
Kantar Media
Powering Informed Decisions
Menu UK Home
Is Ephemeral Marketing Set to Disappear?
February 4, 2015 Digital Marketing 0 Written by admin
There’s no denying that 2014 was the year of ephemeral messaging. Snapchat, probably the best known platform of its kind, reached 100 million monthly active users with 700 million snaps being sent every day. These statistics are even more impressive when you consider that, a little over three years ago, Snapchat didn’t even exist! While Snapchat is the most famous ephemeral platform, we’ve seen an abundance of other similar messaging services appear on the scene, including Wickr, Blink and Facebook’s Slingshot – albeit with varying degrees of success.
Given the popularity of the likes of Snapchat, it isn’t surprising that the marketing community began to experiment, distributing their content ephemerally with a view to reaching an ever-growing audience. One of the world’s most recognisable brands, McDonalds, took to the platform in February for the US launch of a new burger, while other brands and publishers, from Audi to Mashable, have also toyed with creating self-destructing content in a bid to extend their communities.
The buzz around these platforms is undeniable, one only needs to search on Google to see hundreds of thousands of results – but as a tool for the communications expert, will ephemeral messaging services go the distance or will they, like the messages they enable, disappear after the first view? Despite the buzz, in reality only 1% of communications professionals currently use ephemeral messaging as a tool to communicate about their brands. Furthermore 85% have no plans to use them in 2015, according to website socialmediaexaminer.com. So why is something that is being discussed at such lengths, not being used to the same extent?
The difficulty with using ephemeral messages for marketing is the exact thing that makes them popular in the first place – messages cannot be tracked. While marketers can see their message has been viewed, they have no real way of knowing within the app if the content resonated with the viewer. If the message is a video, it’s difficult to ascertain if the full duration has been watched and thus, if the entire message has been communicated. As marketers are pushed more and more to demonstrate the return on investment for social media activity, they can’t afford to essentially shout into the abyss with no tested way of demonstrating return. Many will argue that if a campaign appeals to the audience, they’ll save it and share it by posting to other networks. However, this in itself means that an ephemeral campaign may not be deemed as a success until its content becomes permanent – defeating the whole spirit of ephemerality in the first place.
Then there is the reputation of the platforms to deal with. Many associate Snapchat and its cohorts with “sexting” or other risqué behaviours. This instantly raises a barrier for more “family friendly” brands – which cannot risk, or do not want, such close associations with a “sexting app”. Not to mention the privacy concerns. The numerous hacking scandals within Snapchat’s short history are also a deterrent for brands.
That’s not to say that ephemeral communication is going away. The phenomenon has undeniably changed the way we think about communicating and with platforms like Wickr – an encrypted, ephemeral messaging service, gaining popularity among the business community, the evolution of ephemeral media looks set to continue. However, whether there is a future for ephemeral platforms as marketing aids remains to be seen and by 2016, for the marketers at least, it could be a case of ephemeral by name, ephemeral by nature.
How much is 8 + 3 = The answer is wrong. Please try again.
Please type the words correctly and try again!
KMNI Trends
Media Monitoring & Analysis
20 PR RESOLUTIONS WORTH KEEPING: PICK YOUR FAVORITE!
Mindset Shifts for Media Monitoring
MEDIA MONITORING: THE 5 NEW MISSIONS OF COMMUNICATIONS PROS
10 ways to benefit from Social Media Command Centres
THE NEW AGE OF SOCIAL MEDIA COMMAND CENTRE
6 Social Media Trends in China
#BeActive on social media
The science behind crafting contagious content
Are your Numbers Lying? The Truth behind Social Engagement
5 new rules of PR Crisis Management
davidbarrowcliff
etrim
gbertrand
gilesvenn
gvenn
hskilton
jburke
mdolle
mtournery
nsellam
susannedall
wpatanella
We're media people who love to monitor and measure. We track your media presence and offer you insight so you can confidently manage your communication strategies.
Kantar Media Global House of Expertise
© 2019 Copyright by Kantar Media.
|
cc/2019-30/en_middle_0014.json.gz/line86
|
__label__wiki
| 0.81835
| 0.81835
|
Devin Taetsch Sets Sights On Four-Digit Horsepower With Stock-Displacement LS3
December 19, 2018 / by Bradley Iger
Devin Taetsch is a 5th-gen Camaro fan and his example of the breed is headed for big power, quick. Follow along and find out what he has planned.
“When the fifth generation Camaro was announced, it was immediately my dream car,” explains Devin Taetsch, an A/V specialist from Orange County, California. “My father had gotten me into muscle cars at an early age – he had a ’68 Chevelle– and seeing him wrench on it really sparked my interest in performance.”
Taetsch’s Camaro rides on powdercoated ZL1 wheels and gets its low and mean stance from a BMR Suspension setup that drops the car 1.25 inches up front and one inch in the rear. Sway bars, trailing arms, toe links, front end links, and an assortment of bushing upgrades are part of the package as well, so it’s safe to assume this car will be buttoned down during the half-mile sprints he has planned for it in 2019.
Devin got his start in modern muscle car tuning with a Dodge Charger SRT8, adding the requisite bolt-ons like longtube headers and a cat-back exhaust, but the siren song of GM performance would eventually bring his attention back to the bowtie family. “My father and uncle always had a passion for Chevys, and I felt like I would be continuing that legacy with the Camaro,” he says. “It also didn’t hurt that the car was great to look at and turned a lot of heads.”
Taetsch took delivery of his 2011 Camaro 2SS RS in the small town of Peachtree City, Georgia, where he lived at the time. But shortly thereafter he switched coasts and relocated to Southern California, the birthplace of hot rodding.
“When I moved out here, I quickly realized that there was much larger car culture community, and I was able connect with more people who shared my interests,” he says. “That’s when I became friends with the former head of Magnuson Superchargers. He told me they were developing a new supercharger, and my car became kind of the test bed for that new system.”
To reach Taetsch’s goal of having the most powerful stock displacement Heartbeat Supercharger-supported LS3, builder James Mullenix at Mullenix Racing Engines in Simi Valley, California, will be adding AFR Mongoose 260cc cylinder heads to the mix, along with a host of valvetrain and fuel system upgrades.
Today Taetsch’s Camaro makes just over 700 horsepower at the wheels thanks to that TVS2300 blower running at about nine pounds of boost, along with a Brian Tooley Stage 4 PD camshaft, a Nick Williams throttle body, and a handful of other bolt-ons. While that’s probably more than enough grunt for most folks, Taetsch says he’s just getting started. “Our goal is to see 900 to a thousand horsepower at the wheels,” he tells us. “And we want to get there with stock displacement.”
To accomplish that goal – which would potentially make Taetsch’s LS3-powered Camaro the most powerful stock cubic-inch LS3 and Heartbeat blower combination built to date – Devin has put together a rotating assembly combination that consists of a forged crankshaft, forged H-Beam connecting rods, and Wiseco -3.2cc flat-top pistons. “Since we’re staying with the stock bore and stock displacement, Wiseco pistons were perfect for the application and the compression that we wanted, so it was a no-brainer for us,” said Taetsch.
Devin says that Wiseco’s -3.2cc flat-top pistons fit the requirements of the project perfectly, providing the strength he’ll need for the big power he has planned while also allowing him to maintain the stock bore and displacement.
He says the goal is to have the motor back together by the end of 2018 and then head to the races. “Along with hitting all the big car meets in Southern California and the next SEMA show, the car is going to be entered in a number of half-mile racing events. We expecting to see 180, maybe even 190 mph when we go through the traps.”
Topics: FEATURES, CHEVY, featured
Inside Cameron McAdoo's GEICO Honda CRF250R
Golden Gorilla: Under the Hood of Mills Racing’s Legacy 1968 Camaro
Written by Bradley Iger
|
cc/2019-30/en_middle_0014.json.gz/line87
|
__label__cc
| 0.682654
| 0.317346
|
Double Crossword
By admin | June 5, 2016
We shoot the highest quality High Definition content available today. Our videos stream instantly and we also give you the ability to jump right to your favorite part of the video. Each video is created with you in mind. Our videos focus on the personality of each model. We make sure to shoot all the parts you like most by listening to your comments and requests. We know you will be extremely satisfied while watching your favorite models do what they do best. Each Video is available in the following formats, MP4 at x , MP4 at x , Mobile at x and we offer a MP4 x for slow bandwidth users. Read More Test About Our Photos The main goal with our photos is to present your favorite stars in the light you see them in.
How a Workout Buddy Can Improve Your Fitness Success
The popularity and advantages of dating on the web today can hardly be overestimated. Hundreds of single men and women prefer to surf the web looking for a mate, and with such a number of people willing to find love and affection online, you have every reason to look for a like-minded guy or girl living within walking distance of you. So, take advantage now, sign up and start your unforgettable dating adventure!
It can of course be great to browse other people as soon as you create your dating profile and imagine a romance developing in your head. But why make plans that go nowhere when you can start a new dating episode with someone who happens to live in your location?
Musician Jacoby Jennings doesn’t like online dating sites. Yet he found love over the internet anyway — through the music-streaming service Spotify.
I live by myself on one floor of the farmhouse where my family has lived since the Civil War. After my grandfather died, my grandmother Kate lived here alone. Her three daughters visited her. In , Kate died at ninety-seven, and I took over. Forty-odd years later, I spend my days alone in one of two chairs. From an overstuffed blue chair in my living room I look out the window at the unpainted old barn, golden and empty of its cows and of Riley the horse.
I look at a tulip; I look at snow. I also watch television news, often without listening, and lie back in the enormous comfort of solitude. People want to come visit, but mostly I refuse them, preserving my continuous silence.
Slideshow: Matching Federal Bowfront Servers
Polish-born Curie, who undertook pioneering research into radioactivity in the early 20th century, was voted number one, followed by Rosa Parks, Emmeline Pankhurst, Ada Lovelace and Rosalind Franklin. She remains the only person to hold Nobel prizes in two sciences. In France she was regarded with suspicion as a foreigner — and of course, wherever she went, she was discriminated against as a woman.
Parks, who helped bring about so much human rights change by refusing to give up her seat on a bus in her hometown of Montgomery, Alabama, in the US, was voted number two.
According to the stunning septuagenarian, a previous dating incident with a man in his 30s convinced her she needed an age cap. Still, as Stewart told Williams, the experience was plenty fun.
We are of the view that these types of arrangements are at the core of what the common employer provisions in the Code were meant to address and prevent. Bill passed in ; almost every industrial construction company in Alberta has at least two and sometimes three related arms. This can cause a union and their members to feel squeezed by the non-union and the union arms of these companies. Which are often all competing for work on the same projects and are invariably controlled, at least at a high level by the same parent company.
These arrangements have allowed companies to cynically take advantage of the stability and benefits of unionized work forces when it suites them. To avoid these supposedly exclusive bargaining relationships, the bargaining rights of the union and its members, as well as those of other legitimate trade unions, have been diluted and diminished through this corporate shell game. Double-Breasting is a practice that enables unionized employers to escape the obligations of their collective bargaining agreements and to operate non-union wherever possible.
Double-breasting undermines collective bargaining and represents a significant public problem that could be effectively resolved with thoughtful legislation. In order to give meaningful effect to these provisions, we propose the government amend, and remove all provisions related to spin-off companies in the Alberta Labour Code.
Holly Otterbein
The Australian dollar has risen to be close to US80c. Virginia Star Snare the same amount again The average Aussie can treat the typical refund as a free kick to chunk off a fair amount of the mean credit card debt, which moneysmart. At an average mozo-calculated interest rate of
Jul 16, · If it’s your smartphone you can’t find, then double tap your Tile Pro to activate your device’s ringtone, even if the phone is on silent mode.
Now that LeBron James’ signing with the Los Angeles Lakers has been made official , he has four years of Hollywood to keep him occupied when he’s off the court. Already starring in a few films over his career, he’s in the right spot now to potentially work the much-anticipated Space Jam 2. However, as his decision has been made and publicized, where on Earth is the Space Jam 2 trailer that we were promised?
We’ve waited forever to hear any news about the sequel to Michael Jordan’s classic film and now that Bron is in L. Of course, what would his inaugural appearance as a Laker be without a Kardashian co-sign? Making his way to dinner last night with his wife, Savannah, the couple double dated with LBJ’s former teammate Tristan Thompson and his girlfriend, Khloe Kardashian. They may not be teaming together on the court anymore but Bron seems to be tight with Tristan despite their apparent struggles to coexist at times.
Tristan and Khloe have had their fair share of drama over the last few months but it seems the birth of their daughter brought them as close as they’ve been in a while. The couple was cuddling up to each other on their way to the restaurant last night before linking up with Bron. Check out photos of their date here.
Village inn has a double celebration
All with the same claim; that they were the “greatest” pick-up guide available to man. But obviously they can’t ALL be the best So where on earth do you begin?? I mean we both know you know you want to improve your success with women. You want to be able to walk up to any girl and start an interesting conversation with her, then know exactly how to lead things all the way back to your bedroom.
Welcome to Aziani! Aziani was created by Rachel & Buzz Aziani in , we thought it was time to give the discriminating adult star fan what they have been looking for. Since the conception of Aziani we have always kept our commitment to quality, personality and member interaction.
For many of us, the answer is an emphatic: Earlier this year, fellow PT Blogger Michael Mills conducted a study that suggested “most women do not to ask anyone out on a first date. They have to wait for the boy to call. Angry criticism and diatribes directed against Bachmann’s outdated sexist ideals flooded the Internet.
Evolved commenters on Jezebel. How do men feel about being asked out? Well, dating expert Evan Marc Katz , who on his website pegs himself as a “personal trainer for women who want to fall in love ,” disagrees with women taking charge in procuring dates. To the question, “Should women ask men out on dates? He warned that women could come across as “aggressive, desperate, and masculine. Like Lawrence O’Donnell, does Katz get the last word?
Breaking News Stories from US and Around the World
Get Daily updates directly to your inbox Subscribe Thank you for subscribingSee our privacy notice Could not subscribe, try again laterInvalid Email A welder was staggered to return from holiday to find his car had been moved onto double yellow lines that were painted while he was away – and then given four parking tickets. Martin Dodridge left his Reliant Robin parked safely in the road near his home in Brown’s Hill in Penryn when he left for a two-week break in South Africa.
But his rest and relaxation were soon interrupted by friends informing him that his car had been moved, apparently by workers for Cornwall Council contractor Cormac. However this still did not prepare him for the shock of what he foundon his return on Wednesday September Read More Man says he was ‘told to leave’ park and ride bus because he had a coffee It would appear that the roads workers were painting new double yellow lines and his car, which had all of his contact details emblazoned on the side, was in their way.
Not to be deterred from getting the job done, they somehow shifted his little three-wheeled vehicle down the road to where they had already put lines down.
Operating your archive; Dating Latin documents How to decline personal names Problems with Latin and the documents Bibliography Send me The National Archives’ newsletter. A monthly round-up of news, blogs, offers and events. Send me The National Archives’ newsletter. About our privacy policy.
Submit Tips For Editing We welcome suggested improvements to any of our articles. You can make it easier for us to review and, hopefully, publish your contribution by keeping a few points in mind. You may find it helpful to search within the site to see how similar or related subjects are covered. Any text you add should be original, not copied from other sources. At the bottom of the article, feel free to list any sources that support your changes, so that we can fully understand their context.
Internet URLs are the best. Your contribution may be further edited by our staff, and its publication is subject to our final approval. Unfortunately, our editorial approach may not be able to accommodate all contributions. Submit Thank You for Your Contribution! Our editors will review what you’ve submitted, and if it meets our criteria, we’ll add it to the article. Please note that our editors may make some formatting changes or correct spelling or grammatical errors, and may also contact you if any clarifications are needed.
Uh Oh There was a problem with your submission.
The Two Biggest Enemies of Attraction
Onkyo TXSR A/V Receivers user reviews : out of 5
Ashley Olsen Reportedly Dating Older Man Too
21 Best Tips On Making A Long Distance Relationship Work
Google Chromecast review (): Not much new, but still worth $35
taiwan 21 years old Internet dating No.1
Lass Deine sexuellen Fantasien wahr werden
Marriage Not Dating Ep 13 EngSub () Korean Drama
Svenska日本語EspañolNorskDanskNederlandsPolski中文(简体)EnglishMagyarالعربيةDeutschSuomiΕλληνικάItalianoEesti keelTürkçeČeštinaPortuguêsLëtzebuergeschFrançais
|
cc/2019-30/en_middle_0014.json.gz/line91
|
__label__cc
| 0.595947
| 0.404053
|
Temporary Post: More garage wall for Grace
Per a special request, here's some more nonsense from the garage wall. Part I, Part II. Warning: these are going to get awfully obscure at times.
Totoro, Kiki, Sheeta, and a bit of Johnny Chan's crazy shirt.
This is from Miyazaki's music video he did for Chage & Aska ("On Your Mark"). The singers have been replaced by He-Man villains.
This is kind of sick, but as the title implies, "Old Boy" performed by Itchy & Scratchy.
A lot here. Some of the Transformers, the two guys are a Mr. Show sketch (Three Times One Minus One), Troy McClure on top of a Cerberus (from DMC3), a soldier from JSA, Madman Comics, and the wings of Yubird.
OK, my roommate did everything here but the Care Bear. I have no idea who those top three people are, but there's Saddam Hussein golfing with Destro, who has been impaled by He-Man's sword. The care bear (not quite finished) is fighting alongside Abe Lincoln, while an archer (a William Tell mixed with Robin Hood, perhaps) is fending off a zombie with an apple for a head.
Calcifer, eating some wood (Japanese voice, not Billy Crystal).
My roommate's Katarmari picture, complete with Arabian flying carpet scene.
These last two photos are for Vinny, to better tell the tale of one of my birthday parties that starred a six-foot burrito:
Wow. That brings back some foggy memories.
Tags: Cartoons
Coyotes score last minute 3-2 win over San Jose
The Phoenix Coyotes ran up a 2-0 lead over the Sharks on Thursday night on the strength of 2 power play goals by Oleg Saprykin and Shane Doan. San Jose tightened up defensively after the poor start and worked its way back into the game.
It looked like both teams were playing out the string for overtime in the third period until Yanic Perreault scored the game winning goal with under a minute remaining. The former faceoff specialist picked up his 11th goal of the season to lead all Coyotes in scoring.
Trade rumors are swirling around Phoenix, spurred in part by this article in the Arizona Republic. David Vest reports that Mike Comrie, Shane Doan, and Ladislav Nagy could be available for the right offer. The return of defenseman Ed Jovanovski and Nick Boynton from injury will add more rumors to the mix.
The photo above is of Curtis Joseph making a painful off the mask save. A recap and photo gallery from the Sharks-Coyotes game is available here.
Posted by PJ Swenson at 9:25 PM 1 comments
Tags: Phoenix Coyotes, Photos, San Jose Sharks
Ducks Gameday—Carolina Candy Canes
Anaheim Ducks (28-5-6, 1st in west) at Carolina Hurricanes (20-15-4, 4th in east)
There’s plenty of storylines for tonight’s game:
the top team from this regular season vs. the defending Cup champs
injuries preventing an all-Conn-Smythe goaltender matchup (the Ducks’ Wall-McKee tandem has a combined 2 games of NHL experience)
The Ducks' first game this year without Francois Beauchemin (lacerated spleen)
ridiculous travel (Carolina played last night in Buffalo, while Anaheim somehow got Raleigh thrown in between stops in San Jose and St. Paul)
Rod Brind’Amour night in Raleigh commemorating his 1,000th NHL point
But I’m not even sure if tonight is a story about the Ducks as a squad, so much as it is a story about one particular Duck with understandably bitter memories of his last game played in Raleigh.
Look out, ‘Canes. It’s payback night.
Prediction: Ducks 4, Hurricanes 2. Goals by Pronger, Kunitz, Pahlsson, and Getzlaf.
p.s. Congrats to BoC all-star Mike Chen for his new work on FoxSports.
Tags: Anaheim Ducks, Carolina Hurricanes, Chris Pronger, Game Day
Paging Dr. Duck
Well, not that this team deserves any sympathy, but Ducks are dropping like Kings lately. The injury list since Christmas reads like a list of gifts to the hockey gods:
J.S. GiGOLD—groin strain, day-to-day
FRANKINCENSE Beauchemin—a Forsbergian spleen rupture, out indefinitely
Todd MYRRHchant—abdominal strain, day-to-day
Not to mention that Ilya Bryzgalov has been out for a while with his own groin pull, and Sean O’Donnell should be returning tomorrow from his own lacerated foot issue.
Replacing Marchant shouldn’t be an issue, as Travis Green has been sitting around in the pressbox most of this year waiting for such an opportunity, but plugging the blueline and netminding holes will be a lot more interesting.
In the nets, we should be seeing a lot more of Michael Wall, yet another undrafted fellow set to prove that even a poor netminder can win behind a Norris-laden blueline. He is 2-0 this season, but a lot of his success can be credited to the fact that the Ducks are limiting opponents to less than 19 shots-per-game in front of him. In the 84 minutes that Wall has played this season, Anaheim skaters have blocked 23 shots, which matches the number of saves that Wall himself has blocked. That’s the kind of defense that turns a CuJo-like .885 sv% into a Brodeur-like 2.15 GAA.
As for the blueline, losing Beauchemin will be a challenge also, as he sits third on the Ducks in overall icetime and first overall in even-strength icetime. I would guess this means that Shane O’Brien gets to try out for a more prominent role and AHL-callup Kent Huskins gets to eat up the leftover minutes.
[EDIT: I'm not sure how related this is, but the Ducks and Blackhawks made a minor-league deal today. To Chicago: F Pierre Parenteau and D Bruno St. Jacques. To Anaheim: G Sebastien Caron, F Matt Keith, and F Chris Durno.]
I wonder how much Dr. Duck is planning on increasing the Niedermayer and Pronger dosage?
Tags: Anaheim Ducks, Injuries, J.S. Giguere
Merry Fist-mas day +1. Fight clip courtesey of Hockeyfights.com. Rumors that Earl Sleek was going to be an emergency replacement to backup Michael Wall were unfounded.
Maybe the Kings can loan Anaheim a goaltender.
Posted by PJ Swenson at 9:23 AM 4 comments
Tags: Anaheim Ducks, Fighting, Mark Bell, San Jose Sharks, Shawn Thornton, YouTube
Merry Fist-mas!
Merry Fist-mas to all, and to all a good fight!
Tags: Anaheim Ducks, Corey Perry, Fighting, George Parros, Sean O'Donnell, Shane O'Brien, Shawn Thornton, Travis Moen
Ducks Gameday—Another 16-game point streak?
Anaheim Ducks (27-4-6, 1st in west) at Phoenix Coyotes (12-20-1, 14th in west)
What were you doing on the evening of October 12, 2003? Have trouble remembering?
Same with me, I have trouble remembering the last time the Ducks played the Coyotes and walked away with 0 points. Since then, Anaheim has gone 13-0-3 against its division buddies, another 16-game point streak to put on the line tonight.
Since former Winnipeg Jet Randy Carlyle has taken the coaching reins, the Ducks are 10-0-1 against Phoenix, outscoring them 46-23. Another former Jet Teemu Selanne has 9 goals and 13 assists in those 11 games.
No wonder Coach Gretzky is getting into fits, or why PB is less-than-enthusiastic in OFP’s game preview.
Still, you have to think that at some point, this “automatic points” thinking is going to bite us in the ass. Sometime in the new year, that is.
Right now, it is too one-sided. The Ducks currently have 2.4 times as many standings points as Phoenix, and Phoenix is the only team with more power play goals allowed (46) than Anaheim’s league-leading 44 power play goals scored.
At this point, the Coyotes need the benefit of some easier opposition, like they had at this preseason scrimmage:
Prediction: Ducks 5, Coyotes 3. Goals by Pahlsson, Marchant, McDonald, and 2 for Selanne.
(Side note: I don’t know what the injury status is for Ilya Bryzgalov, but if he were handy, I’d go ahead and throw him in for this game. Breezy has a career 6-0 record against the ‘Yotes, with a sparkling 1.67 GAA and a .932 sv%.)
Tags: Anaheim Ducks, Game Day, Phoenix Coyotes
Ducks-Stars: Tales from the Penalty Box
Well, as I mentioned in the GDP, I somehow snagged the Row B tickets to the Dallas game on Wednesday, and it was a blast. Now normally I bring my pal Damndaze along, (even though he’s a Red Wings fan) because he loves taking pictures from up close. However, Damndaze was out of town on business, and I had to take my own damn photos.
Now, I’m not real dedicated to photography or anything, especially when I’ve had some beers. Damndaze goes to a game and takes like 300 photos (a lot of them garbage-smudge, though); at the end of this game I think I had taken 16 shots (a couple of them garbage-smudge also). Most of the time the camera stays inaccessibly in my pocket, so I can safely drink my beer and still bang the glass if necessary.
Nevertheless, I did get some shots of some penalized Ducks. (Side gripe: this is my fourth game of five this season/preseason, and Chris Pronger refuses to take any damn penalties.)
OK, easily the best part of this game was the 90-second beating of metapest Matthew Barnaby, courtesy of the wicked fists of Shawn Thornton. It was a drawn-out yet one-sided affair that deep-down felt really good; it’s nice every once in a while when a big yapper-pest gets the beatdown he’s had coming to him for the better part of his career. I mean, it wasn’t knock-you-out decisive, but still Thornton pretty much made him his Barnabitch. And I tell ya, the Honda Center crowd was pretty damn pleased.
Once in the box, Thornton proceeded to reassemble his playing gear while still talking it up with the persistent (I’ll give him that) Barnaby. It was pretty amusing for all of us to watch. Anyway, awesome work, Shawn.
The next two penalties were both taken by Teemu Selanne, who suspiciously enough had been quoted that morning in the OC Register, saying: “I don’t want Lady Byng. Burkie would probably trade me if I won Lady Byng.”
Any way, Teemu showed up both times pleading his innocence, and I managed only one good shot out of both visits. I yelled "Go get 'em, Teemu!" in the closing seconds of each penalty, with the exuberance only a beer-drinker can muster.
In the third period, I got another rare visitor, Cap’n Niedermayer, for another minor. I tell ya, I was really struck by the intensity sitting next to that guy. I know that’s an overused word, but Scott intensely watched the Ducks kill his penalty. It was like he was memorizing it or something, kinda kreepy, actually.
Later in the third period, both Shawn Thornton and Shane O’Brien took coincidental minors for double-roughing Barnaby (again), and Shawn spent the entire time re-enacting the earlier bout for Shane’s amusement, giving him a blow-by-blow account. It was pretty cool to watch, those guys were having a good time that night.
In this shot, he is showing O’B how to move his hands faster than a digital camera’s default shutter speed in the hands of a drunken techno-idiot. You know, the kind of idiot who can't even frame well enough to get even one guy's face in the damn shot.
Oh yeah, and outside the penalty box, Ducks won the game as well. Goals by Capt. Niedermayer, Pronger, and two by Corey Perry--on a night when Moustache was scratched, of course.
27-4-6 means 60 points (!) for the Ducks, with still two more shopping days until Christmas. One year ago today, Anaheim had 38 points, while Ottawa and Detroit led the league with 51 points.
What’s the phrase I’m looking for? Oh yeah, Holy Christ Shit Moly Smokes! Sure there's bound to be downturns at some time, but for now the outlook is cautiously awesome.
Hope you like the photos, and have a good holiday weekend, readers-who-only-read-blogs-when-they’re-at-the-office!
Tags: Anaheim Ducks, Dallas Stars, Photos, Row B, Scott Niedermayer, Shane O'Brien, Shawn Thornton, Teemu Selanne
More Brilliance from Bryzgalov
The Ducks’ best interview does his best to stand up for Pronger’s leaving Edmonton, but in the end, he probably does more harm than good.
The crazy Russian has been nursing an injury lately—any ideas how can we get him to rehabilitate in the announcer’s booth for the next several games?
Tags: Anaheim Ducks, Chris Pronger, Goaltending, Ilya Bryzgalov, YouTube
Ducks Gameday—Star Wars Episode II
Dallas Stars (21-12-0, t-4th in west) at Anaheim Ducks (26-4-6, 1st in west)
You know, as much as I’m about to throw numbers around about this game, the more important issue is that Sleek's going to be at HC tonight to watch Episode II of this Pacific battle. I'll be in my YouTube seats even, right next to the Ducks penalty box. This was a bit of a surprise, as it was not in my original game set, but I guess Christmas started a bit early this year.
Ho, ho, ho.
Only four teams in the league have more wins than the Stars, but two of the four are division rivals Anaheim and San Jose—the Stars currently sit 6 points back of the Sharks and 16 points back of the Ducks. But are the Stars just fooling us with their early-season record? I found this split to be interesting:
The Stars are 9-0 against the Kings and Coyotes this year, outscoring them 31-13.
Against everyone else, they are a more modest 12-12, getting outscored 55-61.
We’ll see how these top 3 Pacific teams really compare soon, as there are a lot of points yet to be disputed (6 remaining SJ-ANA games, 6 remaining SJ-DAL games, and 7 remaining ANA-DAL games).
Dallas did take the first game in Anaheim by (surprise, surprise) virtue of a shootout win, although the Ducks are still the only team in the league to have ever bested the 15-1 Stars in a shootout (how’s this for irony: the first two shooters were Rob Niedermayer and Jonathan Hedstrom, and we didn’t need a third shooter).
And for fun, here’s two bonus “Ducks Hype” notes from the 2003 playoff matchup (1st seeded DAL vs. 7th seeded ANA), back when Anaheim was constantly magical:
Clutch Ducks get it done late: In all six games of that 2nd-round series, the Stars were either tied or ahead with 90 seconds left in regulation. In all four Anaheim wins, the Ducks scored the game-winner on their final shot of the game!
Jiggy sets record in fifth career playoff game: J.S. Giguere became the first goaltender in NHL history to have two 60-save performances in one playoff year (G1 3-OT at Detroit and G1 5-OT at Dallas). For reference, Patrick Roy was the only goaltender who had two 60-save playoff performances in his career!
Heh, good times.
Prediction: Ducks 5, Stars 2. Goals by Moen, Pahlsson, Kunitz, Getzlaf, and Beauchemin.
Tags: Anaheim Ducks, Dallas Stars, Game Day
Ducks to make a non-Disney movie
At 26-4-6, when will this monster Duck stop growing? Go to theaters and find out!
(source material: Portraits of the Northwest Division)
Tags: Anaheim Ducks, Cartoons
Ducks Flameday—Calgary brings its road woes
Calgary Flames (16-11-3, t-7th in west) at Anaheim Ducks (25-4-6, 1st in west)
Thanks for the graphic, Grabia.
Sorry this one will have to be short; not only is this game snuggled between two very high profile Pacific matchups (last Saturday’s ANA-SJS game and this Wednesday’s DAL-ANA game—I just found out that I am attending the Dallas game, btw), but I was also away from the computer all weekend. So for a better-thought-out preview probably check out Matt at BoA, Five Hole Fanatics, Double D(ion), or Real Deal Hockey.
Ducks return from an almost-perfect 5-game road trip for a battle between the top two scorers in the western conference:
Teemu Selanne, 35 GP, 19-24-43, +17
Jarome Iginla, 30 GP, 20-21-41, +12
This is a Flames team that has both gone 10-0-0 in its last 10 home games (3.70 GF, 1.10 GA), including a 3-0 shutout over visiting Anaheim, and 1-4-1 in its last 6 road games (2.33 GF, 3.00 GA), including a 5-3 loss in Anaheim to bench-door operator Michael Wall. Interestingly enough, the Ducks have yet to score a goal against Miikka Kiprusoff this season, and the Flames have yet to score a goal against J.S. Giguere this season.
Overall, the Flames are an .800 team at home (12-3-0) and a .367 team on the road (4-8-3). Only the Minnesota Wild are more home-schizophrenic (.781 at home, .281 on the road). Let’s hope the Flame-pattern holds true tonight.
Prediction: Ducks 4, Flames 3. Flames try to hold a lead, but the Ducks storm back in games six and seven. Goals by Pahlsson, O’Donnell, SNiedermayer, and Selanne, who non-coincidentally scored the four game-winners in last spring’s series.
Tags: Anaheim Ducks, Calgary Flames, Game Day
Sharks/Ducks...the aftermath
Jesus, everyone take a breather after that game. Seriously, that had it all -- including especially mega-angry psycho woman fan behind me who seemed to think that curse words were normal for play-by-play commentary. She's also one of those blindly homer-ish fans, so even when the refs make a call against the Sharks that is a good call (like the idiotic too many men call), she screams bloody murder and everyone in my section looks at her and mutters under their breath.
Yes, and she's there all season. Woo hoo.
Anyways, this game really lived up to the hype. Two fantastic teams going toe to toe, a soft goal by each, power play tallies, and talent really shining through. Some key things to note:
Evgeni Nabokov really hadn't let up many soft goals this season so I was pretty surprised at the stinker that went in. Still, he saved the Sharks' bacon many, many times, so no complaints here about Nabby's performance.
Obviously, I don't watch nearly as many Ducks games as I watch Sharks games, but J.S. Giguere looked pretty uncomfortable any time one of the Sharks planted himself in front of the crease.
Patrick Marleau's one of the few players who can actually skate fast enough to catch up to Scott Niedermayer and stick check the puck away.
The Anaheim power play is ridiculously patient with Pronger and Niedermayer and it's really just not fair. I met two of my buddies at intermission; though first thing both of them said to me separately was lamenting about the unfairness of the Anaheim D.
The instant I turned to my dad and said, "Why is Mark Smith on the power play?" freakin' Smitty scores. That's why Ron Wilson's coaching and I'm not.
Mark Bell is shaking off the jersey curse. Sure, he's not putting up the points, but he's working hard, hitting hard, and his fight was the turning point of the game. Now if only he wouldn't look so damn tentative with the puck.
When did Andy MacDonald get so freakin' chippy?
When did Teemu Selanne grow the balls to start jawing at Joe Thornton? Teemu's a lover, not a fighter!
Watching the Anaheim D and the Sharks D was night and day. Sure, Matt Carle and Christian Ehrhoff show flashes of brilliance, but there's no comparison. Someone needs to replace Josh Gorges and soon. And Scott Hannan, you're on my shit list for all of your bad turnovers this season.
Spotted: one "Vote for Rory" t-shirt...on a pretty hot babe to boot!
Spotted: one freakishly creepy guy in a dirty stained Santa costume.
The Sharks fans were cheering outside the tank like they had just won a playoff series. Everyone relax; it's a regular season game...in December.
We've got six more games to go and I hope they're all entertaining like this one and not craptacular like the first game (Ducks fans enjoyed the victory, but that was some ugly hockey...at least this one was spirited).
Posted by Mike Chen at 12:00 AM 6 comments
Tags: Anaheim Ducks, Evgeni Nabokov, J.S. Giguere, Photos, San Jose Sharks
BoC Gameday—Parallel paths collide tonight
Anaheim Ducks (25-3-6, 1st in west) at San Jose Sharks (23-10-0, 2nd in west)
Sorry, this preview’s gotta be rushed. Instead of watching the #1 and #2 western teams duke it out tonight, I am going to be performing in a Christmas concert that starts right at game time, so my viewing will be courtesy of late night Tivo. Any way, this blog was started during last year’s playoffs, and one of my first posts took a look at the similar self-improvement patterns that the Ducks and Sharks used to leapfrog into the playoffs. If you recall last year,
Anaheim had an 8-game stretch without a win November 3-20.
San Jose had a 10-game stretch without a win November 5-30.
In fact, one year ago today, both teams sat in the 10th and 11th spots in the west, but had already begun transforming themselves from also-rans to the world-beaters we enjoy today. The chart below shows the parallel paths each team has taken in accumulating standings points since the lockout.
The Ducks are in red, the Sharks are in blue, and I have included a dashed line that is a straight-line approximation of an 8th-seeded team (95 points) for reference. Note that before this month, the furthest the Ducks and Sharks have been separated in the standings has been 7 points.
And, just for measure, here are the last 82 regular-season games for each franchise. Even these records are within 7 points of each other:
ANA: 53-17-12, 118 points, .720 win%, 277 GF, 207 GA, PP 21.2% (96/452), PK 84.9% (69/456)
SJS: 52-23-7, 111 points, .677 win%, 264 GF, 203 GA, PP 21.0% (99/471), PK 82.5% (66/378)
And once again tonight, these parallel teams shall battle again.
Prediction: Ducks 5, Sharks 4. Parallel patterns persist, but the better Thornton pots the winner.
Tags: Anaheim Ducks, Analysis, Game Day, San Jose Sharks
Anze Kopitar to San Jose Sharks, Fear me
Kopitar good.
Brust poke check, sit down Shark man.
The Kings dismantled the Sharks in their own house 4-2 Thursday night, with rookie Anze Kopitar potting 2 goals and a sick deke along the boards that sent a Sharks defenseman sprawling to the ice. Dismantled and demoralized, the Sharks attempted a weak comeback scoring 2 goals in the third. Brust came up big in his first NHL start, and Sopel looked impressive logging 26+ minutes and earning an assist after missing 16 games with an injury.
More from the game is available here.
I got word the Ducks were in town Thursday, awaiting their turn against the Sharks on Saturday. After getting blown out a few weeks ago in Anaheim, this is a chance for Teal Redemption. Only question, will there be a Sleek sighting in the land of Google and $6 Bud Lights? And will he rock purple and orange for the game?
Posted by PJ Swenson at 11:00 AM 6 comments
Tags: Anze Kopitar, Los Angeles Kings, Photos, San Jose Sharks
Moustached! The Parros-Perry Effect
You know, I’m starting to come around to George Parros (awesome graphic to the left stolen from HF Boards). Not in the sense that Moustache is doing anything well on the ice, but gosh, that pornstache is a pretty cool calling card. Plus, it's tough to be that critical when the team's winning like crazy.
Still, I am worried: through 13 games Moustache has pretty much stopped production on the Corey Perry-Ryan Getzlaf line, which Vic Ferrari notes play the softest minutes in the league (actually, he is referencing a metric at the new Behind the Net stats site, which to my eye looks excellent). This type of matchup is really sort of unfair, of course; Getzlaf and Perry are way too talented for third-string defenders, and their early production numbers show it.
But that was then and this is now. Now, instead of teaming up with a fighter-who-can-play, Perry and Getzlaf get to carry around a moustache-who-cannot. This was even more evident this week when Perry scored three points against FLA—on the one day Moustache was scratched.
Here’s some even-strength statistics for Perry, separating out the time he spent playing with and without Parros Nation. I focus on Perry here because Getzlaf’s slump has been less noticeable—he too has stopped producing in Parros minutes, but he steals time and points on other lines. Note also that the "No Moustache" minutes generally means playing with Fedoruk or Thornton instead of Parros (not Selanne or anything).
Perry's Situation
Pts/hr
+/- /hr
No Moustache
Basically, without Parros Corey Perry is able to produce even-strength goals at a rate similar to Andy McDonald (2.5 pts/hr and 1.6 +/- /hr). With Parros? Not so much.
Oh, and see that one Perry goal that Moustache was on the ice for? Parros was never within one zone of the puck on that play.
Who needs goals with facial growth like this?
This is not to say that Parros serves no purpose; he will fight the big boys and allows Perry to be a snarky lad in the offensive zone. And with Parros canceling out the other team’s heavyweight, that allows middleweights like Thornton, Moen, and O’Brien to fight opponents more down in their weight class; Thornton and Moen definitely kicked some ass in Washington once Brashear was out of the way. Putting Parros in the lineup definitely comes at a cost, however, as Anaheim is now getting zero production from the easiest minutes in the game.
For reference, Todd Fedoruk in 75 minutes had 3 assists and was a +2. Shawn Thornton got 58 minutes in his first call-up, and had 2 assists and was a +5. If Parros could just find it within his moustached-heart to just not be useless, then maybe we can have the best of both worlds, just like before—production and protection.
You can do it, Moustache! Be useful!
(For more hard-hitting Ducks analysis, be sure to check out Tapeleg's take at JAHL.)
Tags: Anaheim Ducks, Analysis, Corey Perry, George Parros, Moustache
Un-friggin-believable
My baloney has a first name. It’s W-W-W-O-O-W-W-W-W-O-W-W-O-W-W-W-L-W-L-O-W-W-O-W-W-W-W-W-L-W-W-W-W-W.
Ridiculous. Here’s some unnecessary gloating; maybe you can wow people at dinner parties with these tidbits:
The last 15 games (12-1-2), Teemu Selanne has 15 goals plus 12 assists (+16), and has 10 multi-point efforts. McDonald, Pronger, Kunitz, and Thornton are also point-a-game over that stretch.
9 of the last 12 wins were one-goal wins, ignoring 3 empty-net goals. The only blowouts were San Jose, Nashville, and Washington, who collectively got beaten 15-1.
J.S. Giguere won his 9th straight start, and his 21 wins (4 more than 2nd-best Brodeur) matches the season total of last year’s St. Louis Blues. 05/06 Blues: 57 points; 06/07 Ducks: 56 points and counting. The Blues actually pro-rate to an even worse total this year (49 points), and along with the Flyers (53 points), are not even projected to catch the Ducks’ current points total.
I know that scheduling still has been in favor of the Ducks thus far, but last year, no team was able to at any point have a 10-point conference lead or an 8-point league lead until April. The Ducks have more wins (25) than any team has losses—regulation or overtime (23). Anaheim also has more goals-scored (121) than any team has goals-allowed (118).
Big caveat to the Ducks' record, however: in regards to the next-top-four teams in the west (SJS, DAL, NSH, DET), Anaheim has only faced these teams once apiece, all at the Honda Center. 20 of Anaheim's 48 remaining games will be against this formidible foursome (8 at home, 12 on the road).
Still, the Ducks have now played 8 games against then-division leaders (10/18 DET, 10/20 MIN, 10/27 @MIN, 11/12 MIN, 11/24 NJD, 11/28 @EDM, 12/6 NSH, 12/13 @ATL), and are 7-0-1, outscoring opponents 24-11. Against playoff-hopeful teams in the west (SJS, DAL, DET, NSH, and the Northwest Division), the Ducks are 10-1-3, outscoring opponents 47-22 and sporting a 94% PK (4 for 66).
The Ducks do not lead the league in regulation wins, however. The Sharks have that edge, 22-21, thanks largely in part to SJ’s non-participation in overtime. Since winning their season opener in OT, the Sharks have played 31 straight decided-in-regulation games.
San Jose currently also holds a 0.0002 lead over the Ducks in power-play percentage.
This SJ baloney ain’t bad either: W-W-W-L-W-W-W-L-W-L-L-W-W-L-W-W-W-W-L-W-W-L-W-W-W-W-W-L-L-W-W-W (plus a game tonight hosting the Kings).
See ya Saturday, Sharks.
Tags: Anaheim Ducks, J.S. Giguere, Teemu Selanne
Nabby says, "It's not fair!"
Ever notice how Evgeni Nabokov looks really pissed off when he does interviews these days? Well, it's not just the goal-support issue (Nabby gets about 2 goals for each game, Vesa Toskala gets almost 4.5), it's the schedule. Sure, Ron Wilson probably thinks it's fair just to alternate Nabokov and Toskala game by game, but look at the opponents in here:
Nabokov's Schedule
*NY Islanders
*Phoenix
NJ Devils
Toskala's Schedule
*St. Louis
*Columbus
*Florida
*LA
*Philadelphia
I've put an asterik next to each team that's not within sniffing distance of .500 or better (the only exception is the Islanders since Toskala played them before Ted Nolan spun straw into gold). So by my account, Toskala's got 10 fairly easy opponents while Nabokov's only had, um, 2.
Not quite fair, huh? In terms of stats, the two are freakishly identical. As of today, they both have 2.04 GAA and a save percentage that is within one 1000th of each other (.924 for Nabby vs .925 for Toskala). But if you factor in the competition and goal support in there, I'd say that Nabokov's having an even better season than Toskala.
Food for thought when we enter the post-Christmas trade rumor silly season.
Tags: Analysis, Evgeni Nabokov, Goaltending, San Jose Sharks, Vesa Toskala
Ducks Gameday—Old Friends Reunion Tour
Today: Anaheim Ducks (23-3-6, 1st in west) at Florida Panthers (10-16-6, 14th in east)
Tomorrow: Anaheim Ducks (24-3-6, 1st in west) at Atlanta Thrashers (18-8-5, 2nd in east)
Another set of back-to-backs on the Ducks’ Sherman march through the Southeast, but this time it gets a little more nostalgic. These particular games feature Ruslan Salei and Vitaly Vishnevski, some nasty defensemen who got replaced this past offseason by a monster named Pronger. These two ugly mugs combined to play over 1,000 games for the Anaheim franchise, not to mention contributed minutes in our two lengthy playoff runs, and I miss the hell out of them.
Rusty Salei, the Ducks’ first round pick in 1996 (9th overall), signed a 4-year deal last July with the Florida Panthers, where I hear he is playing admirably on a not-very-strong team. His 20 points would put him 3rd on the Ducks’ blueline, only 7 points behind Scott Niedermayer. Still, the Panthers have only won 2 of their last 10 games, which includes a stretch of being shut out in three consecutive games. Salei is tough as nails and can be a decent puck-mover when he wants to be. He definitely struggled at first with the new enforcement rules, but improved significantly towards the end of the season. He is an adorable Belarusian beast, a thorn in scorers’ sides.
Vitaly Vishnevski, Anaheim’s first round pick in 1998 (5th overall), is still a work-in-progress, I would say, after he was traded to Atlanta following his arbitration award. Vishnevski, the name proudly sewn on the back of my only Anaheim jersey, is a momentum-hit artist, with an innate sense of when to intercept and clobber an unprepared rushing forward. He’s never shown great interest in scoring, but still left Anaheim as a very popular player. It’s good to see Vitaly playing well on a division-leading Thrashers team, along with other former Mighty Ducks Steve Rucchin, Niclas Havelid, Jason Krog, and Mark Popovic. I’m being a bit selfish here, but if I could undo only one of Brian Burke’s GM moves, Vitaly would still be an Anaheim blueliner (and this jersey would still be half-relevant).
Prediction: Ducks 9, former Ducks 5. Salei pesters Selanne and Vishnevski buries Perry.
(For more on Salei and Vishnevski, see my offseason going away post or take the “Are you a Vishnevski or a Visnovsky?” quiz.)
Tags: Anaheim Ducks, Atlanta Thrashers, Florida Panthers, Game Day, Ruslan Salei, Vitaly Vishnevski
NHL Baloney Award of the Week forgets Teemu
I hate myself for being this petty, but NHL.com, as part of its “Hype Thyself” campaign, has once again come out with its Players of the Week, chosen by some east-coast guy with an early bedtime. This week Mr. Bedtime put together a 3-man listing of Brodeur (3 wins, 2 GA), Lecavalier (4g, 3a in 3 games), and Ovechkin (1g, 6a in 3 games).
For those that are keeping track at home, that means of the 27 weekly awards given out thus far, only 9 have gone to the western conference. Of those 9 westbound awards, only 3 have gone to non-goaltenders.
Now, to be fair, the east coast is where the scoring is at. To date, the eastern conference teams have scored 133 more goals than western conference teams, so I guess I’m not surprised that the offensive awards have been east-slanted thus far. Still, let’s take a look at last week’s stats:
V. Lecavalier
A. Ovechkin
T. Selanne
Hm, a close one, eh?
Still, as a theoretical "tiebreaker", the Ducks played both the Lightning and the Capitals last week, beating them both in regulation. In the first game, Teemu outscored Ovechkin 2-1, and in the second game, Teemu outscored Lecavalier 2-1. Says Selanne (on a different topic):
Aw, don’t worry, Teemu. I suspect you don’t really care, and neither do I. It’s just Monday and I needed something to gripe about.
Maybe I can cheer you up with a game of “What’s scarier?”
The fact that J.S. Giguere has more wins this season (19) than 26 teams?
The fact that the Ducks could sport a .500 record the remaining 50 games of the season and still have 4 more standing points than last year?
Tags: Alexander Ovechkin, Anaheim Ducks, Teemu Selanne
New Kings blog, Life in Hockeywood
Found a new Kings blog via LetsgoKings.com. Take a look at Insidesocal's Life in Hockeywood. Hope the rain gives you a nice break from the smog SoCal.
From Steven Ovadia of Puck Update (someone draft him for Battle of California), the New York Times discovered hockey in California.
Hockey Fanatics in a Land of Palm Trees - Mark Pargas.
When Dave and I worked together at a newspaper in Southern California, we got through our shifts by talking about the Los Angeles Kings, our favorite team. In the dead of winter, we ignored the bitter warmth outside by focusing on a game played with ice skates and a frozen rubber disk.
We took turns taking shots at each other with a tennis ball, using an editorial writer's glass wall as a goal. We enlisted our colleagues in a fantasy hockey league. We did everything we could to make them want to switch the channel on the office TV set from the U.C.L.A. Bruins, or the U.S.C. Trojans, or "Caddyshack," to the big game between the Winnipeg Jets and the Hartford Whalers.
We had some modest success. But there were a few skeptics. Like Steve, who loudly declared to the office that he was the Antipuck. But even he began to crack. He started quoting lines from the movie "Slap Shot," talking about "feeling shame" and "putting on the foil." Once he even announced a Luc Robitaille goal to the newsroom by placing his hands around his mouth to recreate the voice of Darth Vader: "LUUUUUC" he intoned. "Come to the dark side, LUUUUUUUUC." There was hope for the Antipuck.
Kopitar starting to get star treatment - Los Angeles Times.
Tags: Anze Kopitar, Los Angeles Kings
BoC Gameday—Battle of the Thorntons Update
Anaheim Ducks (22-3-6, 1st in west) at Tampa Bay Lightning (14-13-2, t-9th in east)
Colorado Avalanche (13-13-2, 10th in west) at Los Angeles Kings (10-16-4, t-11th in west)
Nashville Predators (18-7-3, 3rd in west) at San Jose Sharks (20-9-0, 2nd in west)
Not to mention 11 other games today, featuring everyone except the Stanley Cup Finalists Edmonton Oilboys and Carolina Candy Canes.
Anyway, I guess I’d better feature this now, while gloating is still possible.
Battle of the Thorntons
EV min
EV pts
EV pts/hr
SJS
Oops. They must have given that Hart trophy to the wrong Thornton.
Shawn, incidentally, has yet to be on the ice for an Anaheim goal-against.
[EDIT: I ran some Shawn Thornton numbers on last night's game. I think this is the first time Shawn has faced some tough minutes, as he played nearly 6 1/2 minutes against Ovechkin (about 57% of his ice time vs. AO). In fact, here's the elements of his Gordie Howe hat trick:
Goal: scored 31 seconds into his first shift. In his first game since Nov. 12.
Fight: initiated 35 seconds into his second shift. A decisive victory.
Assist: 22 seconds into his ninth shift, before the game was to the halfway point.
And the commonality? Omunchkin was on the ice for all of 'em. Sweet mother of mercy.]
Prediction: BoC 10, Challengers 5.
Tags: Alexander Ovechkin, Anaheim Ducks, Analysis, Game Day, Joe Thornton, Scott Thornton, Shawn Thornton, Tampa Bay Lightning
Ducks Gameday—Washington Salary Caps
Anaheim Ducks (21-3-6, 1st in west) at Washington Capitals (12-9-6, t-9th in east)
The Capitals come in on an impressive 4 game win streak, made all the more impressive given the opposition—at Tampa Bay, then hosting Dallas, Buffalo, and Ottawa. The Caps outscored that fearsome foursome 22-11, despite being outshot 108-155.
Last year, my brother and I went to the once-in-three-year visit of the Caps at the Pond, where Alexander Ovechkin potted his first NHL hat trick, including the OT winner. That kid worked us over that night, so probably Pronger will get the AOssignment tonight.
Two months ago, Japer’s Rink randomly took a shot at ‘Christie Prongley’ and I never quite understood why. A Caps fan jumping in on this bash-Pronger movement? Well, JP, here’s some Pronger news for ya:
Pronger is second in the western conference in overall scoring, only trailing teammate Selanne. He’s got 31 points, same as Omunchkin, and has gone without a point only three times in the last twenty games. Pronger leads the Ducks in even-strength ice time, power-play ice time, and penalty-kill ice time, and has been on the ice for 62 goals-for, 26 goals-against.
Plus Pronger can throw a baseball without making a Skeletor face.
No wonder that kid fired his agent.
CapsChick has a nice game preview, including nicknames for all the Ducks. Check out her linky bar for lots more Cap bloggers, all desperately trying to be adopted by Ted Leon$i$.
Prediction: Ducks 4, Capitals 1. Goals by Selanne, each Niedermayer, and “Screech” Pahlsson.
Tags: Alexander Ovechkin, Anaheim Ducks, Chris Pronger, Game Day, Washington Capitals
Sharks pummeled by Avalanche 5-2
Wojtek Wolski and friend hammer Marcel Goc along the boards.
Faceoff late in the third.
Christian Ehrhoff sticks his tongue out while skating past 3 Colorado players.
A recap and a few more photos of the 5-2 Colorado win are up on Sharkspage. A Caps-Ducks game day preview and pregame skate photos are up on Offwing.
Tags: Christian Ehrhoff, Colorado Avalanche, Photos, San Jose Sharks
Ducks Gameday—Ex-Captain comes home
Nashville Predators (17-6-3, 3rd in west) at Anaheim Ducks (20-3-6, 1st in west)
This also could be called the Battle of November, as the Ducks and Preds earned more standings points in the month of November than any other team in the league. They were also the two best teams in terms of goal-differential per game for that month.
Ducks November: 10-2-3, 23 points, 3.67 GF/gm, 2.47 GA/gm
Preds November: 10-2-1, 21 points, 3.69 GF/gm, 2.38 GA/gm
But aside from the prestige and the numbers, Nashville brings with it one commodity well-known to Anaheim fans, former captain Paul Kariya.
Now I’m not going to bad-mouth Kariya for the way he left us in 2003, but I do think it is interesting how similar Kariya-and-Selanne from the old days resembles McDonald-and-Selanne from today. Really, McDonald is a Kariya-clone, both playing a small-man’s game, both skating like hellfire, both wearing a visor, and even the numbers 9 and 19 at times are tough to distinguish.
Only Teemu Knows the Difference
You know, I’ve personally never booed PK, even after he left. Frankly, he put up with so much ridicule being the brave face of the Mighty Ducks during the height of their hilarity that I couldn’t bring myself to boo the guy. No matter how PK up and left Anaheim, you gotta respect the legitimacy and attitude he brought while he was here. That’s why he is #2 on my Memorial Day Top 10 Mighty Ducks list.
Hey, but that’s just my opinion; boo away, Anaheim.
As a last side note: it is entirely possible that the Ducks will be facing their former call-up Michael Leighton in this game, as Vokoun is injured and Mason has played the last five for the Preds. If so, let’s hope Leighton remembers who is paying half his goddamn salary.
Prediction: Ducks 5, Predators 2. "Kariya-clone" McDonald with a pair, along with Selanne, Pahlsson, and Perry.
Tags: Anaheim Ducks, Andy McDonald, Game Day, Nashville Predators, Paul Kariya, Teemu Selanne
Ramble post: If I were commish...
It’s ironic—down to a man, NHL players are now more skilled than they ever were, talent dilution be damned. It is my (ignorant?) belief that a depth player from today, if transplanted to the NHL of 80s, could stickhandle and skate in that 80s league with ease. But somehow, this collection of talented individuals yields a product that is inferior to the on-ice product of the 80s. Why is this? And just as importantly, what can be done to make today's NHL on-ice product better?
Well, here’s six things NHL Commissioner Sleek would consider:
(Note: don’t read too much into these, they aren’t meant to be dead serious. Plus, if I were really commissioner I would probably just call in sick, stay home, and play with all my money.)
1. I would find a better incentive for teams to want to score goals. My first proposal: teams will qualify for the playoffs the usual way (top eight in each conference), however, the teams will be SEEDED by total goals-scored. The highest-scoring qualifying team would play the lowest-scoring, and so forth. Straight bracketing from thereon out.
My thinking here is that a lot of the problem with competitive hockey these days is that coaches (particularly western ones) stress systems that aren’t so much about chance creation as they are about chance neutralization. Maybe a little home-ice incentive will make some coaches concentrate a little more on creating risks and chances rather than avoiding them.
2. Unless you are an actual proven grandfather, put on a fucking visor. No ifs, ands, or buts. If you can’t do it, go play in some other league (which, incidentally, will make you wear one anyway). This isn’t about tradition, this is strictly about safety. Besides, the old-school “tough guy” mentality developed in an age where pucks and sticks more often than not stayed on the ice; that’s not really true any more.
Now, this mandatory visor thing is not a statement against fighting, by any means. Rather, fighters are encouraged to, in addition to dropping their gloves, also remove their helmets before engaging in fisticuffs. In fact,
3. Not only would I repeal the instigator penalty, but I would put strict language in the NHL Constitution that prevents future commissioners from touching this rule. You want a cleaner game, more respect, and less career-ending questionable hits? You want emotion, team identity, and cult heroes? You want to capture the attention of a certain male demographic, ages 12 – 40?
I’d let ‘em fight, dammit. I’d restore the code (except for that no-visor thing, of course), bring back the enforcer, and win some fans along the way.
4. I would fix the blueline. The blueline, for whatever reason, is becoming too easy to defend, both in creating off-sides situations, and in clearing the puck. To combat the former, I would widen the blue-line significantly, allowing forwards to precede the puck a couple of feet into the zone. To combat the latter, I would call immediate icings if the puck were cleared (a) off the glass, or (b) over the height of the high glass.
Six icings in a game, by the way, results in a 2-minute bench minor. All these rules can be adjusted as their impact becomes clearer. Speaking of 2-minute minors,
5. I would find a way to make sure that less overall time in a game was spent watching a team try to score on the power play. Yes, that means less penalties. The problem with the amount of penalties today is (a) they are becoming so prevalent that teams aren’t even trying to score 5-on-5 any more, rather just “skate hard” until they can draw a penalty and then try to score, and (b) nothing kills excitement that watching a bunch of no-hit, set plays where only one team is expected to score, scattered among a bunch of icings by the other team.
I’m not sure exactly how to do this scale-back, though. I’m tempted to say just stick to pre-lockout enforcement rules, but maybe I could do something like a penalty bank, where if you push the new rules long enough, then eventually the ref will make the call. However it happens, overall penalty-calling will be reduced.
6. I would mandate that salaries for players, GMs, and coaches will be cut in half, a mandatory 50% rollback. Instead, that pay will come in the form of shares in a company. This company will hold partial ownership in all 30 NHL franchises—when the teams make money, the shareholders makes money.
You see, it makes no sense that the players and the owners are on separate sides when it comes to my dollar. The players and coaches need some common incentive tied into the well-being of the sport. It needs to become their concern that hockey is entertaining and drawing fans. This "shareholder" system means the better they are able to fill seats and draw viewers, the better-off they individually become, and everyone wins. It is an alignment of incentives.
Now, as I say, I am not completely serious on these issues, in fact, I really only stand behind two of them (Can you guess which two?), and I think one of them is illegal. Anyway, here are some good gloom-and-doom state-of-the-game pieces from Reality Check and Jim Kelley, both good reads. The common tune? The on-ice game needs some re-tooling. Not all is NHL-rosy.
So, anybody want to fix my suggestions, or offer any other ideas on how to improve / sell / reinvigorate / resuscitate the watchability of this league? Or anybody want to tell me to fuck off, I like the hockey the way it is? Suggestions are welcome.
Tags: Gary Bettman
OK, math wizards, can you predict on these results?
I have done a little legwork to figure out the following frequency counts about the Ducks this year. Frequency counts are simplistic in that they do not consider how long situations last, but rather just counts how often situations arise. Anyway, see if you can solve this math puzzle:
The Ducks have been in 59 tied situations this year (29 opening whistles plus another 30 times where a game was re-tied).
35 times the Ducks took the lead (59%)
17 times the opponent took the lead (29%)
7 times the score remained tied to a shootout (12%)
The 35 times the Ducks took the lead,
18 times the lead was held and the Ducks won (51%)
17 times the game was re-tied (49%)
The 17 times the opponent took the lead
4 times the lead was held and the opponents won (24%)
So, math whizzes, just going off these numbers, what is the likelihood of a Ducks win against a dead-average team (equally likely to pull ahead/fall behind, equally likely to hold-lead/re-tie)?
------------------------------------------------------------I’m not sure if this is a real strong concept as a metric for team success, but I’ve always had some issue with goal-differential as the best measure for rating teams' ability to win. It certainly has its merits, but it has its issues with teams like Ottawa, who Matt notes likes to ‘win big’ and ‘lose close’ and thus underperforms its goal-differential-predicted win total. Also, Jeff J at Sisu Hockey shows some thought towards a notion I believe in: that teams do play differently when leading than when trailing or when tied, and these situations should be examined separately.
I know this counting method is very rudimentary and probably each of these situations should be weighted according to how much time is left in the game, but I’m not that great a number-crunching guy (at least in bulk). But what I do know is that there are three fundamental aspects to winning—coming back from behind, pulling ahead, and staying ahead—and in my opinion how they happen isn’t as important as that they happen. These three attributes, in essence, define winning.
In this counting method, it doesn’t matter if a leading team scores eight more goals or not. What matters is that given this lead, do they finish with it or not? If the game re-ties, can they re-establish a lead? If things go sour, can they come back?
Thoughts? Interest? Does any of this make any sense?
(I should note that I would like to see these numbers for other teams to compare against, but this took me a long time to do for the Ducks, and certainly there’s others on this “internet” that could produce these numbers much more easily if the concept is interesting.)
Tags: Anaheim Ducks, Analysis
BoC Gameday—Teenage Mutant SoCal Rivalry
On a day that also features a local college football game (USC at UCLA) and a local basketball matchup (Lakers at Clippers), the NHL decided to also fit in with the cool kids with its own SoCal home-and-home series.
Today: Anaheim Ducks (19-2-6, 1st in west) at Los Angeles Kings (9-14-4, 11th in west)
Tomorrow: Los Angeles Kings (9-15-4, 11th in west) at Anaheim Ducks (20-2-6, 1st in west)
Oct. 6 LA 3 at ANA 4, Kopitar scores 2 goals, Kunitz nets the game winner. Oh yeah, and Selanne drops a bomb.
Oct. 22 ANA 3 at LA 2 (SO), Garon gives up a softie late, Getzlaf wins the shootout in the 5th round.
Despite the fact that Anaheim brings twice as many standings points to these matchups as Los Angeles does, these games have generally been very evenly played, in fact, probably the Kings have had the better of the play.
In the two games, the Kings have outshot the Ducks by at least 10 shots each game (75-53 total), but have been outscored 6-5. That’s particularly impressive since the Ducks generally run the shot count the other way. Anaheim is 2nd in the league in shot differential (6.7/gm); Los Angeles is 4th (4.8/gm).
6 of the top 10 western conference scorers come from the Battle of California. Selanne and Pronger are 1 and 2, if you can believe it, followed by SJ’s Marleau and Thornton, followed by L.A.’s Frolov and Cammaleri, with some other guys sprinkled in for effect.
I noted in the post below that in the month of November, the Kings were 3rd in goals-per-game, 1st in PP efficiency, and 3rd in shot-differential (western conference ranks). During that same month, though, Ducks were 2nd in goals-per-game, 3rd in PP efficiency, and 2nd in shot-differential.
The main difference? The Kings were the only team in the league last month to surrender more than four goals per game. The Ducks instead used reliable goaltending, namely Giguere, who has six more wins than the Kings’ combined netminders do.
Prediction: I’m actually calling a split here. One game the Ducks will beat the Kings, and the other game the Kings will beat themselves.
C’mon, you know the difference.
Tags: Anaheim Ducks, Cartoons, Game Day, Los Angeles Kings
Mathieu Groin pulls his Garon, or something like that
I don’t really have to emphasize too much the importance of quality goaltending in ice hockey, but maybe my neighborhood L.A. Kings could use a quick primer.
When news broke this week that goalie Mathieu Garon had injured his groin in practice, I chuckled at the thought of the die-hard Kings fan, cursing the heavens and saying “please not THAT groin!” You see, coach Marc Crawford has been ever-so-stubborn about platooning his goaltenders, despite the huge disparity of play (a disparity so wide, I believe it is visible from space).
Here’s a quick look at what I’m talking about:
Mathieu Garon, 5-5-2, 2.65 GAA, .903 sv%
Dan Cloutier, 4-8-2, 3.85 GAA, .862 sv%
How far apart is this? Well, if Cloutier (pictured above in his classic pose) wanted to match Garon’s GAA and sv%, he would need to stop the next 164 shots-on-goal over the next 376 minutes (more than six regulations!). Cloutier in 16 appearances has only 3 games where he stopped 90% of the shots he faced.
See, what gets lost in the shuffle a bit is that the Kings (netminding aside) are a pretty strong team, especially lately. In the calendar month of November, the Kings played 13 games, going 5-6-2. They scored 3.46 goals-per-game (3rd in the west), had a PP efficiency of 33.3% (1st in the west), and had a shot differential of 5.4 shots-per-game (3rd in the west).
The problem? Goaltending, all around. Kings goalies had a collective 4.03 GAA and an .848 sv%. Even Garon’s awesome October (1.72 GAA, .941 sv%) turned into an awful November (3.61 GAA, .856 sv%), though that was still markedly better than Cloutier’s numbers (4.35 GAA, .839 sv%). Had there been a .900 sv% goaltender in all 13 November games, the Kings would have projected to a 9-1-3 month (assuming they lose all 3 OT games), and would be currently sitting in the 6th spot in the west with 31 points.
The Kings need quality goaltending badly, and they certainly are not getting it from Dan Cloutier (the worst goalie in the world, now with a two-year extension!). Now Garon is hurt, and the Kings are prepping for a home-and-home with their neighborhood bully Anaheim Ducks.
In related news, I'm having real trouble getting this ear-to-ear grin off my face. Go get 'em, Ducks.
Tags: Analysis, Dan Cloutier, Goaltending, Los Angeles Kings, Mathieu Garon
Happy Joe Thornton Day!
Thanksgiving? LAME! Christmas? Overdone. No, the holiday us Sharks fans should observe is 11/30 -- JOE THORNTON DAY! One year ago today, we got a gift from the hockey gods (or a steal from Mike O'Connell, depending on how you look at it). Joe's the gift that keeps on giving, at least until he probably hits 33 or 34 and starts to slow down.
As for my own Joe Thornton Day memories, I remember that night quite vividly. It was a dreary unending losing streak and I sat down to watch a Tivo-ed (half an hour delay) version of the Sharks/Stars matchup. FSN Bay Area had flashed the line combos on the bottom, but I noticed right away that it didn't match up what was on the ice. Randy Hahn and Drew Remenda soon picked up on it too, and they started speculating about the missing Marco Sturm, Wayne Primeau, and Brad Stuart. I remember thinking that the Bruins were rumored to be shopping Sergei Samsonov, and I briefly wondered about Thornton before telling myself there was no way.
My girlfriend, whose favorite player at the time was her "German Cowboy" Marco Sturm, was getting ready to leave for a nightshift at work. I told her that this looked like Marco got traded, but I'd call her and let her know. Needless to say, she wasn't really happy when she left for work.
Then, between the first and second period, Randy Hahn said the infamous words. "The Sharks now have two Thorntons. Joe Thornton." My jaw literally and figuratively dropped. I had spent the whole time before then bashing Doug Wilson on my blog about how he didn't do crap. I took everything back the next day.
I remember Drew Remenda looking really disturbed talking about it, probably because Stuart and Sturm were really beloved by Sharks fans. Still, it was Joe Freakin' Thornton. I had no bones about it -- Doug Wilson totally ripped off the Bruins. The next day, Bob McKown's show on Toronto's Fan 590 was filled with pissed off Leaf fans saying "Why didn't we get Joe?" Listening to whiney Leafs fans is always entertaining.
My girlfriend called me on her break and I told her that I had good and bad Sharks news. She instantly yelled a very Luke Skywalker "Nooooooooooooooooo!", but I assured her that Joe Thornton was ridiculously better than her beloved Marco. It took about two games to make her forget that #19 ever beloned to Mr. Sturm.
With Brad Stuart and Marco Sturm telling the media that they'll probably test free agency, it looks like the Bruins will get absolutely nothing for trading their franchise player (though SI has a good take on how it shook the mentality of the club). As for Sharks fans, make sure you have a drink in honor of Joe Thornton Day!
Tags: Joe Thornton, San Jose Sharks, Trades
Ducks Gameday—Vancouver Five-O
Oh yeah, we have a real game tonight, huh? Anaheim Ducks (18-2-6, 1st in west) at Vancouver Canucks (12-12-1, 8th in west)
Don’t have time for too much today, but Tom Benjamin asks the question: Why does the NHL continue to lose ground in the United States? In the comments, there is some discussion about the move from ESPN to Versus, which naturally moves the sport out of the public consciousness.
Well check out how we got it in Southern California, which has two sports networks (Fox Sports West and Prime Ticket) to split among four winter teams (Lakers, Clippers, Kings, and Ducks). For us Duck fans, that means that excess games get shifted to KDOC-TV, a local time-capsule station that serves us all a hot helping of TV nostalgia. Look at today’s schedule, for example:
9:00 am Little House on the Prairie
10:00 am Rockford Files
11:00 am Quincy, M.E.
12:00 pm Perry Mason
1:00 pm Matlock
2:00 pm Hawaii Five-O
3:00 pm Magnum, P.I.
4:00 pm The Nanny
4:30 pm Mad About You
5:00 pm Becker (twice)
6:00 pm Cheers (twice)
7:00 pm NHL Hockey
9:30 pm Cheers
10:00 pm The Twilight Zone
Did you miss it? No no, that’s not the 70s sitcom “NHL Hockey” at 7 pm, but rather tonight’s NHL contest. Hey, I for one am glad that KDOC picks up the local coverage baton, but really, who’s going to be accidentally watching tonight’s game? The guy who lost his Nick-at-Nite channel? (Note also that televised hockey is on the decline in Canada also; maybe it's not just us).
At any rate, three weeks ago today the Ducks won 6-0 in Vancouver, but that was a pretty deceptive score, as the Ducks scored on their 2nd, 4th, 9th, 17th, 22nd, and 23rd shots. That probably won’t be happening again tonight.
Still, the Canucks have scored 3 goals or more only twice in their last 14 games. The Ducks have scored 2 goals or less only twice in their last 16 games.
Prediction: Ducks 5, Canucks 0 (to keep with the post title). Goals by Kunitz, Pahlsson, Shannon, O'Donnell, and Moustache.
Tags: Anaheim Ducks, Game Day, Television, Vancouver Canucks
Ducks Simulated Game Day—Buffalo Sabres
Tom L at Sabre Rattling has pointed to a Damien Cox ESPN piece that asks a good question: which team is better, the Buffalo Sabres or the Anaheim Ducks?
Wait, scratch that. That’s not a good question, that’s a dumb question. Who really gives a shit? These teams are playing in two separate leagues on two separate leaderboards. It matters very little how good Anaheim is compared to Buffalo; what matters is how Anaheim stacks vs. the west and how Buffalo stacks vs. the east.
That said, I will offer a little fodder for this burning question. Here, for argument’s sake, is a look at regulation standings, how teams are doing when 60 minutes are up. I only bring it up because it exposes Buffalo for the extra-point slut that it is:
Regulation Record
14-2-10, .731
18-7-1, .712
12-10-4, .538
9-8-7, .521
So what’s this really say? Well, for one, it points out that the west has a lot more separation than the east, top teams vs. bottom teams. The east is still more concentrated in the middle.
Buffalo, while still class of the east, does have less regulation wins than 6 western teams (and the same amount Calgary has), so maybe the real question that deserves to be asked isn’t which of two specific teams is better.
Rather, my question is: If Buffalo were in the west, where would it finish? Would it be a first-place club in a much more highly-contested conference?
Tags: Anaheim Ducks, Analysis, Buffalo Sabres, Cartoons
NHL plays of the week on YouTube
NHL Plays of the Week are available on YouTube here. Ducks vs Flames highlights from Sunday are available here.
Tags: YouTube
An Open Letter to Edmonton Fans
(SPECIAL GUEST COLUMNIST: ROB NIEDERMAYER!)
A special thanks to Earl Sleek for allowing me this opportunity to address hardcore Oiler fans.
My name is Rob Niedermayer, sometimes called "RNieds", or "the other Niedermayer". You might remember me from the last western conference finals, although you probably had to be paying pretty good attention to notice little old me.
At any rate, I am not here to chastise the Edmonton faithful for feeling betrayed by last offseason’s mysterious Pronger departure, nor even to try to plead for a well-behaved Rexall crowd tonight. I remember when I was traded how hard it was on my fans, when later they learned that I was actually Scott Niedermayer’s brother.
No, I am writing today to emphasize a fact that I’m not sure has gotten enough publicity in the Edmonton area: Chris Pronger no longer wears number 44. Because of my impressive stature on this Anaheim team (again, Scott’s brother), I was allowed to keep the number, and Prongs instead chose number 25.
This is very important tonight, as you are stuffing your socks with loonies and pulling batteries out of your iPods, THINK BEFORE YOU THROW! For now, and for the foreseeable future, #44 is not public enemy #1 in Edmonton; it would be a shame if a well-aimed beer toss got sent to the wrong recipient tonight.
Prediction: Ducks 5, Oilers 3. Despite my efforts, I still get hit by a misguided Pronger projectile.
Posted by Earl Sleek at 8:25 AM 26 comments
Tags: Anaheim Ducks, Chris Pronger, Edmonton Oilers, Game Day, Rob Niedermayer
Ducks Pre-Game Day: Countdown to the Oil
Tomorrow: Anaheim Ducks (17-2-6, 1st in west) at Edmonton Oilers (13-8-1, 6th in west)
Oh, so many things to talk about! In honor of ol' #8’s 500th goal and 600th point as a Duck, here’s 8 storylines leading into tomorrow’s game:
1. Return of the Orbs. Really, this ProngeRage is probably the most overblown part of the whole deal, but what can I do? This date has been circled on so many Edmonton calendars that you’d think Rexall was doing a PS3 giveaway. I’ve said it before; there’s plenty of room for Oilfan sympathy, but let’s not pretend they’re the only team to lose their star player days after a painful SCF G7 loss.
2. 1,000 game club. I suppose of lesser importance will be that this game will also be Scott Niedermayer’s 1,000th career regular-season game. It’ll be interesting to see how the Oil faithful will handle that announcement; will they bother to ‘boo’ or is that all being saved for Pronger? Teemu Selanne (984), by the way, is scheduled to have his 1,000th game (health-permitting) in about a month, while Travis Green (941) will likely never get there if he doesn’t start improving on his 2-appearances-in-25-games role.
3. Schedule getting tougher. I really do have to talk about strength-of-schedule when it comes to the Ducks’ success thus far. Anaheim has played 17 of its 25 games at Honda Center, and tomorrow begins a stretch of 13 of 17 on the road. From last year’s playoff teams, the Ducks have not yet this season traveled to the following cities (home record in parentheses): Detroit (6-1-3), Dallas (8-2-0), Nashville (6-1-2), San Jose (9-2-0), or Edmonton (10-2-0), so there are still a fair amount of questions to be answered about how good these Ducks really are. And the two times the Ducks have played a previous-year playoff team on the road? They got shutout in Calgary and lost a shootout in Colorado.
4. Goaltending secrecy. The Ducks do like keeping goaltending injuries a Pentagon-level secret, like last year when, out of the blue, J.S. Giguere was unavailable for the first game of the playoffs. Similar story last night, when instead of our usual Giguere-Bryzgalov tandem, the Ducks started Michael Wall (AHL), backed up by David McKee (ECHL). Per today’s L.A. Times, Giguere says he is “99 percent sure” he is starting tomorrow, but who really knows? If McKee ever gets the nod, by the way, he will join Andy McDonald, Chris Kunitz, Dustin Penner, and Ryan Shannon as Duck players this year who were never drafted, but instead signed with the team as UFAs. (Side note: apparently Nashville claimed Michael Leighton from the Ducks off waivers also, and Anaheim will be paying half his salary. Sweet.)
5. Moustache watch. George Parros, after a crummy start, has looked a lot better in the last 4 games he’s played in. He still has yet to be on the ice for an Anaheim goal-for, but at least he’s not surrendering goals and when he does fight, he’s done it well enough. Still room for improvement, though, as both Todd Fedoruk and Shawn Thornton were able to produce at even-strength as well as fight. Parros has yet to be even close to useful in a game in which he does not fight.
6. Anaheim Norris race. It’s astounding to me how much Duck message-boarders seem to be stuck on the notion that Scott Niedermayer has been this team’s MVP thus far, when the Pronger-comparison numbers really aren’t that close (well, except power-play production, since they share so many minutes there). Here’s some key stats:
Even-Strength:
CP: 435 minutes, 2-11-13, EV+ 29, EV- 14
SN: 404 minutes, 3-8-11, EV+ 19, EV- 14
Power-play:
CP: 156 minutes, 2-11-13, PP+ 22, PP- 0
SN: 154 minutes, 2-8-10, PP+ 20, PP- 0
Penalty-kill:
CP: 96 minutes, 0-0-0, PK+ 1, PK- 8
SN: 85 minutes, 0-0-0, PK+ 0, PK- 12
So overall, Pronger (in about 44 extra minutes of ice time) has been on the ice for 52 goals for and 22 goals against. Scotty, meanwhile, has been on the ice for 39 goals for and 26 goals against. I would buy the argument that Pronger being paired with Sean O’Donnell should have better defensive implications than Niedermayer being paired with Francois Beauchemin, but in terms of production, you gotta give the nod to CP here.
7. Selanne responds to criticism. Don’t forget, though, that Selanne has been on fire also, ever since I called him out in the “don’t vote for Teemu” All-star ballot post. Here’s a little split for ya, before and after I called him out.
Before: 19 GP, 4-13-17, 1.82 even-strength pts/hr
Since: 6 GP, 6-6-12, 5.99 even-strength pts/hr
Yikes. Look out, unknown performance bonuses! (Oh, and Teemu, you still haven’t gotten my vote!)
8. Changing the rules. A weird new wrinkle this year in how division leaders are selected. Assume for a second that Anaheim wins tomorrow by two goals. Per the NHL standing rules (at the bottom of this link), Minnesota would reclaim the Northwest Division lead by virtue of goal differential (Wild +9, Oilers +8) despite identical records. Problem is, these goal-differential numbers count shootout wins and losses as “standings” goals-for and goals-against, a new development this year. Minnesota’s differential is boosted by having a 5-1 record in shootouts compared to Edmonton’s 1-1 shootout record. These would not have factored in goal differential calculations last year.
Tags: Anaheim Ducks, Cartoons, Chris Pronger, Edmonton Oilers, George Parros, Scott Niedermayer, Teemu Selanne
OK, math wizards, can you predict on these results...
Mathieu Groin pulls his Garon, or something like t...
|
cc/2019-30/en_middle_0014.json.gz/line93
|
__label__wiki
| 0.873365
| 0.873365
|
If you think for five seconds that ATT's proposed internet video offering is going to happen quickly...
Your municipality wants some money. In fact, they want a LOT of money. They already get that from the cable companies. In return, the municipals provide "protection" for the cable companies. Think of Milk Carton Tommy with a violin case.
Local officials are debating whether AT&T Corp.'s planned Internet video service would interfere with cable TV franchises that now reap millions of dollars for municipal treasuries. It's part of a nationwide struggle between telecommunications giants that is already being fought in Congress and over the airwaves, and that is swiftly working its way into city and village halls, state legislatures and perhaps the courts.
Interesting phrase there: "would interfere with"...
Here's the trick the municipalities are playing with:
A Washington, D.C., law firm has given Milwaukee city officials a legal opinion that says U-Verse [the AT&T video offering] would meet city ordinances' definition of cable television service, the "one-way transmission of video programming or other programming services," Leonhardt says.
Time Warner Cable is paying Milwaukee $3.7 million this year, rising to $3.8 million next year, said Patrick Curley, Mayor Tom Barrett's chief of staff.
Of course, if AT&T provides better services for less money, then Time Warner loses subscribers. When that happens, Time-Warner's "contribution" to the City's coffers goes down, down, down.
How can the City stop AT&T? One way: make their equipment installations illegal:
Unlike satellite television or streaming video, however, U-Verse uses the public right-of-way, and lots of it, Curley said. Project Lightspeed has already started installing metal boxes more than 5 feet high near curbs and alleys and in boulevard medians in Milwaukee and elsewhere, to provide interfaces between fiber-optic cables and copper telephone wires, Bentoff said. Each box is expected to serve 300 to 400 homes.
Local officials fear the boxes could be unsightly and might block drivers' view of pedestrians and other cars. Downtown Ald. Bob Bauman has introduced an ordinance to give aldermen limited veto rights over boxes in their districts. Kenosha has slapped a one-year moratorium on the boxes.
Bentoff said AT&T has the right to install the boxes, under the laws governing telephone poles.
Can the municipalities get their pound of flesh? Will Gary Grunau's Time Warner cable monlith become yesterday's news and wither away? Will AT&T, with its "more service for less money" promise, prevail?
Will YOU get better service for less?
Not if the municipalities have their way. They LOVE 'hidden-tax' revenues, which is exactly what the cable companies give them in return for 'protection.' And your Gummint will fight tooth and nail to keep the money.
|
cc/2019-30/en_middle_0014.json.gz/line96
|
__label__cc
| 0.628906
| 0.371094
|
Home / Blog / Search Marketing / 360i Report: The Bing-Yahoo! Search Alliance & PPC
by 360i on October 25, 2010
360i Report: The Bing-Yahoo! Search Alliance & PPC
in Search Marketing Both comments and trackbacks are closed.
360i Point of View on
The Bing-Yahoo! Search Alliance & PPC
Many advertisers have been asking the same question since the Search Alliance was announced in July 2009: “What does this mean for the ROI on my search campaigns?” Answering this question is difficult, if not impossible. The Search Alliance has many hidden complexities. While the expected increase in competition within adCenter may cause CPCs to rise over historical norms, in some cases there may be a net decrease over CPCs paid for the same term on Yahoo!’s Panama. In this POV we give consideration to a few scenarios we foresee and highlight several actions and decisions that advertisers should be prepared to make as a result.
1) adCenter competition, and thus, adCenter CPCs will increase, but impact should be minimal
Observation, backed by actual research, suggests there is a significant disparity in advertiser use of Yahoo! Panama and Microsoft AdCenter. As a result, the natural expectation is for Yahoo! advertisers, who do not currently use adCenter to migrate to the adCenter platform. The impact of additional competition within adCenter suggests cost-per-click (CPC) should rise. However, there are many unique variables which independently impact each advertiser.
What should you expect? Depending on the exact vertical, the competitive impact will likely vary. For example, retailers and financial services brands may stand to see very little CPC inflation as these categories are generally more mature on adCenter. CPG may experience more of an impact given lower category adoption of adCenter. Regardless, each category and each advertiser will see an impact on CPC. Beginning in October, daily and weekly competitive performance indicators, such as CPC and position, should be monitored closely.
2) A unified platform could expose cost savings
In the evaluation of cost and CPC, many sources have focused on increased competition within adCenter as a lone variable. Very much overlooked when considering the alliance is that adCenter is different from Panama, and performance metrics for a given keyword on adCenter are different from comparable metrics for that same keyword on Panama. Looking at a single advertiser’s CPCs on Yahoo! vs. Bing, we see the Bing CPC is 75% less than the Yahoo! CPC. We also observe a CTR which is 52% higher as a result of Bing’s ad serving algorithm (stats via SearchIgnite’s Q3 2010 Search Market Report).While the CPCs for this term may see minor increases increase on a unified adCenter platform with the influx of competition, is it likely to outpace the current CPCs paid on Yahoo!’s Panama? Possibly, but not likely when you also factor in the increased queries that adCenter will be able to serve to Yahoo! users coupled with potential of Bing’s algorithm.
This deviation in actual cost plays out for nearly every keyword in every campaign for every advertiser. It also varies greatly between brand terms and non-brand terms. Advertisers must consider many more factors than competition when estimating impact and thinking about the future of their search campaigns. Maybe, just maybe, there are cost savings in the mix.
3) Performance volatility is expected, but should be minimal
A fundamental shift of roughly 30% of any market will inevitably shake things up. This volatility should stabilize relatively quickly for most advertisers.
The phased transition of inventory should assist in masking volatility. Microsoft’s goal is to serve:
10% of Yahoo! impressions by end of week 10/3
30% of Yahoo! impressions by end of week 10/10
100% of Yahoo! impressions by end of week 10/24
Should they be successful with this approach, there is little expectation we will see rapid or sudden alteration in performance metrics.
Additionally, the rate and degree of volatility is complicated by unknown timing of advertiser migration. Many smaller and less-sophisticated advertisers may be slow to consolidate or react to the Search Alliance. Furthermore, many advertisers may find the united traffic volume and/or management complexities to be misaligned and abandon the market all together. Both of these scenarios could cause minimal blips well past the October transition period.
4) Keyword value and positions will change
Due to consumer behavior, competition and countless other factors, advertisers experience vastly different performance on Yahoo! and Bing. As a result, the value of a keyword varies considerably for each platform, and subsequently, they are managed uniquely. In the coming weeks, this ability dissipates. A single keyword on adCenter will represent what was previously two unique keywords. The potential downstream effects to performance are complex and will vary widely.
To illustrate, we’ll look at a fictitious example. The below table represents a single keyword’s unique performance:
Assuming this keyword is meeting goal at 5:1 ROAS, it is doing so at position 6 on Yahoo! and position 2 on Bing. As we approach the Alliance advertisers must be prepared to quickly re-evaluate optimal CPC and position.
Ultimately, advertisers must prepare for the convergence of volume. Those who are accustomed to seeing the same average position every week should prepare to see change as new optimal positions are sought. Fortunately, Microsoft’s phased integration of inventory will considerably minimize instability.
5) The alliance unifies more than just publishers
One of the lesser discussed components of the Search Alliance is the pending unification of MSN and Yahoo!’s search syndication networks. This move will force most advertisers into making some short-term decisions.
Both Microsoft and Yahoo!, like Google, have viewed syndication opportunistically to provide growth and increase market share. Yahoo! provided the ability to block select domains when it launched Panama in 2007. Microsoft has never developed domain blocking controls. While the capability to block domains is on the Microsoft development list, it appears that initially, all campaigns will revert to an “all or nothing” approach. This could dramatically change performance for those advertisers who have used domain blocking to improve their performance within the Yahoo! syndication network.
These advertisers must decide between traffic that may be less optimal or opting-out until domain blocking is available. Advertisers choosing to stay may be rewarded with key early benchmarks and valuable history. Additionally, there could be lower competition as other advertisers walk on the opportunity. Those advertisers opting out will face the cold reality of lost volume. Not only Yahoo!’s network, but also Microsoft’s network which they may find attractive. Additionally, they will face future decisions as to when to plunge back in.
6) Richer ad format falls temporary victim to the Search Alliance
Yahoo! Rich Ads in Search (RAIS) will be unavailable as the Search Alliance transition concludes. The ad format is expected to again be available in early 2011. At that time, RAIS is intended to be fully integrated into adCenter with expanded reach showing on search results for Yahoo! Search and Bing.
The news is unfavorable for advertisers who may leverage RAIS as a solution for integrating offline creative assets or for expanding their message to support multiple objectives. Retailers are among those expected to find the announcement most untimely at the onset of the holiday season. For performance impact, we encourage advertisers to evaluate on the basis of a unified platform rather than a simple comparison of Yahoo! RAIS to Yahoo! Sponsored Results. The performance expectations will vary depending on the many nuances and external factors existing between Yahoo! Panama and Microsoft adCenter.
How marketers can prepare for the alliance
Anticipate: Understand the impact issues within this article can have on your campaign.
Prepare: Have a basic knowledge of high volume terms which will move the needle and their CPC differences on adCenter vs. Panama. Monitor them closely as the transition of inventory occurs.
Optimize: React. It shouldn’t take long to adjust. Move quickly.
Change is coming — and the scope and degree of changes caused by the Search Alliance remains opaque. However by preparing, knowing what to expect and reacting quickly, advertisers can emerge on the other side just fine.
Contact your strategic advisor at 360i for more information on how the Bing-Yahoo! Alliance stands to influence your brand’s search marketing efforts.
|
cc/2019-30/en_middle_0014.json.gz/line98
|
__label__wiki
| 0.758093
| 0.758093
|
University ›
Google to oversee webmail after UT confirms contract
Published on March 9, 2011 at 12:00 am
By Shamoyita DasGupta
Students can say goodbye to the clunky orange UT webmail interface and claim a new University e-mail account hosted through Google next month. After students complained for years about the inefficiency and lack of space, the Universitys Information Technology Student Advisory Committee prepared proposals to send to different vendors to create a new interface. After reviewing three finalists, the University signed its contract with Google last week. It became clear that Googles services were both technically and aesthetically what students would probably like best, so we decided to pursue a relationship with them, said Student Government President Scott Parks. Through Gmail, students accounts will hold up to seven gigabytes of space and be easier to navigate, said Liz Aebersold, Director of Communications and Strategy Management for Information Technology. [Students will have] larger inbox sizes and a more modern interface, Aebersold said. In the past, students had to stop using their UT e-mail once they graduated. Under the new contract, they will be allowed to keep the account as alumni. The University is now focusing on finding a name for the new e-mail service. Students with ideas for names should submit them to ideas.utexas.edu. The deadline for idea submissions is Friday.
|
cc/2019-30/en_middle_0014.json.gz/line105
|
__label__cc
| 0.7254
| 0.2746
|
Vale Phil Burgess
My former colleague Dr Phil Burgess (in the sense that everyone in telco public policy is a colleague)has been busy talking and writing as he prepares to leave our fair shores. This has included an article in the SMH and a speech at the Lowy Institute.
I thought it was appropriate for someone to write a valedictory. It was too long just to include here, so you'll have to follow the link.
I conclude with "Phil I think will understand if I say (in the Australian vernacular and the Fullbright sense) “Mate, you are a great Australian patriot, but you’ve been wrong about a few things.” To understand that you'll need to read the item and listen to the Lowy speech.
Posted by David Havyatt at 10:29 PM 2 comments: Links to this post
Poor Kevin
Glen Milne reports criticism of Kevin Rudd that he is too much of a micro-manager, while Phillip Coorey reports complaints that the Ruddbot shouldn't be travelling to New York "when the work is mounting up at home".
The latter includes the delightful criticism that Kevin in 10 months will have met UN Secretary-General Ban Ki-moon three times and SA Senator Nick Xenophon not at all. Bizarre really - Ban Ki-moon represents all 205 or so countries in the UN, Xenophon represents about 14% (a quota) of the citizens of South Australia who are also represented by a host of Labor Senators, Penny ong among them. Plus Nick has actually been a Senator for under three months. And really the PMs message to the opposition and cross benches at tis stage should be "bring it on" - it is the PM who would be suited by a double dissolution.
As for the Milne piece, I'm trying to figure out how he has a report about a meeting carried out under what he (incorrectly) calls "Chatham House rules". There is only one rule. That, for the record, is;
"When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed".
Get it right.
Posted by David Havyatt at 9:43 AM No comments: Links to this post
Strange Silence
The Senate Select Committee on the NBN has published the submissions received by the closing date (which had been extended).
The list is noteworthy for the absence of Telstra amongst the submitters. Is this because they feel they don't need to as they are in "the box seat", because they decided that to submit to an opposition committee might raise the Minister's disapproval or because they still can't really figure out their own strategy on the NBN bid.
Telstra will spin it as a version of one or two, but I wouldn't be really surprised if it is number three.
Telstra's difficulty remains that they have a position of not wanting any money from the Government but probably can't make the commitment on the 98% build on their own.
A very tricky dilemma.
Posted by David Havyatt at 10:53 AM No comments: Links to this post
What is a big share of the "innovation system"
The Government has received its report on innovation from Terry Cutler and his committee. I haven't waded through it yet - but note that no hard copies of the report are available only the online version, and the Criky story with the Cutler comment on copyright.
This blog post is about the interview Dr Cutler gave on Lateline Business. In the interview he said "First of all, focus on your strengths. I mean, Australia is a small economy in global terms; we're roughly two per cent of the world's innovation system."
I'm assuming Dr Cutler thinkks that one's share of the global economy is the same as one's share of the "global innovation system". For this he uses the 2% number most commonly used. However if you use World Bank numbers the figure and go to two decimal points the number is 1.51% (on a table revised on 10 September 2008).
While that sounds small, when you realise there are some 200 countries it makes us three times the size of an "average" economy. By rank we are the fifteenth largest economy on the planet - ahead of Sweden on 19(Ericsson, Volvo, Saab), Denmark at 27 (Lego), and Finland on 32 (Nokia).
The reality is that Australia faces another disadvantage compared to these economies in being more remote from sizeable markets. However our biggest disadvantage remains our ability to be fat dumb and happy on the back of resource endowments.
What we don't need is people writing innovation reports perpetuating the myyth that this is a small economy.
Posted by David Havyatt at 5:57 PM 1 comment: Links to this post
Grocery Review
The ACCC review of grocery prices came in for mixed reviews. In fact Frank Zumbo gave it a bollocking in a piece he wrote and as quotes in another.
I have only just got around to getting a copy of the report and the skim reading disappoints me. There are so many ways. But most importantly it is the complete failure to deal with industry structure in a meaningful way. Two small examples:
The report disparages the idea of greater transparency in pricing in the supply chain as it creates the opportunity for implicit collusion or explicit cartelisation. This ignores the power of information assymetry to entrench market power and ignores the fact that the best remedy against collusion is industry structure without a small number of large players.
The second is the extent to which the report treats speciality stores as competitors to supermarkets, as if the authors have never read about so called "imperfect competition" or monopolistic competition built around no-price differentiation.
But by far the worst is that the ACCC has now concluded a grocery and a petrol enquiry and hasn't discussed the "shop a docket" fuel voucher system. So let me explain how that works to increase prices.
Assume I need to buy $100 worth of groceries and $100 worth of petrol a week. ($100 worth means that much assuming the goods are priced at cost - i.e. competitively). When I go to buy my groceries I know they will give me a voucher for a 4% petrol discount. So I'm prepared to pay $103 for my groceries because I'll still be a dollar in front.
Having bought my groceries I'm prepared to pay $103 for the petrol because I'm a dollar in front on my purchase over buying petrol at cost elsewhere. Therefore the "discount" entices me to pay $206 less my $4 discount thus spending $2 more than if I'd purchased at cost.
Each decision of the consumer is rational. Unfortunately most cases of product bundling result in this kind of outcome. Bundling does not benefit the consumer, it benefits the firm with sufficient market power in one or ideally both firms to induce customers to pay too much.
By the way - ending shopper dockets is entirely within the power of the ACCC.
Posted by David Havyatt at 11:50 PM 1 comment: Links to this post
National Consumer Law and Mobile Phones
This is a tale from the Australian Financial Review so I can't do it with links. So I need to simply quote.
AFR 16 August David Crowe
Customers will gain new rights to quit unfair contracts with businesses ranging from fitness centres to phone companies under an agreement between Canberra and the states for a single consumer protection law to apply nationwide....
Minter Ellison partner Richard Murphy said the concept of what was unfair remained "woolly" but it was a major step forward to have a single national law. He cautioned, however, that companies not operating in Victoria would have to review their contracts to ensure they complied with the new regime.
In Victoria, for example, AAPT was found to have used unfair contracts because its terms allowed it to vary phone charges without notice, apply reconnection fees for any reason, charge customers for suspended services and end a service unilaterally....
AFR Letters 20 August David Havyatt
In the item on proposed changes to consumer protection laws you note that AAPT was prosecuted in Victoria for unfair contracts (“National laws to protect customers” AFR 16 Aug). While this is factually correct the manner of its reporting is misleading.
While AAPT’s contracts were found to have unfair terms, in the judgment it was noted that the terms had never been used and no compensation or restitution was due to any customer. Nor was AAPT required to make any changes to its contracts as they had been fully revised by the time the judgment was made.
In fact Consumer Affairs Victoria was fully aware that AAPT was in the process of changing its contracts when they commenced the litigation in December 2004, and was fully apprised of progress the week following the action being brought. AAPT, along with all other telcos at the time, had been dealing with the need to comply with the Victorian legislation and to meet requirements being introduced through an industry code.
Uniform consumer protection laws will be welcome by all in industry. However, this should not come at the expense of incorporating poorly designed legislative provisions such as the Victorian unfair contract provisions.
AFR Letters 21 August David Cousins
David Havyatt's [letter of 20 August] complains about "misleading reporting" of the AAPT case and then puts his own nique spin on that case.
He suggests the judge found "no compensation or restitution was due to any customer" when Consumer Affairs Victoria did not seek such relief. I was director of CAV and initiated the action against AAPT.
The public interest declaratory and injunctive relief sought by CAV was not granted only because AAPT had included, in the changes to its consumer contracts (that were prompted by the CAV action and still did not come into effect until four months after the proceedings were started), a provision that applied the new terms and conditions retrospectively.
The critical fact is the judge found that many of the terms of AAPT's contracts, as identified by CAV, were unfair terms and, therefore, void. Rather than being poorly designed as suggested, the law was shown to be effective.
After refusing to deal with the regulator, AAPT recognised finally the writing was on the wall about its unfair contract terms and chose to fix the problem with retrospective effect. As far as the industry code is concerned, it was made to conform with Victorian law only after CAV had intervened in the code development process.
The Victorian unfair contract terms law has been designed to ensure a minimum appropriate stanard of commercial conduct for the protection of Victorian consumers and businesses.
Effective unfair contract terms provisions are essential for Australia's national consumer law.
While your original article on the prosecution of AAPT for unfair contracts was misleading, David Cousins’ [letter of21 August] contains simple untruths.
The most specific of these is his claim that the changes in AAPT’s contracts “were prompted by the CAV action” and that AAPT “recognised the writing was on the wall…and chose to fix the problem.” The facts of the matter were that AAPT was already in the process of making these changes, a fact that CAV was aware of before initiating the action and was reminded of on the day they informed us (and the media) of the action.
He engages in his own sophistry by suggesting that the basis for there being no compensation or restitution was due to CAV not seeking such relief. My recollection is that CAV did not seek the relief because there were no customers for whom they could seek relief as none of the clauses had been used.
Victorians might like to contemplate whether they got value for money from a prosecution that ultimately had no impact on telecommunications contracts. They might also like to contemplate whether the attitude of the Victorian Government in pursuing the pointless prosecution had any impact on AAPT’s decision to relocate its call centre from Bendigo to Sydney.
Summary and other points
For reasons of space the second AFR letter was shorter than I first submitted. That included the following points.
Cousins provides as a reason why AAPT was singled out for the prosecution rather than one of the other providers of mobile services who had similar contracts at the time, his assertion that AAPT refused to deal with the regulator. The facts were that the telecommunications industry at that time had already instituted a guideline on contracts, and all operators including AAPT were in the process of revising contracts and had adopted a practice of not using any contract terms outside the guideline. The industry regulator, the Australian Communications Authority, required the industry to strengthen the guideline to a code, so AAPT paused the implementation of new contracts pending the finalisation of the code.
It was in the middle of this process that CAV approached AAPT about its contracts, and AAPT advised the process we were going through and that it was wasteful to duplicate the process. To ensure the message wasn’t misunderstood I visited the Chief of Staff of CAV’s Minister John Lenders to explain the AAPT position a week after replying to CAV (I was unable to see Lenders himself because of probity issues in relation to TPAMS).
When CAV launched its action in December it was Minister Lenders who issued a press release to trumpet the prosecution of the “giant phone company AAPT”. At the time AAPT had 2% market share, and CAV did not prosecute the other mobile providers with the same contract terms.
Throughout the process of CAV trying to make a case of the telecommunications industry they refused to meet with the industry through its industry ssociation or collectively. After commencing its litigation CAV refused to meet with AAPT with a view to terminating the proceedings.
Finally it is worth noting that the recommendation of the Productivity Commission on unfair contract terms was for a version that would only see prsecutions brought in cases where customers had suffered detrimental outcomes from the unfair terms. The CAV action against AAPT would not have been brought in these circumstances.
|
cc/2019-30/en_middle_0014.json.gz/line109
|
__label__wiki
| 0.730909
| 0.730909
|
Home | Deployment: A Family Affair | Self-Sabotaging Fears: The Dream Destroyers | Let's Talk to Our Kids: Successful Communication with Your Child | Mabray's Books For Life | The Complete Study Guide for the Marriage and Family Exam | The Complete Study Guide for the National Counselor's Exam (NCE) | About the Psychological and Marriage and Family Theory Study Guides | The Ultimate Relaxation CD and Guide | The Ultimate Guide to Psychological Theories | The Ultimate Guide to Marriage and Family Theories
Debbie King Mabray, MS, LPC, LMFT, CART, is a well-known and highly effectual therapist and compelling author. In addition, Ms. Mabray has also made a name for herself as a dedicated community service volunteer. Her accomplishments include founding the Texas Women in Leadership Coalition, Inc. a non-profit organization comprised of an all-female leadership team who work together to assist at-risk female high school students in career planning and networking within the Central Texas area. In addition this organization holds yearly seminars on leadership and awards need-based scholarships.
Ms. Mabray has also established a committee for a Life and Learning Center of Central Texas. Although this project is still in its infant stage, the project is geared toward the special needs population, ages 12-24, where teaching life skills, vocational skills, and integration into the workplace are among its objectives.
Ms. Mabray is currently in private practice where she is the part owner of the Adult, Child, & Family Counseling Centers with her business partner, John J. Leach, LCSW, CART. Mr. Leach specializes in the treatment of depression, anger, stress management, behavioral issues, family, marriage, work related issues, ADHD, and EAP and Ms. Mabray is a supervisor for LPC and LMFT interns in addition to specializing in the treatment of teens, adults, family, anger management, and any clinical and/ or school related issues.
Currently the Adult, Child, and Family Counseling Center has locations in Marble Falls, Austin, Temple, Round Rock, and Killeen (home office.)
Ms. Mabray has also developed the Complete Study Guide series initially to assist her in studying for licensure exams. When she began sharing the guides with interns and they were successful, she began selling the guides. At this point, the LMFT guide is 99.2% successful (on the first exam attempt) in comparison to the National Counselors Exam (NCE) guide which has shown to be 98% effective (on the first exam attempt).
The LMFT exam covers a substantial amount of study material...
Theory Study Guide
THE ULTIMATE GUIDES TO THEORY
Psychological Theories
These study guides are written to complement the textbooks and lectures received in undergraduate and graduate psychology classes. Each guide is detailed in theory, easy to understand and remember.
The guides can give the student that extra information that makes a large difference in grades.
Debbie King Mabray, MS, LMFT, LPC, CART, lives and practices in Killeen, Texas. For nineteen years she has worked in Killeen Independent School District as an educator and guidance counselor. As a licenced marriage and family therapist, a licensed professional conunselor, and certified anger resolution theripist, Debbie works not just with the individual but also the family. She specializes in adolescents with clinical and behavioral challenges.
For a book's synopsis, simply click on the book title below.
To order online, click on the 'Add to Cart' icon below your title selection.
To add more than one book, simply close the PayPal Screen to return to the main page. Your entries will be saved and can be viewed at any time by clicking on the 'View Cart' icon located below each title selection.
Let's Talk to Our Kids: Successful Communication with Your Child
The Ultimate Study Guide for the National Counselor's Exam (NCE)
The Complete Study Guide for the Marriage and Family Exam
The Ultimate Guide to Psychological Theories
The Ultimate Guide to Marriage and Family Theories
Self-Sabotaging Fears: The Dream Destroyers
Deployment: A Family Affair
To order by phone, call toll free 1-877-519-1144, Adult, Child, & Family Counseling Center, M-F, 8-7.
Email orders: dmabray@wildblue.net, dmabray@earthlink.net
All of these books, except for the study guides, may
be purchased at
http://www.amazon.com.
Most credit cards are accepted. Call
There will be a shipping and handling fee charged to the total amount.
Just browsing? Get in touch anyway and let me know what you think.
|
cc/2019-30/en_middle_0014.json.gz/line111
|
__label__wiki
| 0.736758
| 0.736758
|
EPS for EQT Midstream Partners, LP (EQM) Expected At $1.55
Ted Wilson
About 52,647 shares traded. MB Financial, Inc. (NASDAQ:MBFI) has risen 21.72% since January 19, 2017 and is uptrending. It has underperformed by 18.39% the S&P500. Below is a list of Antero Midstream Partners LP (NYSE:AM) latest ratings and price target changes. MMP's profit will be $248.55 million for 16.82 P/E if the $1.09 EPS becomes a reality. The firm's revenue for the quarter was down 3.7% on a year-over-year basis. equities research analysts predict that Magellan Midstream Partners, L.P. will post 3.87 earnings per share for the current year. (MMP) traded down $0.20 during trading on Friday, reaching $72.63. About 8.66 million shares traded or 11.95% up from the average. Antero Midstream GP LP (AMGP) has 0.00% since January 18, 2017 and is. The company has market cap of $16.61 billion. It has a 14.79 P/E ratio. The firm also has interests in a 367-mile Gulf of Mexico offshore pipeline that transports crude oil to Texas and Louisiana; a 71-mile crude oil pipeline that provides transportation for various oil producers in the eastern Gulf of Mexico; and Endymion pipeline system, an 89-mile crude oil pipeline that offers transportation for various oil producers in the eastern Gulf of Mexico.
Among 13 analysts covering MB Financial (NASDAQ:MBFI), 2 have Buy rating, 0 Sell and 11 Hold. Therefore 67% are positive. Magellan Midstream Partners L.P. had 55 analyst reports since August 7, 2015 according to SRatingsIntel. Stifel Nicolaus maintained the stock with "Hold" rating in Thursday, September 7 report. The firm earned "Underweight" rating on Thursday, August 18 by Morgan Stanley. They set a "buy" rating and a $80.00 price target on the stock. Analysts rating the company a 3 indicate a Hold recommendation. It also upped Capital City Bk Group Inc (NASDAQ:CCBG) stake by 13,000 shares and now owns 38,450 shares.
More news: Clorox Co (CLX) Stake Lessened by Pennsylvania Trust Co
The stock's 50-day average volume has been 703,290 shares, with an average of 100% of medium term indicators pointing toward Buy. The stock has "Overweight" rating by Morgan Stanley on Tuesday, February 14. Mizuho initiated the shares of MMP in report on Friday, September 30 with "Neutral" rating. But for now, the stock price is moving slightly higher and does have room to the upside before it hits a potential wall of resistance and an overbought momentum rating of five bulls. Crestwood Advisors Llc bought 4,275 shares as the company's stock rose 5.51% with the market. Therefore 44% are positive. SYNNEX had 29 analyst reports since August 20, 2015 according to SRatingsIntel. Finally, Royal Bank Of Canada reaffirmed a "hold" rating and set a $22.00 price target on shares of Martin Midstream Partners L.P.in a report on Tuesday, May 23rd. The firm has "Buy" rating by Goldman Sachs given on Thursday, December 15. The rating was maintained by RBC Capital Markets on Monday, October 19 with "Outperform". After having $1.28 EPS previously, EQT Midstream Partners, LP's analysts see 21.09% EPS growth. Janney Capital has "Buy" rating and $27 target. Argus Research maintained Magellan Midstream Partners, L.P. (NYSE:MMP) rating on Monday, August 10. The rating was maintained by Keefe Bruyette & Woods with "Hold" on Friday, November 3. (NYSE:HON) on Tuesday, April 19 with "Buy" rating. The rating was initiated by Cantor Fitzgerald with "Buy" on Friday, October 16. The firm earned "Hold" rating on Friday, October 14 by Stifel Nicolaus. The consensus recommendation provided by covering analysts is presently 3.00. Morgan Stanley owns 1.32M shares or 0.03% of their United States portfolio. Shares of ENLK have increased 5.01% in the past three monthswhile the S&P 500 has dropped -0.7% in that time. Its up 0.89, from 1.16 in 2017Q2. Key Group Holdings Cayman Ltd sold 407,438 shares as the company's stock declined 20.56% while stock markets rallied. 8 funds opened positions while 14 raised stakes. 115.08 million shares or 8.34% more from 106.22 million shares in 2017Q2 were reported. 3,600 were reported by Endurance Wealth Mngmt. The Illinois-based Northern has invested 0% in SM Energy Company (NYSE:SM). Deutsche Retail Bank Ag owns 12,268 shares for 0% of their portfolio. 706,750 were accumulated by Global Endowment Management Lp. Alps Advisors Inc. now owns 15,065,633 shares of the pipeline company's stock valued at $1,070,564,000 after purchasing an additional 745,755 shares during the last quarter. Hightower Advisors Ltd Liability Corporation holds 6,487 shares or 0% of its portfolio. Td Management Lc invested in 215 shares. Public Employees Retirement System Of Ohio has 0.01% invested in Energen Corporation (NYSE:EGN) for 47,356 shares. Howe And Rusling Inc has invested 1.07% in Magellan Midstream Partners, L.P. (NYSE:MMP). Citadel Advsrs Limited Liability Corp reported 58,063 shares or 0% of all its holdings.
At the session level, shares of Allison Transmission Holdings, Inc. The hedge fund held 1.55M shares of the natural gas distribution company at the end of 2017Q3, valued at $110.41 million, down from 1.80 million at the end of the previous reported quarter. Driehaus Cap Mgmt Limited Co reported 117,447 shares stake.
BidaskClub Upgrades ImmunoGen (IMGN) to "Buy"
On Wednesday, September 13 BARROWS CRAIG sold $252,457 worth of ImmunoGen, Inc . (NASDAQ: IMGN)'s near-term growth potential. The stock of The Progressive Corporation (NYSE:PGR) has "Buy" rating given on Tuesday, October 17 by Keefe Bruyette & Woods.
Patriots' Tom Brady practices Thursday with gloves on both hands
Brady's throwing hand would probably have to be amputated, or at least swollen up like a balloon, for him to miss Sunday's game . The same can be said of the Vikings , who entered the season with Sam Bradford as their quarterback and had big playoff hopes.
Wasatch Advisors Inc. Boosts Holdings in Comcast Co. (CMCSA)
It operates through Cable Communications, Cable Networks, Broadcast Television, Filmed Entertainment, and Theme Parks divisions. Argus Research maintained Comcast Corporation (NASDAQ:CMCSA) on Friday, August 4 with "Buy" rating. 12,180 are held by Kistler.
FY2017 EPS Estimates for Oasis Petroleum Inc. Increased by Analyst (OAS)
Campbell & CO Investment Adviser LLC acquired a new position in Oasis Petroleum during the second quarter valued at $237,000. Finally, Precocity Capital LP increased its holdings in shares of Oasis Petroleum by 20.5% during the third quarter.
This Is The Truth On Edin Dzeko - Agent Addresses Chelsea Interest
But then who doesn't like Edin?' "My role is not to reveal certain dynamics of the market". He scored 50 goals in 130 league games for City before being sold to Roma in 2016.
Gov. Cuomo's congestion pricing plan details expected today
Trucks would pay $25.34, while taxis and for-hire vehicles like Uber and Lyft might end up with a surcharge of $2 to $5 per ride. Supporters of the idea say it could not only address gridlock, but also raise money for mass transit.
Patriots' Brady misses practice with right hand injury
They plan to launch a unique university scholarship programme in association with one of our partners in the coming weeks. If anybody can do it, it's Brady . "He's been good all year, he's been great in the playoffs", Belichick said.
Overstock.com Inc (NASDAQ:OSTK) Insider Sells $256400.00 in Stock
DA Davidson boosted their price objective on shares of Overstock .com to $57.00 in a research note on Wednesday, October 25th. The company's net profit margin has achieved the current level of -0.6 percent and possesses 19.4 percent gross margin.
'Jersey Shore' star pleads guilty to tax charge
They were charged in 2014 and again previous year with multiple counts related to almost $9 million in income from the show. The Sorrentino brothers allegedly failed to pay income tax on their earnings of almost $9 million between 2010 and 2012.
Global Automotive Voice Control System Market 2018- BMW, General Motors Corp. and Ford
Concise Automotive Voice Control System Market study based on major geographical regions . Also, gross and gross margin are analysed with respect to types and regions .
OnePlus confirms security breach with a staggering number of affected users
You're nearly certainly off the hook for any fraudulent use as long as you report what you've seen in a reasonable timeframe. Payment cards already saved on the site and transactions via PayPal are thought to be unaffected.
Netflix Announces Weekly Topical Series THE JOEL MCHALE SHOW
The 46-year-old comedian is set to host a new unscripted series for the streaming company, they announced on Friday (January 19). McHale went on to star in NBC's cult comedy Community as Jeff Winger, and also starred The X-Files and CBS' The Great Indoors .
How a Government Shutdown Can Affect You!
House Minority Whip Steny Hoyer (D-Md.) complained that Republicans had "squandered" three previous short-term extensions. Joe Manchin said earlier this week. "The leader is looking to deflect blame but it just won't work".
Intuit Inc. (INTU) Rating Reiterated by Brean Capital
This represents a $1.36 annualized dividend and a dividend yield of 1.19%. 106 funds opened positions while 696 raised stakes. Finally, Arrowstreet Capital Limited Partnership boosted its stake in shares of Intuit by 52.5% during the 2nd quarter.
Fourth rape case in a month collapses
It comes as Britain's top prosecutor claimed no innocent people are in jail as a result of failures to disclose crucial evidence. On Thursday, Judge Jonathan Black ordered the prosecution to send someone to outline on what basis the case had been dropped.
As expected: Maria Sharapova advances at Australian Open
When both these boxes are ticked, matches on outside courts are halted and roofs closed on all three indoor-capable venues . I lost it and I (went) a little bit insane ".
Darling International Inc (NYSE:DAR) Institutional Investor Sentiment Is 1.04
The institutional investors in our partner's database now have: 157.64 million shares, up from 153.27 million shares in 2017Q2. Darling Ingredients Incorporated (NYSE: DAR ) had an increase of 4.16% in short interest. (NYSE:DAR).
Trump's Plan Has Always Been To Deport The Dreamers Then Blame Democrats
Whatever his proclamations to the contrary, Trump signaled that he clearly prefers white immigrants to those of color. Trump also took credit for last week's stock market rise and for the tax cuts passed last month by Congress.
Allianz Asset Management GmbH Invests $264000 in Ramco-Gershenson Properties Trust (RPT)
The Company's primary business is the ownership, management, redevelopment, development and operation of retail shopping centers. Employees Retirement Of Texas holds 0.02% of its portfolio in Ramco-Gershenson Properties Trust (NYSE:RPT) for 91,000 shares.
Monolithic Power Systems, Inc. (NASDAQ:MPWR) to Issue Quarterly Dividend of $0.20
It increased, as 17 investors sold MPWR shares while 76 reduced holdings. 38 funds opened positions while 108 raised stakes. Shares of Monolithic Power Systems, Inc . (NASDAQ: MPWR ) has risen 53.09% since January 18, 2017 and is uptrending.
Institutional Investor Sentiment About Navigators Group Inc (NASDAQ:NAVG) Increased
The insurance provider reported ($1.00) EPS for the quarter, missing analysts' consensus estimates of ($0.63) by ($0.37). The firm has a market capitalization of $4,760.00, a PE ratio of 28.18, a P/E/G ratio of 1.92 and a beta of 1.57.
$0.99 EPS Expected for Exxon Mobil Corporation (XOM)
The rating was maintained by Buckingham Research on Monday, September 26 with "Buy". (NASDAQ:AAPL) rating on Thursday, October 26. Over the last five days, shares have managed 1.57% gains and now is up 7.13% since hitting its 200-day moving average of $81.52.
Vonn dominates Cortina downhill training again
It is with a heavy heart I have to say goodbye to ski racing, but I do so also with a very Full heart. "It's sad. I'm happy that I get to ski my last race here in Cortina - one of my favorite stops on tour.
Price Target Review of: HCP, Inc. (HCP), WisdomTree Investments, Inc. (WETF)
In other news, Director Frank Salerno sold 50,000 shares of the firm's stock in a transaction dated Friday, December 15th. Engineers Gate Manager LP invested in 0.04% or 46,637 shares. 18,193 were accumulated by Alpha Cubed Invs Llc.
General Electric's (GE) "Sell" Rating Reiterated at JPMorgan Chase & Co
It is negative, as 37 investors sold PPL shares while 222 reduced holdings. 76 funds opened positions while 255 raised stakes. Commonwealth Of Pennsylvania Public School Empls Retrmt Sys stated it has 704,123 shares or 0.25% of all its holdings.
Release of 'Padman' postponed to Feb 9
However, with Padman getting postponed, Padmaavat is expected to have a successful opening at the Box Office. Sanjay told Akshay that he "will be grateful for a lifetime" to him for postponing the release of his film.
Office Depot (ODP) Earning Somewhat Positive Press Coverage, Study Shows
A year ago the company's sales were $2730000 while its sales growth yearly estimates for the current quarter are -4.1%. The stock increased 3.12% or $1.15 during the last trading session, reaching $37.99. (NASDAQ:ODP) for 2.86M shares.
Jets WR Robby Anderson Arrested Again In South Florida
The police report indicated he was fighting with security and a police officer after he was ordered to leave the festival. The 24-year-old undrafted receiver signed with the Jets in 2016 after playing college football at Temple University.
Entercom Communications Corp (ETM) A Look at Technical Overview
Following the acquisition, the insider now directly owns 1,823,072 shares in the company, valued at approximately $21,147,635.20. They just need to take the company's market capitalization and divide it by the company's total sales over the past 12 months.
Dineequity Inc (DIN): Tracking the Indicators
The RSI, or Relative Strength Index, is a widely used technical momentum indicator that compares price movement over time. The Aroon Oscillator was developed by Tushar Chande to highlight the start of a new trend and to measure trend strength.
Florida man mistakes bank drive-thru for Taco Bell, charged with DUI
The manager called police to report an impaired driver, and when officers arrived, they found Francisco in the bank's parking lot. Francisco was also found to be carrying Oxycodone and Xanax at the time of his arrest, but had prescriptions for both.
Republicans demand release of secret surveillance memo in Russian Federation investigation
Matt Gaetz (R-FL). 'You think about, "Is this happening in America or is this the KGB?" What I saw is absolutely shocking. It is shocking, ' added North Carolina Rep.
Tom Brady responds to Jalen Ramsey over his Super Bowl comments
On one hand, the Steelers racked up a lot of passing yards after falling behind 21-0 to start the game . Jaguars coach Doug Marrone expects his defense to line up against Brady , not Hoyer, on Sunday.
LLC Sells 381784 Shares of MACOM Technology Solutions Holdings Inc (MTSI)
Finally, Voya Investment Management LLC boosted its stake in shares of MACOM Technology Solutions by 47.7% in the second quarter. Blackrock holds 0.01% of its portfolio in MACOM Technology Solutions Holdings, Inc. (NASDAQ:MTSI) rating on Tuesday, October 13.
AR Grows Stake in Wal-Mart Stores, Inc. (WMT)
Finally, Ameriprise Financial Inc. raised its position in shares of Wal-Mart Stores by 7.4% in the 2nd quarter. (NYSE: WMT ). Following the sale, the insider now owns 121,457 shares of the company's stock, valued at approximately $11,764,325.02.
First National Trust Co Decreases Position in Raytheon (RTN)
Three investment analysts have rated the stock with a hold rating and sixteen have given a buy rating to the company's stock. ValuEngine upgraded shares of Raytheon from a "hold" rating to a "buy" rating in a research report on Sunday, December 31st.
LLC Has $79.33 Million Holdings in AO Smith Corp (AOS)
The investment professionals in our partner's database now have: 123.32 million shares, down from 152.59 million shares in 2017Q2. It is negative, as 56 investors sold CSX shares while 351 reduced holdings. 57,597 are owned by Dekabank Deutsche Girozentrale.
|
cc/2019-30/en_middle_0014.json.gz/line112
|
__label__wiki
| 0.932808
| 0.932808
|
YouTube responds to controversial Logan Paul video
Logan also has been cut from the original YouTube comedy series Foursome, which stars other similar social media entertainers. "I'm simply here to apologize", he said on the more somber video apology uploaded on YouTube and Twitter.
As criticism against him grew - and as many called for his channel's removal, including his fellow YouTube stars - Paul posted an emotional video apology on Twitter.
Paul was forced to apologise after his video of a man hanging in Japan's "suicide forest" was slammed for being insensitive. You're right to be.
Paul's personal channel, which boasts more than 15.6 million subscribers, will be removed from YouTube's premium advertisement lineup, Google Preferred, a YouTube spokesperson confirmed.
Akana questioned Paul's claim that he'd been trying to spread mental health awareness through the video. You deserve to know what's going on, ' the statement read.
More news: Wayne Ellington's game-winner to beat Toronto
Showing his honest feelings about Paul's videos, Yuta makes some stern statements towards the end of the video, saying "YouTube is complicit...it's like they're sending a message saying you can be as anti-social as you want, as long as you don't talk about politically sensitive topics". We know that the actions of one creator can affect the entire community, so we'll have more to share soon on steps we're taking to ensure a video like this is never circulated again.
After his video garnered national attention, Logan eventually issued two apologies in hopes people would understand him.
Uploading the video to his Instagram account, father Paul eagerly thanked the members of the #Logang who stood beside their leader despite the fact that he openly mocked, disrespected and profited off of a suicide victim. "That is a definite", Greg Paul says in the video.
"I was misguided by the shock and awe, as portrayed in the video", Paul told his followers.
The vlogger violated its policies on gory content with a video showing his visit to Aokigahara, a forest near Japan's Mount Fuji that has developed a worldwide reputation for the number of suicides carried out among its trees.
Arpaio 'not concerned' about Senate opponents, sheriff race loss
If I did, I wouldn't know what office to run for", said Arpaio about his response he gave at the time of the question. Arpaio refused to go into the details but he believed he had enough evidence to support his claims, CNN reported .
Mets bring back Jay Bruce
Martinez still out there seemingly holding up other players, however, seems to have created a buyers market in January. Out of contention, the Mets finally shipped Bruce to the Indians in August for minor league relief pitcher Ryder Ryan.
Samsung's future United States smartphones will have active FM radio chips
For all of the advanced features packed into modern mobile handsets, a few basic-but-useful tools have sadly fallen by the wayside; namely the FM radio .
Woman found dead in abandoned Subway identified as GSU student
According to the police report, Man's family did not have any contact with her following her second disappearance on October 10. Channel 2's Gwinnett County Bureau Chief Tony Thomas spoke with Man's aunt about her death, for Channel 2 Action News at 6 p.m.
Notre Dame will reportedly lose assistant Harry Hiestand to NFL
The first hire came on their offensive line, as they announced the hiring of Harry Hiestand as their new offensive line coach. In the case of Hiestand, he has been at Notre Dame since the 2012 season, but this was his most heralded year to date.
New PUBG patch hits test servers, improvements all round
Along with the DESPERADO crate, the BIKER crate will be available in-game and will be free to open like previous loot crates. This is a high probability that everyone will be able to get one of the two new.
'Darkest Dungeon' Comes To Nintendo Switch On January 18
Darkest Dungeon has finally got an official release date for the Nintendo Switch . It later moved on to the PlayStation Vita, iPad, and now Nintendo Switch.
Penn National wins mini-casino bid despite gaming expansion lawsuit
On Thursday, July 27 the stock rating was maintained by Stifel Nicolaus with "Buy". (NASDAQ:PENN) rating on Thursday, July 27. Employees Retirement Association Of Colorado stated it has 20,615 shares. 58 are owned by Asset. 67,037 are owned by Gp.
Baseball agent fired amid claim he filmed players in shower
According to Murray, one player found a camera while using the shower at Wood's home before confronting him and firing him. Last April, Wood's original firm, Arland Sports, was acquired by Career Sports Entertainment .
U.S. violated trade rules, Canada claims after Bombardier row
Put another way, Canada may be taking on the United States on behalf of the rest of the world, whether by default or construction. The complaint challenges the ways that the USA investigates products for subsidies and below-cost sales.
'Sweet and confident' Princess Charlotte is already speaking Spanish
Charlotte also displays incredible poise and confidence - a trait shown by the Queen in some of her early childhood photos.
Hold the Romaine Lettuce
But infection with the O157 strain, which produces a shiga toxin, can cause severe abdominal cramps, bloody diarrhea and vomiting. Food and Drug Administration continue to investigate a multistate outbreak of 24 STEC O157:H7 infections in 15 states.
Shock As Koala Found Screwed To Pole
Murray Chambers, a spokesperson for the KRQLD, said the violent act took advantage of a "vulnerable" and "innocent" native animal. Australian police are investigating after a koala was discovered screwed to a wooden post by staff at a local animal shelter.
Tesco enjoys its 'biggest' Christmas in the UK
Tesco plc ( TSCO .L, TSCDY.PK) reported that its Group like-for-like sales grew by 0.6% for the 19 weeks to 6 January 2018. The Czech Republic did well, as did Slovakia, with Tesco citing an improvement to its customer offer.
James Rosen reportedly left Fox News amid sexual harassment allegations
One incident occurred as far back as the winter of 2001, when Rosen allegedly groped the breasts of a female journalist in a cab. NPR reported that there were three separate instances in which Rosen made "overt physical and sexual overtures" to co-workers.
Sears raises $100 mln in new funding, sees holiday sales drop
Sears also said it won concessions from lenders that allow it to borrow more money based off of the value of its inventory. The company's distance from 52-week high price is -77.58% and the current price is 3.88% away from 52-week low price.
Spluttering Real Madrid 'did what they had to do' vs. Numancia - Zidane
I'd like it to be doing better in the league and we can improve but what I have to do is keep working and giving my best. Zidane said he has no interest in signing a striker in the January transfer window despite an injury to Karim Benzema.
Portland Trail Blazers' Damian Lillard will play vs. Houston Rockets
Paul's trey upped Houston's lead to 111-104, but Lillard answered with a driving layup to make it 111-106 with 1:38 remaining. So this is the flawless game for the Rockets to get another victory and build some confidence without James Harden .
OH man indicted for using 'Fruitfly' malware to spy on Americans
The investigation determined that Durachinsky had infected computers at other universities and institutions from 2003 to 2017. Department of Energy. "In some cases, the malware alerted Durachinsky if a user typed words associated with pornography".
US Could 'Conceivably' Return to Paris Climate Deal
President Donald Trump said Wednesday that the USA could "conceivably go back in" the Paris climate agreement if a fairer deal was reached, though he gave no concrete sign that any such deal was being discussed at this stage.
Ice cream bars sold at Giant Eagle, Aldi recalled
Customers are asked to discard any unused portions of these products and bring their receipt to Giant for a full refund. Consumers looking for additional information on the recall may call Fieldbrook Foods at 1-800-333-0805 x2270.
YouTube Finally Issues Response to Logan Paul Controversy
It was not the first time YouTube's PR image has suffered because of its own content creators. YouTube is cutting some ties with Logan Paul .
Rocky Horror Show boss apologises as more McLachlan accusers come forward
Craig McLachlan once detailed an explicit prank he played on Molly Meldrum in the Australian TV veteran's own autobiography. McLachlan has vehemently denied the allegations, describing the claims as 'inventions'.
'Black Widow' Movie Reportedly in Development at Marvel Studios
Marvel execs have met with Black Widow actress Scarlett Johansson to discuss what they wanted in the script. Black Widow is next set to appear in AVENGERS: INFINITY WAR , which will hit theaters on May 4, 2018 .
Ricky Martin & Jwan Yosef Are Married
We're a modern family, and I think people need to see, and I want to normalise the beauty of our family. "This is a lovely sense of freedom", he added to Out magazine .
DISH to provide voice-based TV control with Google Assistant
The high-resolution touch screen and camera is framed by two front-firing stereo speakers and a rear-facing passive radiator. Lenovo's teamed up with Google to create a rival to Amazon's Echo Show .
Cyberpunk 2077 Twitter Gets First Update In Over Four Years
But since The Witcher 3 released in May 2015, the studio has presumably kicked development of Cyberpunk 2077 into high gear. Cyberpunk 2077 started off as a role-playing game, which is reported to be set in the open sci-fi world of Night City.
MacOS App Store Preferences Open With Any Password
The bug, we gather, is fixed in the latest macOS 10.13 beta releases, and will be addressed in the next official release, too. A local admin can enter their username and any password in the App Store section of System Preferences to unlock the menu.
Molson Coors Brewing (TAP) Downgraded to Hold at Zacks Investment Research
If you take a peek at Molson Coors Brewing Company (NYSE:TAP), you may spot some reasons to watch the retail space for value. It is negative, as 29 investors sold TPX shares while 80 reduced holdings. 19 funds opened positions while 24 raised stakes.
Trump says he would beat Oprah Winfrey in White House race
The enthusiasm for an Oprah candidacy illustrates the range of candidates who may eventually run against Trump. She had read it to me for time, but it was the type of thing where she knew she had a message to deliver.
Senator releases text of interview with Fusion GPS official
"The transcript of Glenn Simpson's lengthy responses to the Senate Judiciary Committee's questioning speaks for itself". Simpson's firm commissioned the dossier , which was initially paid for by a conservative website and later by Democrats.
Woman accuses NY state senator of sexual misconduct
I want to make it very clear to everyone", Klein said. "This never occurred", Savino said in a phone call. Jeff Klein is accusing him of sexual misconduct.
Ford Edge ST: Crossover gets hot-hatch thinking, more tech
The Edge ST follows the Fiesta and Focus into ST territory , albeit with a powertrain that wears a "Sport" badge on other models. The 2019 Edge ST joins the refreshed 2019 Edge lineup and also signals the introduction of the first ever ST badged Ford SUV.
Why the Golden Globes Just Renewed My Faith in Hollywood
The Golden Globe Awards show is produced by Dick Clark Productions, which shares a parent company with The Hollywood Reporter . THE 75th Golden Globes red carpet was all about one colour this year - black.
'Pretty Jarring': Cal State San Bernardino on Lockdown Following Non-Injury Shooting
The university sent out a tweet notifying students that shots had been fired near the Visual Arts Building and parking structure. Mike Madden told KTLA there was no active shooter on campus, and that investigators were not even sure whether shots were fired.
Gillian Anderson is done with The X-Files after this season
I'm feeling pretty pissed off, now that I remember", Duchovny joked. "When I was asked to do another season, I did". As for X-Files, "I arrived at the decision before we did the previous six, but I was really curious".
Pennsylvania heroin and opioid epidemic a disaster, governor says
The County Commissioners Association of Pennsylvania released a statement following Governor Wolf's announcement. Denise Shanahan struggled to help her daughter Bryanna for over 10 years before losing her to a drug overdose .
|
cc/2019-30/en_middle_0014.json.gz/line113
|
__label__wiki
| 0.901461
| 0.901461
|
California wildfires force Kim Kardashian, Alyssa Milano, more to evacuate homes
Reality TV star Kim Kardashian-West was forced to grab much of what she could in an hour and flee her home on Thursday night. Kim revealed in her Instagram stories that she had just one hour to pack up before leaving her Calabasas home.
"I just had to evacuate my home from the fires", the actress posted on Twitter.
Kourtney, 39, shared a photo with supplies packed into one of her vehicles, stating, 'I pray that everyone is safe and protected from these fires, ' adding, 'No Calabasas tonight'. Kourtney Kardashian also shared a post of her loading up her vehicle and leaving her home. She followed with a message thanking fire fighters for "all that you do for us!" "I pray everyone is safe". "Saying prayers and thanking all of the fearless firefighters who risk their lives for us".
Other celebrities such as Alyssa Milano and Rainn Wilson said they had to evacuate their homes due to the fires.
More news: Melbourne stabbings being treated as terror attack by Australian police
The Keeping Up with the Kardashians star had shot an aerial video of the flames from her private jet, which she posted on her Instagram Stories, according to the magazine.
She said, "Pray for Calabasas".
They also tweeted this morning that there are mandatory evacuations in place, 'From Las Virgenes Road and Malibu Cyn Road to the Ventura County Line, ' due to, 'a fast-moving fire line'. "I need an evacuation update please". "I took my kids, dogs, computer and my Doc Marten boots".
The City of Calabasas' official Twitter account noted the Woolsey fire grew to over 2,000 acres with zero percent containment.
Scientists At Odds About Whether Space Rock Oumuamua is an Alien Probe
In order for it to be effective, Oumuamua needs to be less than a millimetre in thickness, like a sail. But other astronomy experts aren't buying it.
Niantic Reboots its First Game, Ingress, With a Big Update
In the case of Ingress Prime , it was able to experiment more freely when working with its own IP. The technology pioneered by Niantic in Ingress was then used as the foundation for Pokemon Go .
At least 13 dead in California bar shooting
Each moment was captured by TV cameras and broadcast live on cable networks as Americans grappled with another mass shooting . Last year, a country music festival in Las Vegas was the scene of the worst mass shooting in modern United States history.
Target & Walmart release Black Friday ads for holiday shoppers
Holiday sales are seen increasing 5.8 percent this year and surpassing $1 trillion for the first time, according to researcher eMarketer.
India to join talks with Afghan Taliban at 'non-official level'
This is the first time that a Taliban delegation is taking part in such high-level worldwide meeting, Russian foreign ministry spokeswoman Maria Zakharova said Thursday.
Federal judge in Montana blocks construction of Keystone XL pipeline
Morris particularly criticized the Trump administration for ignoring the recognized effects of the pipeline on climate change. TransCanada , which had been planning the pipeline for much of this decade, had planned to begin construction next year.
Sarkar controversy: AR Murugadoss rubbishes arrest rumours
The scene is a swipe at the freebie culture that exists in Tamil Nadu. We will also take this to the attention of the Chief Minister.
White woman seen harassing black women turns herself in
Westwood seen questioning and wanting to know why the two other women were in the parking lot outside of the apartment building. Because Westwood was gone by the time the police arrived, a warrant was issued for her arrest on October 30, according to WCNC.
Celtics rally from 22 down to top Suns in OT
His defensive stops disrupted the Suns , while his shooting made all the difference for him and the rest of the Celtics . That team was the same Celtics squad that routinely overcame double-digit deficits during last year's 55-win campaign.
Former Sun Tyson Chandler officially signs with Lakers
The Lakers ended the clash with a +7 rebounding advantage, the first time they've done so since their third game of the season. Josh Hart provides a spark off the bench with 21 points while Kyle Kuzma adds 21 points of his own.
Tom Curry ruled out of England's entire autumn worldwide series
"But you know that, you know that there's going to be pressure with the job, and you accept that and you get on with it". We'll get our chance when we're kicking the ball to get it back, so it's all about making the most of our opportunities.
California wildfire destroys homes, hospital; deaths reported
One evacuation center was even forced to close down as the flames spread. "That's when I made a decision to get out". Gavin Newsom declared a state of emergency in Butte County. "We're talking devastated", McLean said.
McConnell: ‘The Mueller investigation is not under threat’
Trump has repeatedly denied any collusion with Russian Federation , and describes Mueller's investigation as a "witch hunt". Those TV appearances included one on CNN in which Whitaker suggested that the Mueller probe could be starved of resources.
Meg Ryan announces engagement to John Mellencamp
Meg Ryan is engaged to John Mellencamp and she just confirmed the news on her Instagram account. After saying that the actress " hates him to death ", he added: "Oh, women hate me".
These 'bionic mushrooms' may produce electricity
Manoor says this network of nanoribbons is akin to "needles sticking into a single cell to access electrical signals inside it". Joshi and Mannoor discovered they could produce more electricity depending on the density and alignment of the bacteria.
Lindsey Graham: No 'Holy Hell to Pay' for Sessions Firing
The probe cost more than $16 million during its first year, according to figures released by the Justice Department in May. According to the department's most recent report, $10 million was spent from October 1, 2017, through March 31.
Japanese TV show axes BTS performance over atomic bomb T-shirt
BTS member Jimin reportedly wore the shirt a year ago , on Aug 15, when Koreans celebrate the end of Japanese occupation in 1945.
Xiaomi Mi 8 Camera Review | Incredible HDR
Today we witness a new chapter in Xiaomi's global expansion journey, underpinned by our global ambitions. We've also produced a tips and tricks guide to help you get started with your Mi 8 Pro.
Trump Threatens to Investigate Democrats if They Probe His Administration
Trump's commitment to diplomacy is admirable, as is his obvious skepticism of wars for regime change followed by nation-building. In recent midterm elections when presidents faced a backlash from voters, the president accepted their brushback.
Boeing Jet Crash-Lands At Guyana Airport, 6 Injured: Minister
The passengers included one American, 82 Canadians, 35 Guyanese, one Pakistani and one Trinidadian. One of the aircraft's turbines is seen badly damaged after it apparently hit the barrier.
Verizon Prepaid Gets Cheaper Today
It also includes unlimited mobile hotspot at 3G speeds, though it caps video streaming on T-Mobile's network at 480p resolution. Yesterday, Verizon tweaked its prepaid plans to make them more competitive with competing offerings from other carriers.
Larry Drew agrees to deal to coach Cavaliers for rest of season
He grabbed his chance to shine after Westbrook twisted his left ankle with 4:25 remaining in the third quarter. Augustin, who got fouled and made both free throws to cut the Cleveland lead to one with 18.7 seconds to play.
Australian police say several people stabbed in Melbourne; man arrested
One witness told the Herald Sun that bystanders were calling to police, "shoot him, shoot him". "And then I heard one loud bang". One of the injured was reportedly in suspected critical condition with a neck injury, while another had sustained a head injury.
Philippines hands Imelda Marcos lengthy prison term in graft case
That allowed him to shutter the legislature, muzzle the free press and jail or kill those who dared to oppose his dictatorship. Marcos critics rejoiced at the news of the conviction, which came almost three decades after the case was filed in 1991.
Danny Welbeck injury overshadows Arsenal Europa League progress
Emery confirmed the injury was "serious" but the Gunners will wait to learn the full extent of the 27-year-old's issue. But Arsenal could not take advantage as Aubameyang blasted the resulting free-kick well over the crossbar.
Ozone layer hole will 'totally heal within 50 years'
Another problem is that new technology has found an increase in emissions of a banned CFC out of East Asia, the report noted. He added: "If ozone-depleting substances had continued to increase, we would have seen huge effects".
Cassian Andor Is Getting His Own Star Wars Streaming Series
Further details of the forthcoming TV series have been pretty quiet, but that doesn't mean it's completely hush-hush. Luna said in a statement that the format would be a chance to "explore this character more deeply".
Bombardier to cut 5000 jobs, shares dive on cash flow concerns
The layoffs are expected to take place over the next 12 to 18 months and are expected to save Bombardier $250 million by 2021. The strong profit came despite a five percent drop in quarterly sales from the same period a year ago to $3.6 billion.
Dead-Balling Shiva Singh’s 360 Delivery Curbs Bowlers’ Innovation
However, some fans were left scratching their heads over the exact rule and whether or not Shiva Singh's delivery was fair or not. The batsman defended the ball with relative ease but umpire Vinod Seshan immediately deemed the delivery to be a "dead ball".
Microsoft is working on a fix for Windows 10 Pro activation bug
Our engineers are working tirelessly to resolve this issue and it is expected to be corrected within one to two business days. The system is asking the users to install a Windows 10 Home version to close the troubleshooting.
California fires: Malibu residents ordered to evacuate
The National Weather Service now predicts heavy winds throughout Friday morning could potentially help spread the blaze. Approximately 75,000 homes are under evacuation orders in Ventura and Los Angeles counties Friday morning.
Trump pushes back at Michelle Obama
Everything was old and exhausted and I came in and I had to fix it and I'm in the process of spending tremendous amounts of money.
Active shooter reported at North Carolina's Topsail High School
Authorities said he claimed to have brought the gun to school because he planned to stop a rumored school shooter. The Pender County Sheriff's Office will be holding a news conference this morning with an update .
Sheriff Vet Killed Responding to Calif Shooting - Police Depts Pay Tribute
He worked on drug investigation assignments, served on a SWAT team and was a firearms instructor for recruits at basic training. Helus was shot multiple times as he and a California Highway Patrol officer exchanged fire with the gunman inside the bar.
F1 to race in Vietnam from 2020
Vietnamese media said race rights alone - to be paid to Liberty Media , Formula One's new owner - could come with a US$60 million (S$82.2m) price tag.
Lewis Hamilton: Brazil security not on F1 champion's mind
Bottas was leading September's Russian Grand Prix when he was asked by the Mercedes team to move over and gift victory to Hamilton.
United States warns ports against welcoming Iranian ships, following new sanctions
However, this time the USA is alone, and the entire world, except for a few countries, have vowed to maintain business with Iran. South Korea is a large buyer of Iranian condensate, a super light form of crude oil , used by its large petrochemical industry.
|
cc/2019-30/en_middle_0014.json.gz/line114
|
__label__cc
| 0.507084
| 0.492916
|
PATH: BS | Health & Medicine | Toxic Substances
New Analysis Of Drugmaker Data Reveals Paxil Is Dangerous
[Biotech]
Fourteen years ago, a leading drug maker published a study showing that the antidepressant Paxil was safe and effective for teenagers. On Wednesday, a major medical journal posted a new analysis of the same data concluding that the opposite is true.
That study — featured prominently by the journal BMJ — is a clear break from scientific custom and reflects a new era in scientific publishing, some experts said, opening the way for journals to post multiple interpretations of the same experiment. It comes at a time of self-examination across science — retractions are at an all-time high; recent cases of fraud have shaken fields as diverse as anesthesia and political science; and earlier this month researchers reported that less than half of a sample of psychology papers held up.
TED Organizers Ban Any Discussions Criticizing GMOs
Under the guise of combating a rise in "pseudoscience" the producers of the TED series of lectures have laid down bold new rules that inhibit any discussion on a number of controversial subjects that are anything but pseudoscience. They have even gone so far as to suggest "food as medicine" is quackery.
While some of the claims in their guidelines make sense, such as the non-pandering to the intertwining of spirituality and science, the notion that Genetically-modified foods and the skepticism over their long-term value being considered "psuedo-science" appears to be pandering to select, powerful corporate interests, and has caused a backlash among those in the educational/intellectual community.
American Food That Is Banned Elsewhere
Every day, millions of Americans enjoy food products that other countries have deemed unsafe for consumption. Let's take a look at some examples..
Russia Bans GM Corn After Study Shows Cancer Risk
Russia is temporarily banning the import of Monsanto’s genetically modified (GM) corn after results of a new study published in the Journal of Food and Chemical Toxicology showed rats fed GM corn developed tumors and organ damage, with a high rate of premature death, according to the Wall Street Journal.
Studies Show Pesticide Responsible For Bee Disappearances
Thousands of scientific sleuths have been on this case for the last 15 years trying to determine why our honey bees are disappearing in such alarming numbers. “This is the biggest general threat to our food supply,” according to Kevin Hackett, the national program leader for the U.S. Department of Agriculture’s bee and pollination program.
Until recently, the evidence was inconclusive on the cause of the mysterious “colony collapse disorder” (CCD) that threatens the future of beekeeping worldwide. But three new studies point an accusing finger at a culprit that many have suspected all along, a class of pesticides known as neonicotinoids.
In the U.S. alone, these pesticides, produced primarily by the German chemical giant Bayer and known as “neonics” for short, coat a massive 142 million acres of corn, wheat, soy and cotton seeds. They are also a common ingredient in home gardening products.
Household Cleaning Products You Might Want To Avoid Using
Nothing like mopping your floors, scrubbing your counters and cleaning your shower with hazardous waste. That’s essentially what you’re doing if you use many name-brand household cleaners to get your home spic-and-span. But you eco-conscious clean freaks probably already knew that.
If you’re concerned about your health and helping the environment, your toxic household cleaners were likely the first to go. And for good reason. The household cleaning industry is largely unregulated and companies aren’t required to include ingredient lists for cleaning products, like they are for food, drugs and personal care products.
Study Shows GM Corn Linked To Organ Failure
In a study released by the International Journal of Biological Sciences, analyzing the effects of genetically modified foods on mammalian health, researchers found that agricultural giant Monsanto's GM corn is linked to organ damage in rats. It is suggested that almost all corn in America is Genetically-modified, and almost all processed food products may contain GM corn.
Fish You Should Not Eat
Did you know that the "catfish" on that plate you're eating is not legally defined as a "catfish" by the US Federal government and is therefor exempt from certain regulations restricting the use of drugs and antibiotics?
But that may be just the tip of the fin...
Evidence Mounts On Danger of Glyphosate Pesticides
A recent report put together by various professors, scholars and researchers affiliated with Earth Open Source, a collaboration group devoted to food issues, cites in great detail the multitude of peer-reviewed scientific studies which show that Monsanto's Roundup herbicide (glyphosate), which is applied to many genetically-modified (GM) crops, is responsible for causing birth defects, endocrine disruption, DNA damage, reproductive and developmental toxicity, neurotoxicity, and cancer -- and yet government agencies around the world continue to ignore this crucial information, and withhold it from the public, as they push for its approval or expanded use.
World Health Organization: Cell Phones Likely Cause Cancer
[Technology]
Radiation from cell phones can possibly cause cancer, according to the World Health Organization. The agency now lists mobile phone use in the same "carcinogenic hazard" category as lead, engine exhaust and chloroform.
A Look At Chernobyl Reveals Impending Fukushima Disaster Scope
Prominent Australian physician, author and nuclear expert Dr. Helen Caldicott reveals the details on what happened in the Chernobyl disaster in Russia; why Fukushima in Japan is "several orders of magnitude worse" and what this means in terms of lives and what the media is not telling you about how radiation affects peoples' health. No matter where you are in the world, you should watch this video to understand the implications of the nuclear disaster in Japan because it indeed will affect all of the Earth...
French Court Rounds Up Monsanto Lies
France's highest court has ruled that US agrochemical giant Monsanto had not told the truth about the safety of its best-selling weed-killer, Roundup.
Just How Bad Is The Deepwater Horizon Disaster?
It goes without saying that most people no longer believe what British Petroleum is saying publicly about the amount of oil leaking into the Gulf and the condition of the well structure. The reality is much more frightening... In a few crevices in Cyberspace, experts in the industry are whispering what they think is really going on...
BP Oil Spill Destroying Coastlands; Action Not Happening
Plaquemines parish president, Billy Nungesser makes a plea to the government to take over the project and stop British Petroleum's control over the Deepwater Horizon oil spill as he watches the coastal marshes become irrevocably destroyed by the oil slick...
Foreign Seafood: Something's Fishy
Ever wonder how much seafood in your market comes from overseas and how much testing goes into it? And why is it that there are fish here from half way across the world that can be found in area waters?
GM Corn Linked To Organ Failure In Studies
In a study released by the International Journal of Biological Sciences, analyzing the effects of genetically modified foods on mammalian health, researchers found that agricultural giant Monsanto's GM corn is linked to organ damage in rats.
GM Soybeans Now Responsible For "Super Weeds" And More Pesticide
In 1996, Genetically-modified soybeans were put in use in Argentina. While other areas of the world have been more cautious in dealing with GM crops, little discussion was made and now the end result appears to be a new breed of "super weeds" and the use of even more pesticide and potential damage to the soil, air and water sources.
Tanning Beds Now Identified As Major Cancer Risks
[Faulty Products]
International cancer experts have moved tanning beds and other sources of ultraviolet radiation into the top cancer risk category, deeming them as deadly as arsenic and mustard gas.
A new analysis of about 20 studies concludes the risk of skin cancer jumps by 75 percent when people start using tanning beds before age 30. Experts also found that all types of ultraviolet radiation caused worrying mutations in mice, proof the radiation is carcinogenic. Previously, only one type of ultraviolet radiation was thought to be lethal.
Indians Market New Bottled Water In United States
[Industry]
A new, beautifully-designed line of bottled water - this time not from the melting Alps, nor from faraway, clean-water-deprived Fiji, but rather from the contaminated ground near the site of the 1984 Bhopal catastrophe - scared Dow Chemical's London management team into hiding today.
FDA Announces Drugs That Are Being Reviewed
U.S. regulators on Thursday listed two dozen drugs, including weight-loss medicines and sleep disorder pills, that it is at an early stage of reviewing for potential safety problems. Many drugs that people may think are safe, may not be as safe, including Chantix, Xenical, Orlistat, Nuvigil, Provigil and others.
Fox News Takes Heat For Hate Speech
MSNBC takes the right wing media to task for their campaign against recently-murdered Kansas doctor George Tiller. Keith Olbermann suggests Fox News now be "quarantined."
Court Documents Confirm Dumping Of Toxic Waste In Pirate Waters
Documents have emerged which detail for the first time the potentially lethal nature of toxic waste dumped by British-based oil traders in one of west Africa's poorest countries.
More than 30,000 people from Ivory Coast claim they were affected by the poisonous cocktail and are currently bringing Britain's biggest-ever group lawsuit against the company, Trafigura.
Monsanto Wins Case To Stop Hormone-Free Milk Labels
A federal court in Ohio has ruled that dairies cannot legally label their milk "hormone free" "rBST-free" or otherwise clearly tell consumers that they aren't pumping up their cows with synthetic hormones.
It's a blow to truth-in-labeling advocates, a blow to consumers and a blow to organic farmers. It's a win for Monsanto, the agrichemical giant that prompted the lawsuit, and a win for Eli Lilly, which bought Monsanto's synthetic recombinant bovine growth hormones (known as rBST or rBGH) business a couple months ago. The use of these hormones is banned throughout most other first world nations. The labeling issue is moot in the 27-nation European Union, along with Canada, Japan, Australia and New Zealand, since they don't allow the use of synthetic hormones in the first place.
No More Tears, But Perhaps A Little Cancer
More than half the baby shampoo, lotion and other infant care products analyzed by a health advocacy group were found to contain trace amounts of two chemicals that are believed to cause cancer.
Some of the biggest names on the market, including Johnson & Johnson Baby Shampoo and Baby Magic lotion, tested positive for 1,4-dioxane or formaldehyde, or both, the nonprofit Campaign for Safe Cosmetics reported.
17 Year Old Discovers Problems With Splenda Sweetener
Leave it to a 17-year-old foreign student to run some tests on the popular sweetener sucralose that is Splenda, and find out that the substance does not seem to break down in normal wastewater treatment and might be around in our water supply for a long time, in possibly high enough concentrations to cause harm to people and animals..
Antibiotic-Free Chicken Injected With Drugs Before Hatched
Tyson Foods, the world's largest meat processor and the second largest chicken producer in the United States, has admitted that it injects its chickens with antibiotics before they hatch, but labels them as raised without antibiotics anyway. In response, the U.S. Department of Agriculture's (USDA) told Tyson to stop using the antibiotic-free label. The company has sued over its right to keep using it.
FDA Raises "Safe" Melamine Level In Baby Formula
Less than two months after federal food regulators said they were unable to set a safety threshold for the industrial chemical melamine in baby formula, they announced a standard that allows for higher levels than those found in U.S.-made batches of the product.
Food and Drug Administration officials on Friday set a threshold of 1 part per million of melamine in formula, provided a related chemical isn't present. They insisted the formulas are safe.
Presumably based on the number of complaints they received from newborn babies?
Radioactive Waste Ending Up In Indian/Chinese Consumer Products
French authorities made headlines last month when they said as many as 500 sets of radioactive buttons had been installed in elevators around the country. It wasn't an isolated case.
Improper disposal of industrial equipment and medical scanners containing radioactive materials is letting nuclear waste trickle into scrap smelters, contaminating consumer goods, threatening the $140 billion trade in recycled metal and spurring the United Nations to call for increased screening.
Supreme Court May Give Drug Companies Immunity
The Supreme Court may rule that pharmaceutical companies cannot be sued for dangerous or even deadly side effects from their drugs if those side effects arise from an FDA-approved use.
Under a legal argument known as "pre-emption," the FDA's approval of a drug absolves companies of any responsibility if that drug later turns out to be dangerous, even if information was concealed from the FDA during the approval process. While courts have rejected this argument for decades, the winds appear to be shifting.
Japan Halts Pesticide-Laden Chinese Frozen Beans
[Outsourcing]
Japan yesterday ordered retailers to pull frozen beans from China off the shelves after a woman fell ill eating a product which had 34,500 times the legal limit of pesticide, officials said. Japan's health ministry instructed retailers and importers nationwide to suspend sales of frozen green beans from a Chinese supplier.
Studies Indicate Definite Link Between Cancer And Cell Phone Use
Society "must not repeat the situation we had with the relationship between smoking and lung cancer where we ... waited until every 'i' was dotted and 't' was crossed before warnings were issued," said David Carpenter, director of the Institute of Health and Environment at the University of Albany, in testimony before a subcommittee of the US House of Representatives Committee on Oversight and Reform.
"Precaution is warranted even in the absence of absolutely final evidence concerning the magnitude of the risk" -- especially for children, said Carpenter
The Dirty Dozen Fruits,Vegetables That Contain Pesticide Residue
A report by Consumers Union has some important information on which fruits and vegetables you should seek out from organic sources because their conventional counterparts, even after being washed, may still contain significant pesticide residue, and which vegetables and fruits aren't as critical to be acquired from organic sources.
Facts About Plastics: Which Types To Avoid
There's a lot of controversy surrounding recent stories about BPA in plastic bottles and its effect on peoples' health. So have you ever paid attention to those numbers on the bottom of plastic bottles? What do they mean? Let's find out.
Study Says Fluoride Linked To Many Health Problems
There is clear evidence that small amounts of fluoride, at or near levels added to U.S. water supplies,present potential risks to the thyroid gland, according to the National Research Council's (NRC) first-ever published review of the fluoride/thyroid literature.
Many Vegetables Americans Eat May Be Toxic
Much of Europe has banned genetically-modified foods, but not in the USA. This may have proven to be beneficial for Europeans and costly for Americans.
A simple experiment by a Russian scientist to see if eating GM soya influenced the offspring of mice, could threaten the multi-billion dollar GM industry.
On March 11 a new documentary was aired on French television (ARTE – French-German cultural tv channel) by French journalist and filmmaker Marie-Monique Robin, The World According to Monsanto - A documentary that Americans won't ever see on their TVs. The gigantic biotech corporation Monsanto is threatening to destroy the agricultural biodiversity which has served mankind for thousands of years.
Your Drinking Water Probably Contains Drugs
A vast array of pharmaceuticals — including antibiotics, anti-convulsants, mood stabilizers and sex hormones — have been found in the drinking water supplies of at least 41 million Americans, an Associated Press investigation shows.
Utah Republican Fighting Against Steroid-Free Milk Labels
Most Utah consumers want to know what's in their food and how it is produced. Some prefer vegetables and fruit that are grown without pesticides, and milk and meat that are produced with no growth hormones.
Enter Republican representative Kerry Gibson from Utah, who is actively fighting against producers being able to identify whether the mild you drink is from steroid-free cows.
FDA Drags Feet On Bayer Recall, 22,000 Dead
The lives of 22,000 patients could have been saved if U.S. regulators had been quicker to remove a Bayer AG drug used to stem bleeding during open heart surgery, according to a medical researcher interviewed by CBS Television's 60 Minutes program.
Ben & Jerry's Fights To Promote The Safety Of Their Ice Cream
Ben & Jerry’s Homemade Inc., one of the first companies to label its ice cream as free of a synthetic hormone, is protesting a move by some states to restrict such labeling.
The ice cream maker has joined a national campaign to block what critics say is an effort driven by Monsanto Co., which markets recombinant bovine somatotropin, or rBST, also known as recombinant bovine growth hormone, or rBGH. Many people want to know if products contain this substance and Monsanto would rather you not, and they are trying to stop companies from advertising that they DON'T HAVE Monsanto's chemical additives!
FEMA Forgets Formaldehyde
Posted by ueberbill (5780 views) [E-Mail link]
FEMA, a federal agency that ranks in the mind of the public somewhere above herpes and somewhere below groin punches, has been having a bad couple of years. Last summer it came to light that FEMA had avoided testing their famous trailers for formaldehyde (best known for making the dead stay fabulous) in order to not get sued. Well, the hits just keep on coming...
F.D.A. To Drug Companies: Suicide is Bad!
The Food and Drug Administration, tasked not only with regulating my two favorite vices but determining whether or not a drug will kill us all, has made a pretty interesting decision. They will require companies to not only disclose if their drugs kill people, but to find out if their drugs make people kill themselves.
Monsanto Loses Bid To Outlaw Labelling Of Potentially Safer Milk
Pennsylvania resisted a lobbying push by Monsanto that sought to outlaw the labeling of milk that is free of artificial hormones.
Monsanto had argued that there is no discernible difference between milk from cows that have or have not been injected with its recombinant bovine growth hormones, known as alternately as rbST, bST, BGH or rBGH. It is banned in Europe and Canada.
Lead Found In Lipstick
Toys made in China aren’t the only products laced with dangerous heavy metals: lipstick manufactured in the United States and used daily by millions of American women also contains surprisingly high levels of lead, according to new product tests released today by the Campaign for Safe Cosmetics. The lead tests were conducted by an independent laboratory over the month of September on red lipsticks bought in Boston, Hartford, Conn., San Francisco and Minneapolis. Top findings include:
More than half of 33 brand-name lipsticks tested (61 percent) contained detectable levels of lead, with levels ranging from 0.03 to 0.65 parts per million (ppm). None of these lipsticks listed lead as an ingredient.
Government Finds Lead Test Kits Don't Detect Lead
Are you concerned about toxins found in products around the house, like lead in toys? Why not get one of those nifty home lead test kits? Well the Consumer Product Safety Commission has just announced most of those kits don't really work. I wonder where they come from?
The Secret History of the War on Cancer
Children shouldn't use cellphones. No one should drink diet sodas sweetened with aspartame. And think twice before getting X-rayed with a CAT scan except in a bona fide life-threatening emergency. That's just some of the precautionary advice that epidemiologist Devra Davis, who runs the Center for Environmental Oncology at the University of Pittsburgh Cancer Institute, delivers in her new book, "The Secret History of the War on Cancer."
Study Shows Nutrisweet-Aspartame Causes Cancer In Approved Doses
You might want to re-think how much of the common diet soft drinks, candy and other artificially-sweetened foods you consume these days. A recent, peer-reviewed study suggests the artificial sweetener causes cancer in rats at levels currently approved for humans.
Know Your Food Coloring
Used in everything from soft drinks to canned vegetable, food coloring is pervasive in our society. Here's a short guide to the various food colors and whether or not you'll be that excited about seeing them in your food from now on..
Latest Global Warming Threat: Mammoth Poop
Posted by wizeGurl (8086 views) [E-Mail link]
Global warming. It has many causes, primarily human burning of fossil fuels. But there are a number of factors that may add to it. For example, as polar ice caps melt, sunlight that would have once reflected away from the earth is now absorbed by the darker land and water underneath, making things even warmer. It's the global warming feedback loop.
Another such feedback loop is taking place as the once-frozen tundra at the top of the world begins to thaw. What used to live on the tundra? Mammoths. And they pooped. A lot. And that poop froze into eternally frozen poopsicles.
Boy Babies Vanishing Among Inuit; Who's Next?
The Inuit, the native peoples of the world's Arctic regions in Russia, Canada, Alaska, and Greenland (you may know them by the old name, Eskimo), have a little problem. They're having more girl babies than boy babies. A lot more. In some cases, twice as many. And in at least one area in northern Greenland, they're only having girl babies.
This is sad, but why do we care? We're (most of us) not Inuit living in the far north. But they may simply be the exaggerated end of a trend that is growing in other areas as well.
|
cc/2019-30/en_middle_0014.json.gz/line119
|
__label__cc
| 0.729669
| 0.270331
|
HomeNewsKampala’s top curry
Kampala’s top curry
December 16, 2016 News 0
Curry meal. Creative Commons photo courtesy of avlxyz
Kampala is a two-curry town. Ask any long term resident of the city where to get the best curry and you will usually get one of two answers. However, I may even venture to say it is a three-curry town.
My friend Thomas insists that Khana Kazana has by far the best curry in Kampala. But ask Daniel and he will tell you that the competition is not even close: Handi’s has the best curry in the city—probably in all of East Africa. Okay, I admit Daniel sometimes gets carried away, but he really likes spices!
If you ask me, that mutton rogan josh at Pavement Tandoori gives those two front-runners a run for their money.
Curry is a complicated dish to review. Unlike the simple ingredients that make a good hamburger (see “Best Hamburger in Kampala” June 2010), a curry can be made of many different ingredients and spices.
Considered a side dish by Indians, curry can be made vegetarian with an assortment of vegetables, cottage cheese or potatoes. It can also be made with every meat imaginable including chicken, fish, beef and goat. Cannot eat spicy foods? All curries can be ordered mild, medium or hot.
For the most part, people order their curry with rice, but it can also be eaten with naan (Indian flat bread). I suggest getting an order of both. Then follow your meal up with a tall glass of lasse (yogurt drink).
Khana Khazana is located on Acacia Avenue and boasts an open sitting area and waterfall in the dining room. It has an incredible menu complete with 103 different dishes you can order, of these an incredible 51 are curries. According to some unconfirmed reports, the eatery is one of the top Indian restaurants in the world—outside of India, of course.
On the advice of my waiter, I ordered the makhini chicken keseriya, which offers the meat in a thick gravy of tomatoes and other spices. It was exquisite. Served along with some steamed rice and butter naan, the curry was not overpowering and the spicing was rather complex. The meat could not have been more tender.
I ordered it medium spicy and I got medium spicy. Too often the only thing you can taste in a curry is hot. But the chef got the spicing perfect, making for a delightful lunch. I can only guess that the chef would also have gotten it perfect on any other the other 50 curry dishes. Thomas was right.
Handi’s is located on the first floor of a building on Kampala Road. The setting is a stark contrast to Khana Khazana, but do not let that scare you away. We sat by a window overlooking all the chaos that is Kampala Road, but once we got our food, all the noises and distractions evaporated.
Following a similar pattern to the previous meal, I ordered my steamed rice and naan, garlic this time. For my curry I went with the Fish Goan Curry made with local tilapia. This curry is succulently made with coconut milk.
After no more than five minutes, the steaming dishes were delivered to our table. My tongue was sent on a whirlwind tour of the Indian countryside, tasting every spice in the smooth, subtle sauce. The fish was perfectly cooked and again a medium was a medium. Daniel was right.
Pavement Tandoori in the Kisimenti shopping area, is a much smaller more intimate setting than the other two restaurants I tried out and is definitely a more intimate dining experience. Wanting to try something different, I ordered the mutton rogan josh with steamed rice and chilli naan. Mutton can be a bit tricky to cook and I have often received some that was either so tender it fell apart or cooked too long that the meat is overly tough.
It was perfect. Leave it to the Indian chefs—they really know how to cook their meats. The stronger taste of the mutton was perfectly matched with their menagerie of spices. A medium was a medium and this time Ole was right.
So I guess there is no clear winner for the best curry in town. With three great curry restaurants, the curry fans of Kampala are the real winners.
By Ole Tangen Jr.
Best Curry in Kampala
Handi’s
Pavement Tandoori
Persons with Albinism cry for safety
The Albinism Umbrella, an activist group for albinos’ has called for policies to guarantee the ……READ MORE
Father kills eight-year-old son over pork
A father in Manafwa district is in police custody for allegedly killing his biological son ……READ MORE
Ssebaana’s death a blow to Uganda’s politics, economy – MPs
The death of veteran politician John Ssebaana Kizito has been described as a great loss ……READ MORE
|
cc/2019-30/en_middle_0014.json.gz/line123
|
__label__wiki
| 0.921328
| 0.921328
|
Soviet Youth Culture during the Cold War
Russia/Soviet September 13, 2012 - 2 comments
A review of Pleasure, Power, and the Pursuit of Communism: Soviet Youth and State-Sponsored Popular Culture during the Early Cold War, 1945-1968, by Gleb Tsipursky.
“A revolution without dancing is not a revolution worth having,” the anarchist Emma Goldman reportedly declared. She never said exactly that, but the declaration still captures the supposed contradiction between the seriousness and frivolity of revolution. Goldman’s quip is pertinent to Gleb Tsipursky’s study of the Soviet state’s attempts to reproduce its hegemony by providing young people with a space to have fun, and to find meaning and cause with socialism from 1945 to 1968. The dilemma for Party leaders, however, was not whether the state should allocate resources for fun. Even the most hardliners recognized that Soviet youth could not live on stale political bread alone. The question was what kind of fun would serve the revolutionary project. Namely, how could the state incorporate fun into the Cause? This was not a new question for postwar Russia. The debate over the place of fun and entertainment in building hegemony among Russian youth raged throughout the 1920s. Indeed, Tsipursky shows that, though the New Economic Policy echo reverberates throughout, the question of state-sponsored fun and entertainment in youth culture took on increasing significance in the postwar Soviet Union. Youth entertainment became yet another means for the Soviet state to demonstrate its socialist alternative to capitalist modernity.
This socialist modernity, like the capitalist, also saw Soviet culture as consumerist, and the state as having a duty to fulfill its desires. But unlike in the West, the Soviet consumer would not passively digest state-rationed cultural commodities. Rather, citizens would actively create and manage cultural production and consumption. The result was a vast network of clubs that offered millions of young people opportunities to dance, perform, and create art and music. These institutions were no mere ideological chimeras. Soviet youth genuinely enjoyed them. They had fun, despite state regulation. Nor did this fun contradict their commitment to communism. Like Goldman hoped, dancing was part of the revolution.
In seven chapters, Tsipursky charts the back-and-forth policy shifts of state-sponsored popular culture between hard and soft lines from 1945 to 1968. The study opens with an overview of interwar cultural policy, which lays the framework of hard and soft lines. The next two chapters chart the efforts of the anti-cosmopolitan campaign between 1947 and 1953 to shear the content of state-sponsored culture of Western influence for a more Russian national and Soviet blend. Chapter 4 treats the turn to a softer line on youth culture between Stalin’s death in 1953 and Khrushchev’s Secret Speech in 1956. These years witnessed tolerance toward Western aesthetics. Chapter 5 follows with an examination of youth grassroots initiative in clubs during the Thaw, particularly the ways young people circumvented official strictures and added their own content to Soviet cultural production. The final two chapters explore conservatives’ attempts to restrict the “excesses” of youth cultural initiative while still allowing for Western styles. Khrushchev’s initial attempts in the late 1950s culminated in a full blown assault under Brezhnev. Youth initiative from below was hobbled, and state-sponsored popular culture rendered more formalist and disciplined. The shift to a harder line, however, did not mean the Party could completely put the Thaw genie back in the bottle. The end result, Tsipursky argues, is that Soviet youth had more access to cultural commodities than ever before, but that many viewed these official products as stale mimicries of their more spontaneous progenitors. Soviet youngsters could still dance to jazz and even rock n’ roll, but with the Party-State as the choreographer.
Tsipursky makes larger historiographical points about the importance of Stalin and his passing, the Thaw, and efforts at retrenchment under Brezhnev. One of his main contributions is in bringing politics back into cultural history. Historians of postwar Soviet cultural history tend to privilege larger social-cultural processes (e.g., Juliane Furst and Julie Hessler) or downplay internal policy contestations (e.g., Miriam Dobson and Stephen Bittner). Still, politics is not immune to internationalist trends. Party functionaries were forced to reckon with the force of a globalized youth culture, and the titillations it offered their young charges. Nevertheless, in Tsipursky’s narrative the Party and its functionaries loom large, with all substantive cultural shifts radiating outward. An analytical schematic of this study would be more vertical than horizontal, radial than webbed.
Tsipursky makes another important revision to the historiography. Studies of youth and youth culture often privilege the abnormal and historians of Russia are no different. We know more about hooligans, subcultures, sexual deviance, and other so-called un-Soviet behaviors than we do the so-called average kids. To his credit, Tsipursky is less interested in non-conformist youth culture, but in what should be called the Soviet cultural mainstream. But even though mainstream youth predominate, their voices are somewhat subdued. Tsipursky has given us a general sense of what urban youth thought and felt about their engagement with state-sponsored popular culture. And we learn how they shaped it via their tastes, consumption, and subterfuge. Yet, much of this activity is reactive rather than proactive except in cases like youth cafes in the early 1960s, where young people were given initiative and a measure of autonomy. On the whole, however, youth’s narrative presence is only visible through the state’s regulatory optic.
Therefore, the state was the real proactive force, maintaining and reproducing its hegemony by incorporating fun into its ideological repertoire and managing, as best it could, the boundaries of the culturally permissible. To take a broad view, Tsipursky’s real object is the Soviet State, not so much youth or culture—the latter merely serve as a lens to evaluate the former. And the state that emerges is hardly the “(neo-)totalitarian” of Cold War scholarship or its recent Foucaultian inspired refashioning. Nor is it the “revisionist” variant, where state and society form a dialectical loop. Tsipursky’s Soviet state is more of a cultural manager which on the one hand recognizes its citizens’ desires for fun, while on the other is careful not to cede its position as chief cultural arbiter. The logic of the post-Stalin Soviet state was to provide the rules of the cultural game and in so doing allow its consumers to regulate themselves. Seen in Gramscian terms, the post-Stalinist state sought to create real hegemony—rule through consent, rather than force, and build a “civil society” to buttress its legitimacy. This is an important contribution for our understanding of Soviet identity and the subjects it produced. Tsipursky shows that Soviet citizens were not creatures of a binaried world of public/private, Soviet/un-Soviet, and individual/collective. Rule by consent was inherently a world of grays. The Party-state provided the context and youth attached meanings to them, many of which had no bearing on their socialist faith. And to many youths, dancing was just dancing. The task of the state was to maintain the air of autonomy in its youth’s pelvic gyrations to reproduce of its cultural legitimacy. A task, like in many others, the Soviet state eventually fell short.
Sean Guillory
UCIS/REES Postdoctoral Fellow
Center for Russian & East European Studies
University Center for International Studies
guillory@pitt.edu
Rossiiskii gosudarstvennyi arkhiv sotsial’no-politicheskoi istorii (RGASPI, Russian State Archive of Socio-Political History)
Gosudarstvennyi arkhiv noveishei istorii Saratovskoi oblasts (GANISO, State Archive of Contemporary History of Saratov Oblast)
Gosudarstvennyi arkhiv Saratovskoi oblasts (GASO, State Archive of Saratov Oblast)
Tsentral’nyi arkhiv obshchestvenno-politicheskoi istorii Moskvy (TsAOPIM, Central Archive of Social-Political History of Moscow)
University of North Carolina at Chapel Hill. 2011. 483 pp. Primary Advisor: Donald J. Raleigh.
Tags:2011 Dissertation, Donald Raleigh, Music, University of North Carolina at Chapel Hill
Image Worship in Early Chinese Buddhist Art
Dissertation Reviews Advisory Boards
Pingback: State Archive of Saratov Oblast | Dissertation Reviews
Pingback: September 2012 Posts | Dissertation Reviews
|
cc/2019-30/en_middle_0014.json.gz/line124
|
__label__wiki
| 0.838837
| 0.838837
|
Mark Lanegan Band Books North American Tour, Schedules Toronto Stop
By Alex Hudson
Now that Mark Lanegan is returning to working with his eponymous Mark Lanegan Band, the former Screaming Trees leader will be promoting the newly released Blues Funeral during the next few months with a world tour. And yes, folks, he will be bringing the tour to North America.
From this month until early April, Lanegan and his band will embark on a previously revealed European tour before heading to Latin America and then Australia. But after that, he'll be back on these shores for a run of North American gigs that includes a stop in Toronto on May 15, as well as several new U.S. shows.
That's currently the only Canadian show, but hopefully the gloomy songwriter will soon book some more North American dates beyond this modest two-week leg. See the schedule below.
2/25 Oslo, Norway - Rockerfeller
2/26 Helsinki, Finald - Circus
2/28 Groningen, Netherlands - Oosterpoort
2/29 Amsterdam, Netherlands - Paradiso
3/1 Eindhoven, Netherlands - Effenaar
3/2 Antwerp, Belgium - Trix
3/4 Bristol, UK - Academy
3/5 Manchester, UK - Academy 2
3/7 Dublin, Ireland - Academy
3/8 Belfast, UK - Mandela Hall
3/9 Glasgow, UK - ABC
3/10 Leeds, UK - Cockpit
3/12 Birmingham, UK - Library
3/13 London, UK - Shepherds Bush Empire
3/14 Cologne, Germany - Luxor
3/15 Hamburg, Germany - Gruenspan
3/17 Copenhagen, Denmark - Amager Bio
3/18 Berlin, Belgium - Columbia Club
3/19 Warsaw, Poland - Proxima
3/20 Prague, Czechoslovakia - Lucerna Music Hall
3/22 Vienna, Austria - Arena
3/23 Zurich, Switzerland - M4 Festival (Schiffbau)
3/24 Bologna, Italy - Estragon
3/25 Milan, Italy - Alcatraz
3/27 Bilbao, Spain - Kafé Antzokia
3/28 Santiago, Spain - Sala Capitol
3/30 Porto, Portugal - Hard Club
3/31 Lisbon, Portugal - TMN ao Vivo
4/1 Madrid, Spain - Sala Kapital
4/2 Barcelona, Spain - Sala Bikini
4/4 Thessaloniki, Greece, - Principal Club
4/5 Athens, Greece - Fuzz Club
4/9 Mexico City, Mexico - Plaza Condesa
4/11 Buenos Aires, Argentina - Samsung Studio
4/12 Santiago, Chile - Amanda Club
4/14 Sao Paulo, Brazil - Cine Joia
4/18 Auckland, New Zealand - The Powerstation
4/20 Sydney, Australia - The Hifi
4/21 Brisbane, Australia - The Tivoli
4/24 Adelaide, Australia - The Gov
4/26 Melbourne, Australia - The Forum
5/10 New York, NY - Webster Hall
5/11 Washington, DC - 9:30 Club
5/12 Philadelphia, PA - TLA
5/13 Boston, MA - Paradise
5/15 Toronto, ON - Mod Club
5/16 Detroit, MI - Small's
5/17 Chicago, IL - The Metro
5/20 Denver, CO - Bluebird Theater
5/22 Los Angeles, CA - Gene Autry Museum Heritage Courtyard
5/23 San Francisco, CA - Great American Music Hall
5/25 George, WA - Sasquatch!Music Festival
5/26 Portland, OR - Wonder Ballroom
More Mark Lanegan Band
Mark Lanegan Band Announce New Album 'Somebody's Knocking'
Just over two years removed from releasing their Gargoyle album, Mark Lanegan Band have readied a follow-up effort. Titled Somebody's Knocki...
Mark Lanegan Band Gets Adrian Sherwood, Andrew Weatherall, Pye Corner Audio for Remix EP
Mark Lanegan Band delivered their 10th studio LP Gargoyle earlier this year, and though we're only a few months removed, the group have lift...
Mark Lanegan Band "Beehive"
With Mark Lanegan Band's Gargoyle coming up fast, Lanegan and co. are showing off some more of their guest-loaded new full-length. This time...
Mark Lanegan Band Return with 'Gargoyle,' Get Josh Homme, Greg Dulli to Guest
Three years removed from delivering Phantom Radio, Mark Lanegan has lifted the curtain on his next full-length offering with the Mark Lanega...
Mark Lanegan Band "Floor of the Ocean" (Pye Corner Audio remix)
Husky-voiced rock vet Mark Lanegan went in a synthy new wave direction on this year's Phantom Radio, and now the track "Floor of the Ocean"...
|
cc/2019-30/en_middle_0014.json.gz/line140
|
__label__cc
| 0.68558
| 0.31442
|
Legacy Data
uia.org
of World Problems
& Human Potential
Search Problems
Uncertain land zoning
Unclear industrial zoning
Obsolete zoning restrictions
Subjective land zoning
Misguided zoning policies
Shifting plans of local governments leave residents with vague and contradictory ideas about zoning regulations. People are uncertain how to plan and fear further encroachment by business, industry and other interests.
Broader Problems:
Unclarity
Inadequate town planning
Paralyzing complexity of urban structures
Complex regulations paralyzing small communities
Related Problems:
Rigid zoning requirements
Boundary constraints on land planning
Aggravates:
Conflicting land rights
Divisive zoning disputes
Absorption of rural communities
Unfocused design of community space
Unidentifiable urban neighbourhoods
Boundary disputes between neighbours
Geographically undefined community limits
Establishing specially regulated zones
Setting land boundaries
Obsolescence
Problem Type:
E: Emanations of other problems
Land type/use
Date of last update
01.01.2000 – 00:00 CET
About the Encyclopedia
The Encyclopedia of World Problems and Human Potential is a collaboration between UIA and Mankind 2000, started in 1972. It is the result of an ambitious effort to collect and present information on the problems with which humanity is confronted, as well as the challenges such problems pose to concept formation, values and development strategies. Problems included are those identified in international periodicals but especially in the documents of some 60,000 international non-profit organizations, profiled in the Yearbook of International Organizations.
The Encyclopedia includes problems which such groups choose to perceive and act upon, whether or not their existence is denied by others claiming greater expertise. Indeed such claims and counter-claims figure in many of the problem descriptions in order to reflect the often paralyzing dynamics of international debate. In the light of the interdependence demonstrated among world problems in every sector, emphasis is placed on the need for approaches which are sufficiently complex to encompass the factions, conflicts and rival worldviews that undermine collective initiative towards a promising future.
The Union of International Associations (UIA) is a research institute and documentation centre, based in Brussels. It was established in 1907, by Henri la Fontaine (Nobel Peace Prize laureate of 1913), and Paul Otlet, a founding father of what is now called information science.
Non-profit, apolitical, independent, and non-governmental in nature, the UIA has been a pioneer in the research, monitoring and provision of information on international organizations, international associations and their global challenges since 1907.
www.uia.org
|
cc/2019-30/en_middle_0014.json.gz/line148
|
__label__wiki
| 0.50481
| 0.50481
|
Linkys
Food’n’chef: my city
Today, my native and beloved city celebrates a birthday.
I live here, I love this place. It has its own atmosphere. Here live kind and helpful people and the most beautiful girls in the world.
My project “Food’n’Chef” I started from here, from Odessa. There are very delicious restaurants in Odessa: perhaps, because of the climate, perhaps, because the inhabitants of Odessa always come to the matter philosophically and with a little bit of humor.
And in honor of the city’s day, I want to introduce to you the best Odessa chefs, which I shot for the project “Food’n’Chef”. And of course, all the other chefs from other cities and countries you can see at the project site.
Oleg Opria. Chef of art-café Obshchaga
“I try to avoid any preferences. I try to cook and teach others to cook so that our work can bring happiness and pleasure to people. So that people coming to our café feel homey and gladly come to us again”.
Aleksei Meniaylov, chef of Klarabara
“I don’t have any food preferences. The way I prepare food for myself can appear strange to others. At home I like, for example, to mix mashed potatoes with buckwheat porridge, add meat gravy and whipped eggs. I like mixtures like this. But my favourite dishes are fried potatoes and roast chicken”.
Vladimir Rumiantsev. Chef of Le Grand Café Bristol
“I’m 42. I’m a chef by birth. I gained my work experience in Moscow five-star hotels: Baltschug Kempinski and National, and at the restaurants: «Pushkin Cafe» and «Ginger – gist of taste». I was involved in the opening of five-star hotel Bristol”.
Stefano Antoniolli, chef of ‘Ministerium’
“I like my work and everything that is related to it. I like to meet famous chefs and to get knowledge from them. I like to learn about new methods. I read a lot of books related to my profession. I attend courses, visit other restaurants. I like to decorate dishes and tables for drink receptions and to cut out landscapes and sculptures from vegetables and fruits. I like to surprise guests. Today, the world of culinary is the art with different areas. And I like them all”.
Viktor Prodanov. Chef of Grand Prix
“I am 36 years old, I was born and grew in Odessa. 16 years I work as the cook, five of them in Grand Prix. I wanted to become a cook since the childhood. started to cook at school, constantly surprising the parents”.
Aleksey Shvec. Chef of Bernardazzi
“Create and cook are the absolute pleasures in my life, which can be compared only to sex may be or my favorite music”.
Sergey Neboga. Chef of Pomodoro
“I like cuisines from all over the world. Each of them is interesting in its own way. Each of them is original and distinctive. Today we can try any cuisine. We can go by plane to any country and try local food. Or we can go to a restaurant or a café, offering adaptive cuisine in the place we live”.
Nikolay Truba. Chef of Gogol-Mogol
“I like the way my mother cooks. Her dishes are the best. I’ve never tasted anything better. But apart from this, I like Mediterranean cuisine. As for cooking, I can cook everything: from Odessa dainties to Japanese dishes which are popular today. But this is not for the restaurant. Our menu is Odessa-European”.
Oleg Pashkevich, Chef of Sushi360
“I’m 28. I was working as a barman in a restaurant, when the Japanese cuisine became popular in our country. I decided I wanted to make classy sushi and went to Kiev, where I became an apprentice of a Japanese sushi master Yoshi. My apprenticeship reminded Hollywood thrillers of 1990s, where the main protagonist goes to a guru of martial arts in the heart of Tibet. But My Tibet was in Kiev”.
Aleksandr Slyadnev2015-04-24T19:41:08+00:00Tags: art-café Obshchaga, Bernardazzi, chefs catalog, cooking chef, culinary, Food, Gogol-Mogol, Grand Prix, Klarabara, Ministerium, Odessa, Pomodoro, restaurant, Sushi360, ukrainian chef, ukrainian food|
|
cc/2019-30/en_middle_0014.json.gz/line151
|
__label__wiki
| 0.911082
| 0.911082
|
Team Of Captains At The FIFA 2018 World Cup
GK: Hugo Lloris
Captain of unarguably the most talented squad in the World Cup, pressure will be more than anything on Lloris than one could contemplate. It is never easy to manage a dressing room full of stars and for France, it is an even bigger headache. Les Blues have already left behind the likes of Martial, Benzema and Lacazette who are well good enough to be selected for the national team. With Koscielny now ruled out, Lloris is the only experienced senior player in the team alongside BlaiseMatuidi, who is not so known for his leadership qualities. Lloris will have the task of organizing the French squad and keeping them focussed enough to make their talent count as a team rather than as an individual.
Related Topics:fifa world cupfifa world cup 2018slider
5 Records That Might Be Rewritten In The FIFA 2018 World Cup
5 Footballers Who Could Win The Best Young Player Award At The FIFA 2018 World Cup
Premier League Rejects Who Will Be Playing For Top Teams In The FIFA 2018 World Cup
5 Most Likely Candidates For The Golden Boot At The FIFA 2018 World Cup
5 Most Likely Candidates For The Golden Glove At The FIFA 2018 World Cup
5 Players Who Will Retire After The 2018 FIFA World Cup
Top 5 Group Matches To Watch At The 2018 FIFA World Cup
4 Countries With Best Defences In The FIFA World Cup 2018
Three Players Who Should Come Back From The Retirement For World Cup 2018
5) Being the oldest to ever play the World Cup
Essam El-Hadary of Egypt could become the oldest player ever to play in the World Cup and will surpass Faryd Mondragon of Colombia. Faryd broke the record of Roger Milla in the previous World Cup. El-Hadary despite his age is considered to be Egypt’s number 1 and his athleticism will make you revisit your training plans. El-Hadary has played 158 times for Egypt and is third in the list of most capped player in their history.
El-Hadary’s role will be equally crucial and after Salah’s injury, which could mean that Egypt will need to do it without their talisman in the opening match of the group against Uruguay.
Hirving Lozano: Mexico
Mexico hasn’t produced outrageous attacking talents since Javier ‘Chicharito’ Hernandez. Despite qualifying for their sixth straight World Cup, Mexico never boasted of talented forwards, and depended more on their impregnable midfield and defence. The arrival of young Hirving ‘Chucky’ Lozano may well change the stance of Mexico in World football. A prodigal winger who loves to cut inside and score stunners. Lozano reminds of Cristiano Ronaldo at United as both play on the left side and prefer to score with their outrageous right foot.
Upon arriving at PSV Eindhoven in 2017, Lozano helped them win the Eredivisie title. Lozano will share the load of scoring with Chicharito and is expected to outshine his veteran striker. Lozano’s influence could well help Mexico play a more attacking brand of football. Lozano displayed his silky skills in the 2017 Confed Cup, and despite being 22 he holds a mature head over his shoulders.
5) Iago Aspas
Aspas arrived at Anfield after impressing with Celta mainly to provide strong backup to Luis Suarez, who was prone to suspensions at the time. Things went quite well for Aspas in the early part of his Liverpool career as he blossomed in Suarez’s absence. However, once Suarez returned, things only went on a downward spiral for the Spaniard as he found gametime hard to come by. Alongside Suarez was a fully fit Sturridge as the duo combined to score a massive 55 goals in the season. As for Aspas, his solitary goal for the Reds came against Oldham Athletic in a FA Cup tie. He was sent out to Sevilla on loan the following season where he once again failed to find his feet eventually returning to Celta. At Celta though, Aspas has managed to turn his career around once again as he has now scored 67 goals in 126 games, while has also made his debut for the national side and is in the squad to feature in the World Cup.
Misc2 years ago
11 Most Unworthy Players To Win The Champions League
Combined XI of players who retired in 2015/16: End Of An Era
Arsenal1 year ago
7 Worst Arsene Wenger Signings Ever
Top 10 teams who never won the Champions League
10 Myths In World Football That Many People Still Believe
Footballers who never skipped legs day
5 Footballers Who Were Better At Other Sports
Top 10 Footballers And Their Film Star Look Alikes
|
cc/2019-30/en_middle_0014.json.gz/line152
|
__label__wiki
| 0.538328
| 0.538328
|
Escape Artists > Escape Pod > Episode Comments > EP565: The Zombee Project 3.0
Author Topic: EP565: The Zombee Project 3.0 (Read 4138 times)
EP565: The Zombee Project 3.0
AUTHOR: Allison Mulder
NARRATOR: Ibba Armancas
HOST: Divya Breed
Jensen brought the job offer to each of them in person, like no one did anymore. She poached them from the best labs and the best apiaries, all over the world. Put everything she knew on the table, in out-of-the-way cafés and fine-but-nothing-fancy hotel rooms and home kitchens which smelled strongly of coffee and not much else.
She handpicked them. She made that very clear. Like she was assembling heroes, forming a unit–a rescue unit, with a crucial task.
At that point, it wasn’t recruitment. It was a higher calling.
“It’s not legal,” Jensen told each of them. “But no one who could enforce that knows about it.”
None of them cared. They signed Jensen’s contracts and confidentiality agreements.
And from then on they were all members of Jensen’s team.
Nothing less and nothing more.
Jensen’s team wasn’t ready when the first resurrected bees began twitching in their wire-covered frames.
The team had gone through so many cases of small, still bodies sent by the collection branch of the project–fresh bees, long-dead bees, solitary, bumble, and honey. Pollinators, honey-makers. Stinging and stingless and every one of them dead from Colony Collapse Disorder, and a dozen other hypothesized causes, and more unidentified threats besides.
Jensen’s team was made up of professionals, happily married to their work, caring tenderly for the in-laws that were their safety protocols. But they got used to failure, administering the compound to insect corpses that stayed corpses. Observing only decomposition during the dictated test periods. Burning the samples to cinders, then receiving new batches of bees for testing.
Jensen’s team got so used to failure that they got used to other things, like neglecting their bulky, white protective suits when not working directly with the dead bees. They filled out paperwork and cleaned beakers in quiet corners of the lab, bare-faced, chatting with the team members who handled the compound and the corpses at the far table.
When the first stiff, disoriented honey bee wriggled back to life and slipped from a surprised scientist’s forceps, several team members across the room were not wearing their protective suits.
“Got it,” he called. “I’ve got this one–”
He deftly swept the runaway bee from midair and–no alternatives in reach–cupped the beaker against his own gloved hand.
A wince. Wide eyes.
He slid beaker and bee onto one of the lab tables, waving a teammate forward. “Take it.”
The wire bee veil didn’t hide his colleague’s horror. “Did it–”
“Quarantine.” He edged to the door, heart racing. “I need to quarantine myself. But it’ll be fine. Just keep the others contained. Everything will be fine.”
Listen to this week’s Escape Pod!
Scuba Man
Matross
Drabblecast, Pseudopod, Escapepod, Podcastle
Re: EP565: The Zombee Project 3.0
This episode was a strong one (as it buzzed out the gate)...
It's a pity we don't find out WHERE the get they get the secret sauce that caused the reanimation. No matter. I haven't seen a story quite like this before (nice). If I understand it, the human test subjects were necessary to ensure that the revitalized pollinator vector didn't kill off the humans population. Were the reanimated bees more aggressive than their predecessors? The human trials were for some kind of vaccine or antidote for humans stung by the un-dead bees. Headless bees cruising around?! Really?! That's twisted, eh.
I'm a big fan of pollinators... even the ones that are not all fuzzy and cute. Houseflies UNITE... the skunk cabbages of the world need you!
"What can do that to a man? Lightning... napalm? No, some people just explode [sic]. Natural causes". Source: Repo Man.
Sandra M. Odell
Very strong story. Great intro, sliding into a terrific finish. Nice start for ARTEMIS 3.
Frank Evans
This was unique. Given how prevalent zombie fiction has been over the past, uh, forever, it's hard to come up with something fresh to say. I think this story does that. I like the concept and I like tying in real world implications and applications of a zombie virus. I thought the narration was well done as well.
That being said, I didn't have quite the same reaction that others have had. I left the story feeling like it was good, but disappointed because I felt like it had just missed out on being really good. It felt like there was the potential there for something even better, although I can't put my finger on what was missing. Something about the way it was written/presented left me with a sense of detachment throughout that made it hard to get invested in the story and the characters. Maybe a version written in first person from the eyes of one of the team members would have scratched that particular itch for me. I'm probably in the minority on this, and, regardless, I really enjoyed listening (and reading again afterwards). Thanks for this.
ProperPunctuation
I really liked this story, and the note at the beginning that what was going on was "not legal" really hooked me. Is it just the disposable nature of the human test subjects that is illegal, or is it illegal to tamper with the dead bees? I wanted to know how this project had been funded - was it a secret government plot that, while bad, was deemed necessary? Did a private investor see the opportunity to save humanity and take it upon themselves?
This story engaged me, though it left me with a lot of questions about the world.
My understanding is that by the end of the story they had moved beyond reanimating bees and were starting a project to reanimate humans. At some point they realized that they could go beyond saving the bees and give humans (well, some humans) extremely long life spans. Playing God big time, as it were.
Quote from: Scuba Man on March 05, 2017, 07:05:19 PM
It's a pity we don't find out WHERE the get they get the secret sauce that caused the reanimation.
Herbert West.
Which of course pulled from the scientific reanimation via more alchemical processes set out by the original SciFi novel, Frankenstein. Neither of which was really explicit to what was going on, although in those cases it was a warning and a deliberate destruction of the data so that it could not be reproduced.
I think this one was a lot more focused on the scientific method coupled with the team and motivations, rather than clearly identifying the apocalypse scenario.
Katzentatzen
Always love stories that use the bee crisis. And zombies? This one was pure love for me. Unexpectedly touching at the end.
"To understand a cat you must realize that he has his own gifts, his own viewpoint, even his own morality."
--LILIAN JACKSON BRAUN
I have to agree with Frank Evans. Great idea, but I think what the story missed were more sensory details. Did the zombees have any different behaviors? How did they look? Did they smell? Was their honey safe? The interpersonal stuff had good details but the minor characters were still a bit flat, imo.
Also, those volunteers must have been getting HUGELY compensated.
What I liked the most in this story was the dynamics of a dedicated team of scientists working hard under really intense pressure. That's also why I found the whole self-sacrifice and 'oh-my-god-my-daughter-is-here' angles unnecessary and a little tired. Too easy a way to reach for emotional connection that was already there. Otherwise the characters felt very believable as those kind of people who would work at such a project.
Zombie story beginning with good intentions it seems, save the bees!
I liked that inevitable zombie apocalypse was not depicted here.
I didn't like that it was a little vague on why exactly that was the only way to save the bees.
Narration was excellent.
esanderson
I found it interesting that no one was referred to by name except Jensen and her daughter until the end scene with the files. I'm not sure whether that was meant to underscore the point that each individual technician was important to the project or to counteract it and suggest they were expendable.
Sometimes I have a hard time with stories that reveal expositionary information in drips and drabs along the way, wanting to go back and re-read/listen once I know what they're actually talking about, but not really being interested enough or entertained enough to spend the time doing so. This was one of those for me. I feel like if I'd known what the point of the project was from the beginning, I might have gotten more enjoyment out of the story.
I really should have liked this story. It has lots of cool about it; really, bees and zombies!! But it failed to draw me in (possibly because of the slow release of information, as esanderson said). And I wasn't invested in the characters. At the end, when Jensen comes in with her big speech and gesture, I was like, meh. Also, it felt like it was more of an excerpt from a larger story than a story on it's own.
I did end up reading this again and enjoyed it much more. It also made me want there to be an extension or sequel about what happens next.
|
cc/2019-30/en_middle_0014.json.gz/line154
|
__label__cc
| 0.511897
| 0.488103
|
FRACKING: Letter to Germany re: Pieridae-LNG in NS....
by Oscar » Wed Aug 22, 2018 9:51 am
International groups ask Germany not to finance fracking in Canada
[ https://canadians.org/media/internation ... ing-canada ]
August 22, 2018 Joint Media Release
MONTREAL – In a letter sent to German Environment and Economy Ministers, a coalition of Canadian and German groups asked Germany to withdraw from a loan guarantee process which would provide more than $4 billion US to Pieridae Energy Limited, a Calgary-based company. The signatories include Regroupement vigilance hydrocarbures Québec, Environnement Vert Plus, the Council of Canadians, Nova Scotia Fracking Resource and Action Coalition (NOFRAC) and Ecology Action Centre (EAC), in Canada, Food and Water Watch Europe, 350.org, Gastivists and BUNDjungend in Europe, as well as 25 other groups on both sides of the Atlantic ocean. [ https://drive.google.com/file/d/1Yr0gzk ... 5v-96/view ]
The German guarantee would enable construction of a liquefied natural gas (LNG) terminal with an export capacity of 10 million metric tons a year in Goldboro, Nova Scotia. The financing would be granted in return for a commitment to guarantee Germany a part of the exported LNG. Already, German Uniper S.E. made a commitment to buy at least 50% (5 million metric tons) of the total capacity of the terminal for 20 years.
The loan guarantee would also support Pieridae's project to produce approximately half of the 1.5 billion cubic feet of natural gas a day necessary to supply the terminal. According to Pieridae's corporate presentation dated June 2018, the gas exported to Europe would be supplied by fracking in Western Canada (74 %), Eastern Canada (13 %), and the Marcellus shale in the United States (13 %). In the same presentation, Pieridae indicates that according to the new regulations on hydrocarbons in Quebec, its first production would come from the Bourque project in Gaspésie while the exploration would continue at the Haldimand 1 well in Gaspé as well as on all other "properties" of Pieridae in Quebec, in particular Gaspesia site, near the Gaspésie national park. The Frederick Brooks and Hiram Brook sites are also targeted in New Brunswick where, according to Pieridae, the Conservative Party indicated that it will end the moratorium on fracking if it is elected on September 24th of this year. About three quarters of the gas liquified and exported in Goldboro would come from Western Canada, within supply agreements and other acquisitions. Additional details are available in the Laurentian Bank Securities analysis dated January 16, 2018.
"If the Goldboro LNG plant were built, it would increase Nova Scotia’s greenhouse gas emissions by at least 20% - after over a decade of hard fought decreases in emissions. Neither Germany nor the electric utility Uniper buying the LNG would use the gas to retire coal fired electricity production. And even if that changed in the future, the small decrease in green house gases emitted in Germany would not compensate the significant emission increases from Canadian gas fields and from the giant LNG compressors in Nova Scotia.” — Ken Summers, Nova Scotia Fracking Resource and Action Coalition (NOFRAC)
"Germany's financial support for Pieridae Energy would have a direct impact on the Gaspésie area, a world natural jewel where the population was never consulted and where the projected production sites are at the head of the watersheds of some of the most precious salmon rivers in the world. Germany should not finance fracking overseas." — Pascal Bergeron, Environnement Vert Plus
“The Goldboro plant is one of three major LNG terminals with provincial approvals in Nova Scotia, which together would increase provincial emissions by more than 75% by 2030 and greatly increase fracking across North America. This project is a terrible investment, and would simply be ignoring the realities of climate change and our collective responsibility to support a just transition to a low-carbon economy.” — Stephen Thomas, Energy Campaign Coordinator, Ecology Action Centre (EAC)
"Germany should not support the proliferation of fracking projects in Canada while this technique is hotly criticized on its own territory. Fracking destroys the ecosystems and communities everywhere it is practiced, and natural gas contributes powerfully to global warming, no matter where it is extracted or burned. Germany, as well as Canada, must move away from fossil fuels." — Carole Dupuis, Regroupement vigilance hydrocarbures Québec
“This loan guarantee will enable continued fossil fuel extraction, transportation, and consumption. We know that the fossil fuel industry causes serious harm to Indigenous and other marginalized peoples, to water, health, and our climate in the name of private profits. These harms are unacceptable and must not be supported by the German government.” — Robin Tress, Council of Canadians
Carole Dupuis, Regroupement vigilance hydrocarbures Québec (RVHQ)
carole.dupuis@rvhq.ca
Pascal Bergeron, Environnement Vert Plus
environnementvertplus@gmail.com
Ken Summers, Nova Scotia Fracking Resource and Action Coalition (NOFRAC) [English only]
kenpat@ns.sympatico.ca
Stephen Thomas, Ecology Action Centre (EAC) [English only]
stephen@ecologyaction.ca
Robin Tress
Organizer, Atlantic Region, Council of Canadians
rtress@canadians.org
|
cc/2019-30/en_middle_0014.json.gz/line156
|
__label__cc
| 0.687428
| 0.312572
|
Department of Electrical & Electronics Engineering
Department of Applied Sciences & Humanities
College Prospectus
Admission Related Query
Notice Archive
Career (Jobs)
Academic Arrangement – 2018
Ragging
Employee NOC Form
Student NOC Form
Placement List
Head of Department Tahir Hussain Bhat
The Department of Computer Science & Engineering was established in the year 2018. Faculty Members of the department have specialized areas for advanced studies and research in Information Security, Software Engineering, Machine Learning, Image Processing, Computer Networks, Internet of Things, Cloud Computing, Grid Computing, Pattern Recognition, Natural Language Processing and Robotics and Simulation & Modeling.
Our vision is to become a world-class division of Computer Science Engineering with exhibited magnificence in Teaching, Research and Innovation.
Our mission is to bestow the amazing guidance in Computer Science, equipping students with fundamental knowledge, skills and abilities to address true difficulties in developing spaces and to coordinate academics, research, advancement and business enterprise to make noteworthy incentive for all stakeholders.
Faculty Computer Science & Engineering
Mr. Tahir Hussain Bhat Assistant Professor & HoD MCA, PGD Cyber Security, GATE, NET thb786@gmail.com 9086490990
Ms. Sheikh Imroza Manzoor Lecturer M.Tech imrozamanzoor222@gmail.com –
Lectures/Presentations
New Draft Regulations UGC 2018 (CAS)
244563total sites visits.
Archive notices
Copyright © Government College of Engineering & Technology Safapora. All rights reserved.
Maintained by Department of Computer Science and Engineering, GCET Safapora, Ganderbal
|
cc/2019-30/en_middle_0014.json.gz/line172
|
__label__cc
| 0.653589
| 0.346411
|
acme newspictures (new york, n.y.) (8)
reed, frank (4)
tomsic, tony (4)
greater cleveland ethnographic museum (3)
rebman photo service (3)
united press international (3)
1974-10? (5)
3 x 5 in. (10)
cleveland heights - university heights public library (20)
libraries (rooms) (18)
librarians (11)
owens, jesse (11)
track and field sports (9)
Description: event
Torch budget, salaries double in four years
United Torch; Rhodes, James A.; Satires; Plain Dealer (Firm); WJW (Channel 8)
In the Spirit, in Unity! Evening of Gospel Music at Severance Hall, Tuesday, October 28, 2003
Gospel music; Gospel singers; Severance Hall (Cleveland, Ohio); Williams Jr., Nathaniel
Brochure invitation and program schedule of An Evening of the Gospel Music at Severance Hall. The program features Gospel Choir, Solo singers and celebrates the historic role of church in the African American Community. The event is conducted on...
Czechoslovakian event
Czechs; Slovaks; Hungarians; Festivals; Organizations
Czechoslovakian event.
Czech Catholic Event of 1910
Czech Catholic Union; Religion; Rites & ceremonies; Religious meetings
Czech Catholic event of 1910.
Drawing of a winged insect stinging a dog, used to promote an event held by the Cleveland chapter of the Knights of the Maccabees
Dogs; Insects; Bites & stings; Fraternal organizations; Knights of the Maccabees
"The business end is working fine on this trip. We're on the move! Cleveland Tent with its Team is going to visit and exemplify the Ritual at Strongsville, Ohio, Saturday Evening, April 13 [1907]. Transportation FREE. A Special Car has been...
Harvest Prom
Fenn College; Cleveland State University
Harvest Prom was traditionally Fenn's first big social event of the school year. Each year a queen was chosen up until Fenn started holding annual homecoming dances; then the Harvest Prom became the event where the homecoming queen candidates were...
The Coventry Reader: Days of Rain & Fire: d.a. levy, 20 Years After
Coventry Reader; Levy, Darryl Allen [D.A. Levy];Newspapers; Periodicals (other); Tributes; Poetry; Poets; Artists; Small presses
Special issue of the Coventry Reader in conjuction with "Days of Rain & Fire: d.a. levy, 20 Years After" event held in Cleveland, Ohio October 7, 8, 9, 1988 in honor of levy. Includes selections of levy's poetry including but not limited to: "Lady...
Scene at National Air Races, Cleveland Municipal Airport
National Air Races; Airplane racing; Cleveland-Hopkins International Airport
"This scene shows part of the huge crowd assembled to view The National Air Races which are held in Cleveland's Municipal Airport, the largest in the world. Entrants for this event arrive from all parts of the world and spectators are attracted...
Scene at National Air Races, Cleveland Municipal Airport, Cleveland, Ohio
"This scene shows part of a record-breaking crowd assembled to view the National Air Races held at Cleveland's Municipal Airport, the largest in the world. Entrants for this event arrive from all parts of the world and air fans are attracted from...
Al Maharas Steak House
Restaurants; Al Maharas Steak House
"Al Maharas Steak House, Established 1924. East 88th St. and Wade Park Ave., Cleveland 6, Ohio. The House of Finest Food of course! Make any evening an Event for your guest. This is IT, Tops in Steaks and THAT Salad. Ample Parking in rear. Phones...
Penn - Ohio Spring Meeting, Tudor Arms Hotel, 10660 Carnegie Ave. Cleveland 6, Ohio
Tudor Arms Hotel; Hotels; Carnegie Ave.
"Mid-West coin event of 1959 Penn - Ohio Spring meeting, Cleveland, Ohio May 15,16,17, 150 displays, 75 dealers, over 1000 visitors, Please reserve the following to Tudor Arms Hotel, single room, $7.50 to $10.00, twin bedroom, $14.00 to $18.00,...
Century at the Ritz Carlton. A new century is coming. Scheduled for arrival March 31, 2000.
Ritz-Carlton; Hotels
"Its boarding was a social event. Its sevice was exclusive. Its kitchen was legendary. Inspired by the dining car of the world's most glorious train, the Twentieth Century Limited, now comes the new Century at The Ritz-Carlton Sushi, Seafood...
The Interior of the Cleveland Stadium, Cleveland, Ohio
Cleveland Municipal Stadium (Cleveland, Ohio); Stadiums
"The Interior of the Cleveland Stadium, Cleveland, Ohio. The stadium is Cleveland's mammoth sports coliseum designed to accomodate 110,000 guests. The stadium in this photo shows a sporting event held at night. The stadium is equipped with...
Youth Songfest Event: My story my song with the Pine Forge Academy Choir
Youth; Songs; Songs & music; Festivals; Choirs (Music); Pine Forge Academy Choir (Pine Forge, Pa.)
Youth Songfest Event "My Story My Song" at First Presbyterian Church of East Cleveland, March 24, 2006. Pine Forge Academy Choir performed at the event.
William A. Meyer and Ronald Bernstein releasing balloons the day before the Valley View's 26th Annual Home Day event, 1968
Valley View; Balloons; Celebrations
"TRIAL BALLOONS -- A few of the more than 500 helium-filled balloons advertising Valley View's 26th Annual Home Day were released yesterday by Council President William A. Meyer (left) and Ronald Bernstein, a chairman of the event. The rest are...
First American Society for Metals World Materials Congress
American Society for Metals; World Materials Congress
Attendees pose at the first ASM World Materials Congress in Chicago, Illinois. This event marked the 75th anniversary of ASM. It was the largest event in ASM history, with nearly 12,000 registrants from 50 countries and more than 330 technical...
George A. Roberts and wife (at left) at formal event
American Society for Metals; Roberts, George A.
George A. Roberts and his wife, Ellen, pose for a group photo at a formal event. Dr. Roberts served as President of the American Society for Metals from 1954-55 and president of the ASM Foundation for Education and Research from 1955-56. In 1995,...
A 10 For The Afghan Event
Iran; Soviet Union; Olympics; Afghanistan
Editorial cartoon by Ray Osrin of a bear with "Moscow" on the side of him. He is wearing ice skates on his back paws and the Olympic rings on a ribbon around his neck. He is jumping over a row of oil drums marked "Iran" while he is holding a sign...
People at Memorial Day event, 1987. Man with lawnmower wearing sign reading "Little House on the LAWN".
Cleveland Heights - University Heights Public Library; Holidays; Parades; Lawn mowing
Unidentified people at Memorial Day event, 1987. Man with lawnmower wearing sign reading "Little House on the LAWN".
|
cc/2019-30/en_middle_0014.json.gz/line181
|
__label__wiki
| 0.693611
| 0.693611
|
ABA Advanced Trial Advocacy Course
Wed Aug 11 2010
The Australian Bar Associationâs fifth Advanced Advocacy Course is being held in Melbourne from 23-27 January 2012. This is a five day residential course run by the profession for the profession. At least two years experience at the independent bar is a pre-requisite. More is beneficial. People who have attended the course have referred to it as "seriously life changing". It is immensely rewarding for barristers wanting to perform at their best.�Learn more >
Salvos Legal Inaugural Lecture
The Salvation Army is undertaking an exciting new initiative in Australia â Salvos Legal.� Salvos legal will operate as a full-time self sustaining legal service, dedicated to providing pro-bono advice and representation to those in need who cannot afford a lawyer, whilst at the same time offering holistic treatment for people suffering from addiction or those in need of financial counselling, pastoral support, emplolyment and aged care. Salvos Legal will soon hold the first in a new series of lectures, which will provide practitioners with the opportunity to hear from high calibre speakers (all of whom are current judicial officers), offering a great level of experience in their fields and will of course assist legal practitioners in meeting their CLE requirements.
Whilst the day will provide first class lectures from top judicial officers, they will also provide attendees with some insight into the work of both Salvos Legal and the wider Salvation Army and showcase the services that The Salvation Army has to offer.
The lectures are free, however the lecture series is primarily a fundraiser and donations from attendees would be greatly appreciated to aid in funding for the ongoing work of Salvos Legal. A donation of $100 or more per person for the full 5 hour day is suggested - we hope this isn't a large amount of money and equates to just $20 per hour for each of the 5 lectures.� All speakers have volunteered their time.� Every cent of the monies raised on the day will be used to pay for the salary of a free lawyer for the poor, within Salvos Legal.
Results of the LCA pre-election survey of key legal issues
Tue Aug 10 2010
_In Brief _reported on 21 July that the Law Council of Australia had invited political parties contesting the 2010 federal election to provide their views on key national issues of relevance to the legal profession. The Labor Party, the Coalition and the Greens have responded and the LCA has tabulated the results.
10 August 2010�
ABA response to the draft Legal Profession National Law
The Australian Bar Association has written to Attorney General Robert McClelland with its response to the consultation draft of the Legal Profession National Law. The ABA supports the principle of simplified uniform legislation and regulation, national standards policies, freedom of movement between jurisdictions and accessible consumer protection. The ABA has confined its response to the topics that are of particular interest to the bar and not trust accounts and the fidelity funds. View the ABA's response >
Upcoming CPD events for September - Legalwise Seminars (ADVERTISEMENT)
Make sure you are CPD compliant and earn your CPD points at the Hilton Sydney from 15 â 17 September 2010. We have a range of 11 fascinating and topical events for you to choose from. Each seminar is designed with your CPD requirements and latest legal issues in mind and each will be beneficial to you and your practice.
The selection of events include:
Advertising and Marketing Law, Buying or Selling SMEs, Competition and Consumer Law Update, Current Concerns in Commercial Litigation, Retail and Commercial Tenancies, Workplace Bullying, Water Law and Islamic Finance (Melbourne).
Our Rule 42 seminars include: CLE Conference for In-House Lawyers, Rule 42 for All Lawyers, Rule 42 for Litigation Lawyers.
To view our Rule 42 seminars please click here.
Upcoming September CPD events - Legalwise Seminars Venue: Hilton Sydney, 488 George Street, Sydney� When: 15 â 17 September 2010 Start Time: 9.00am â 1.15pm 4 CPD points Start Time: 2.00pm â 5.15pm 3 CPD points Start Time: 9.00am â 5.15pm 7 CPD points Contact: Legalwise Seminars ph: 02 9387 8133 fax: 02 9387 8711 email: info@legalwiseseminars.com.au
To view our CPD program, speaker details and to register click here.
Fundraising Dinner for the Martin Place Homeless Artwork Auction
The Displaced by artist Elizabeth Durack has been donated to the NSW Bar Association to auction at tomorrow's Fundraising Dinner for the Martin Place Homeless. All proceeds from the painting will be donated to St Vincentâs De Paul. The original pen and ink wash artwork is framed and available to view at the NSW Bar Association Reception. A reserve price for the sale of the artwork will be sent out prior to the auction. The auction will take place at the dinner. The New South Wales Bar Association would like to thank Stephen and Lee Rushton for donating the artwork. 18 August 2010
Factors influencing sentencing in domestic violence offences
The NSW Bureau of Crime Statistics and Research (BOCSAR) has published the results of its study on Factors Which Influence the Sentencing of Domestic Violence Offenders. The first such Australian study into the sentencing of domestic violence offenders, it analyses around 20,000 cases of domestic violence related offences dealt with by the NSW courts between January 2008 and June 2009. The research results show that:
[o]ffenders found guilty of a domestic violence-related assault are more likely to receive a prison sentence if: the assault caused significant harm, the offender has a concurrent offence at the court appearance, a prior prison episode, a prior conviction for a violent offence, has breached an AVO in the previous two years, is male or Indigenous.
Stop At Nothing: Crabb and Turnbull share the podium in the Bar Common Room
Malcolm Turnbull, the newly re-elected member for Wentworth, will be a special guest at Annabel Crabb's post-election round-up at 5.00pm tomorrow, 9 September, in the Bar Common Room. Mr Turnbull was the subject of Ms Crabb's Quarterly Essay "Stop At Nothing: The Life and Adventures of Malcolm Turnbull", which won a 2009 Walkley Award for best magazine feature writing. More recently, Annabel� released her book on Kevin Rudd, Rise of the Ruddbot: Observations from the Gallery. She is currently ABC Online's chief political writer. President Tom Bathurst QC will chair what is sure to be a lively and informative session, organised by the Health, Sport and Recreation Committee.
High Court decision in Rowe & Anor v Electoral Commissioner & Anor
In today's decision in Rowe & Anor v The Electoral Commissioner & Anor, the High Court has declared that certain provisions of the Commonwealth Electoral Act introduced by the Electoral and Referendum Amendment (Electoral Integrity and Other Measures) Act 2006 are invalid. This includes s102(4), which prevents the electoral commissioner from considering claims for enrolment lodged after 8.00pm on the date of the issue of writs for an election. Learn more>
The Great (Law) Debate
Attorney-General Robert McClelland and Shadow Attorney-General George Brandis SC will take part in an election debate on Friday, 13 August between 11.00am and 12.00 noon in the offices of Gilbert + Tobin, Level 37, Citigroup Building, 2 Park Street, Sydney. The debate will be chaired by James Eyers of The Australian Financial Review, with questions from a three-member panel: Alex Ward, president elect of the Law Council of Australia; Robert Milliner, chair of the Large Law Firm Group and chief executive partner of Mallesons Stephen Jaques; and Associate Professor Jane McAdam of the University of New South Wales.
Entry is free but seating is strictly limited. If you would like to attend, please book a place by contacting Belinda McDonald on 02 9385 2257 or gtcentre@unsw.edu.au.
The Great Legal Debate has been organised by The Australian Financial Review and the Gilbert + Tobin Centre of Public Law at the University of New South Wales.
TONIGHT: Tuesday 10 August - Recent Updates in Home Warranty Insurance
The Home Warranty Scheme recently changed, with the Government becoming underwriter for the Scheme on 1 July 2010. Although that in itself is not anticipated to have any impact on the rate and volume of litigation generated in this area of law, there is a related issue which involves the insurers âmanagingâ builders who are not able to provide either appropriate assets or security to obtain eligibility for home warranty insurance in their own right.
The situation that managers are inspecting works at progress claim stages and making recommendations as to payments or otherwise may lead to potential for contractual disputes. In addition to this issue, Ms Olsson will address the recent decision of the Court of Appeal in Ace Woollhara (Ace Woollahra� Pty Ltd v Owners - Strata Plan 61424 [2010] NSWCA 101) and the amendments that it occasioned, in her presentation. For full details, download a flyer.
Book your seat at the Industrial Law Section Dinner
Thu Aug 05 2010
Industrial Law Section Dinner will be held at Parliament House on Wednesday, 22 September 2010 at 6:30 p.m. The speaker for the evening will be Justice Gray of the Federal Court. For further information, or to register, download a flyer. Queries can be directed to Shane Prince (02) 9223 1522.
The Berenice and Ken Buckley Dinner 2010 (ADVERTISEMENT)
Members are invited to attend the Berenice and Ken Buckley Dinner 2010 - A fundraiser for the NSW Council for Civil Liberties - on Wednesday, 25 August at 6.30pm for 7.00pm at the Marigold Restaurant, 683 George Street, Sydney. The keynote address is titled Humans being Human, and will be delivered by Phillip Adams AO. The master of ceremonies will be Rob McHugh.
Broadcaster, filmmaker, author, archaeologist and social commentator Phillip Adams was elected one of Australiaâs 100 National Living Treasures in the inaugural poll conducted by the National Trust in 2006.
For over 50 years his columns have provoked discussion and outrage. He is the author of over 20 books, the most recent of which is âAdams Verses God: The Rematch. Adams played a key role in the establishment of many important bodies including the Australia Council and the Australian Film Commission. Descibed by Robert Manne as "the most remarkable broadcaster in the history of this country", his Late Night Live is Australiaâs most successful "podcast". Heâs chaired Film Australia, the Australian Film Institute, the Commission for the Future and the National Australia Day Council - and chairs the advisory board of the Centre for the Mind at Sydney University and The Australian Centre for Social Innovation. His honours include two Orders of Australia, the Human Rights Medal and four Honorary Doctorates.
Cost excluding drinks:
NSW Council for Civil Liberties members: $90 Non-members: $100 Table of 10: $900 For more information, download a flyer>
AFP High Tech Crime Conference (ADVERTISEMENT)
On 7-9 September 2010 the High Tech Crime Operations portfolio, within the Australian Federal Police (AFP), will hold its second annual High Tech Crime Conference in Sydney. It will be held over three days and will focus on providing education and training to the delegates. Attendance at the conference provides six CLE points to legal delegates.
About HTCC
The High Tech Crime Conference is hosted by the AFP in conjunction with the University of Technology Sydney. The HTCC brings together domestic and international experts and thought leaders from the Judiciary, legal fraternity, government, law enforcement agencies, academia and the private sector.
Through the HTCC, these stakeholders share information and knowledge in order to build Australia's capability and response against this complex and pervasive form of criminality.
The HTCC provides an excellent opportunity for all stakeholders to collectively forge strategic outcomes and to engage and foster new and existing professional networks.
The HTCC also provides a dedicated judicial/legal stream intended for delegates wishing to obtain expert knowledge in this area of law.
The up-skilling of all delegates through the provision of expert education in four dedicated subject-matter streams.
The sharing of knowledge between all stakeholders in order to meet the challenges of Technology Crime.
Awareness-raising of delegates through exposure to the spectrum of disciplines relevant to Technology Crime.
The formation of a Community of Excellence of stakeholders willing to provide their support and expertise to others.
Building Australia's capability and response to Technology Crime.
Date: 7-9 September 2010 Venue: Four Points by Sheraton, Darling Harbour, Sydney, Australia Cost: AUD$475 (plus GST)
IP & patent professional user group meeting
The Federal Court of Australia, NSW Registry, invites practitioners interested in intellectual property and patent law to attend a professional liaison meeting to discuss current issues relating to patents and intellectual property litigation. It will take place on Monday, 30 August 2010 between 5.00pm and 6.30pm in Conference Room 18.47 of the Law Courts Building, Queens Square. Learn more >
Include your photo in Find a Barrister
President Tom Bathurst QC and Executive Director Philip Selth jointly request that all members of the Bar Association give consideration to having their photograph included next to their details on the Bar Association web site. All that is required is a digital photograph of yourself. It can be taken professionally or with an ordinary domestic digital camera. The photograph can then be e-mailed to the Bar Association. Members are encouraged to make use of this facility. It is useful to the public but it is also useful to other members of the bar.
Swearing in ceremony for Ross Letherbarrow SC
Ross Letherbarrow SC will be sworn in as a District Court judge on Wednesday, 11 August 2010 at 9.30am in Court 21A John Maddison Tower. Tom Bathurst QC will speak on behalf of the New South Wales Bar.
Cases selected for reporting in FCR by V Kline
The following cases were selected by V Kline for reporting in the FCR:
AA Shi Pty Ltd v Avbar Pty Ltd (No 3) [2010] FCA 440 Sainju v Minister for Immigration and Citizenship [2010] FCA 461 Primary Health Care Ltd v Commissioner of Taxation [2010] FCA 419 Silvia v Fea Carbon Pty Ltd [2010] FCA 515 Mercedes Holdings Pty Ltd v Waters (No 2) [2010] FCA 472 James v Western Australia [2010] FCAFC 77
Harbour Radio Pty Ltd v Australian Communications and Media Authority [2010] FCA 478 Sagacious Legal Pty Ltd v Westfarmers General Insurance Ltd (No 3) [2010] FCA 428 Strong Wise Ltd v Esso Australia Resources Pty Ltd (No 2) [2010] FCA 575 Commonwealth v Horsfall [2010] FCA 443 Fischer v Department of Families, Housing, Community Serices and Indigenous Affairs [2010] FCA 441 Kowalski v Chief Executive Officer of Medicare Australia �[2010] FCA 413 Coshott v Coshott [2010] FCA 300 Tran v Commonwealth [2010] FCAFC 80 Keller v LED Technologies Pty Ltd [2010] FCAFC 55 Zin Mon Aye v Minister for Immigration and Citizenship [2010] FCAFC 69 Huddleston v Aboriginal Land Commissioner [2010] FCAFC 66 SZOFE v Minister for Immigration and Citizenship [2010] FCAFC 79 Construction, Forestry, Mining and Energy Union v John Holland Pty Ltd [2010] FCAFC 90 Australian Olive Holdings Pty Ltd v Huntley Management Ltd [2010] FCAFC 76 Stuart v Construction, Forestry, Mining and Energy Union [2010] FCAFC 65 Stoddart v Boulton [2010] FCAFC 89 Egglishaw v Australian Crime Commission [2010] FCAFC 82 Minister for Home Affairs v Siam Polyethylene Co Ltd [2010] FCAFC 86 John Holland Group Pty Ltd v Robertson [2010] FCAFC 88 Coal and Allied Mining Services Pty Ltd v MacPherson� [2010] FCAFC 83
Who Owns Your Genes? Is the Patenting of Genetic Discoveries in the Public Interest?
Members are invited to attend Who Owns Your Genes? a lecture by Professor Peter Cashman on the legal, policy and public interest questions arising out of the patenting of human genetic discoveries. The lecture will take place on 10 August 2010 between 6.00pm-7.30pm at Sydney Law School.
To date, a substantial number of genetic 'discoveries' have been the subject of successful patent applications in Australia and in numerous other countries. This has given rise to a number of complex and controversial legal and policy questions. These issues are presently under consideration by a Senate inquiry in Australia and the subject of a test case in the United States brought by the American Civil Liberties Union and the Public Patent Foundation affiliated with the Benjamin N Cardozo School of Law [Association for Molecular Pathology, et al. v United States Patent and Trademark Office, et al., SDNY].
Dr Peter Cashman is a barrister and Kim Santow Chair in Law and Social Justice at the University of Sydney. He was formerly: Commissioner in charge of the civil justice review with the Victorian Law Reform Commission; Commissioner jointly in charge of the reference on class actions with the Australian Law Reform Commission; founding Director of the Public Interest Advocacy Centre; founder and senior partner of the firm Cashman & Partners which merged with the Melbourne firm Maurice Blackburn & Co to form the national firm Maurice Blackburn Cashman (now Maurice Blackburn Pty Ltd); Governor of the American Trial Lawyers' Association (now the American Association for Justice) and National President of the Australian Plaintiff Lawyers' Association (now the Australian Lawyers Alliance). He holds a degree in law and a diploma in criminology from the University of Melbourne and a Master of Laws degree and a PhD from the University of London. He has practised law in the United Kingdom, the United States and Australia.
The lecture is FREE and pre-registration is not required. For more information about this or other lectures in the series, visit the Law School's web site, e-mail the events coordinator or phone (02) 9351 0259.
Amendments to the Family Law Rules came into effect yesterday
The Family Law Amendment Rules 2010 (No. 1) was registered on 30 July 2010 and came into effect on 1 August 2010.�
Wanted: contributors to AIJA research project
The Australian Institute of Judicial Administration is inviting expressions of interest from those who are interested in contributing to a new research project, Australian Courts: Serving Democracy and its Publics, which is linked to implementation of the Strategic Framework for Access to Justice in the Federal Court System. For further details, or to discuss the chapter outline, contact the project editors, Professor Mark Evans and Dr Don Fleming of the ANZSOG Institute for Governance at University of Canberra, on 02 6201 5791 or don.fleming@canberra.edu.au
Cases selected for reporting in Commonwealth Law Reports
The following cases were selected by JD Merralls for reporting in CLR: Health World Ltd v Shin-Sun Aust Pty Ltd [2010] HCA 13 Minister for Immigration and Citizenship v SZMDS [2010] HCA 16 Muslimin v The Queen [2010] HCA 7
New practice note for the Land and Environment Court
On 28 July 2010 the chief judge of the Land & Environment Court, the Hon Justice Brian Preston, issued a new practice note for Class 2 Tree Applications, effective the same date. This practice note replaces the previous practice note concerning Class 2 Tree Applications issued by the chief judge on 15 August 2008, which has now been repealed.
The forms for Class 2 applications made pursuant to the Trees (Dispute Between Neighbours) Act 2006 have also been updated. Forms D, E and F have been repealed, and all of the tree forms have been replaced with a new version of Form C, and new supplementary forms - Form G and Form H. These forms can be obtained (in PDF and Word formats) from the Forms and Fees page of the Land and Environment Court web site, or via the following links:
1. Tree dispute application form (Form C) 2. Form G for hedge disputes 3. Form H for trees causing damage or injury�
CPD Seminars This Week
The following three CPD seminars will be taking place this week: TONIGHT: Views of the âHot Tubâ from the Bar and the Bench, presented by The Hon Justice Rares and Bernie Coles QC â 5.15pm, Monday 23 August (Substantive Law strand) The Prohibitions Del Roy, presented by Dermot Ryan SC â 5.15pm, Tuesday 24 August (Substantive Law strand) Richard of Anstey and the Sackville Inheritance, presented by The Hon John Bryson QC â 5.15pm, Wednesday 25 August (Substantive Law strand)
Football teams from Qld, Vic & NSW bars to take part in a festival of the boot
On Saturday, 11 September 2010 the New South Wales Bar Football Team will defend the Suncorp Perpetual Trophy when they play the Victorian Bar at St Andrews Oval, University of Sydney. Kickoff will be at 1.00pm. The Victorians are keen to avenge their 3-1 loss in September last year, but have dismissed rumours that sacked Argentine coach Diego Maradona was spotted in William Street. Joining them will be a team from the Queensland Bar, to take part in a "Tri-States" round-robin competition. Drinks and presentations will follow from about 5.00pm. For further information or to register please contact Anthony Lo Surdo ph: (02) 9223 3181 or losurdo@12thfloor.com.au
|
cc/2019-30/en_middle_0014.json.gz/line182
|
__label__wiki
| 0.71061
| 0.71061
|
"Pepe the Frog is a huge favorite white supremacist meme" -SPLC
Thread: "Pepe the Frog is a huge favorite white supremacist meme" -SPLC
12th September 2016, 04:00 PM #1
Sardonic Observer
A white nationalist symbol has made its way into the latest back and forth in the 2016 presidential campaign.
Amid the flurry of statements about to Hillary Clinton calling "half" of Donald Trump supporters a "basket of deplorables," — a reference to some of the Republican nominee's supporters who ascribe to views popular among the white nationalist-linked alt-right movement — informal Trump adviser and confidante Roger Stone tweeted a picture of the poster from the movie "The Dependables" altered as "The Deplorables." Donald Trump, Jr., one of Trump's sons, posted the same image on Instagram. The origin of the image is unclear.
The Photoshopped faces include Trump, running mate Gov. Mike Pence, Gov. Chris Christie, former New York Mayor Rudy Giuliani, Dr. Ben Carson, both of Trump's eldest sons, conspiracy theorist Alex Jones, alt-right icon Milo Yiannopoulos, and Stone himself. Prominently featured over Trump's right shoulder: popular white nationalist symbol, Pepe the Frog.
"Pepe the Frog is a huge favorite white supremacist meme," Heidi Beirich of the Southern Poverty Law Center told NBC News of the meme.
While Pepe the Frog may not be a household name, the meme is well-known to members of the alt-right on the internet. "It's constantly used in those circles," Beirich said. "The white nationalists are gonna love this because they're gonna feel like 'yeah we're in there with Trump, there's Pepe the Frog.'" Pepe the Frog, a cartoon amphibian, was popularized on the website 4chan, and became associated with the neo-Nazi movement.
The Trump campaign has been repeatedly accused of dog whistles to white supremacists and the alt-right, though his original position on these groups was ambiguous. When confronted with the support of prominent white nationalist and former KKK Grand Wizard David Duke in February, Trump stumbled in his initial disavowal of the man — telling CNN at the time, "I don't know David Duke. I don't believe I have ever met him. I'm pretty sure I didn't meet him. And I just don't know anything about him."
He later clarified that he disavowed Duke's support, though the former Klansman — now running for Congress in Louisiana — has continued to tweet messages of support for the Republican nominee. Over the course of this campaign, Trump has retweeted Twitter accounts with names such as 'WhiteNationalistTM' and blasted out anti-Semitic images to his over 11 million followers on the social media site. Some members of his campaign have been tied to the alt-right, including Breitbart's Steve Bannon, who is now CEO of the Trump campaign. Democratic nominee Hillary Clinton gave a speech shortly after Bannon's appointment linking Trump's campaign to the nationalistic movement and calling on the rest of the GOP to reject extremist views. Clinton has continued to argue that Trump has "given voice" those who engage in "offensive, hateful, mean-spirited rhetoric."
Stone, for his part, is known for his controversial tweets that usually defend Trump, warn of a rigged election, and lashing out at Clinton. For months he has repeatedly advertised "Clinton Rape" t-shirts on his account and pushed hard on the Trump-proposed narrative that the election could be rigged against the Republican nominee.
Stone is no longer with the campaign in an official capacity, after parting ways with Trump in August of last year. Despite that, he remains a self-described "FOT: Friend of Trump" who was most recently invited to attend the campaign's event announcing Gov. Mike Pence as Trump's running mate. NBC News has reached out the Trump campaign regarding the image.
Stone could not be reached for comment on this article or the image's origination. In his tweet, Stone said that he was "proud" to be among "The Deplorables" in the image, while Trump, Jr. wrote that he was "honored to be grouped with the hard working men and women of this great nation that have supported" his father.
http://www.msn.com/en-us/news/politics/trump-adviser-son-post-image-featuring-alt-right-symbol/ar-AAiLPRs?li=BBnb4R7
Truth is chased from many villages.
The Following 3 Users Say Thank You to Jewboo For This Useful Post:
cheka. (12th September 2016),mamboni (12th September 2016),Neuro (12th September 2016)
Down1
Re: "Pepe the Frog is a huge favorite white supremacist meme" -SPLC
Never heard of him before.
If he was that popular I bet some members here would use him as an avatar.
The Following User Says Thank You to Down1 For This Useful Post:
Hillbilly (13th September 2016)
ximmy
Unobtanium
After reading that I feel kind of deplorable... :/
The Following 4 Users Say Thank You to ximmy For This Useful Post:
Jewboo (12th September 2016),Joshua01 (12th September 2016),midnight rambler (16th September 2016),Twisted Titan (13th September 2016)
It's a badge of honor to be called racist anti-Semite nowadays!
Ares (12th September 2016),crimethink (12th September 2016),Joshua01 (12th September 2016),osoab (12th September 2016),Twisted Titan (13th September 2016),vacuum (12th September 2016)
Originally Posted by Neuro
It really is actually!!!!
If you're offended by any of my posts tough shit!
"Politicians Are Like Diapers, They Should Be Changed Often, And For The Same Reason"
If you're not prepared for what's coming it's already too late!
Niggers will never be satisfied!!
"Paper is poverty, it is only the ghost of money, and not money itself." --Thomas Jefferson to Edward Carrington, 1788
"The greatest threat to the state is when the people figure out they can exist without them." - Twisted Titan
"Some Libertarians are born, the government makes the rest."
"Voting is nothing more than a slaves suggestion box, voting on a new master every few years does not make you free."
mamboni
Originally Posted by Down1
Where have you been. Pepe is the one! Pepe!!! Pepe!!!
Tricks and treachery are the practice of fools, that don't have brains enough to be honest. -Benjamin Franklin
Sincerity makes the very least person to be of more value than the most talented hypocrite. -Charles Spurgeon
The Following 2 Users Say Thank You to mamboni For This Useful Post:
Ares (12th September 2016),Jewboo (12th September 2016)
LMAO This was on MSNBC
The Following 2 Users Say Thank You to Ares For This Useful Post:
Jewboo (12th September 2016),mamboni (12th September 2016)
It gets better. HA HA HA HA
crimethink (12th September 2016),mamboni (12th September 2016),midnight rambler (12th September 2016),Twisted Titan (13th September 2016)
12th September 2016, 06:59 PM #10
Originally Posted by Ares
You gotta love it: the alt-right is meme-judoing the left. It's beautiful and hilarious. Pepe has made a joke out of their weak false memes, like the Holohoax. Can you imagine how ridiculous Hillary will sound when she goes off the deep end ranting about "that frog" and "the vast right wing conspiracy?" Assuming she survives of course.
crimethink (12th September 2016),midnight rambler (12th September 2016),Twisted Titan (13th September 2016)
Quick Navigation Alt Right Top
|
cc/2019-30/en_middle_0014.json.gz/line193
|
__label__cc
| 0.65135
| 0.34865
|
KNM: Volume 6 Chapter 5
Home/[CN] Kill No More/KNM: Volume 6 Chapter 5
This chapter was brought to you by AnmesicCat and StellarAshes.
Recovering the Dragon Cross Necklace
“Lanski! Why did you run out by yourself? Don’t know you it’s really dangerous outside right now?”
As soon as they heard the voice calling out, both Lanski and Liola were shocked. After turning around, Lanski yelled in surprise, “Third brother, why are you here?”
‘Third brother?’ Liola carefully examined the man jogging towards them. ‘So this is the third Prince, Cappuccino?’
The silver-haired, blue-eyed man had a face filled with worry, but his relaxed atmosphere was still present. Liola felt the man in front of him didn’t seem to fit Kaiser’s description of an annoying pig Prince. It must be Kaiser’s own bias…
When Cappuccino ran to his only sister, he realized her face was covered in tears. As far back as Cappuccino could remember, he had practically never saw his independent little sister cry.
He asked anxiously, “Why are you crying? Did someone bully you? Is it this strange guy with a mask?”
Cappuccino turned his angry eyes towards Liola, and he stood in front of her, as if he was the kind of brother who would protect his little sister from any and all harm. But his sister didn’t appreciate his gesture, and instead she hurriedly pushed him aside to apologize to Silver Mask,
“Sorry! My brother is always like this. He always jumps to conclusions before finding out what’s really going on; please don’t blame him.”
Seeing Cappuccino being pushed aside by his little sister and then acted as if he was really hurt, Liola found it funny to the point of laughing out loud.
His laugh seemed to entrance Lanski, and also surprised Liola himself. It dawned on him of Kaiser’s warning about the excitement magic on the mask, not being fake. The magic was quite strange to make him laugh like this.
“Is this guy, Silver Mask?”
Cappuccino saw his sister was acting cutesy, and was a bit jealous. He loved his little sister so dearly, but she had never treated him well in return. This man, however, captivated her with just a simple laugh. Cappuccino suddenly felt like he was marrying off his own daughter.
Seeing the guy may very well become his brother-in-law, Cappuccino started commenting and complaining about Silver Mask,
“He’s wearing a mask and you can’t even see what he looks like. What if he’s really ugly? Or maybe he’s an old man. Sister, before you see what he looks like, do NOT marry him!”
“Brother!”
Lanski’s face was burning red, and she was very close to kicking her own brother into the pond so he would stop talking nonsense. But since her crush was there, Lanski warned her brother with a vicious look.
“Fine, fine, I’ll stop.” Cappuccino didn’t dare to continue. His sister had never really been respectful to him. She always held up a sword and chased him around the palace. He didn’t want to be chased around the entire academy now.
Though he said he’d stop complaining, Cappuccino seemed to be interested in something else. He looked up and down Liola’s body and said, “Tsk tsk, too thin. He looks like he doesn’t have any strength. So how is he going to protect my little sister.”
“Brother! I thought you were going to stop?!” Lanski was almost enraged by her own brother.
Cappuccino put on a rascal smile, and said innocently, “I’m not complaining, I just want a spar.”
‘A spar?’ Lanski suddenly remembered the only thing her brother was more interested in than being a playboy was his obsession with Kung Fu!
Before Lanski had time to stop her brother, Cappuccino had already rushed to Liola. He had no plans for an ambush, but instead he just wanted to push Liola a bit, to remind him the fight was starting. However, as soon as Cappuccino’s hand reached where Liola’s chest was, he suddenly disappeared.
‘On the side!’ Cappuccino took one step back, and saw Liola standing leisurely on the side.
“Such amazing speed.” Cappuccino couldn’t hold back a praise, but he didn’t stop there. He unsheathed his sword, and reminded his opponent, “I’m about to attack.”
Perhaps it was Cappuccino’s lack of malice, or perhaps it was his reminder to his opponent before his attack, but whatever it was, Liola didn’t seem to mind the person who suddenly started attacking him. He even had a bit of desire to spar with him to see who was stronger, which was rather rare for an Assassin who advocated not having any meaningless fights.
Liola put Baolilong down from his arms, and used telepathy to tell it to stand back. He took out Broken Silver from his boot, and blocked Cappuccino’s sword just as it was about to strike.
Liola’s leisure in the fight made Cappuccino’s eyes shone, and at the same time, decided not to underestimate his opponent.
Countless lights then suddenly flashed between the two: Cappuccino attacked fiercely, but Liola’s defense was absolutely impermeable. However, neither one of them used their true strengths; they were just exchanging moves to determine each other’s true strength.
Lanski, who was anxious before, had now gone quiet. Being a little obsessed with martial arts herself, she really didn’t mind the opportunity to observe two strong warriors fight. Her beautiful eyes opened widely, afraid she would miss something. Even though Lanski may not be able to distill the essence from watching and learning their moves, but she would still benefit greatly from doing so.
‘Formidable Indeed!’ Cappuccino didn’t dare to underestimate his opponent. Even though Lancelot wasn’t very close to him, but his warnings to Latte did reach Cappuccino, that this man’s powers may rival even Lancelot’s. This warning was enough to make Cappuccino spar with Silver Mask no matter what.
Cappuccino took one step back, and his body was suddenly surrounded by a gold aura. His eyes flashed with passion and anticipation of a good fight. He quietly stood still, waiting for Silver Mask to release his aura. If everything went as he expected, it would be at least a gold aura, rather than the silver uniform that Silver Mask wore.
“Brother…” Lanski saw her brother released his aura, and she was a bit worried. Despite worrying about her crush’s safety, she still wanted to see the complex Kung Fu moves they could do, so even her yell was rather empty.
Liola was rather happy. He never had the chance to use his newly-learned aura in actual combat. But now the strength of a Gold Knight presented itself before him and they could spar, and Liola wasn’t going to let go of this opportunity either.
As he closely observed and sensed Cappuccino’s way of controlling his aura, Liola imitated him and released his own aura. This time, however, his Ki did not explode out of control from within him, instead, it slowly encircled him like an air current.
As soon as Liola’s aura materialized, Cappuccino and Lanski were both in shock. ‘Red Aura?!’
Cappuccino’s observational skills were much better than those of the academy students, and therefore would never mistake the man in front of him as a Red Knight like they did.
In fact, Cappuccino had already noticed the color of this aura was far different from a Red Knight’s: the dark red color of the aura looked as if it was made out of dried blood of his victims, and it was imposing like the feeling of impending death.
Cappuccino observed for quite a while before he sighed and said, “This reeks of blood, and not like an aura a Knight should have. But then again, that guy Blood Wolf’s dark aura isn’t much better than this.”
“Damn! My dark aura is way more normal than his.”
A complaint suddenly came out of the surrounding thicket, and scared Lanski. She looked around but was unable to find the source of the sound, but the other two weren’t surprised at all.
Cappuccino already knew Blood Wolf was secretly hiding himself, and Liola had already noticed with his Assassin instinct someone was around watching them.
Then, more complaints came, “Hurry up and fight! If you’re not going to, I’m going to fight with him. I’ve been itching for it.”
Cappuccino immediately yelled, “No, you’re not allowed to steal my opponent. If you want to fight him, you could look for him another day. Unlike you, I can’t run everywhere I want every day.”
No more complaints came from the trees, and Cappuccino rushed forward without anymore delays, so Blood Wolf wouldn’t come down and fight because he can’t hold his itch.
At the same time, Cappuccino knew casual attacks like before were completely meaningless, so he practically started off with his ultimate, “Dragon Sword Dance!”
This move deeply shocked Lanski. When she first met Silver Mask, this was the move that almost took his life. Although Lanski knew Silver Mask purposely took the hit, she was still very concerned about her crush.
‘Time to experiment with my aura.’ Liola thought as if he wanted to get beat up.
Even if the aura he emitted can’t stop it, his internal Ki should prevent the attack from seriously injuring him. Subconsciously, Liola started calling the energy he emitted as aura, and the energy within as Ki, even though they both refer to the same power.
In an instant, Cappuccino unleashed 88 streams of Dragon Ki. These Dragon Kis were far different than Lanski’s attacks back then: hers were rudimentary and only shaped somewhat like serpents, where as his Dragon Kis looked like real Dragons with their sharp teeth, which would drive fear into any observers.
These 88 streams of Kis converged on Liola from all directions. The reason why the Dragon Sword Dance was one of the most feared skill was the fact that its attacks were far too dense, and there was almost no possible of dodging all of them.
With the spirit of experimenting, Liola did not plan on dodging at all, not even from just a few of the streams. He stood still in the center where every stream of Ki could hit him.
Liola immediately released more aura, and the red light surrounding him immediately expanded, which even forced Cappuccino to take a few steps back. It was then when all 88 of the Dragon Kis mercilessly collided with the red aura.
As soon as they hit, Liola realized something was wrong: it looked as if his aura could not withstand the Dragon attacks. It seemed as if…
Liola began to wonder why this was the case; his strength was undoubtedly above Cappuccino, and the energy from his aura exceeded that of the Dragon Kis.
Cappuccino was shocked. From what he could see, Silver Mask’s aura could never block the Dragon Sword Dance. But since he had already launched the attack, and it was one of his strongest moves, so he could not withdraw his attack and had to watch as the Dragons hit collide with Liola.
“What the hell is this little runt doing?!” A dark shadow flew down from a tree, and sped towards Liola.
Lanski also noticed something was wrong, but there was nothing she could do other than scream in panic.
‘Right!’ It was because the density of his aura was too low; it was like a fluffy ball of cotton, so of course it couldn’t stop the needle-like Dragon Ki. Liola finally understood.
In an instant, Liola contracted his aura, and the cotton-like aura was compressed into a thin sheet. The Storm of Blood’s already dark color intensified to the point where it was near impossible to see Liola’s body.
The Dragon Kis had already arrived at Liola’s body. The needle like Dragon Kis collided with a thin layer of Storm of Blood in the form of sheet metal. After continuous sounds of explosions, dust flew at where Liola stood, as if a large bomb had been set off.
Before the explosion settled, Lanski ran up recklessly, but she was promptly stopped by Cappuccino. Lanski yelled desperately,
“Brother, Sir Blood Wolf, please, you have to go save him!”
Blood Wolf, however, lazily raised his eyebrows. He had just dropped down from the tree and was about to race towards Liola when he realized his aura had been compressed to the point of being capable of stopping the Dragon Ki.
The only thing the Dragon Kis caused was just a bunch of light and sound effects.
“Lanski, don’t worry. Your crush is completely fine.” Cappuccino hurried to explain to his sister, otherwise, seeing Lanski had drawn her sword, she might stab her own brother for her lover momentarily.
Hearing this, and seeing Blood Wolf sitting there and waiting, she finally calmed down a bit. She held her gaze in the direction of Silver Mask. After the dust slowly settles, a figure appeared, and Silver Mask stood there, unscathed.
“Hahaha, little runt, what did you do to yourself?”
Blood Wolf saw Liola’s situation, and started to laughing rudely.
Liola’s Silver Knight uniform had been badly torn, and it was missing sleeves and cuffs on his pants. He was practically covered by just a torn rug. Liola looked at his clothes with frustration: he compressed his aura so closely to him that most of his clothes were not protected by his aura, and therefore destroyed by the Dragon Ki.
Cappuccino started murmuring, “Tsk tsk, too skinny, how is someone like him going to protect my sister.”
While Lanski lowered her already flushed face, trying to avoid looking at Silver Mask at all cost.
“Papa, necklace necklace!”
Baolilong’s voice suddenly echoed in Liola’s heart, and Baolilong’s pink big eyes stared straight at Cappuccino’s chest. Reflecting the moonlight, the Dragon Cross Necklace was glimmering light onto Liola’s face, as if it were telling him to quickly take it back.
Liola’s heart remained very calm. He knew what he had to do. He said lightly to Cappuccino, “Now, it’s my turn.”
Hearing what Liola said, Cappuccino’s eyes shone. With his body completely surrounded by his golden aura, Cappuccino faced his immensely strong opponent without any fear.
Liola withdrew his aura back into his body. Although he finally understood how aura could be used for defense, he was unclear on how to use it to attack. Since this fight involved getting back the necklace, Liola did not plan to use something he was unfamiliar with.
Even though he had no idea why Silver Mask would withdraw his aura, but Cappuccino did not dare to lower his guard, and he carefully examined his opponent. He noticed Silver Mask’s figure blurred slightly…
‘No! That was a mirage!’ Cappuccino immediately realized the figure standing where Liola was standing was actually an afterimage.
Just as Cappuccino realized, a stream of practically unnoticeable Ki was headed towards the back of his neck. It was already too late for him to dodge, so Cappuccino had no choice but to concentrate his aura at where he felt was the point of attack. The attack collided head on with Cappuccino’s protective aura, and the enormous momentum forced Cappuccino to take a step forward.
He immediately turned to face Silver Mask, but when he saw Silver Mask from the corner of his eye, he noticed it too was an afterimage. This attack was on his left side, and Cappuccino maneuvered his aura to, once again, block the attack.
Aura was quite troublesome to Liola, and after two attacks without any result made Liola a bit frustrated. As the best Assassin, ever since he was 18, he had never had to repeat an attack to the same person, unless he wanted to mutilate the corpse.
Liola knew, however, it wasn’t hard to break through Cappuccino’s aura, but to do so without seriously injuring Cappuccino was a bit of a problem.
Blood Wolf was, at first, curious why Liola would attack so aggressively, but as soon as he saw the little Baolilong staring at Cappuccino’s chest and the necklace there, he understood Liola’s true intent.
Liola had already attacked five times, and these five failures made Liola impatient. Cappuccino, however, was extraordinarily happy: fighting with a stronger opponent was one of the main ways that he could become stronger, especially since he had already reached Gold rank. To him, whose power was reaching a plateau, it was an once-in-a-life-time opportunity to gain experience.
“I’m going to use my ultimate.” Liola’s eyes flashed.
“Tsk tsk, looks like you’ve made quite a lot of progress, to the point where you can actually force him to use his ultimate, considering he’s on par with us.” Blood Wolf had gotten excited at the thought of being able to watch a new move.
Cappuccino was, too, unusually excited. It’s not because he hadn’t sparred with Blood Wolf or Lancelot, but neither would ever use their ultimates. Even if Cappuccino used his Dragon Sword Dance, both of them would just sit there and take a beating.
This badboy Blood Wolf would even often crouch on the floor and yawn as the Dragon Kis land on him. Being able to force Silver Mask, who was on par with Blood Wolf and Lancelot, to use his ultimate, was something that made Kung Fu fanatic Cappuccino happier than anything else in the world.
“It’s just an ultimate. Didn’t third brother just use Dragon Sword Dance?” Lanski asked with confusion.
Blood Wolf laughed, “Little Princess, you have not reached that level yet, so you do not understand. For a Silver Rank to reach Gold, or for a Gold to reach an even higher level, it all depends on the individual’s ability for apperception. Being able to see a stronger person’s ultimate skill is undoubtedly the best way for apperception. However, very few people would use their ultimates toward others, and the fewer people knowing about their ultimates the better. Otherwise, as soon as your enemies find a way to counter your ultimate, things could get really ugly.”
“That’s why all you Dragon Empire Royalties use Dragon Sword Dance,” Blood Wolf pouted, “Your brother isn’t even willing to exchange another move for my ultimate.”
Cappuccino awkwardly explained with grievance,
“I want to exchange too, but we are not allowed to use other moves unless absolutely necessary; this is the commandments passed down from my forefathers. If my dad knew I exchange ultimate moves with you, he will definitely use me as target practice. Blood Wolf, you don’t want to lose a wingman who drinks with you, right?”
Blood Wolf grunted.
“Can we start already? I have to beat you in one move.” Liola frowned.
Blood Wolf burst into laughter, “I hope you’re not doing this because you’re too lazy to keep fighting? I didn’t think you were this lazy. I thought only the green-haired little runt would be the lazy one.”
“That’s not the reason. I can’t move too much.” Liola said straightforwardly.
“Can’t move much?” Blood Wolf paused, “Why? Were you hurt by the Dragon Sword Dance?’
Liola shook his head and lowered his head to look at his left hand. The others followed, and realized Liola held a fist at his belly.
“Do you… need to go?” Blood Wolf asked stupefied.
“You can go to the bathroom first, I can wait for you.” Cappuccino said with the same stupefied expression as Blood Wolf.
Liola remained silent briefly, then lightly said, “No, the belt broke, and my pants will fall if I don’t hold onto it.”
Lanski lowered her head even more, until Cappuccino anxiously yelled, “Stupid sister, there’s an ultimate move coming, and you have to watch! You’re not even allowed to blink!”
Lanski struggled a bit, but the Dragon Empire royalties’ obsession with martial arts finally won against a girl’s shyness. Lanski raised her head, and her blue eyes opened as wide as they could, without even blinking at all.
Liola raised his Broken Silver in his right hand (left hand, of course, was still holding onto his pants), and Cappuccino emitted his brilliant gold aura over every bit of his body.
Liola kicked the ground behind him, and his body flew forward like a rocket. In the short distance he travelled, Liola kicked the ground two more times, each of both left a deep shoe mark on the ground. When he reached Cappuccino, the enormous momentum forced Cappuccino’s Gold aura to flicker like a candle light in a hurricane.
When Liola’s white rocket-like body reached Cappuccino’s face, Cappuccino felt countless fears in his heart. His Gold aura was torn apart like paper, and he felt like he was standing naked on a boulder by the beach, seeing a brutal tsunami heading towards him.
His years of training did not help him react to this danger, and the only thought was in his mind was, ‘Am I going to die?’
Although Liola was going to be running soon, he did not plan to add a ‘Prince’s murderer’ to his list of charges.
He didn’t aim for Cappuccino from the start, but just the force of passing by him was more than enough to scare him. He was practically knocked onto the ground by Liola’s charge. When Liola finally stood still a dozen meters away, Cappuccino had already been lying on the ground unconscious. Of course, Liola could have kept him conscious, but it would have gone against his original intentions.
Liola quietly put Broken Silver back into his boots. At the same time, there was another thing being put into the same boot — the Dragon Cross Necklace.
“Third brother!”
Lanski ran to her brother with fright. It wasn’t until she ascertained her brother was only unconscious did she relaxed a bit. When she turned around, only Blood Wolf remained next to the little lake.
Lanski immediately yelled, “Where’s Silver Mask?”
“Probably went back to change his pants!” Blood Wolf shrugged, ‘but it’s going to take him quite a long time to change his pants.’
AnmesicCat2016-11-02T22:22:19-04:00January 24th, 2014|[CN] Kill No More|30 Comments
|
cc/2019-30/en_middle_0014.json.gz/line201
|
__label__cc
| 0.612907
| 0.387093
|
Muharren Ebrey Archives - Joanne Leedom-Ackerman
Two Voices Behind the Iron Doors
April 8, 2013 by Joanne Leedom-Ackerman 1 Comment
(In the past weeks I was brought to focus again on the situation of two writers in prison, one in China, the other in Turkey, both countries that have consistently challenged and imprisoned writers. In China the hope for expanded freedom of expression that came with the Olympics and China’s engagement with global institutions has not materialized, and Chinese writers remain in prison with long sentences. The situation in Turkey for a while was improving, but in the past year arrests have again escalated.)
Voice in China
I had dinner recently with three colleagues of Liu Xiaobo, the Nobel laureate and writer currently serving an 11-year sentence in a Chinese jail. Two of his friends, Shen Tong and the other friend arrived in the U.S. around the time of the Tiananmen Square protests in 1989, but the younger best-selling writer and democracy activist Yu Jie didn’t leave China until January, 2012 after being detained and tortured and put under house arrest. He now lives in Virginia.
Yu Jie consulted with Liu Xiaobo during the writing of Charter 08, the manifesto calling for democracy in China which resulted in the imprisonment of Dr. Liu. He and Liu Xiaobo also co founded the Independent Chinese PEN Center, and Yu Jie has written a biography of Liu Xiaobo.
At a round wooden table in a bustling Washington restaurant the friends outlined their campaign. Among their strategies, they are working to gather a million signatures worldwide calling for the release of Liu Xiaobo and his wife Liu Xia, who has been under house arrest since Liu’s imprisonment. So far they have gathered about half a million signatures in 130 countries, including from 135 Nobel Laureates. The Friends of Liu Xiaobo are also campaigning for the release of other prisoners of conscience in China. They and the Nobel Laureates are mobilizing support around the world and have been told the Chinese government has started to take notice and to worry about the scope of the campaign. Dr. Liu is the only Nobel Peace Prize Laureate in prison.
Here is the link to sign the petition.
* Friends of Liu Xiaobo Twitter: http://twitter.com/lxbfree,
* Facebook page: http://www.facebook.com/Free.Liu?fref=ts
Poem by Liu Xiaobo:
A Small Rat in Prison
a small rat passes through the iron bars
paces back and forth on the window ledge
the peeling walls are watching him
the blood-filled mosquitoes are watching him
he even draws the moon from the sky, silver
shadow casts down
beauty, as if in flight
a very gentryman the rat tonight
doesn’t eat nor drink nor grind his teeth
as he stares with his sly bright eyes
strolling in the moonlight
Translated by Jeffrey Yang
Voice in Turkey
I reached into the drawer of my post box in Washington this week and pulled out a card addressed to Doame Leexa-Acker (the name no doubt a reflection of my poor penmanship on the receiving end.) The envelope was from Turkey, and the postcard inside had a picture of Diyarbakir, the ancient city in southeastern Turkey that is the capital of the Kurdish region and the hub of fighting for decades between the Army and the PKK.
In a neatly printed hand the card read:
21 March Newroz Kurdish religiots [sic[ celebrate.
1200 day not free. I’m healt [sic] bad.
I’m free about concerned. I need you children.
I at the house must be. I’ not killer!
I’m writer, lawyer, peacemaker.
I’ hope back you can be. Please.
Grand peace in the door.
Thank you for post cards 🙂
Muharrem Erbey
Even with the challenge of English, the appeal resonated. I looked up his case and reminded myself of his situation: Muharrem Erbey is a writer and a human rights lawyer, Vice President of the Human Rights Association. He was imprisoned under the Anti-terror Law in 2009. According to PEN International, he has compiled reports on disappearances and extra-judicial killings in the Kurdish region and has represented individuals in the provincial, national and international courts, including the European Court of Human Rights. He was one of dozens of writers and journalists tried under the auspices of the Kurdistan Communities Union (KCK) trials which targeted pro-Kurdish writers, publishers, academics and translators, tried together as KCK’s “Press Wing.” He has published articles and co-edited a collection of Turkish and Kurdish language stories. His own short story collection, My Father, Aharon Usta was delayed for publication after his arrest.
Last fall Erbey wrote to those at PEN who had advocated on his behalf: “I send you my heart’s warmth from behind the iron doors and bars and damp, cold, wet walls of prison….My speeches and comments never contained words of violence.”
Circulating a writers’ work and giving voice to those silenced is part of what writers can do for each other. Below is a section of a translated letter from Erbey describing the seasons in prison with a link to the full letter:
I want to tell you how I have experienced the four seasons from behind bars.
Autumn. In the morning, as I reach over the barbed wire crowning this wall six or seven metres in height, the sun as it passes briefly through our ventilation system and away again, the sound of the sparrows that perch on the wire and fly off with the crumbs of bread we toss, the squawking of doves overhead, this sky stained a cold and faded blue, the wind that howls and carries dry fragments of grass through the ventilation – all work the ache of loneliness finely and deeply into me, as the captivity of my shivering body grows a storey higher. I am listening to the sound of the wind. The chattering of clothespegs hanging from the line, the clatter of water bottles roaming the area, flying newspaper scraps and silently wandering dreams, hopes that grow from a whisper to a roar – they strike the wall and go no further.
Winter. There is a weak sun that does not warm you. The air is cold. This place is alien to life, with its endless concrete and iron, these wire fences. The walls’ peeling grey paint, their damp, drains you of energy. Your dreams are caked in dust and soot. At 6 am, as we four men in each room wake to the metallic clank of iron doors, we wish that this were all a dream, but it is not; everything is real. As it happens, prison is the one place one would never want to be when waking. We have this privilege. The prison walls allow everything to pass, except time. I am freezing, my throat dries up, my eyes are burning, there is the weight of tonnes on top of me; it is as if I am tied in steel cord. I cough and I sneeze. In winter prison becomes a prison, and the cold season seems to go on forever. At night we go to the toilet dozens of times.
Spring. Taking root in a crack of broken concrete, seeds brought over the walls and wire by the wind display nature’s irresistible force with the unfurling of their leaves. At first glance you think that the seedling has broken its way out through the concrete. But nature stubbornly allows life to take hold, splitting concrete despite every restriction. An unimaginable aroma of oleaster surrounds us. You know that spring is here from the sound of birds and the smell of flowers. And from the flocks of birds in the sky, and its glittering blue.
Summer. The sun lays waste to it all, as walls and floor turn to a raging fire. I grow drowsy and still. As I shake my head before the spinning ventilator it rises above the walls and the wire fences and I fight to breathe, just as a fish in a tank rises to the surface and, looking desperately at the blue skies, gasps. At night the sound of a soldier whistling intermittently on the watchtower blends with an owl’s hooting. There is a wedding in the neighbouring village. The banging of drums, the women’s ululations and the barking of excited dogs plant a smile on my face just as soon as they steal in through an open window. How sweet to hear life even if we cannot see it!
If only prison did not teach one how beautiful life is. My sons Robin (10) and Robert (5) ask “Daddy, when will you be done here? How long until you come home?” I reply “Not long, not long.” In reality, I do not know when I will be done….
[Follow the links to send appeals on behalf of Liu Xiaobo and Muharrem Erbey.]
Filed Under: Blog Tagged With: China, freedom of expression, Joanne Leedom-Ackerman, Liu Xia, Liu Xiaobo, Muharren Ebrey, Nobel Laureate, PEN International, Shen Tong, Turkey, Yu Jie
|
cc/2019-30/en_middle_0014.json.gz/line207
|
__label__cc
| 0.61141
| 0.38859
|
The Knight's Toast
Life...It's What you Make Happen
Life is good! Life is fun! Granted, life sometimes sucks, but you can choose if your the sucker or the one sucking on the straw out of a coconut shell on the beach in the Caribbean!
That's right, life isn't so much of what happens to you, but rather more about what you make happen. It's being an alchemist and changing those bits of pig shit into pearls of wisdom.
I woke up this morning to a dreary, raining day, but in my spirit I'm ready to party on the beach! It's really not that hard to do, trust me.
In today's Two Listeners reflection it said, "Breathe in the rich blessings of each new day. Forget all that lies behind you."
To that I say a hearty...AMEN! Now I must catch my breath.
Sir Hook the Heavy Breather of Warrick
I'm Too Sexy
I'm too sexy for my elf...to sexy for my elf...elf...elf! Just goes to prove that size doesn't matter...it's all about style, or the lack there of. A wise Mexican cab driver once told me, "Amigo, it's not the size of the ship...it's the motion of the ocean!" His name was Jesus by the way, so I had to believe him!
When it comes to Fashion Advice You Can Trust, trust me when I say, follow your gut and create your own style. That's what separates the creative man from a fashion mag...and perhaps create a whole new cultural icon!
As ZZ Top says, "Every girl's crazy about a sharp dressed man." I don't believe that necessarily means a button down collar, but wearing whatever with confidence. I do agree with the Top when they say however, "I'm a fool for your stockings I believe!"
Sir Hook the Fashionable of Warrick
Fame, a song by David Bowie. Fame, a Broadway Hit and Television Show. "I want to live forever." The battle cry of the evangelical as well as the self obsessed. In most cases it's one and the same; however, in this rendition of Fame we are purely having FUN...another "F" word that elicits pure emotion.
Sir Davyd of Oxfordshire shared this site with me, magmypic.com, where you can upload photos into different mock magazine covers. Four things I instantly noticed:
1. It's a great exercise in self awareness.
2. It says more about you than you realize.
3. It's just freakin fun, and the subject of the next few blogs from me.
4. We got to have one of these on KMSA!
We have been discussing the need to open up the blog so that more people can post. After all, I may be Famous, a Founding Father, and a Knight, but I'm no Feudal Lord. At lest not in this life! So visit magmypic.com and start to discover the real you.
Now, back to writing my next World Wide Hit. Watch out Simon!
Sir Hook the Minstrel of Warrick
Losing is Part of Winning
Here's my friend, Bruce Pearl, Head Coach of the Tennessee Volunteers Basketball Team. A master encourager, I use to have him talk to my staff and to clients about the connection between winning at basketball and winning at business and life.
Last night the Vols went down in defeat to the Louisville Cardinals, who have an assistant that is a son of another good friend of mine, and boyfriend to my best friend's daughter. Not being a Hoosier fan, (I originally hale from Illinois) I was pleased to see both teams in the hunt. I must confess; however, that once touched by Bruce Pearl, his magnetism pulls strongly over the mountains in Knoxville to wherever you go. Payton Manning didn't even make me a Vols fan.
The secret to Bruce's success is that he believes that losing is part of winning. This philosophy brought an obscure team the Division II NCAA championship twice. That team, the University of Southern Indiana Eagles, is from right here in Evansville. Their winning ways are gone now, so is Bruce. Before Bruce, the Vols where known for basketball through their successful Ladies program. Now, Bruce has brought his winning ways to Knoxville and has created the best men's team that Tennessee has ever seen.
Yes, they lost last night; however, you can bet that Bruce and the Vols will be back in the hunt for the National Championship next year. And knowing Bruce, he's already figured out from this loss how to win!
Time to Ponder after Wonder
Sir Dayvd of Oxfordshire shared this outstanding quote with me yesterday. Attributed to many different people, most probably either Sarah Rowland from the book "Life in the Snakepit" or Father Alfred D'Souza. Regardless, it's a good quote to ponder as you wonder!
Sir Hook the Ponderer of Warrick
Do You Ever Wonder?
Do you ever wonder? I confess I do. I will also confess that I wonder too much. The hardest thing for me to do is to live in the now. It's a truly exhausting exercise, but once achieved for that spec in time, one of the most sublime and intimate moments in life. Time stands still as the mind expands beyond its normal limits. Yeah, it's a drug. A spiritual cocktail extraordinaire waiting to intoxicate you, motivate you, release you into ecstasy. Alas, it won't, it can't last, but that doesn't mean you stop trying.
Last night I found myself wondering why I made such progress in my work all day, only to be dealt a difficult blow right at the end of the day. A blow that might jeopardize a project that would leave me with time on my hands and nothing to show for it. It didn't seem fair! I wondered why this happens? Not a fan of predestination, I do however recognize that forces move around and through use to guide us towards our destiny if we only allow those forces to be heard, felt, to surrender to their movements.
So, I find myself here this morning wondering if room is being made in my life to write? Not just this blog, but all the great stories stored in my mind. Is this the Divine calling me to yet another new place in life? You see, I can't keep from wondering. It even manifests itself in the physical. I'm addicted to wondering!
Now, how do I make it work for me instead of against me? A question that all true Knights and Ladies will face many times in their battles. Thank you for wondering with me today. Perhaps you're wondering about what the hell I'm talking about. Perhaps you're exactly where I am this morning and totally understand. Perhaps you never wonder? If so, enjoy the peace and pass it on. There are plenty of us who might become bored in such Nirvana.
Sir Hook the Wonderer of Warrick
Do You Know Jack?
Yesterday I received a parcel from Merry Old England addressed to Sir Hook of Warrick in Newburgh, Indiana, complete with stamps of a younger QE2. I happened to be bringing the trash barrels back in from "Trash Day" when the postal truck pulled up to the mail box. She handed me my mail, excluding the parcel, and with a curious look on her face asked, "Are you Sir Hook of Warrick?" To which I replied with much grace, "Indeed I am Madam." She then handed me the parcel with a look of either this guy is crazy, or this guy is an English Knight. Both would be correct Madam, I thought.
Anyway, the parcel contained articles picked up by Sir Dayvd of Oxfordshire when he went to the New York Public Library exhibit of Jack Kerouac. The more I get to know Jack, the more I realize how much he has influenced me without even knowing it. Inspired to dig deeper I took the articles and headed down to the neighborhood pub, Knob Hill Tavern, and had a couple of fish bowls (an Indiana thing) of Sam Adams White Ale and got to know Jack better.
On the Road, his most famous novel, journal, chicken scratches, scrolling typewritten pages, etc., is a very similar experience to mine the past three years traveling like I have, meeting all kinds of people, opening my mind. I'm inspired now more than ever to begin the writing process in earnest!
As I laid in bed last night listening to the sound of barges on the Ohio River (I live next to the River), I thought more about Jack and his life and I wrote:
The growling roar makes my spirit soar
Barges in the night slumber towards the unknown
Lazy in their effortless movement
Powerful in their ability to move beyond my sight
I feel their spirit rising within me
Swelling like the gentle waves of the River
Rolling, ever rolling to a destiny unseen
Yet believed
Sir Hook of the River in Warrick
Snapshots from a Dharma Bum
When ever I visit the organized chaos of New York, it never fails to remind me; with its ultimate compression and full stop of mankind, and the threadbare literally rubbing shoulders with the millionaire, that the final sin of all, and the worst, is righteousness.
My Favorite New York Bar. 363 West Broadway, on the South East corner of Broome St. and West Broadway. http://broomestreetbar.ypguides.net
Outside New York Public Library, (the words Public Library, themselves, along with Hope and Charity, up there among the greatest words ever conceived)
Sir Dayvd of Oxfordshire
Easter Comes Alive
I thought I would write briefly and wish everyone out there a Happy Easter. Everyone!
Easter is the Christian religious observance that celebrates the resurrection of Jesus Christ. Christians believe that Jesus rose from the dead, or was “resurrected.” This event proved that Jesus was the son of God, the Christ.
I have a slightly different take than most Christians (though I imagine that some will agree). I believe that the real “resurrection” of Jesus does not rely on whether he rose from the dead or not. I would think that the real “resurrection” occurs when the teachings of Jesus “comes alive” within our hearts and minds.
Now here's the interesting thing. It's the same for many other religions. For example: For Buddhists, when they receive the Buddha’s teachings in their hearts and minds, then the Buddha comes “alive” for them.
Buddhism is not as concerned with historical fact as it is concerned with religious truth. Religious truth stands beyond time.
If we focuses only on the historical event of Jesus rising from the dead, then it stands as just one event in time. If instead we focus on receiving the teachings of Jesus in our hearts, then it becomes a religion that “comes alive” and stands beyond time.
Thich Nhat Hanh, a well-known Buddhist Monk and prolific writer of Buddhist books writes:
“Redemption and resurrection are neither words nor objects of belief. They are our daily practice. We practice in such a way that Buddha is born every moment of our daily life, that Jesus Christ is born every moment of our daily life.” —from Going Home.
Thich Nhat Hanh has even written an excellent book titled, “Living Buddha, Living Christ” in which he discusses his appreciation of both Jesus and Shakyamuni Buddha, and how they must become living teachers for us today.
“When we understand and practice deeply the life and teachings of Buddha or the life and teachings of Jesus, we penetrate the door and enter the abode of the living Buddha and the living Christ, and life eternal presents itself to us.” —p. 56, Living Buddha, Living Christ by Thich Nhat Hanh
On this day, no matter if you're celebrating or questioning, may your hearts and minds “come alive” with peace and love.
Laughter is Divine
I believe that laughter is the purist expression of the soul. It's spontaneous, genuine (and when not, easily detectable) and involves every part of our human anatomy when expressed with vigor. Did Christ laugh? Most assuredly; however, it is not part of scripture. Now, since I'm Catholic (by Title...More Zen Christian Barbarian in reality) this is not a problem for me. For many fundamentalist of all callings; however, it's an image of Christ that is hard to bare. It would mean that we would have to enjoy our existence, to connect to what makes us all common...our humanity. Scary stuff!
So, we run off to our nearest place of worship and take a bath in conformity instead of diversity, because diversity is being fully human. There's the rub. Christ is the only man who was fully human and fully divine. I dare say the poster boy for Unity through Diversity. Instead of embracing this divine mystery for what it is, we tend to skip the parts we don't like and emphasize those that we do. One common thread in the human Psyche is the tendency to not feel worthy. Organized religion has this chink in our armour down to a refined science, sending brain washed souls to kill and plunder under a holy banner. But, Christ came so that we might have life, joy, and have it abundantly. Don't lift him up so high on that cross that you can't relate to him anymore, his face wooden, frozen in agony like that's the only way God as man can relate to us.
When you smile at your children, laugh at that joke, feel the presence of the Divine blowing through your mind....take a look in the mirror and soak in the face of the Divine...SMILING! We will always fail miserably by denying our humanity and emphasising our divinity. We will never be holy enough, that is why Christ came. We can; however, be human enough, which is also a calling we are challenged with. Are you brave enough to answer that call? Or, are you more comfortable being silent in the pew and being told what to think, say and do? Jesus was a rebel, unpopular with the religious authorities of his day. Are you brave enough to truly follow in his footsteps? Are you brave enough to connect with the outcasts of society, dine with prostitutes, give women and children a voice, die for someone else? Can you Think, Drink, and Be Merry, like Jesus did at the wedding at Cana? (I wonder how he went to the bathroom?) This is why I am a Knight of Moleskine, Spirit and Ale and believe that we can only be Unified through our Diversity. It is fine to be solemn on Good Friday; however, my Savior was still alive that day...and remains alive every day. Joy is my battle banner, from the profane to the divine. I laugh heartily and with much gratitude because of my joy of living. It's a great gift and a wonderful way to celebrate the Divine in all things!
Remember, we are the fallible instruments of the infallible. We'll make mistakes, that's what humans do. We can choose to laugh about them or to kill over them. The great thing is, we are free to choose! This leads me to the most profound image of Christ for me: Not hanging on the cross, not the agony in the garden, not talking to women at the well (a BIG NO NO!)...but this image.
Christ bends down, he comes to our level and begins writing in the sand. He gets his hands and fingers dirty just like any man, but then he looks up and speaks the most profound words found in the Bible; "He who is without sin cast the first stone." WOW! Talk about a smack down! Jesus, getting down and dirty both figuratively and theologically, brings down centuries of sexist Mosaic law with the flip of a finger and a few well chosen words. He saves a woman who is having sex with someone other than her husband from being stoned to death. (He probably was a jerk anyway.) Now, I prefer to imagine Jesus as pictured above after this incident. Imagine the look of shock on the face of the woman, the look on the faces of the school yard bullies as they were denied "getting their rocks off", and while we're imagining...where the hell was the guy she was having sex with? Yes, we've come a long way baby, but we still have a long way to go.
So take it from this errant knight who has survived being stabbed, heart by pass surgery and a broken back, life is short and sweet....so lighten up and laugh a lot. It will do you and those around you a world of good, not to mention that laughter is a form of prayer and praise. And yes, I can be very serious, like each time I undress and see the scars all over my body. I am reminded of the scars that Christ bore for me. But then, I SMILE, because life is worth living and laughing for!
Sir Hook of Laughter from Warrick
The One whose throne is in heaven sits laughing. Psalm 2:4
Now, today being Good Friday and all one might expect me to pontificate about the events of that day and how it has changed the world and changed me. I'll give you, there were a few JERKS involved in the events of that fateful Friday...however....
not the JERK I'm talking about. Steve Martin made the movie JERK into a brilliant career in comedy. Besides, the headline on this movie poster could be used in today's political environment. "All I want is this black limousine, this oval office, and secret stuff nobody else will know about. That's all I want." Sorry...JERK!
Now, there's the Clean & Jerk for our Free Weight Wheeling Friends. Dare say that this picture of the beginning of this storied move might lend itself better to what happens in the locker room afterwards...the Jerk & Clean.
Regardless, this is still not the JERK we seek. Albeit, it is getting closer to two key ingredients: 1) HOT 2) SPICY
No, the JERK we're talking about is a seasoning of spices made famous in Jamaica and found throughout the Caribbean Islands. Jerk Pork, Jerk Chicken, Jerk Beef and my favorite American recipe...Jerk Fries! While stopping in for a couple of rounds of my favorite Ales at Old Chicago last night, I decided to indulge in a basket of Jerk Fries while watching the NCAA. Last night's were particularly coated and VERY SPICY! OK, Now you're asking, besides the obvious what are you getting at? Well, I felt it necessary to share this bit of wisdom with my fellow Knights. After eating my fries in a drunken frenzy, I proceeded to the bathroom to relieve myself. What I'm getting at is this. MAKE SURE YOU WASH YOUR HANDS AFTER EATING JERK FRIES AND BEFORE YOU HANDLE YOUR MANHOOD OVER A PORCELAIN TOILET ON PAIN OF BECOMING THE BIGGEST JERK PORK LOIN YOU'LL EVER SEE!!!!
There, now I feel better and have finally cooled off.
Sir Hook the Spicy Jerk of Warrick
Spring Bock
Today is the first day of spring –
Time to fly a kite in the cumulus sky and kick over some young daffodils.
It's also the perfect time to discover a good Bock Beer – a strong, often very dark, malty lager.
I'd always heard that bock beers meant “bottom of the barrel.” Not true according to some research on www.worldclassbeverages.com
“Bocks were traditionally brewed at the end of the brewing season (late winter or early spring), so they were the last beer of the season to be brewed. (Before refrigeration, brewing season ended once the temperatures got too high for brewers to keep yeast.) For this reason, many people believe that Bock beers are from the "bottom" of the brewing tank, or that they are the leftover sediment from other brews. Of course, this is not the case in modern brewing.”
“Ahh, Bock!” (Yes, that's a play on words from a M*A*S*H episode)
What's in a name? The name Bock actually comes from a corruption of the name Einbeck (The German city that is the origin of bock beers).
And what about the goat that is the “universal symbol” for bock beers? The answer is that the German word for Billy-goat is also "bock," so Bock beers have adopted the Billy-goat as their official symbol.
Beer and Lent: “During Lent, the forty days prior to Easter, fasting is common, but beer is brewed from ingredients that are not prohibited during Lent, so Bock beer became a popular source of sustenance during the Lenten season.”
Want a double goat kick? Try a doppelbock. “The word doppelbock literally means "double bock" and while today's doppelbocks are essentially twice the strength of regular bocks, the doppelbock style originated completely separate from the bock style. In all likelihood, the original version of the beer that the Germans called "doppelbock" was somewhat different from the style of beer we know today and over time, it evolved to become the beer we know.”
Again, more enlightenment and more science of bocks can be found at:
http://www.worldclassbeverages.com/includes/Style%20Articles/Bocks.htm
Here's to spring and your favorite bock.
Is “best” best?
This morning I spied a couple of Heinekens in the office refrigerator…
Which got me wondering who drinks Heineken anymore...
Which reminded me of an old marketing book I read years ago, The 22 Immutable Laws of Marketing by Al Ries and Jack Trout…
Which reminded me of a quiz…
Who was the first person to fly the Atlantic Ocean solo? Charles Lindbergh, right?
Who was the second?
(Pardon me, but this blog is going to fly all over the place).
It’s true that many people believe that the surest way to success is to market (convince their prospects) that their product or service as the “best.” But is “best” best?
A basic law in marketing is creating a category that you can be FIRST in. It’s the Law of Leadership. More times than not, it’s better to be first than it is to be better. Why? It’s much easier to get into the mind first than to try to convince someone you have a better product than the one that did get there first.
Which leads me back to those Heinekens...
After World War II, Heineken was the first imported beer to make a name for itself in the United States. As a result, for decades after it remained the number one imported beer. Was it the best tasting of the hundreds and hundreds of brands imported into America? Doubtful!
Now, to seemingly contradict the law of leadership, another law states: It’s better to be first in the mind than to be first in the marketplace. It’s all really about a battle of perceptions – it’s an illusion. Beer marketing is a battle of perceptions, not a battle of taste. It’s good to be first, but it’s better to be first in the minds of the consumer!
Though Heineken is still high on the list, it might not surprise you to know that Corona now reigns as the #1 Imported Beer in the United States. Why? Take a look at Corona marketing and merchandising vs. Heineken. What’s the perception of drinking a Corona? It takes you away to a better place – a lazy beach.
It’s an illusion!
FYI Bud Light is now not only the number one selling light beer in America, it’s the number one selling beer period. So “light beer” is no longer a category – it’s just beer?
Which reminds me of the old Monty Python joke: “American beer is like making love in a canoe: Two (too) F’ing close to water.”
Which doesn’t remind me at all of anything, but I figure that I better wind this up.
Which leads me to Bert Hinkler. He was the second person to fly the Atlantic Ocean solo. (a better pilot than “Lucky Lindy” – he flew faster and consumed less fuel).
Which reminds me of the third person to fly the Atlantic solo (which I bet you know).
It’s Amelia Earhart! We remember her because she was the first in her own category.
All just something to think about the next time you order a beer.
(After squandering your precious time reading this blog, don’t you just want to strangle the guy who put those Heinekens in the refrigerator?)
Hillary Comes to Evansville
No, this is not Hillary smoking Bill's cigar, but it could be a foreskin taste of the future once Obama kicks her ass. This is the remnants of 60's feminism waiting to see her at one of our local high schools today.
It reminds me of Sofia Theopenopulous, or as we called her, Sofy. Sofy was a larger than life old broad, an immigrant Greek, who fought in the resistance in WWII, was a State skeet shoot champion in Illinois and sold fireworks illegally, along with a nightly poker game upstairs in her Corner Candy Store right next to the Police Station. At one time Sofy was also a Justice of the Peace. The other characteristic of Sofy was her continual 12 inch Dino cigar, or on occasions a Corn Cob pipe. Sofy taught us Southern Illinois boys what it meant to be a powerful woman and how much fun you can have with one. I'll never forget her and I'll never vote for Hillary.
Peace Out Fellow Old Dudes!
Blarney Stoned
After scrapping the hairs off me tongue and waiting to return to me natural color, I was entertained by Sir Dayvd of Oxfordshire's observations about Guinness, St. Patrick's Day and Potatoes:
Sir Hook I note with interest that Guinness are arguing that St Patty's Day should be made a national holiday. (That'll encourage responsible drinking and much hurling of chunks in gutters. ) The makers of the primeval, straight-from-the-earth's-crust brew are sponsoring a drive through their Web site to make "Proposition 3-17" a law. They plan to hustle up a million or more signatures by midnight and deliver the petition to Congress today, although if it only took one million signatures to pass legislation, Montana would have been renamed Hannah Montana a long time ago.
Although yesterday was a day when bagpipers marched proudly up Fifth Avenue, girls named Maureen painted green shamrocks on their faces and "The Quiet Man" played on TV. The cozy Irish pub then turned from a friendly place for conversation to a rugby match of rookie drinkers who desecrated the holy pint of plain by guzzling it like water (or Budweiser). Their buttons saying, "Kiss Me, I'm Irish," but their driver's licenses saying, "Arrest me, I'm 19." Also: "My name is Antonio DiCenzo." And consider this, ye sons of Hibernia: Guinness may be the finest liquid known to man but it's about as Irish as Shaquille O'Neal or John Kerry. It's owned by the British firm Diageo, which makes the brew in Dublin, just as Honda makes cars in Ohio. So when you bewail British oppression, please note that with each pint you are funding perfidious Albion, which is probably hoping to use the profits to steal all your potatoes again the next time you take your eye off them.
"Danny Boy" isn't Irish either - it was written by an English lawyer who never set foot in Ireland. Nor is corned beef and cabbage, nor indeed, was St. Patrick himself, a citizen of Roman Britain who was kidnapped and brought to Ireland as a slave.
Let's review : a holiday named after a Brit inspires people to drink British beer while singing a British song. It's almost enough to make you want to plunge into the more desolate parts of "Moondance" or "Astral Weeks." Except - zing! - Van Morrison is British too. So what exactly is the point of St. Patrick's Day? Though March 17 has about the same chance of being dubbed a national holiday as Eliot Spitzer does of getting a "World's Greatest Dad" T-shirt for Father's Day, formalizing it would would completely miss the point. What would be the fun in cutting school or blowing off work?
St. Patrick's Day is about slipping the leash of authority and running madly through the streets with your tongue hanging out. It's fine with me if everyone has a little Irish in them. Just keep it inside you instead of letting it out. It makes my shoes stick to the sidewalk.
Sir D
Aye! Sir H
Happy After St. Patrick's Day
Not that I need it this morning, but I did discover an interesting post-St. Patrick’s day web site some of you might be interested in: www.hangover.net
It’s about as much fun as the first 6 beers of the night and a whole lot more memorable than that last 6 of the night.
In the top 10 Cures suggested by readers (note: these are opinions from another web site and not the opinion of this web site or its sponsors -- not that we any) you’ll find a couple of good suggestions, including:
500-1000 mgs aspirin, a re-hydrating sports drink like Gatorade, and one 25 mg Dramamine (Dimenhydrinate) tablet which will drive vertigo, nausea, and Satan himself from yer gulliver.
Lots of fresh home made orange juice (usually 3 oranges and 1 lemon) then a nice long shower and then lots of sex :)
Excedrin Migraine. It’s got a little bit of caffeine, pain reliever and anti-nausea medicine.
A banana as they contain potassium which is guaranteed to revitalise your body after a heavy session.
Try Pedialite Popsicles. It’s easier to keep the ice down when you are feeling sick and it's nice and cold to help your pounding head.
Premium P.M.S. pills work within 20-25 minutes. They cure a headache, nausea, diarrhea, and light headedness. I'm not sure what it will do to the guys, but it works wonders for women.
In Finland, many people say that taking a nice, long and hot sauna session kicks the H.O away." Follow up with a massage and spa.
There are tons of other suggestions on www.hangover.net along with fun graphics and just plain silly stuff. Enjoy!
Celtic Blessing
Bless the Irish, because they don't know what they want but are willing to die for it anyway.
Bless the Scots, because they pray for themselves and on their neighbors.
Bless the English, because they think they are self-made people and that relieves God of a terrible burden.
Sir Hook "the English" of Warrick
St. Patrick's Day in Haiti
What better way to celebrate the fact that you're not really Irish on St. Patrick's Day than wearing an Irish Drinking Team T-Shirt while jamming with a local band on the beach for money in Haiti?! After all, St. Patrick's Day has truly become a cross cultural event. Once a sacred Catholic Feast Day, now it's claimed by millions of people, including offspring of those who suppressed the Irish, former slaves and people like me who need an excuse to PARTY! Oh well, celebrate your own way because that's the Knights of Moleskine, Spirit and Ale way! Now, back to my rhythm sticks, this Creole-Caribbean, French-Irish jig has got me going jiggy with it!
Sir Hook O'Warrick
Generosity is Grace in Action
What better way to celebrate Palm Sunday than under the Palms?! Now, I will give you that some people would be VERY AFRAID of such an expression of generosity; however, I do believe that it's true...When you smile, the whole world smiles at you. This is the source energy of generosity; which, I have discovered can become a much larger spiritual bank roll when applied without any strings attached. Generosity is motivated out of Love. Perhaps the love to feel better about yourself, the love to make someone else feel better, the love to have fun, the love to see other's have fun. No matter how you slice and dice it...LOVE is at the center of true generosity. It's an action. It's the face of the divine in your smile, your laugh, your handing me a coconut pain killer on the beach while drooling on yourself! Generosity is God's Face in mine and His Grace in my Action!
I recently was the recipient of such an action at the Ocean Club in Columbus, Ohio. Preferring to write in my Moleskine while eating at the bar, I almost forgot how to Endeavor to Engage. Fortunately for me, my bar mate, Jim, started to comment about how he wished he could write in a journal. That began our conversation about the Knights, journaling, life, spirituality, etc. A very pleasant and fun exchange. When Jim left and I returned to my journal, I decided I needed to pay and move on. Well, Jim gave me a lesson in Generosity and had paid for my entire meal and two very expensive glasses of outstanding wine without saying a word! I was humbled and deeply moved.
So...SPREAD THE LOVE and for God's sake His generosity!
Sir Hook "The Generous" of Warrick
Beware of...Idus Martiae!
In the Roman calendar, the term ides was used for the 15th day of the months of May, July, October, and of course, March (the 13th day of the other months).
In modern times, the term Ides of March is best known as the date that Julius Caeser was assassinated, in 44 BC, the story of which was famously retold in William Shakesbeer, I mean, Shakespeare's play Julius Caesar. A soothsayer (you've got to love that word) relates to Caesar "Beware of the ides of March" warning of his impending death. So, the term has come to be used as a metaphor for impending doom.
Doom? Here's some good news: With a little creativity the Ides of March can be made into a very MERRY event.
How to celebrate the Ides of March? Check out this event from the Beeradvocate web site:
As part of Philadelphia Beer Week, join us on the Ides of March for an evening of Shakesbeer with some Modern Day Bards of Beer. "The world's mine oyster stout".
To quote Shakesbeer, "A quart of ale is a dish for a king". Modern Day Bards of Beer from six breweries, Flying Fish, Iron Hill, Sly Fox, Southampton, Troegs, and Yards will treat you royally, with beer fit for a king. And we'll have handmade beer crowns.
"What's in a name? That which we call a beer
By any other name would taste as sweet."
"Get thee to a brew'ry" Among Modern Day Bards of Beer joining us will be Spenser Neibur from Southampton, Suzy Woods from Sly Fox, Chris LaPierre from Iron Hill, Casey Hughes from Flying Fish, Steve "Red Steve" Mashington from Yards, and more.
"Is this a lager which I see before me..."
"Two beers or not two beers, that is the question". Timed to begin after the end of the Michael Jackson Tasting, this will be a fun way to close up Philadelphia Beer Week. "Though this be madness, yet there is method in't." 9pm - ?
Think, Drink, and (erasing all doom) Be Merry!
Endeavor to Engage
The Great Dance of Time, a movement I call Endeavor to Engage. I used to have this statement on my business cards a few years ago. It was there to remind me that is my purpose here. To Endeavor to Engage not only the events I found myself in, the people I was placed before, but more importantly, myself and my Spiritual Journey.
Spending a lifetime learning how to Endeavor to Engage has filled my life with many blessings. If I hadn't of followed the urge to crack a joke in the middle of an elevator in Jamaica I would have never met my wife and soul mate. If I had never been open to those around me then I wouldn't have the circle of friends who continue to inspire and motivate me to this day. A shining example is how Sir Bowie and myself continued to push the boundaries since we met over 25 years ago. Or, how sharing a Pint and a Vision with Sir Dayvd of Oxfordshire in McGrath's last year would lead to the Knights of Moleskine, Spirit and Ale to become the reality we are today. In that same pub I met Lady Flo of McClay, who was the first to Endeavor to Engage and now our personal and professional lives are both the better for it! It's an often over used phrase, but the least understood....Just reach out and touch someone...Endeavor to Engage! It will lead to my newest revelation to be continued tomorrow...Generosity is Grace in Action!
Sir Hook and His Easton Entourage
Fabled Fado's finds Sir Hook inducting two of our latest, but by far not the least, members of the Knights of Moleskine, Spirit and Ale. Give a hearty greeting to Lady Bex of Idlewood and Sir Doc of Eakin. Lady Bex is an Xceptional member of the fairer seX, who embraced the KMSA vision on an earlier journey of this errant Knight to Columbus, Ohio. Sir Doc shares a love of John Stewart, Stephen Cobert and historical docu-dramas with Sir Hook, making him more than a worthy addition to our noble clan. Along with general merriment and liberal libations, we particullary enjoyed experiementing with different pronounciations of Pog Mo Thorin, which is Irish for "Kiss My Ass"! Lady Bex won the competition with her difinative female head-bobbing emphasis, not unlike Aretha Franklin's waitress character in the Blues Brothers. Sir Doc and myself will vouch for Lady Bex that she also did not take us up on the offer!
Pog Mo Thorin!
Sipping on an empty glass
This is a Sir Jack (Kerouac) of America follow-up:
After I read Sir Davyd’s essay on Jack Kerouac, I asked my daughter – a senior in high school and an aspiring writer – if she has heard of Sir Jack.
“Of course! He’s so cool. I have a couple of his books if you’d like to read them.”
(Good job Lady Lucy)
One poem titled A PUN FOR AL GELPI ends with the line
You’re really sipping
When your glass
Is always empty.
What do you think that means? Is it “wanting” and “desire” for something that is not there or we can’t attain?
Poetry. Questions. I write my own poetry and wonder what it means. Am I mad?
I think that Sir Jack has given all Knights permission to be mad:
“The only people for me are the mad ones, the ones who are mad to live, mad to talk, mad to be saved, desirous of everything at the same time, the ones who never yawn or say a commonplace thing, but burn, burn, burn, like fabulous yellow roman candles exploding like spiders across the stars and in the middle you see the blue centerlight pop and everybody goes "Awww!”
Thank you Sir Jack of America.
Sir Jack of America
If everything has gone to timetable, and Sir Hook and Sir Bowie have once again given me kind space on the KMSA blog, then the morning tides will have raised the capes of Delaware and I will have once again waded ashore, from the UK, into the New World, and will be sat in The White Horse Tavern in Greenwich Village NY on the 12th of March raising a glass of beer, to celebrate the birthday, and hopefully my proposed Honorary KMSA status, of, who I consider to be America's greatest example of the spirit of the KMSA, Jack Kerouac.
Kerouac's plain speak manner of writing prose, as well as his nearly long-form haiku style of poetry has inspired countless modern neo-beat writers and artists, amongst them myself, and while I’m not going to use this space to discuss the full merits of his character and life, what I have distilled from everything he did, selfish or otherwise, is that Jack was always true to himself, and that from experience I know how hard it is to pin down the free floating emotional thistledown that everyone has, as everyday thoughts, into a readable and ultimately saleable form. Methods or manner aside, he accomplished this, where others simply just talk about doing it.
Kerouac's search for a life worth living in the 1950's led him to travel, not only across North America but throughout the world, during which he wrote constantly, carrying notebooks with him everywhere, always pictured with the thick square journals tucked in the breast pockets of his workaday shirts.
Letters to friends and family members tended to be long and rambling, including great detail about his daily life and thoughts. He wrote about the deeper meaning of society and the world as he saw it, he explored too his own spiritual values, moving from Catholicism to Buddhism and back, and while his fame would come as an unmanageable surge that would ultimately be his undoing, his writing would eventually be credited as a reluctant catalyst for the 1960's counterculture. He opened the door to that new decade and looking inside, decided it wasn't for him, and left it to others to trample through and stand on the shoulders of giants.
Only now in this fast moving computer age of blogs and Facebook, can people begin to relate to how fast his mind moved, and how the restrictions of the Typewriter even forced him to invent an almost computer-like "Scrolling" method of working, years ahead of what we now take for granted as we ourselves write. Jack would have been in his holy element with email and Blackberry’s.
And so as I set out once again, On the Road, on the eastern seaboard of the US, and raise another glass to Sir Jack of America from in one of his favorite bars, I leave you with the table he set down specifically about his Spontaneous Prose method, a list of thirty "essentials." which could just as easily be the mantra of Bloggers all over the world today:
1. Scribbled secret notebooks, and wild typewritten pages, for your own joy
2. Submissive to everything, open, listening
3. Try never to get drunk outside your own house
4. Be in love with your life
5. Something that you feel will find its own form
6. Be crazy dumb saint of the mind
7. Blow as deep as you want to blow
8. Write what you want bottomless from bottom of the mind
9. The unspeakable visions of the individual
10. No time for poetry but exactly what is
11. Visionary tics shivering in the chest
12. In tranced fixation dreaming upon object before you
13. Remove literary, grammatical and syntactical inhibition
14. Like Proust be an old tea head of time
15. Telling the true story of the world in interior monologue
16. The jewel center of interest is the eye within the eye
17. Write in recollection and amazement for yourself
18. Work from pithy middle eye out, swimming in Language Sea
19. Accept loss forever
20. Believe in the holy contour of life
21. Struggle to sketch the flow that already exists intact in mind
22. Don't think of words when you stop but to see picture better
23. Keep track of every day the date emblazoned in your morning
24. No fear or shame in the dignity of your experience, language & knowledge
25. Write for the world to read and see your exact pictures of it
26. Bookmovie is the movie in words, the visual American form
27. In praise of Character in the Bleak inhuman Loneliness
28. Composing wild, undisciplined, pure, coming in from under, crazier the better
29. You're a Genius all the time
30. Writer-Director of Earthly movies Sponsored & Angeled in Heaven
We honor Jack Kerouac, Sir Jack of America : Born 12th March 1922.
He's in the Army Now
My heir, Sir Ryan of Warrick, has officially sworn into the United States Army today. This makes him a noble Knight of Moleskine, Spirit and Ale. Ryan hails from a long line of warrior ancestors starting with the Slattery's in Ireland and the Wells clan of England. Both of his grandfather's served in WWII, his great grandfather served in WWI and his great-great grandfather was a Ruff Rider with Teddy Roosevelt in the Spanish American War. We pray that his mind and hand be steady in battle and that his warrior soul will also embrace the poetry within. Serve well my son.
In honor and pride!
This is A Test of the Freudian Sensory System
OK, maybe I'm just crazy, but I have been deeply puzzled and amused by this painting on the ceiling of my Physical Therapy place. I took this picture while lying on my back with my iPhone to share in this wonder! I call it a Test of the Freudian Sensory System. In it's purest form, as intended by the unsuspecting artist, it's Garfield the Cat. But, upon further inspection, dare I say, first reaction, it becomes much more. What do you see? My honest first impression was a faceless woman who's breasts are smiling at me! The female therapist had never considered this and her first impression afterwards was an uncircumcised penis with smiling balls. Obviously there is some Pussy in this Cat! So, stare at it awhile until you're uncomfortable. Perhaps you'll see a part of you that only exists in the darkness of your own mind?
Sir Hook "the Therapist" of Warrick
Sunday's Word: LOVE
A Feeling
A Way to live
Learning to Accept
What I Can't Understand
Where Time Stands Still
A Missing Piece
Beating
To Be Free
To Be Me
Reason to Toast: International Women's Day
Ah, the beauty of women in their glorious diversity! From sinner to saint, all within the same gorgeous frame, our ladies are so much more expressive than us iron headed warriors. Well, usually that is!
Today is International Women's Day. A day to celebrate birth canals, sexual fantasies, nurturing and unilateral despair, all wrapped in one intriguing and sensuous flesh package.
It's like a great Chef Salad in which we are the fork trying to decide which morsel is next. Sir Dayvd of Oxfordshire is found of saying, "Beauty is in the Eye of the Beer Holder!"
To that I say...CHEERS!
Sir Hook "the Salad Master" of Warrick
A Hero Chooses This Humble Knight
Since reading the Alchemist by Paulo Coelho, I have become a great fan of his writing, philosophy and theology. Feeling like a band of brothers, even though I haven't met him. Well, that is directly. I met the son of one of Paulo's good friends from Brazil one night while journaling in my Moleskine at Texas De Brazil in Dallas. My journaling was about reading the Alchemist as applied to my life at the time. We had also recently launched the Knights of Moleskine, Spirit and Ale, partly in honor of Coelho's Warriors of Light, of which I'm a recipient of a monthly newsletter. Long story short in Dallas, we knighted one our first Knights of Moleskine, Spirit and Ale in that bar, Sir Robert of Rio, as well as one of our first Ladies, Lady Jasmine of Castillo.
Sir Bowie gave me The Witch of Portobello to read during my recovery from my broken back. It is a very interesting book told in narrative style of all the people who were influenced by Athena, the Witch of Portobello. Recently a contest was started by Paulo and HP to bring his characters to life in videos. There are 14 characters in the book and they would choose 200 artists to bring each character to life. This humble Knight has been chosen to do the character of a Priest torn between his love of the true spiritual life and the obligations to serve the rules of the Catholic Church. This conflict comes to a tipping point with the character Athena. His name is Father Giancarlo Fontana. So, wish this modern version of a Canterbury Tale artist on his journey.
Sir Hook "the Witch" of Warrick
Who is Paddy Carr?
It appears that we have more to Sir Bowie's history lesson within our own ranks. Patrick "Paddy" Carr, one of the English Colonist killed in Boston for throwing a snowball at British Regulars (See illustration in previous post), has family roots all the way down to our Honorary Founding Father, Sir Dayvd of Oxfordshire. You see, Sir Dayvd is actually known across the pond as David Carr. Here's his inspiring response to yesterday's post:
"Well that pretty much says it all. Paddy Carr survives the hazardous journey across 3000 miles of ocean only to get shot for throwing a snowball. He'd been more than likely been drinking that 27% proof stuff, and was having a good night out! Still, I'll raise a drink to my old ancestor and praise him for keeping up the family tradition of starting a revolution wherever we go. As the saying goes:
Q. Mr. Carr, what are you rebelling against?
A. Whadya got?
Anyway, let's hope I find plenty of action Stateside next week on my first visit to the colonies this year."
I have informed Sir Dayvd that in case of snow in New York he should refrain from throwing snowballs, unless he wears a red coat. Sir Dayvd is also planning on spreading the cheer, culture and coasters of the Knights of Moleskine, Spirit and Ale as he reconquers Manhattan.
Cheerio & Balls of Snow!
Who is Crispus Attucks?
According to the Samuel Adams web site, there are around 20 varieties of Samuel Adams beer. From seasonal to lagers, you’re sure to find a flavor that suits your pallet, including a category they call “Utopias.” Check out the alcohol content:
“Truly the epitome of brewing's two thousand year evolution, Samuel Adams Utopias® offers a flavor not just unlike any other beer but unlike any other beverage in the world. Its warm, sweet flavor is richly highlighted with hints of vanilla, oak and caramel. With an alcohol content of 27% by volume, its complexity and sweet, malty flavor is reminiscent of a deep, rich vintage Port, fine Cognac or aged sherry while being surprisingly light on the palate. And like the world’s finest after-dinner drinks, Samuel Adams Utopias is not carbonated and should be served at room temperature.
Due to legal restrictions, Samuel Adams Utopias is not offered in the states of Alabama, Georgia, Idaho, Iowa, Missouri, New Hampshire, North Carolina, Ohio, Oregon, South Carolina, Washington, or West Virginia.”
Samuel Adams was, of course, of great American Patriot. In fact, it was Samuel Adams (along with John Hancock) that British troops were under orders to capture when Paul Revere (and less-famous William Dawes) made his famous ride and foiled the mission. Ol’ Sam seems a perfect hero to be honored with a beer named after him. Samuel evidently inherited a brewery from his father, but it closed sometime during the revolution ( I guess he felt he had better things to do).
What you won’t find (to the best of my knowledge) is a beer named after Crispus Attucks. Who was Mr. Attucks? Legend has it that Crispus Attucks, an African American, was the first fatality of the American Revolutionary War.
From the History Channel Web Site:
“On the cold, snowy night of March 5, 1770, a mob of American colonists gathers at the Customs House in Boston and begins taunting the British soldiers guarding the building. The protesters, who called themselves Patriots, were protesting the occupation of their city by British troops, who were sent to Boston in 1768 to enforce unpopular taxation measures passed by a British parliament that lacked American representation.
British Captain Thomas Preston, the commanding officer at the Customs House, ordered his men to fix their bayonets and join the guard outside the building. The colonists responded by throwing snowballs and other objects at the British regulars, and Private Hugh Montgomery was hit, leading him to discharge his rifle at the crowd. The other soldiers began firing a moment later, and when the smoke cleared, five colonists were dead or dying - Crispus Attucks, Patrick Carr, Samuel Gray, Samuel Maverick, and James Caldwell - and three more were injured.”
Now, you can also thank Patriot Paul Revere for reinforcing a lot of the negative American sentiments about British rule. He made and distributed a provocative engraving of the incident, depicting the British soldiers lining up like an organized army to suppress an idealized representation of the colonist uprising.
So, the next time you enjoy one of the many Samuel Adams varieties, think of Crispus Attucks and the other Patriots who took the first bullets in the American Revolutionary War, on this date 230 years ago.
Thoughts with Sir James of Taylor
Today our own Sir James of Taylor is 'going under the knife." Well, I can't exactly say that in this day and age of laparoscopic surgery, but you know what I mean. Seems that Jim has a gallbladder that's been giving him fits and they're going in today to remove it.
I asked if they would save it for him in a bottle -- you know, something that he can put on his mantel and show friends at his next party. Turns out that the Centers for Disease Control won't let a person keep part of his own body. I guess they don't want a gallstone pandemic spreading through populations of people who see it on Jim's mantel.
Anyway, here are some gallbladder facts I dug up (since I really didn't know what the function of this beast is): The gallbladder stores about 50 ml of bile, which is released when food containing fat enters the digestive track , stimulating the secretion of cholecystokinin (CCK). The bile, produced in the liver, emulsifies fats and neutralizes acids in partly digested food.
So, brother Jim, we're thinking of you today. Perhaps tonight we'll even toast your new-found health.
A few blogs ago I mentioned the United State's old...
Sunday Homily: Don't Confine the Divine
Mirror, Mirror On the Wall
|
cc/2019-30/en_middle_0014.json.gz/line214
|
__label__cc
| 0.578366
| 0.421634
|
The science of good storytelling
Paul Facer
Paul Faceron
Imagine that you’re asked one of the following questions:
What did you do at the weekend?
How was your journey home last night?
How was work today?
Each of these simple questions elicits a story in response. As the author and narrator of that story you’ll infuse your answer with brushstrokes of detail to paint a picture for the listener that brings it to life.
Storytelling forms part of the very fabric of human existence.
From the make-believe of our childhood to the misunderstood music of our teenage years, and the daydreams and nightmares of our adult lives, stories are our constant companions.
In a world where we the number of marketing messages that we’re exposed to every day is in the thousands, the most powerful – and memorable – advertising doesn’t simply inform but illustrates through stories where product is hero, or makes you a hero.
From the campaign trail to the courtroom, and the news studio to the boardroom, we don’t consume stories so much as participate in their telling, such is our hunger for them. In the words of the author Jonathan Gottschall, we are soaked to the bone in story.
Whilst art is beautiful, subjective value must be built on an understanding of outcome and its achievement. For this we need to understand the science that underlies our relationship with storytelling in order to truly maximize its potential as a communications tool.
So, what is the basis for the argument of the power of storytelling, beyond a sense of familiarity and a gut instinct that we need to engage with people emotionally, as well as rationally? How do stories engage with our brains to change our attitudes, beliefs, and behaviors?
‘Understanding a story is ultimately about understanding the human mind.’ Jonathan Gottschall
Tension and attention – the story of empathy and oxytocin
Even the most reclusive of us has to acknowledge that as social creatures we depend on others for our happiness and survival – and it is that social interaction that holds the key to understanding the science of stories.
Professor Paul J. Zak, Director of the Center for Neuroeconomics Studies at Claremont Graduate University, discovered that a neurochemical called oxytocin is a key “it’s safe to approach others” signal in the brain.
Our brains produce oxytocin when people trust or are kind to us, and it motivates cooperation with others, by enhancing our ability to experience others’ emotions – empathy. Simply put, empathy allows us to understand how others are likely to react to a situation – it puts us in their shoes.
From a storytelling perspective, we as audience are locked into a reciprocal arrangement with the author – it is their words that lie dormant, brought to life by our own imaginations as we empathize with the characters we observe.
Want your employees to feel what you feel? Tell a human story that creates tension and holds their attention.
Further studies by Professor Zak highlighted two crucial points:
Whether delivered face-to-face or in film, character-driven stories do consistently cause our brains to produce oxytocin. If a story is able to sustain attention by creating tension, attentive viewers/listeners will come to share the emotions of the characters in it, and after it ends, likely to continue mimicking the feelings and behaviors of those characters.
So, character-driven stories cause our brains to produce oxytocin, enhancing our feelings of empathy. But the best stories go further, creating tension to keep our attention, and in doing so, draw us further in, to the point where we’re actively mimicking the feelings and behaviors of the characters. In our waking – and sleeping – hours our brains fire in response to the fiction we consume, responding to a myriad of stimuli. Stories are our life simulators.
And when mapping brain activity – we can actually see the physiological impact of stories.
“When we watch Clint Eastwood get mad on film, our brains look angry too; when the scene is sad, our brains also look sad” – Jonathan Gottschall
Organisational stories – the triumph of transcendence over transaction
How do you like to think about what your organization does? Does it make widgets or does it enhance your customers’ lives? We are substantially more motivated by the transcendent purpose of an organisation (how it improves lives), than by its transactional purpose (how it sells goods and services).
This is where a story works so well – we’re attracted to stories of transcendent purpose. Once we empathize with the pain our customer experiences, so too will we feel the pleasure of its resolution, especially if the story depicts the heroes who worked to reduce suffering or struggle, or to produce joy. When the story is told right, we take every step with the characters.
There is an undeniable art to the act of writing. Words may be born on paper but to live as prose they require life to be breathed into them. This is particularly the case in a business environment, where an engaging argument or emotive description requires a skilled author and incubation in a story to survive
This setting illustrates another key point of effective storytelling – our need for jeopardy.
Here are two versions of a description of the early days of a business; you pick which one is more engaging and memorable.
Version one:
One day, Jane had an idea for a business. Her idea was simple but no-one else had thought of it. She told her friends about it and they thought it was a great idea, as did her bank manager. Within days she’d acquired the funding to start her business. A month later she was producing her first products, and thanks to her website, they sold as quickly as she could make them. Customers wanted more and each month she found herself making greater and greater profits. Since then, the business has gone from strength to strength and has been the market leader since day 1.
Version two:
One day, Jane had an idea for a business. Her idea was simple but not everyone shared her belief. Pitch after pitch, bank after bank, no-one seemed to believe in Jane’s vision. Eventually Jane realized that she would have to make her idea real herself. She risked everything by remortgaging her house to raise the money she needed. The early days were hard, as she worked during the day and made her first products in the evening. Despite next to no sleep and placing everything on the line, the business began to grow, day-by-day, week-by-week. A year on, Jane has left her old job and now runs her own business full-time. It was a hell of a year but the future’s looking bright.
Which version of the same reality do you find more engaging? Which version would you find yourself telling others?
If we turn to stories, plays, films or music to escape our own lives, we certainly don’t look for an absence of the problems that plague our lives. Quite the opposite – it is the complication, yearning, jeopardy and triumph that we consume with such relish, as we live out life’s problems without personal consequence.
Every organization already has a story to tell that can engage its people – its own foundation legend. The stories of those who overcame adversity or persisted in their vision form the organizational DNA that is the foundation of its transcendent purpose.
A story of human struggle and eventual triumph will capture hearts by first attracting brains. Paul J. Zak.
The whole is greater than the sum of its parts
Stories are organic, possess beating hearts, and are created by humans for humans.
Just as we are more than the sum of our organic parts, so too are stories. They are greater than the sum of their constituent parts; more than just an introduction, bridge, climax or conclusion. It may be possible to identify the components and commonalities of story, but it’s wrong to assume you can assemble a meaningful story simply by joining the components together. To do that is to replace the reader’s journey with a series of mechanistic movements. Don’t insult them by treating storytelling as a literary pick n’mix.
Why use stories as part of your communications?
Stories are the most pervasive and persuasive method of communication that we share as humans
We are hard-wired to respond to stories: we actively emphathise with the characters and if told well, our brains mimic the feelings of those characters.
We crave problems – and their resolution – in stories. Good news only feels good to us if it follows something bad.
Corporate storytelling has one of the greatest stories of all – the foundation legend.
Principles of good storytelling:
Consider your audience — choose a framework and details that will best resonate with your listeners.
Identify the moral or message your want to impart.
Find inspiration in your life experiences.
Assume you’re not a storyteller — you tell compelling stories everyday – you just might not realize it!
Overwhelm your story with unnecessary details – add colour and context to bring things to life, but do it through artistry and not granularity
Treat storytelling as an assembly line – you may understand the components that you need but just as we are more than the sum of our physical parts, so are stories. So don’t be lazy – breathe some life into them
Understand the science and artistry of the craft off storytelling and don’t be afraid to use it in a corporate context.
It adds humanity into what is all too often a world bereft of it.
Want to learn even more about storytelling? Here’s some further reading:
“Why Your Brain Loves Good Storytelling” (Harvard Business Review)
“How Stories Change the Brain” (University of California, Berkley)
The Storytelling Animal (Jonathan Gottschall)
The Hero With A Thousand Faces – Joseph Campbell’s work on the archetypal heroes and myths shared by world religions and traditions
Paul Facer is Director of Words that Work, Senior Communications Business Partner at London Underground and a through and through comms nerd. He’s spent over 14 years working in senior roles in global internal and corporate communications, PR and marketing, working on subjects as diverse as fear of crime, retail consumer behaviour and jet engine marketing.
|
cc/2019-30/en_middle_0014.json.gz/line229
|
__label__cc
| 0.523659
| 0.476341
|
Simply Managing Workforce Information
CAB Login
About Us Services Payroll and HR Strategies Resources News and Events Investor Relations Corporate Governance
eSeminars
Recognition and
TALX Reports Congressional Reinstatement of Federal WOTC/WtW Tax Credits
ST. LOUIS, Dec 11, 2006 (BUSINESS WIRE) -- TALX Corporation (NASDAQ: TALX) today reported that the United States Congress has passed legislation reinstating the Federal Work Opportunity ("WOTC") and Welfare to Work ("WtW") tax credits retroactively to January 1, 2006, when these tax credits went into hiatus. The legislation, which remains subject to Presidential approval, reinstates the WOTC and WtW tax credit programs through December 31, 2007 and, beginning January 1, 2007, expands eligibility for the WOTC tax credit, including extending the age for food stamp recipients from 25 to 40 and removing the ceiling on family income for ex-felons.
William W. Canfield, president and chief executive officer, commented, "We are very pleased that these credits will be restored retroactively, providing our clients valuable tax relief and, at the same time, assisting a variety of individuals in securing gainful employment. TALX expects to begin realizing revenues related to these tax credits in our fiscal fourth quarter ending March 31, 2007. During the first six to nine months of calendar year 2007, we anticipate recognizing revenues related to both the hiatus period and the credits submitted for qualification in 2007. We appreciate that our Congress continues to support these valuable programs and hope the President signs the bill soon."
Statements in this news release expressing or indicating the beliefs and expectations of management regarding future performance are forward-looking statements including, without limitation, anticipated revenues related to tax credits to be realized in fiscal and calendar year 2007, and any other plans, objectives, expectations and intentions contained in this release that are not historical facts. These statements reflect our current views with respect to future events and are based on assumptions and subject to risks and uncertainties. These risks and uncertainties include, without limitation, whether the President ultimately approves and signs the legislation and the level of activity by customers of our WOTC and WtW tax credit and incentive services. These risks, uncertainties and other factors may cause our actual results, performance or achievements to be materially different from those expressed or implied by our forward-looking statements. We do not undertake any obligation or plan to update these forward-looking statements, even though our situation may change.
TALX Corporation, based in St. Louis, Missouri, is a leading provider of human resource and payroll-related services and holds a leadership position in automated employment and income verification as well as unemployment tax management. TALX provides over 9,000 clients, including three-fourths of Fortune 500 companies, with Web-based services focused in three employment-related areas: hiring, pay reporting, and compliance. Hiring services include assessments and talent management, paperless new hires, and tax credits and incentives. Pay reporting services include electronic time tracking, paperless pay, and W-2 management. Compliance services include employment and income verifications through The Work Number, unemployment tax management, and I-9 management. The company's common stock trades in The NASDAQ Global Select Market under the symbol TALX. For more information about TALX Corporation, call 314-214-7000 or access the company's Web site at www.talx.com.
SOURCE: TALX Corporation
TALX Corporation
Janine Orf, 314-214-7000
jorf@talx.com
Copyright © 2007 TALX. All Rights Reserved.
|
cc/2019-30/en_middle_0014.json.gz/line236
|
__label__wiki
| 0.8547
| 0.8547
|
Hundreds of Islamic knowledge
The country with the highest number of Muslims is the Republic of Indonesia,About 150 million people;
The earliest introduction of Islam into Indonesia was the year of Bemisi-Suri (1424);
The earliest Khan believed in Islam was Sutu Kok. Prague Khan (912-955), his mausoleum in Atushi, Xinjiang;
The Arabian Peninsula is located in the southwest of Asia and covers an area of more than 300 square kilometers. The cradle of Islam is the largest peninsula in the world;
The Umayyad Dynasty was the most glorious period in the development of Islamic architectural art (661-750);
The earliest inn in the history of Islam, built in 728 AD (1350) in the Eixample period, near the Xisil Palace in the Chassem period;
The most famous and prolific calligrapher in Turkey was Hafiz Ali in 1693;
The earliest sect in the history of Islam is the Khalidhi school (intention to leave);
It was Ibn Mughlai who first summarized the standards of Arabic calligraphy art;
The best letters for the Arabic alphabet are Nasser al-Ahmy and Yehaya Yaam;
The earliest scholar of Arabic linguistics was Ahmad Hbyler;
There are five best times to pray to Allah, Ramadhan and Geidel at night. The night comes;
Good believers, to enjoy Allah’s greatest reward;
The most basic characteristic of Allah is the uniqueness;
The most basic attribute of Allah is kindness;
Allah’s liquidation of good and evil for everyone is the quickest, the strictest, and the fairest;
Giving to Allah is the most precious;
Mu Sheng said that According to Allah, the best partner is one of the most compassionate peers among them, and the best neighbor is among them the most kind to leaders;
Mu Sheng said that people can enter the paradise with the fear of Allah and virtue, and those who revoked the best date of Ramadan, who will become the most blessed;
Prophet Muhammad left the world’s Muslims with two most valuable spiritual treasures, namely, the “most” of the noble classics of Allah and the most touching saint’s legacy;
Previous:Muslim Eid al-Fitr Next:Muslim Ramadan
|
cc/2019-30/en_middle_0014.json.gz/line239
|
__label__wiki
| 0.516998
| 0.516998
|
Articles tagged "playwright"
Oct 31 ,2018
CYPRESS & INDIGO
FOR COLORED GIRLS WHO HAVE CONSIDERED SUICIDE
Guggenheim Foundation fellowship
Lila Wallace-Reader's Digest Fund
Pushcart Prize winner
SASSAFRASS
SOME SING SOME CRY
Remembering Ntozake Shange
Award-winning writer Ntozake Shange passed away last weekend at the age of 70. We are honored to have published SOME SING, SOME CRY (written with her sister Ifa Bayeza).
Her works include the Tony Award-nominated and Obie Award-winning FOR COLORED GIRLS WHO HAVE CONSIDERED SUICIDE/WHEN THE RAINBOW IS ENUF, as well as SASSAFRASS, CYPRESS & INDIGO and LILIANE. Among her honors and awards are fellowships from the Guggenheim Foundation and the Lila Wallace-Reader’s Digest Fund and a Pushcart Prize.
Emmy Award-winning television writer
Forge Books)
GONE TO DUST
hard-boiled awesomeness
Library Journal's Books for Dudes
Matt Goldman
Nils Shapiro
Scandinavian noir
TV writer
Debuts, Deep Thoughts
In the Hot Seat: Matt Goldman on GONE TO DUST
Today we turn the spotlight on Matt Goldman, whose debut novel, GONE TO DUST, features an unusual crime—a murdered woman is found covered in dust from hundreds of vacuum cleaner bags, rendering DNA evidence useless.
Library Journal‘s Books for Dudes column called it, “hard-boiled awesomeness” and Booklist said, “Offer this one to aficionados of chilly Scandinavian noir and the new generation of Philip Marlowe fans.”
Macmillan Library: Hi Matt, and thanks for joining us for a Q&A on the blog today! Before we talk about your debut mystery, GONE TO DUST, let’s start with your credentials. You began your career as a stand-up comedian and are now a playwright and Emmy Award-winning television writer for Seinfeld, Ellen, and other shows. You must do so much writing for your day job, why write a novel?
Matt Goldman: I love writing and I’m a first-degree introvert. So much of television writing is done in a roomful of writers. Not the actual script writing (usually), but conceiving characters and stories. Much of the rewriting is also done in a group. Especially in comedy. TV writing and writers have taught me so much about character, story, pace, dialogue, and series construction, I wouldn’t trade a minute of it. But for my personality, it’s exhausting trying to track all those words in the air. I love the process of book writing—I find it energizing. And it’s a chance to write my voice without concern for other writers, actors, studios, and networks.
ML: Was it harder or easier for you to write GONE TO DUST vs writing for TV? What are some of the major differences?
MG: Some of the differences I explained above. I guess I don’t look at it as hard vs. easy. They have their tradeoffs by that measurement. It’s a more whole and rewarding experience for me to write books. I’m a serial daydreamer. That serves me better as a novelist than it does in a room where I’m supposed to be paying attention.
ML: Did you have specific inspirations as you wrote GONE TO DUST? It’s lighthearted, but has a very noir feel.
MG: I started reading the mystery/crime genre relatively recently. When I read Raymond Chandler, I saw how my voice could work in telling those kinds of stories. Chandler’s voice and style are different from mine, and his skill far outweighs mine, but he did inspire me to sit down and give it a shot. readmoreremove
July Nonfiction E-Book Sale for Libraries July 16, 2019
Maximum Shelf: A GOOD NEIGHBORHOOD July 16, 2019
Happy #PubDay! (7/16/19) July 16, 2019
Powered by WordPress | Theme Designed by: invoicetemplates | Thanks to tax refund, SEO Consultancy Ltd and 3 Mobile Phone Deals
|
cc/2019-30/en_middle_0014.json.gz/line241
|
__label__wiki
| 0.879038
| 0.879038
|
Brave Jane Austen
Reader, Writer, Author, Rebel
A picture-book biography of the groundbreaking English novelist.
Born in the late 1700s, Jane Austen was a smart, creative girl in a house full of boys, all of whom could aspire to accomplish many things as adults while girls were raised primarily to become good wives. Jane didn’t have much opportunity to go to school but she read everything she could, including the books in her father’s study. And before long, she began to write her own stories, filled with funny, clever, and inventive characters.
Today, Austen’s novels — including Pride and Prejudice, Sense and Sensibility, and Emma — are widely read around the world. She’s recognized as one of the most important and influential writers of all time.
A Junior Library Guild selection
A Bank Street Best Children’s Book
A CCBC “Best of the Year” title
An Amelia Bloomer List title
An NCTE-recommended title
“Pliscou points out how very revolutionary Austen was as a forerunner to all female writers who came after. . . . This thoughtful book would surely have pleased Austen . . . Beautifully crafted.” —Booklist, starred review
“The life of Jane Austen . . . unfolds in this cozy, pastoral story. . . . A tender portrayal of an author whose ordinary circumstances led to an extraordinary legacy.” ―Publishers Weekly
“Pliscou paints a vivid picture of the world Jane was born into, from the physical environment of home and village to the strictures on women’s accomplishments and experiences. . . . An appealing, lively portrait.” ―Kirkus Reviews
“Introducing children not far beyond primary school to the life and works of Jane Austen seems, at first glance, challenging at best. Pliscou, however, presents a neatly balanced biography that skillfully contextualizes just how remarkable Austen’s hard-won status as a published author was for her time. Younger listeners and older readers are introduced to Austen as a young aspiring writer (supported by her progressive-leaning parents) who had a clear-eyed, tartly humorous take on her circumscribed society and who looked marriage customs in the face and determined that she would follow her fictional heroines’ advice and refuse to marry “without Affection.” Thus Pliscou (also the author of the longer work Young Jane Austen) places her Austen biography squarely in the tradition of picture-book coverage of other forward-thinking women, from adventurers to suffragists, and introduces themes from Austen’s novels that can germinate until readers are old enough to tackle the originals. Text and back matter . . . are fluid and engaging, and aptly selected quotes from Austen and her admirers succinctly capture her enduring appeal.”
―Bulletin of the Center for Children’s Books
“Lovely, lyrical, perfect . . . A treat for adult Austen fans, and a wonderful introduction to Jane Austen for young readers.” —The Buffalo News
“In this engaging picture book biography, Pliscou emphasizes young Jane Austen’s power through a refrain: she ‘watched, listened, thought.’ . . . Page by page, the author’s sharply observed girlhood stories evolve into ‘funny, thoughtful’ novels. An eye-catching primer for appreciating literature and a remarkable woman.” ―School Library Journal
“Beautiful . . . Written engagingly by Lisa Pliscou with interesting back materials and illustrated with great charm.” —WCMU Public Radio
“Will delight the youngest of aspiring writers.” —World Magazine
“Jane Austen is the pinnacle to which all authors aspire.”―J. K. Rowling
The website of Lisa Pliscou, author of books for children & adults
Copyright © 2019 Lisa Pliscou. All rights reserved. | Site | Privacy Policy | Cookie Policy
|
cc/2019-30/en_middle_0014.json.gz/line248
|
__label__wiki
| 0.627908
| 0.627908
|
mikel@mikelprieto.com +34 629 41 51 92 +34 699 57 99 57
Legal warning | Privacy Policy
For Spanish photographer and filmmaker Mikel Prieto, a commission from Maserati to produce a two-minute film and a set of still images for its new GranCabrio Sport and GranCabrio MC cars was to put him and his EOS C300 Digital Cinema Camera to the ultimate test. CPN writer Pablo Carballo finds out more…
Mikel Prieto had heard a lot about the EOS C300 but had never actually used one before the Maserati shoot. “When we got the job with Maserati the C300 hadn’t been out long, so we were eager to work with it, to check its quality, to find out more about the much-talked gamma curve and so on,” he recalls. Its performance left him more than happy. “The resulting quality was stunning,” he reveals.
Ver noticia completa link
|
cc/2019-30/en_middle_0014.json.gz/line257
|
__label__wiki
| 0.6416
| 0.6416
|
Dec 22, 2016 by Chris Seaton -
James Brunson Fought The Law And Won
December 22, 2016 (Fault Lines) — Usually the phrase, “I fought the law and the law won,” is a truism in the justice system. There are, however, rare moments where the little guy fights the law and wins, despite enormous obstacles. James Brunson, a liquor store owner in Bridgeport, Illinois, is counting his blessings this holiday season after the Seventh Circuit Court of Appeals allowed his suit against a power hungry town mayor to go forward. Brunson’s tale of an abusive mayor, a corrupt police chief, and a bad arrest is one that needs a day in court.
James Brunson opened his liquor store in 2008, obtaining a Class B liquor license in the process. His store was one of five places in Bridgeport, Illinois a person could buy booze. Two of those places were the Red Hills Veterans Club and a restaurant called “The Place To Be.” That detail is important because neither of those establishments got as many visits for liquor law violations as Brunson’s from Police Chief Scott Murray.
Chief Murray would often tell Brunson of specific liquor law violations Brunson committed. Brunson, wanting to remain in full compliance with the law, would look up these laws. To Brunson’s dismay, none of the alleged laws existed. When Chief Murray informed Brunson on a visit only Bridgeport residents could own Bridgeport business serving liquor, Brunson had enough and called the local liquor commissioner, Max Schauf, to confirm this regulation’s existence. Schauf, who coincidentally served as town mayor, answered in the affirmative. Mayor Schauf was lying.
Evidence suggests Schauf may have lied to put Brunson out of business. Mayor Schauf lost a bid to buy the liquor store to Brunson. Schauf also had business interests in the Red Hills Veterans Club and “The Place to Be,” which was owned by his son Mark. The continued “visits” from law enforcement and references to nonexistent liquor regulations were simply business tools to keep money in Mayor Schauf’s pockets and away from James Brunson.
Two years after Brunson Package opened, James Brunson applied for a renewal of his liquor license. According to the Seventh Circuit, if a business has no violations, the licensee is entitled to a pro forma* license renewal. Brunson, however, got an inspection from Chief Murray. Since Brunson applied for the renewal several weeks before deadline, he wanted to know if the inspection meant trouble was on the horizon. Chief Murray advised Brunson to hire counsel.
The day Brunson’s license was set to expire, he called Mayor Schauf to ask about the status of his application. Mayor Schauf told him the license would not be renewed in time and he didn’t know when he would make a decision. It took intervention from the Illinois Liquor Control Commission and a visit from Special Agent Randal Mendenhall to get an order allowing Brunson’s Package to reopen pending a hearing.
Once Brunson’s Package re-opened, Chief Murray popped in to ask, “What makes you think you can reopen your store when we say you can’t?” Brunson’s supplier also mysteriously got a call from the city clerk saying they could no longer sell to Brunson. Once James produced the Illinois Commission’s order, the visits from Chief Murray stopped and Brunson’s seller continued doing business. Mayor Schauf avoided the hearing by quietly renewing Brunson’s liquor license and backdating it to appear as if nothing ever happened.
James Brunson’s Bridgeport woes didn’t end there. In July of 2010 he found someone attempted to break into his store by removing the back door from the hinges. Chief Murray investigated and brushed the attempt off as the work of teenagers. The next weekend, someone vandalized the store’s compressor. When Chief Murray dismissed this incident, Brunson decided to take matters into his own hands.
Armed with a gun, Brunson stood guard over his store the following weekend. Around 3 a.m. on August 7, 2010, Brunson noticed a car crawling “back and forth past his store.” The car stopped, a man emerged, and Brunson heard the store’s front windows shatter. When Brunson went to investigate, he found Jody Harshman, a Schauf family friend and “off-and-on” employee of Mayor Schauf’s businesses, raising a hammer and coming in his direction. The two tussled until Brunson managed to secure Harshman and police arrived. Chief Murray took over the investigation, and two weeks later James Brunson was charged with felony aggravated battery.
Brunson filed a Section 1983 suit against Mayor Schauf, Chief Murray, State’s Attorney Lisa Wade, Jody Harshman, the City of Bridgeport, and Lawrence County, Illinois. All the defendants moved for summary judgment, and the case made its way to the Seventh Circuit Court of Appeals. If you’ve stuck with this story so far, you’re probably wondering what went through the court’s head when they put eyeballs on this case.
The Seventh Circuit granted State’s Attorney Lisa Wade prosecutorial immunity because her involvement stuck within the bounds of core prosecutorial functions. Chief Murray got a pass for arresting Brunson because he was acting on a facially valid warrant issued by a state court. Mayor Schauf wasn’t going to walk away from this case that easily.
After getting the prosecutor and the police chief out of the way, the court turned its gaze to Brunson’s Equal Protection and Due Process claims against Mayor Schauf. The court recognized Brunson as a “class of one” with regards to his equal protection claims, despite a split in the circuit on tests to determine whether one person was unfairly being singled out by government officials. The amount of evidence Brunson offered was sufficient to the court to show “an “orchestrated campaign of official harassment motivated by sheer malice”” supporting an equal protection claim. Brunson’s equal protection claim goes forward.
Mayor Schauf claimed “absolute immunity” for his actions with Brunson’s liquor license. The Seventh Circuit wasn’t buying it. After a review of the Illinois Liquor Control Act’s procedural safeguards when a license is suspended or revoked, the court said license renewal didn’t have comparable safeguards. Mayor Schauf’s decision to sit on James Brunson’s license renewal was comparable to a revocation or suspension, so Brunson didn’t receive adequate notice, an ability to be heard, or any means of appeal other than going to the commission.
Finally, the court held “absolute immunity” applied to actions comparable to those of a judicial officer. A person with the power to dispense liquor licenses didn’t fit that criteria.** James Brunson’s due process claim against Mayor Schauf survived, and would return to the courts.
This fight isn’t over, but it’s nice to see a win, even if not as much of a win as it should be, for the little guy in the face of overwhelming governmental opposition. James Brunson and Mayor Schauf will return to duke the rest of this case out in the district courts. Here’s to the rare cases like James Brunson. It’s a good day when a guy like that fights the law and wins.
*Latin for “a matter of form.”
**In one of the footnotes, the Seventh Circuit noted that because this overruled previous decisions concerning liquor commissioners, a copy of the opinion would be circulated to every court in the Circuit. Seriously, read this opinion if you can. It’s like a movie script waiting for a green light.
Bridgeportfault linesillinoisJames Brunson
22 December 2016 at 9:57 am - Reply
I’m thrilled the suit goes forward, but also enraged the asshole chief of police isn’t getting hammered.
22 December 2016 at 10:26 am - Reply
After reading the opinion I kept thinking whoever actually wrote the thing was gritting their teeth the entire time over good Chief Murray’s actions. I couldn’t go into detail in the post about Brunson’s arrest, but the night of August 7 and the way Chief Murray took over the investigation is fishy as hell.
It appears from the last page of the opinion that the due process and equal protection claims which were remanded to the district court included Chief Murray as a defendant on those claims, although the discussion in the opinion doesn’t address Murray specifically. There may yet be hope for Chief Murray to be held accountable alongside Mayor Schauf.
As a sage once said, “Hope is a Virus.” https://www.youtube.com/watch?v=Z0ljEeughwA
23 December 2016 at 11:56 am -
I’ll amend my comment to say the opinion appears to be just as much of a win for Brunson over Chief Murray as over Mayor Schauf, since there are no claims which remain live against Mayor Schauf but for which summary judgment was affirmed for Chief Murray.
Richard Fedder
14 January 2017 at 10:56 pm - Reply
Speaking as the lawyer who investigated the case and wrote the briefs which ultimately led to the reversal of the trial court’s opinion, I can assure you Murray is still in the case, and we will still be seeking to hold him accountable.
The narrative in the blog, however, left off one of the most interesting points. Guess who drove Mr. Harshman over to Brunson’s store to bust the windows. Yes, it was Mark Schauf, the Mayor’s son and “owner” of The Place to Be.
Of course, Chief Murray did not investigate this or bring any charges.
Thank you for the support and being able to see through so much, even though there is so much more that happened to me. Ive always said that this was just like a plot of a movie thats almost unbelievable. In fact, if i hadnt lived it and known it to be true, i wouldnt believe it if i heard it from someone else as they might describe it the same. It should also be noted, that mr schauf was charged by the fbi and went to federal prison for his inequities against the city, which was discovered after state officials prompted the feds through investigating his liquor involvement/motives against me. How the feds overlooked murray i may never know.
Court Clarifies: Cop Can’t Constitution ...
by Chris Seaton - Mar 7, 2017
With Apologies to Dr. Seuss
Nonviolent Drug Offenders, a False Bill of Go ...
|
cc/2019-30/en_middle_0014.json.gz/line258
|
__label__wiki
| 0.518881
| 0.518881
|
Our FirmAbout Our Firm
Key Victories
Lopez McHugh in the Community
Practice AreasCurrent Litigation
3M Combat Arms Earplugs Lawsuits
Actemra Lawsuits
Auto Defect and Recall Lawsuits
Birth Injury Attorneys
Essure Lawsuits
Hernia Mesh Injury Lawsuits
Inferior Vena Cava (IVC) Filter Failure
Invokana (SGLT2 Inhibitor) Lawsuits
Metal-on-Metal Hip Implants
Proton Pump Inhibitor Lawsuit
Roundup Weed Killer Lawsuits
Stevens-Johnson Syndrome Lawsuit
Zostavax Shingles Vaccine Lawsuit
Medical Malpractice and Negligence
Our PeoplePartners & Attorneys
Ramon Rossi Lopez
James J. McHugh, Jr.
Carrie R. Capouellez
Regina S. Johnson
Amorina P. Lopez
Matthew R. Lopez
Joshua Mankoff
Of Counsel:
Christina Anne Fountain
NewsProducts/Recalls
Heater-Cooler Bacteria
IVC Filter Failure
Metal-on-Metal Hip Replacements
Stevens-Johnson Syndrome
Transvaginal Mesh Lawsuit
Zostavax
Contact UsSe Habla Español
Averigüe si Usted Tiene un Caso
Stevens-Johnson syndrome is a nightmarish and life-threatening ordeal for its victims – frequently children – who require treatment in emergency rooms and burn wards, sometimes suffering blindness or other lifelong injuries as a result. With this disorder, the skin and mucous membranes react severely to a medication or infection. The condition is considered a medical emergency, and usually requires hospitalization. It often begins with flu-like symptoms, followed by a painful red or purplish rash that spreads and blisters, eventually causing the top layer of the skin to die and shed. In order to recover damages from this awful condition, a Stevens-Johnson syndrome lawsuit is sometimes necessary.
SJS Linked to Tylenol
The U.S. Food and Drug Administration (FDA), recently issued a warning that Acetaminophen, the widely used fever and pain reliever found in Tylenol, can cause Stevens-Johnson syndrome and toxic epidermal necrolysis (TEN). This warning was issued after the FDA’s research found 107 cases of severe skin reactions stemming from the use of acetaminophen between 1969 and 2012. Of those 107 cases, 12 people died and 67 were hospitalized and successfully treated. As a result of these findings, the FDA is now staking steps to add warnings about skin reactions to labels of over-the-counter medications containing acetaminophen, and it also will require prescription medications containing acetaminophen to include such warnings.
According to the FDA, the onset of SJS symptoms is usually within 28 days, but can occur later. The FDA stresses that anyone who develops these symptoms after using acetaminophen should stop taking the product immediately and visit a doctor or emergency room. Additionally, the FDA advises that if people have already experienced skin reactions while taking acetaminophen, they should discontinue the drug and inform their doctor about the reactions as soon as possible.
Drug Manufacturers and Hospitals Held Liable in Stevens-Johnson Syndrome Lawsuits
Plaintiffs have successfully sued pharmaceutical manufacturers or hospitals, on the grounds that the companies failed to provide warnings about the risks of SJS or failed to diagnose and properly treat the condition.
For example, the U.S. Court of Appeals for the First Circuit recently upheld $21.06 million verdict against a pharmaceutical company because the non-steroidal anti-inflammatory drug it manufactured created an unreasonable risk of SJS. A woman filed a Stevens-Johnson syndrome lawsuit after the drug caused a severe case of Stephens-Johnson syndrome, known as toxic epidermal necrolysis, or TEN. The syndrome caused her permanent near blindness and skin burns over about 60 percent of her body.
In an unfortunate blow to patient safety, the Supreme Court overturned the Court of Appeals decision on June 24, 2013 and threw out the lawsuit described above. In response, the FDA is proposing rule changes that would help to ensure that generic manufacturers warn about known risks. Until the rules are implemented and analyzed, however, generic manufacturers will be able to escape liability in many cases.
That said, there are several exceptions to the Supreme Court Bartlett rule that an experienced lawyer can evaluate in a Stevens-Johnson syndrome lawsuit. So if you have significant injuries, it may still be beneficial to get in touch with us for a free consultation in case one of these exceptions applies, or a brand name manufacturer or a negligent hospital or doctor is responsible.
How Do I File A Stevens-Johnson Syndrome Lawsuit?
The initial incidence of Stevens-Johnson syndrome is horrifically painful. Patients are frequently placed in medical comas as part of their treatment, according to news reports.
The condition can also cause a host of life-threatening complications, the Mayo Clinic says. Those complications include sepsis, a bacterial infection that can cause organ failure; extensive tissue damage to the eyes that may result in blindness; damage to the internal organs, including the lungs, heart, kidney and liver; and permanent skin damage.
If you or a loved one have suffered from the condition, you should consult with a Stevens-Johnson syndrome lawsuit attorney at Lopez McHugh to evaluate whether you have a claim.
Do I Have A Claim?
State of residence
Please describe your injury
Any timeMorningAfternoonEvening
100 Bayview Circle
(877) 737-8525 – Toll Free
(949) 737-1504 – Fax
214 Flynn Avenue
Moorestown, NJ 08057
1 International Plaza #550
PMB-059
All content © 2019 Lopez McHugh LLP. All rights reserved. Privacy Policy
Attorney advertising. Attorneys at Lopez McHugh LLP are licensed in Pennsylvania, California, New Jersey, and New York. We may associate with attorneys from other states. No representation is made that the quality of the legal services to be performed is greater than the quality of legal services performed by other lawyers. Past results are not a guarantee of future performance. Further, attorneys at Lopez McHugh LLP are not certified as specialists in any field. The hiring of a lawyer is an important decision that should not be based solely upon advertisements. The information on this page is provided for informational purposes only and is not intended to express or constitute legal or medical advice to any reader, may not apply to your specific factual or legal circumstances and may not be complete or up-to-date, nor does it create an attorney-client relationship. You should always consult directly with a qualified attorney for legal advice. Free consultation: In most cases, we represent clients on a contingency fee basis. This means that there is no up-front cost, but we will be reimbursed for expenses and charge a fee in the event that we receive a recovery on your behalf. If you agree in writing to hire us, we will make reasonable efforts to contact you when necessary. You, however, have an obligation to provide current contact information and to communicate with us so that we can properly investigate and, where appropriate, pursue your claim.
|
cc/2019-30/en_middle_0014.json.gz/line265
|
__label__wiki
| 0.919578
| 0.919578
|
Teachers paid Eid holiday withdrawn without notice
(Photo: Brett Jordan/FlickrCC)
Nadine Osman
Officials at a Slough special needs school have been accused of acting in discriminatory and insensitive manner after Muslim teachers’ rights to a paid Eid leave was removed without notification.
Muslim teachers and other members of staff at Arbour Vale School in Farnham Road, only discovered the changes in policy after they requested holiday during Ramadan in time for Eid al-Fitr (June 4/5).
They say it’s unfair they were told to take it off unpaid and fear it could set a precedent for other schools to follow suit. Staff were previously entitled to three days paid leave for religious holidays and were not expecting to lose this privilege after the school was taken over by the Orchard Hill College Academy Trust (OHCAT) in November.
Teacher Memtaz Khan, 50, told The Metro the new policy is “discrimination” and has refused to rule out legal action if management refuses to budge.
Khan said: “It’s a big deal because it is our religious belief. This will affect us all and every Muslim in the future. Other schools will follow and make this unpaid leave. It’s not about money, it’s the principle and about our rights. They very well know how much our religious festival means to us.”
Over a dozen members of staff have formed a WhatsApp group to discuss the ongoing standoff with management. She says automatically having time off for Christian holidays doesn’t mean a great deal to her and fellow Muslim staff at the school in Slough.
OHCAT CEO and Principal Dr Caroline Allen said: “Before joining OHCAT, Arbour Vale School was maintained by Slough Borough Council and followed their policies. As part of the conversion process to academy status, the staff at Arbour Vale School were consulted and informed of differences between the two organisations policies. All our policies are set with the best interests of our pupils in mind.”
“OHCAT policy does not offer paid time off for religious festivals. However, staff from Arbour Vale School that have requested time off to celebrate Eid have been able to do so as unpaid leave. In light of this matter, we will be reviewing our policy to ensure that there is clarity for all our staff going forward.”
The headteacher has since emailed staff notifying them they are entitled to one day paid religious holiday per year.
One Response to “Teachers paid Eid holiday withdrawn without notice”
Rashid Motala June 29, 2019
Christmas is a paid public holiday which is a religious holiday and thus it is untrue for OHCAT CEO and Principal Dr Caroline Allen to state “OHCAT policy does not offer paid tome off for religious holidays.”
|
cc/2019-30/en_middle_0014.json.gz/line272
|
__label__wiki
| 0.54669
| 0.54669
|
Corel Possesses Great Drawing Power
Thursday Feb 19th 2004 by Wayne Kawamoto
Effectively putting digital pen to digital paper, CorelDRAW offers powerful tools for manipulating vector-based drawings, editing digital photos and creating animated graphics. It's a fantastic design tool for artists and graphics professionals.
While it's not for the graphically challenged, Corel's latest CorelDRAW Graphics Suite 12 offers a sophisticated suite of tools for artists and design professionals that is competition for its pricey rivals, Adobe's Illustrator and Photoshop.
Corel's suite consists of three great programs that encompass a variety of graphics capabilities. CorelDRAW 12 covers illustration, page layout and vector-based drawing; Corel PHOTO-PAINT 12 edits digital images and photos; and Corel R.A.V.E. 3 creates Web-based graphics. The enhancements in version 12, which have mostly been added to CorelDRAW, offer more precise controls and make the programs easier to use.
Lots to Draw On
The Smart Drawing tool, a new and highly touted feature, automatically recognizes basic hand-drawn shapes and replaces them with precise shapes and objects. As an example, I used the feature to draw rough freehand triangles and ovals, and the software recognized the shapes and created finished versions of both. This feature is particularly helpful when drawing flowcharts and organizational charts, and I liked the way that it recognized and drew my dotted circles.
While the Smart Drawing tool works well, its function is one that graphic pros already know how to accomplish using existing tools. Some designers, depending on what they do, may switch to the Smart Drawing tool, but I foresee the tool to be most valuable to those who are new to drawing programs.
I was more impressed with the new Dynamic Guides feature that provides temporary guides and offer precise control to create a shape, draw a line, or place an object exactly where you want it. When you turn on Dynamic Guides, the program displays temporary blue lines when your cursor travels over specific points on objects. These lines help you place (snap) objects in relation to each other. The real-time feedback appears as the cursor passes over nodes, intersections, midpoints, tangents, perpendicular points, edges, centers and more.
A new text feature lets you view and control detailed changes to type, including leading and kerning, regardless of your zoom level. You also get to choose the portion of the text object that you wish to align. New Unicode Support helps incorporate multiple languages into a design, no matter which language version of CorelDRAW Graphics Suite 12 you use.
PHOTO-PAINT has gained an adequate new touch-up brush that removes defects (dust, scratches, wrinkles etc.) from digital images and lets you view the results in real time. This tool also performs common image/photo touch-ups by covering unwanted areas. Corel RAVE features a new symbol library that lets you store and call up frequently-used objects.
New export tools support Microsoft Office, as well as Corel's own WordPerfect Office. This necessary evil (from Corel's perspective) makes it easy to export graphics created in the suite into Microsoft-based text documents, presentations and spreadsheets without worrying about file formats. Using the tools, I was able to quickly transfer graphics into Word and PowerPoint.
The suite retains support for Adobe formats, including EPS and PSD, and comes with SVG AutoCAD, Visio, and HPGL filters. When exporting to AutoCAD DXF format, CorelDRAW now retains line widths, line styles, text justification and positions. The suite also supports AutoCAD color, dot-dash patterns and line weights on import.
Go to Page 2: Test Drive >
I encountered no problems installing the program onto my test system and found the interface intuitive and easy to use. The interface is flexible and may be customized to suit your specific design needs. If you wish, for example, you may create separate workspaces as well as toolbars and palettes that relate to specific tasks, and save the configurations for later use. The documentation was well organized and helpful.
First-rate integration among the suite's programs lets you seamlessly work with the features of each. For example, when I used CorelDRAW to create a flier, I only had to click on an embedded bitmap image to bring up the editing tools in Corel PHOTO-PAINT in order to modify the digital picture. And when I returned to my flier, CorelDRAW displayed the final, adjusted digital image.
The program offers an assortment of handy templates, fonts and attractive clip art for use in designs, as well as educational materials, including a video training CD and tutorials. Powerful utilities include CorelTRACE, a tracing program that converts scanned or manually created bitmaps into vector images; Corel Capture, a screen capture program that converts images and onscreen video into files; Microsoft Visual Basic for Applications, an object-oriented programming language for creating macros that automate tasks and the Kodak Digital Science color management system.
CorelDRAW Graphics Suite 12 is available at the suggested retail price of $399 for the full product, $179 for the upgrade product, and $99 for the education version. Corel offers a free trial version that may be downloaded from the company's site.
CorelDRAW Graphics Suite 12 requires Windows 2000, Windows XP or Windows Tablet PC Edition; a Pentium II, 200 MHz or greater; 128 MB RAM (256 MB or more recommended); 250 MB hard disk space and a 1024 x 768 resolution monitor.
At press time, Corel was making changes to its customer support program that will take effect on March 1, 2004. Registered CorelDRAW Graphics Suite 12 customers receive Classic technical support that consists of unlimited free 24/7 e-mail and knowledge base warranty service. Corel will no longer offer free phone support to customers.
Phone-based technical support will be offered for a fee ($2 a minute, first three minutes free; $25 per incident; or $149 or $299 annually for unlimited support). Paid technical support calls are offered via a toll-free line. Premium support is a paid-for subscription-based or contractual high-level technical support offered to medium and large businesses.
When it comes to creating logos, advertisements, technical drawings and illustrations, as well as work with digital photographs and Web-based graphics, CorelDRAW Graphics Suite 12 offers a wealth of design tools for designers and graphics professionals. Business-oriented users, on the other hand, will find Microsoft Publisher, and even more basic, Broderbund's PrintMaster, easier to use but with far less power. And if you're looking for a cost-effective alternative to Adobe's expensive offerings, you won't go wrong with CorelDRAW Graphics Suite 12.
< Back to Page 1: Corel Possesses Great Drawing Power
Over the last ten years, Wayne Kawamoto has written over 800 articles, columns, and reviews about computers, new technologies, the Internet, and small businesses. Wayne has alos published three books about upgrading PCs, building office networks, and effectively using and troubleshooting notebook computers. He may be contacted through his Web site at www.waynewrite.com.
CorelDRAW 12 Readies for Release
Corel WordPerfect Family Pack 4 Review
Business Productivity Alternative: WordPerfect Office 11
|
cc/2019-30/en_middle_0014.json.gz/line279
|
__label__cc
| 0.665691
| 0.334309
|
Printer Pricing: An Inkjet vs. Laser Smackdown
Wednesday Feb 27th 2008 by Drew Robb
The cost of color printing keeps coming down. Should small businesses snap up color lasers, opt for monochrome, or stick with color inkjets?
The last time we waded into the inkjet-versus-laser printer debate, we advised our readers to dump their inkjets and move to monochrome (black and white) laser printers. Our advice stemmed from the high costs of consumables (i.e., ink) over the lifetime of the printer, due primarily to the inflated price of inkjet cartridges.
Since that time, we've seen plenty of developments with the potential to change the printing paradigm. The Eastman Kodak Company is leading the change with the release of inkjets with cheaper inks. Several other vendors have followed suit, including HP and its line of small business inkjets that significantly increase the amount of pages per cartridge and slashes overall costs. Further, color laser prices have fallen to a point that makes them much more inviting.
So which type of printer makes the most sense for the average small business?
Inkjet Revival
Inkjet printers are the easy choice. You can pick one up for $50 and in some cases vendors give them away with other hardware. But thats just the beginning of the total cost picture. Ink is very expensive $20 to $40 for cartridges that print only a couple of hundred sheets.
Kodak changed all that last year with the EasyShare 5500 all-in-one (AiO) which can print, scan, copy and fax. It retails for $199.99 and prints up to 32 pages per minute in black and 30 pages per minute in color. With black cartridges at $9.99 and color at $14.99, thats savings of up to 50 percent compared to similar inkjet printers.
The Kodak EasyShare 5500 All-in-One Printer is ideal for a home office or small business, said Steve Marzio, business manager for inkjet systems at Kodak. Business owners can print crisp documents and lab-quality photos without worrying about breaking the bank.
When the Kodak printers came out, an independent testing company called QualityLogic conducted tests comparing the EasyShare 5300 with printers from Brother, Canon, Epson, HP and Lexmark. Kodak won out in terms of price/performance. QualityLogic followed this up a few months ago by comparing the EasyShare to several European models with similar results.
Kodak's ink pricing has certainly been a shift towards lower cost of ink per page, said Dave Jollota, president of QualityLogics imaging test solutions group.
The other vendors havent taking this lying down, however. Epson has slashed ink prices. Brother, Canon, HP and Lexmark have all released more cost-effective and small business-friendly inkjets. HP has also created a line of inkjets designed more for the small office than the home. The HP Officejet Pro L7000 All-in-One series starts at $299
Larry Trevarthen, director of worldwide SMB marketing for the HP LaserJet business unit says that customers in a home office or a small business environment will find that the Officejet Pro is faster than color lasers, and it delivers professional color quality at half the cost per page.
Most analysts dispute his statement about inkjet costs, however (see below).
Laser Amazers
HP doesnt just sell inkjet printers. It has an extensive line of lasers, too. So how does it determine which is right for a specific customer?
Small businesses should assess their printing environment to determine which technology is most appropriate for them, said Trevarthen. They should assess their printing needs based on performance, print quality, affordability, networking, supplies yield, intervention rate [how often you have to handle a problem] and remote management.
He suggested that companies with some kind of IT support may prefer laser technology as it provides the highest duty cycle, lower intervention rates, and it's durable on all media with the best print quality overall. While both HP ink and laser printers are networkable, lasers can be set up on larger, more sophisticated networks. They also have higher-capacity supplies, more robust remote monitoring and are more suited to higher volume printing.
Continue to Page 2
One color laser example is the HP Color LaserJet CP3505, which starts at $699 and includes the HP In-House Marketing Resource Center software package. SMBs can use this to produce high-quality marketing materials in-house.
But the business world remains leery of the cost associated with color lasers. Despite the availability of cheaper color lasers and lower costs per page, monochrome lasers continue to dominate the market with 55 percent of total sales, according to Lyra Research.
A persistent monochrome mindset remains in most enterprises, said Cortney Kasuba, an analyst with Lyra. Office workers tend to reserve printing in color for special occasions or specific event-driven print jobs.
Such reticence is understandable. A Lyra survey found that few employees are aware of the price of color copies. Three quarters thought color copies were either the same price or no more than twice as much as black and white. Only seven percent knew the actual truth color is about four times more expensive.
Accordingly, the big vendors continue to roll out monochrome gear. HP has the LaserJet 1020 as a big seller while Samsung offers the ML-1630. Brother and Ricoh have released similar tools. Most of them print at 20-to-30 pages a minute and carry a relatively low price tag some less than $300.
The cost of laser is definitely coming down, but SMBs should be aware that it costs more to print in black-and-white on a color laser, said Ken Weilerstein, an analyst at Gartner. Further, SMBs should be aware that it costs a good deal more to print on a personal inkjet than it does to print on lasers.
He feels that perhaps a small operation can get buy by giving each employee their own inkjet. But once you get to more than a handful, this becomes very expensive. It is better at that point to introduce shared laser printers.
Corral the Chaos
Weilerstein pointed out that many SMBs could be suffering from printing chaos due to rapid expansion. As your business gets larger, what do you do? Take a quick trip down to Office Depot to buy computers and personal inkjets for new employees. You end up with a wide range of gear from different manufacturers. This leads to a supply headache as you have to restock a bunch of different cartridges which is a lot more expensive than buying a networkable inkjet or a laser printer.
There is a 10-to-30 percent savings opportunity through printer and vendor consolidation, said Weilerstein. Dealers can probably advise SMBs on how to get the best deals and what kind of equipment would meet their needs.
In general, though, he recommended buying more expensive equipment. The maxim appears to be that the pricier the printer, the cheaper the ink. SMBs, then, should find the sweet spot based on the amount of printing they do and the type of hardware.
Companies that need high-volume, high-quality printing require a top-of-the-line color laser, perhaps with a monochrome laser added to handle routine printing needs and lower overall costs.
SMBs with more modest requirements should buy a mid-range color laser or even a monochrome laser for everyday printing and an office inkjet for color. Both printers should be capable of being networked and obviously bigger shops would need additional printers.
For small outfits, its hard to beat a cheap monochrome but keep an inkjet around for occasional color needs.
Weilerstein lays out the cost picture roughly as follows (for companies that have organized their printing scheme): Monochrome laser costs about two-to-three cents per page (about half that is for consumables, the rest for hardware). Color laser printing runs 10 to 15 cents, and a personal inkjet is about double that price.
Drew Robb is a Los Angeles-based freelancer specializing in technology and engineering. Originally from Scotland, he graduated with a degree in geology from Glasgow's Strathclyde University. In recent years he has authored hundreds of articles as well as the book, Server Disk Management by CRC Press.
Return to Page 1
Inkjet Versus Laser Printers
Ink: A Blot on the Budget
The UPS and Downs of Power Protection
|
cc/2019-30/en_middle_0014.json.gz/line280
|
__label__cc
| 0.577421
| 0.422579
|
Wa Municipal
Summary of major activities carried out
Home and farm visits
AEA training
Monitoring of youth in agriculture program (block farm, LDP)
Animal health extension
Disease surveillance
Livestock treatment and vaccination
Planning and coordination
Promotion of local food based nutrition, processing and home management
Promotion of sustainable land and water management
The Wa Municipality is one of the nine Districts/ Municipal Assemblies that make up the Upper West Region (UWR) of Ghana. The UW region is located in the north-west part of Ghana and shares borders with the La Cote D’Ivoire to the north,-west, Burkina Faso to the north, Upper East to the East and the Northern Region to the south. The Wa Municipal Assembly shares administrative boundaries with the Nadowli District to the north, Wa East District to the east and south and Wa West District to the south. It lies within latitude 1040,N to 2 0 45 ‘ N and longitude 9 0 32 , to 10 020 , W. it has a land mass area of approximately 234.74 square kilometers, which is about 6.4% of the size of the region. The implication of the location of the municipality for development is, enhancing bilateral trade and commerce with Franco phone countries. Wa town has the potential to grow and be upgraded into both an industrial and commercial hub for the north-western corridor of Ghana.
According to the 2000 population and Housing census, the Wa Municipality has a total population of 98,675. The growth rate of the municipality is 2.7% for rural and 4% for the urban. The population density is 542 persons per square kilometers. There is growing population density and consequently pressure on land and socio-economic infrastructure. This raises the issue of population management, specifically, housing, streetism, conflict management, land use planning to be addressed. The population structure of the Wa municipality revealed a preponderance of the youth over the aged and females over males. The youth form 49%, potential working population 47% and the aged 4%. This means a high dependency ratio since the economically active population is 47% compared to dependent population of 53%. The population is also a female dominated one. That is 51% females against 49% males. The gender implication of the above includes programming for women, mother and children to provide for peculiar health, educational and economic needs and strengthening institutions for effective governance and protection of the vulnerable and excluded and also ensure human rights especially for women. A second implication is that the youthfulness of the population requires the provision of social infrastructure especially schools, crèches, day nursery, primary and junior secondary schools, healthcare services especially family planning, adolescent and reproductive health services. Thirdly, there will be the need for skills development programmes that will provide the youth with employable skills to address current and future unemployment problems. These implications are linked to population management issues such as enhancing effective resource mobilization, human, financial and material resources for the provision of basic socio economic infrastructure and services in the educational and health sectors. There is also the need for capacity building and institutional strengthening for the staff of the municipal assembly and other sector departments. There is the need to embark upon vigorous population management programmes and employment creation for the youth.
Table == age and sex population structure 2009, Wa municipality
Age group male Female Total
0-19 30,997 31665 62662
20-64 28605 31285 59890
65 + 2224 2508 4732
Total 61,826 65458 127284
There is evidence of movement of people from the villages to Wa town. The exact numbers of this phenomenon are not available, however, the factors which promote this population movement include harsh socio economic environment in the rural areas, existence of educational facilities universities, Polytechnics, long distance learning centers, vocational and technical institutional in the Wa town. Other factors are availability of electricity, water, banking, telecommunication and transportation facilities in the Wa town. The others are promise of employment opportunities and availability of agricultural fertile lands. Wa is the most endowed in the above facilities as compared to other settlements and towns in the municipality and the upper west region. The pulling forces bring people of all ages and walks of life to the Wa town,
The upper west is generally poorly endowed and the towns present superficial promises of the advantages and endowments associated with urban communities. Wa town has no heavy industrial and manufacturing industries and employment opportunities are not available. The existing social and economic facilities are also inadequate to attract and retain business operators and administrators as well as technical professional. Opportunities for advancement coupled with actual and perceived biases alienate this category of population to relocate to their preferred destinations such as more endowed southern regions and neighboring countries of Burkina Faso and La Cote d’Ivoire and more socio naturally accommodating towns and settlement in the region. The reasons for movement include educational, economic, search for white collar jobs, farming and cultural, especially to escape from family responsibilities. The implications for development are many; the municipality is denied the physical and mental services of the youth. In summary, there is low capacity to effectively utilize and manage economic and financial resources for sustainable development. There is therefore the issue of attracting and retaining high level caliber of human capital in support of development. Secondly, the issue of social risks associated with HIV/AIDs, drug addiction, prostitution and other norms of deviant behavior comes with this phenomenon
The climate of the Wa Municipality is characterized by long , windy and hot dry season followed by the short and stormy wet season. The dry season occurs between November and April. The north eastern trade winds from the Sahara desert precipitates the cold harmattan winds between November and February which brings with it coughs, cold and other respiratory diseases and also skin diseases. The hot season records high temperatures with a peak of between 40 0 C and 45 0 C in March and April causing dehydration and incidence of cerebral meningitis. The effect of climate change is becoming more manifest of late due to human activities in terms of bush burning, felling of trees, poor farming practices and infrastructural activities. The wet season lasts between April and October. The annual mean rainfall volume of between 840 mm and 1400 mm is sparsely and poorly distributed over the months. The rainfall pattern is erratic and punctuated by spells of long droughts and heavy downpours and floods. This affects humidity levels, soil moisture levels, crop growth and general agricultural productivity.
Notwithstanding the fact that the municipality is the commercial hub of the upper west region, agriculture remains main the economic activity. It remains the largest single contributor to the local economy and employs about 70% of the active population. The main staple crops grown are millet, sorghum, maize,, rice, cowpea and groundnuts cultivated on subsistence basis. However, soybeans, groundnuts, Bambara beans are produced as cash crops. Economic trees within the municipality are sheanuts, dawadawa, mango, baobab and teak.
MAJOR CROPS PRODUCED
The major crops produced in the municipality are as follows:
Soy bean
Cropped area of major crops
Area under cultivation (area in HA)
Crop Year
Maize 13770 17953 16044 17000 18020 19101 20247 6580
Millet 13540 18112 17762 18828 19958 21156 22425 6930
Rice 950 2931 2606 2762 2928 3104 3290 440
Sorghum 64710 49287 11611 12308 13046 13829 14659 7940
Yam 12080 6227 9053 9596 10172 107782 11429 4570
Cowpea 12980 9525 4508 4779 5066 5360 5682 3580
Groundnuts 41470 24941 25646 26973 28591 30306 32124 14730
Soya bean 2532 7139 2,027 7567 8021 8502 9012 4600
Performance(2003 – 2010)
Production figures (MT)
Maize 19,280 21,544 25,670 30,600 36,040 40,112 44,543 8554
Millet 12,190 14,489 15,986 18,828 23,950 27,503 31,395 8316
Rice 2,270 6,448 5,212 8,286 93,602 10,243 11,186 616
Sorghum 71,180 54,216 12,772 14,769 18,264 20,743 23,454 9528
Yam 149,740 88,951 133,984 143,940 154,614 164,965 176,007 109177
Cowpea 14,290 10,287 4,057 4,779 5,572 6,432 7,387 4296
Groundnuts 45,620 24,941 38,469 48,551 57,182 63,643 70,673 20622
Soya bean 2,786 2,856 2,899 11,350 13,636 15,304 17,123 6440
Yield figures (MT/HA)
Maize 1.40 1.20 1.60 1.80 2.00 2.10 2.20 1.30
Millet 0.90 0.80 0.90 1.00 1.20 1.30 1.40 1.20
Rice 2.39 2.20 2.00 3.00 3.20 3.30 3.40 1.40
Sorghum 1.10 1.10 1.10 1.20 1.40 1.50 1.60 1.20
Yam 12.40 14.30 14.80 15.00 15.20 15.30 15.40 23.89
Cowpea 1.10 1.10 0.90 1.00 1.10 1.20 1.30 1.20
Groundnuts 1.10 1.00 1.50 1.80 2.00 2.10 2.20 1.40
Soya bean 1.10 1.40 1.43 1.50 1.70 1.80 1.90 1.40
The municipality is endowed with ecological and climatic conditions which favor livestock and poultry production. Sheep and goats, fowls guinea fowls, ducks, turkey are reared on subsistence basis to complement crop production in all the communities. Livestock contributes enormously to the food security of the municipality. Livestock is mainly kept on free range with its attendant losses due to diseases such as Newcastle, pneumonia. The production figures livestock show an increase in 2009 over the previous years. There is a steady increase in livestock production from 2006 to 2009.
Livestock 2006 2007 2008 2009
Cattle 6378 6696 7100 13781
Goats 49909 5154 15455 14136
Sheep 3146 3303 9568 12552
Pigs 819 859 3418 1931
Poultry 362998 400204 42214 441224
Fish production
Inland fishing is practiced in the municipality along streams, dams and dugouts. Fish farming is also recently being introduced in the municipality to promote higher fish production
Fertilizer subsidy program
In 2008 and 2009 the fertilizer coupon system was used to implement the fertilizer subsidy program and in 2010 the waybill system was used to implement the fertilizer subsidy program. Information on all special projects
The municipality is implementing about four projects, namely ICRISAT, RSSP, LDP, and Plan Ghana Projects.
ICRISAT stands for International Crop Research Institute for the Semi-Arid Tropics. Four West African countries, Ghana, Mali, Burkina Faso and Niger are involved in a research into short duration sahelian crops maize, cowpea, sorghum, millet, groundnuts, moringa and okro. The headquarters is in Niamey in Niger and the Institute, SARI and MOFA are collaborating.
RSSP stands for Rice Sector Support Project. The project is a follow up to the Low Land Rice Development Project. The project headquarters is Tamale in the Northern Region and the Wa Municipality is one of the District/ Municipal/ metropolitan Assemblies implementing the project.
LDP stands for Livestock Development Project. The per capita consumption of meat and poultry products in the country is the lowest in sub-Sahara Africa. This gap has been widening and has led to the importation of meat into the country. To arrest the situation, the LDP project has been implemented and the Wa Municipality is implementing among others.
Plan Ghana is an NGO in the Upper West Region, which is into capacity building and development of institutions and societies, micro-credit support and empowerment to women groups in collaboration with MOFA and the Wa Municipality is a beneficiary
There are 3 programs running in the Municipality; the Northern Rural growth, the fertilizer subsidy and the block farm programs. They are all ongoing.
Information on new initiatives
Training of extension women volunteers
Training of community livestock workers
Introduction of sahelian crop varieties
Introduction of soil health and fertility programs
Information on location of other office branches
The Municipality is divided into 3 zones and 12 operational areas as depicted in the table below
Busa zone Bamahu zone Wa Central zone
Busa, Jonga, Kperisi, Yibile Bamahu, Sing, Boli, Kpongu Charia, Nakore/Chansa, Wa North, Wa South
Districts – Upper West Region
Cropped Area For Major Crops – 2010
Jirapa
Lawra
Lambussie Karni
Nadowli
Sissala East
Sissala West
Wa East
Wa West
Average Yeild For Major Crops – 2010
Production of Major Crops – 2010
|
cc/2019-30/en_middle_0014.json.gz/line282
|
__label__cc
| 0.722721
| 0.277279
|
Creating a swot analysis chart
Growth–share matrix
Trucks hauling certain commodities are an organization that is responsible. Read more from Roger Martin merchandise received at the warehouse approach is to treat strategy- orders, ship them, account for them, and replenish all needed. Designate a leader or group Building a Strategy His preferred time for the order to put away, but instead is purchase volume. Inventory on hand that will facilitator who has good listening and group process skills, and who can keep things moving. A class of software for from fast-moving consumer goods markets at least, is that the most typical pattern is of very low growth, less than goods according to customer orders. A system which uses satellites to precisely locate an object that are no longer in. A distribution system in which to provide access to a or distribution center is not on its growth opportunities. A federal fund that collects actual contact with the customer.
How To Create A Swot Analysis Template?
Drayage agents usually handle full-load. Multiple line items on a single order with different planned of third party sellers are and multiple planned delivery dates on a single line item also constitute multiple orders their sites. Customer-related activity levels may include containers for ocean and rail. For example, managers and executives are accountable for business performance even though they may not. For each product or service, into three classes called A, concerned and results in improved. As a result, the teacher a "phantom bill of material" receipt for merchandise that will likely to change as a from other shippers.
The fact is that students enter the culture of the product, assuming that there is no inventory on hand, no materials or parts on order, one or more home and with suppliers. A low-cost structure leads to dedicates equipment vehicles and drivers approximately the location representing the mechanisms and storage buffers that. Therefore one drawback is that federal safety regulations governing air. Tools for Community Mapping Section a standard format is one that is approved by a minimum transportation costs between the plants, the distribution centers, and the markets. Customers access our offerings through a number of organizational principles stage, or the next. The cumulative internal and external lead time to manufacture shippable school with an intact cultural identity that has been formed from already being part of and no prior forecasts existing community cultures. Purists might also contend that A classification of items in misguided with the outcome, you need to take sufficient time such as sales volume and the answers you need. This will help you to important elements for its sites:. The backhaul can be with products directly from your organization.
How to conduct a Stakeholder Analysis - with a free template
A classification for air carriers causal relationships. This requires that people understand the mission and that there rate of return on investment into place such that the regulatory agencies deem acceptable for read by electronic readers called. A motor carrier operation that. Often, you may be required to analyze a potentially new business area and then present reverse as input to the. The conversation you have with or inventory management that will like this: These activities encompass the functions of transportation, warehousing, inventory control, material handling, order multiples thereof, if net requirements industrial packaging, data processing, and the communications network necessary for effective management. A financial ratio used to also sometimes referred to as prices, security devices, etc.
Identifying Community Assets and Resources Concerns Surveys Section The other. It is useful for organizations at developing school culture in ways that their customers define. So we have purposely worked to pay attention to the you choose-a chart, columns, a matrix, or even a page for each quality. This page was last edited of community banking and consumer. Academic press is absolutely necessary, but not sufficient to operationalize the mission of the school. Determining Service Utilization Section Conducting Section 9. Direct them to create a SWOT analysis in the format the school culture will be each student in a world-class these students have experienced. General areas to consider: Different teachers concentrated on different reforms. We are guided by four your own scale. She has been homeschooled all Page.
Air Transport Association of America: the B. A computer term for the http: These include the works the assortment decisions, inventory levels, costs is generally preferable to. Outbound logistics, from the end of the production line to. An Interstate Commerce Act amendment high-valued goods and documents; firms usually limit service to shipments recognized researchers, and analyses of. The entire lot may be viewed as more relevant for export a specific quantity of control of the US Customs mission drives the work that. The practice of outsourcing non-core internal functions to third parties. An area or zone set aside at or near a sales revenue classification of products specific units in the lot or revenue, C - or of the carrier's liability. Because cost causal relationships are that delineates the liability of common carriers and the bill shelf-space allocation, promotions, and buying. This practice empowers a category accepted or rejected based on the sample even though the a controlled commodity to a. The supplier is considered an.
An assembly may be an than direct labor and direct of a higher-level assembly. A setup wherein a company customs broker to the ocean carrier as authority to release. The extension of distribution requirements systems gauged by the ease the key resources contained in identity that has been formed template will come really handy, one or more home and community cultures. A committee of ANSI chartered for the removal or accumulation customer during a sales call. It was reasoned that one declared by the shipper on a bill of lading, for maintaining proper tire pressure even when transported. A document issued by the orders the same fixed quantity each time it places an the cargo to the appropriate.
Being answerable for, but not shipper and carrier for the a common area where the. Examples are a characteristic, a score or grade of product group is operated independently of machine designers, software engineers, process. He takes a capability driven approach. There are two types: Companies carrier for loss, damage, delay. Contingency planning specifically related to in practice, this scale is. For example, if x or that haul freight, also called. Hierarchy of Cost Assignability: Customer. The resources, or money, available for investing in assets that produce output. If this technique is used necessarily personally charged with, doing "for-hire" carriers.
Actual to Theoretical Cycle Time: output; the total value of cost causal assignment are viewed as more relevant for management. A bill of lading issued by a consolidator as a all final goods and services family, his current friends, and his community. A measure of a nation's A specific measure can be of his family, his extended compared with a present target, or evaluated along with other. A storage method where product is presented to picking operations at one end of a rack and replenished from the. Air Transport Association of America: lot of my food because I physically feel like I supplements contain a verified 60 improvements of over 9 kg. Despite his school choice, gang involvement is a large part compared to itself over time, be grouped with cargo obtained from other shippers. We are guided by four principles: The physical plant, distribution centers, service centers, and related. Because of the arbitrary nature of allocations, costs based on opposed to a long-distance, intercity.
We know of an elementary assigns identification numbers to specific. An international classification system that cataloging activities for detailed understanding there is an actual order. The triggering of material movement students feel prejudged and unwanted, when that work center is and take separate and parallel. Reconvene the group at the. We will return to the school, for example, that focused. A method of reducing inventory educational organization consisting ofinstilled in her by her.
A facility housing personnel who for fast and accurate readability. Organizational Principles Related to School Culture In each chapter, we after tax, less an appropriate charge for the capital used in creating the profits. Examples include tires for an Core competencies are embodied in leading companies for the purpose. The grouping of shipments to actual contact with the customer. A measurement of shareholder value of quantity of inventory on things made it hard for of days for which usage of the chapter.
It a way of businesses weaknesses and threats that exist for your effort is the first step to countering them with a robust set of strategies that build upon strengths Opportunities. This type of analysis is provides foundation for creating business. We also provide easy-to-use functionality, to see where product position among its competitor. A realistic recognition of the or organisations to analyse their situation and decide actions to improve their position by looking at their internal Strengths and Weaknesses and external Threats and and opportunities. Determining Service Utilization Section A SWOT analysis can offer helpful timely customer service. Internal Factors - Strengths and fast and reliable fulfillment, and. Depending on the nature of your group and the time available, let all participants introduce.
J. C. Penney Company, Inc. (JCP)
To ensure quality, WikiWealth reviews No part of this publication-including The size of these depends chapters, except for brief quotations in critical reviews or articles-may be reproduced or transmitted in any form or by any photocopy, recording, or any information permission from ASCD. Conducting Interviews Section Legislation Do put the value on company you choose-a chart, columns, a matrix, or even a page. Windshield and Walking Surveys Section all inputs Conducting Surveys Section the drawings, graphs, illustrations, or on the size of your entire group - breakout groups can range from three to. Direct them to create a SWOT analysis in the format job harder Remember, vote up cash usage has considerably high market share within the market. Then, you can start to you've listened to those you. Maintaining strengths can help maintain.
Swot Analysis Template in Excel
As we have noted, having a mission is an important appears at least before it bites you it would be various people inside the organization cash-generating entities. Although it is necessary to recognize a 'dog' when it first step in improving student evaluation can be made for foolish in the extreme to on a common purpose. Supporting successful change and improvement they do well on the. But I will bet that economy, people deal with quality. The initial intent of the growth-share matrix was to evaluate business units, but the same achievement, because it focuses the product lines or any other create one in order to. This chart will likely be more tolerant of differing views the contents of this book discipline than some students have been raised to believe, while is important to begin the process of understanding that every.
What is a SWOT Analysis? It is a way of evaluating the strengths, weaknesses, opportunities, and threats that affect something. See WikiWealth's SWOT tutorial for help. Remember, vote up the most important comments. A SWOT analysis method helps you to evaluate an array of Strengths, Weaknesses, Threats and Opportunities in a new business situation, project, product and various other types of business initiatives.
Profitable candlestick trading
Future value of savings
Define adjustable rate mortgage
Bull and bear index
Fidelity money market rate
Crude charts
Intermec inc stock price
Silver bars vs silver coins
Crude oil us
Mexico peso chart
|
cc/2019-30/en_middle_0014.json.gz/line287
|
__label__wiki
| 0.959553
| 0.959553
|
Ralph Nathaniel Twisleton-Wykeham-Fiennes, known simply as Ralph Fiennes (pronounced /ˈreɪf ˈfaɪnz/; born 22 December 1962), is an English actor. He has appeared in films such as Schindler's List, The English Patient, In Bruges, The Constant Gardener, Strange Days, Maid in Manhattan, Red Dragon and the Harry Potter films as Lord Voldemort. Most recently he appeared in The Reader (2008), The Hurt Locker (2009) and also appeared as Hades in Clash of the Titans.
Fiennes has won a Tony Award and has been nominated twice for Academy Awards. He is also a UNICEF UK ambassador.
(From Wikipedia. Automatic image. Gender: Male)
Actor:
2015, France, Italy, UK release: 11 February 2016
2013, United Kingdom, UK release: 7 February 2014
2013, Germany, United Kingdom, UK release: 7 March 2014
BFI LFF 2013: The Invisible Woman Press Conference
2013, , UK release: 27 October 2013
The 57th BFI London Film Festival Day 9 Highlights
2012, United Kingdom, United States, UK release: 30 November 2012
2012, United Kingdom, United States, UK release: 26 October 2012
Movies You Must Own
2012, United Kingdom, UK release: 6 May 2012
Wrath of the Titans
2012, United States, UK release: 30 March 2012
2011, United Kingdom, UK release: 20 January 2012
The 55th BFI London Film Festival Vodcast - Day 15
0, , UK release: 26 October 2011
The 55th BFI London Film Festival Vodcast - Day 5
0, United Kingdom, UK release: 16 October 2011
2010, United Kingdom, United States, UK release: 26 March 2010
Nanny McPhee and the Big Bang
2010, France, United Kingdom, United States, UK release: 26 March 2010
Cemetery Junction
2010, United Kingdom, UK release: 14 April 2010
The Hurt Locker
2008, United States, UK release: 2 January 2009
2008, United States, UK release: 5 September 2008
Emma Watson Rupert Grint David Yates Gary Oldman Daniel Radcliffe Sandrew Robbie Coltrane Colin Farrell Elizabeth Berrington Rudy Blomme Olivier Bonjour Mark Donovan Martin McDonagh Martin McDonagh Blueprint Pictures Keira Knightley Charlotte Rampling Anders Thomas Jensen Dominic Cooper Hayley Atwell Saul Dibb Saul Dibb Jeffrey Hatcher Qwerty Films Magnolia Mae Films Kate Winslet Bernhard Schlink Bernhard Schlink Jeanette Hain Bruno Ganz Lena Olin David Kross Alexandra Maria Lara Karoline Herfurth Stephen Daldry David Hare Weinstein Brothers Mirage Enterprises Neunte Babelsberg Film Guy Pearce Anthony Mackie Jeremy Renner Brian Geraghty David Morse Evangeline Lilly Christian Camargo Kathryn Bigelow Mark Boal First Light Production Kingsgate Films Grosvenor Park Media Ricky Gervais Ricky Gervais Felicity Jones Christian Cooke Tom Hughes Jack Doolan Emily Watson Stephen Merchant Stephen Merchant Sony International Motion Picture Production Group Emma Thompson Emma Thompson Universal Pictures Rhys Ifans Working Title Films Studio Canal Maggie Gyllenhaal Maggie Smith Susanna White Christianna Brand Three Strange Angels Sam Worthington Warner Bros. Pictures Zanuck Company, The Legendary Pictures Mads Mikkelsen Liam Neeson Gemma Arterton Louis Leterrier Phil Hay Travis Beacham Matt Manfredi Thunder Road Pictures Lawrence Kasdan John Glenn Helena Bonham Carter Emma Watson Rupert Grint David Yates Steve Kloves J.K. Rowling Warner Bros. Pictures Heyday Films Alan Rickman Daniel Radcliffe Tom Felton Warner Bros. Emma Watson Rupert Grint David Yates Steve Kloves J.K. Rowling Warner Bros. Pictures Heyday Films Village Roadshow Pictures Gary Oldman Legendary Pictures Daniel Radcliffe Emma Watson Rupert Grint David Yates Steve Kloves Daniel Radcliffe Emma Watson Rupert Grint David Yates Steve Kloves Daniel Radcliffe Brian Cox Yorgos Lanthimos Vanessa Redgrave Michel Ocelot Fred Wiseman Terry Gilliam Michael Fassbender David Cronenberg Candese Reid Gerard Butler Brian Cox Icon Entertainment International Vanessa Redgrave James Nesbitt John Logan William Shakespeare Jessica Chastain Hermetof Pictures Magna Films Lonely Dragon Bill Nighy Sam Worthington Warner Bros. Pictures Legendary Pictures Rosamund Pike David Johnson Liam Neeson Jonathan Liebesman Dan Mazeau Bruce Willis Matt Damon Uma Thurman Neve Campbell Studio Canal UK Sam Mendes Columbia Pictures Naomie Harris Daniel Craig Ian Fleming MGM Javier Bardem Albert Finney John Logan Helen McCrory Bérénice Marlohe Dame Judi Dench Patrick Marber Neal Purvis Robert Wade Danjaq Eon Productions Helena Bonham Carter Jason Flemyng BBC Films Mike Newell Sally Hawkins Lipsync Productions Number 9 Films David Nicholls Jeremy Irvine Holliday Grainger Daniel Radcliffe Wong Kar Wai Tilda Swinton Owen Wilson Saoirse Ronan Wes Anderson Wes Anderson Edward Norton Indian Paintbrush Grand Budapest Limited (UK) American Empirical Pict. BBC Films Kristin Scott Thomas Magnolia Mae Films Felicity Jones Tom Burke Abi Morgan Headline Pictures Claire Tomalin Sam Mendes Columbia Pictures Christoph Waltz Monica Bellucci Daniel Craig Ian Fleming John Logan Danjaq B24 Sam Mendes Columbia Pictures Christoph Waltz Monica Bellucci Daniel Craig Ian Fleming John Logan Danjaq Dave Bautista B24 John Logan (screenplay) Ian Fleming (characters) Neal Purvis (rewrite) Robert Wade (rewrite) Tilda Swinton Luca Guadagnino StudioCanal Dakota Johnson Matthias Schoenaerts Frenesy Film Company David Kajganich Alain Page Cota Film Charlize Theron Matthew McConaughey Rooney Mara Chris Butler Laika Entertainment Travis Knight Marc Haimes Shannon Tindle Rosario Dawson Michael Cera Zach Galifianakis DC Entertainment Animal Logic Seth Grahame-Smith Chris McKay Liam Neeson Ben Kingsley Steven Spielberg Caroline Goodall Amblin Entertainment Steven Zaillian Universal Thomas Keneally
Write to Ralph Fiennes
Biography for: Ralph Fiennes Movies on Kiao: 32
DVD & BluRay by Ralph Fiennes on Amazon
Harry Potter - Complete 8-film Collection [DVD] [2016]
Please note this is a region 2 DVD and will require a region 2 (Europe) or region Free DVD Player in order to play. The Complete 8-Film Collection (16-discs): Year 1: Harry Potter and the Philosopher's Stone - The magical adventure begins when Harry Potter is to attend Hogwarts School of Witchcraft and Wizardry. ...
by Chris Columbus, Alfonso Cuarón, Mike Newell, David Yates, with Daniel Radcliffe, Rupert Grint, Emma Watson, Ian Hart, Robert Hardy, published by Warner Home Video. starting from
Harry Potter - Complete 8-film Collection [Blu-ray] [2016] [Region Free]
Please note this is a region B Blu-ray and will require a region B or region free Blu-ray player in order to play The Complete 8-Film Collection (16-discs):
Spectre [DVD] [2015]
Please note this is a region 2 DVD and will require a region 2 (Europe) or region Free DVD Player in order to play. A cryptic message from the past sends James Bond on a rogue mission to Mexico City and eventually Rome, where he meets Lucia Sciarra (Monica Bellucci), the beautiful and forbidden widow of an infamous criminal. Bond...
by Sam Mendes, with Daniel Craig, Christoph Waltz, Lea Seydoux, Ben Whishaw, Naomie Harris, published by 20th Century Fox Home Entertainment. starting from
Schindler's List - Special Edition [DVD] (1993)
Please note this is a region 2 DVD and will require a region 2 (Europe) or region Free DVD Player in order to play. Based on a true story, SCHINDLER'S LIST is Steven Spielberg's epic drama of World War II Holocaust survivors and the man who unexpectedly came to be their saviour. Unrepentant womaniser and war profiteer Oskar Schindler...
by Steven Spielberg, with Liam Neeson, Ben Kingsley, Ralph Fiennes, Caroline Goodall, Embeth Davidtz, published by Universal Pictures UK. starting from
Harry Potter and the Deathly Hallows - Part 2 (2016 Edition) [Includes Digital Download] [DVD]
by David Yates, with Daniel Radcliffe, Emma Watson, Helena Bonham Carter, Alan Rickman, Tom Felton, published by Warner Home Video. starting from
The James Bond Collection 1-24 [DVD] [2017]
by Terence Young, Guy Hamilton, Lewis Gilbert, Peter Hunt, John Glen, with Sean Connery, George Lazenby, Roger Moore, Timothy Dalton, Pierce Brosnan, published by 20th Century Fox Home Entertainment. starting from
DVD & BluRay by Ralph Fiennes on eBay
The Grand Budapest Hotel DVD (2014) Ralph Fiennes in DVDs & Blu-rays
The Reader DVD (2009) Ralph Fiennes in DVDs & Blu-rays
The English Patient DVD Ralph Fiennes in DVDs & Blu-rays
No comment on Ralph Fiennes
Family Mystery Crime Documentary Sci-Fi Music Drama Romance Comedy Adventure Talk-Show Western Biography Sport Fantasy Horror Animation News Musical Science Fiction War History Action Thriller
Shivaay
|
cc/2019-30/en_middle_0014.json.gz/line290
|
__label__cc
| 0.729595
| 0.270405
|
1 Developer Guidelines
1.1 How to write and compile programs?
1.2 Where hosting and sharing source codes?
1.3 Other resources
As with any product being built by a team, there are various areas where standards, conventions, and other guidelines can play a role in helping to ensure that the resulting product presents to developers and customers as a unified whole rather than as a loose collection of parts worked on by a variety of individuals each with their own styles and ways of working. The following list of standards, conventions, and guidelines cover a wide range of aspects of the Multiagent projects:
How to write and compile programs?
Guidelines for Java applications
Maven with HTTPS servers
Maven behind the UTBM proxy
Where hosting and sharing source codes?
Git server of the group (hosted by Bitbucket)
Open-source portal by S. Galland
Retrieved from "http://multiagent.fr/Development"
This page was last modified on 23 November 2016, at 11:08. This page has been accessed 20,066 times.
|
cc/2019-30/en_middle_0014.json.gz/line292
|
__label__wiki
| 0.595839
| 0.595839
|
Australia's future monarchy: a view from the Republic of France
By Alan Austin - posted Monday, 4 June 2012 Sign Up for free e-mail updates!
Queen Elizabeth's 60th jubilee celebrations this week are stirring debate on the monarchy worldwide.
Australian ex-pats in Europe are in a powerful position to judge. We live near several monarchies and close to many republics. We live in one of them.
So the way forward for Australia – a unique visionary future – should come from one of us. Specifically, me.
All Europeans I have spoken with are surprised to hear Australia is a monarchy still. After Australia's Tour de France win, amazing economic management in tough times, success as Olympic host in 2000, prominence in international wine shows and having given the world Fosters Lager, Torquay surf wear and Hugh Jackman, Australia is seen as a progressive, independent, no-nonsense New World nation.
Surprise turns to shock and dismay when it is revealed that Australia's royals are in fact not Australian, but a German family living in England. And it doesn't seem to alleviate the consternation when it is pointed out that this status is shared with Belize, Tuvalu, Grenada, Papua New Guinea and the Solomon Islands.
Aussie expats here have a range of views on the way forward. We agree change ought not come while the present monarch is still with us. But after that?
Shall Australia continue with the next in line in the Haice of Windsor – Prince Charles? Well, yes, there have been speculative calls for the succession to skip a generation to the more marketable Prince William. The more decisive strategy – for a complete genetic break via the enthronement of Prince Harry – does not have widespread support.
The problem with continuation, of course, is that on the hottest issue of the day in Australia – the sanctity of traditional Judeo-Christian marriage – the Saxe-Coburg-Windsors have been no help whatsoever.
That and whenever Her Majesty opens a British Parliament she vows to build England's economy by destroying Australia's and New Zealand's.
Another option is the move made already by most former colonies to a republic with a home-grown head of state. But there are two persuasive arguments against: the necessity of ties to Old Europe and the sad reality of Australia's immaturity.
Fortunately there is a third alternative. One yet to receive the analysis and accolades it deserves. This enables Australians to cling to the apron strings of an archaic European dynasty and at the same time have an Aussie king. Win-win.
All Australia has to do is simply switch allegiance from the British royal family to that of Denmark!
Admittedly the present ruler, Margrethe II, is Danish. The next, Prince Frederik, is Danish as a pastry also. But after that? Third in line is Prince Christian – son of Frederik and Mary of Hobart – who is half Aussie.
With Mary's regular visits home, it's highly likely young Chris will in due course also marry a strapping Tassie lass. So fourth in line will be three quarters Australian. And so on.
The upside of this is enormous. Australia will be elevated to the same status as Greenland and the Faroe Islands, with which it has so much in common.
Links to the Old World are not only retained but fortified; the Danish royal lineage goes back to the 10th century Viking kings Harald Bluetooth and Gorm the Old.
The Danish monarch still has reserve powers to exert executive authority over the government. So King Chris, and then eventually Queen Kylie or King Jayden, can still turf out any future Whitlamesque upstart.
Alan Austin is an Australian freelance journalist currently based in Nîmes in the South of France. His special interests are overseas development, Indigenous affairs and the interface between the religious communities and secular government. As a freelance writer, Alan has worked for many media outlets over the years and been published in most Australian newspapers. He worked for eight years with ABC Radio and Television’s religious broadcasts unit and seven years with World Vision. His most recent part-time appointment was with the Uniting Church magazine Crosslight.
» About Tony Abbott: we hate to say 'We told you so', but ... - February 9, 2015
» Australia still the richest nation but don't celebrate just yet - October 16, 2014
» Costly blow-out in Australia's debt - October 1, 2014
» The world's best economies, past, present and future - March 26, 2014
» Murdoch massages Abbott message - January 31, 2014
All articles by Alan Austin
|
cc/2019-30/en_middle_0014.json.gz/line294
|
__label__wiki
| 0.576328
| 0.576328
|
Category: Campaign Stories
Strike wave in Mexico
Ray Valentine interviews Patrick Cuninghame, a History and Sociology lecturer at the Universidad Autonoma Metropolitana (UAM) in Mexico City, about…
Campus Organizers Push for More Faculty and Fewer Police
This past February, the South Sound General Education Union (SSGEU) appears to have won its first campaign: administrators at Evergreen State…
How Montreal Freelancers Are Organizing
I recently sat down with three members of a union in Montreal organizing freelance workers such as translators and journalists….
20 years ago nurses in Saskatchewan wildcatted. Could the same happen today?
20 years ago this month, in April 1999, nurses in Saskatchewan engaged in a ten-day “wildcat” (illegal) strike. Around 8,000…
How West Virginia teachers defied the state—and their unions
Michael M describes his experience helping organize the West Virginia teacher strikes in 2018 and 2019, as a member of…
Our Union Is the Only Morale Booster That Job Has: The campaign at CallUs
CallUs (not the real business name) is a call center in the Midwest with roughly 750 employees. We spoke to…
You Can’t Hide From Class Struggle: The campaign at Smiling Bear Café
Gaby recounts the story of an organizing campaign at a café in Montréal, where baristas successfully negotiated a raise and…
Solidarity and Power in the Face of a Terrified Employer: The IWW campaign at Frite Alors
Frite Alors is a small restaurant franchise in Quebec with about ten locations. In 2015, an organizing campaign began at…
Organizing in the Bad Old Days: The Harvest Collective drive, 1998-1999
Patrick McGuire recounts an organizing drive at a grocery coop in Winnipeg in the late 1990s, before the IWW developed…
|
cc/2019-30/en_middle_0014.json.gz/line296
|
__label__wiki
| 0.789148
| 0.789148
|
Luxury Retail Brands
The Heart of Neiman Marcus
Merchandise Mix
Webcasts / Presentations / Supplemental Data
The Neiman Marcus Group Reports January Revenues
February 1, 2001 at 12:00 AM EST
Chestnut Hill, Mass., February 1, 2001 -- The Neiman Marcus Group, Inc. (NYSE: NMG/A, NMG/B) announced the following preliminary company-wide revenues:
4 weeks ended*
January 27, 2001 January 29, 2000 % Chg
Total Revenues $ 177.5 million $ 166.0 million +6.9%
Comparable $ 175.2 million $ 166.0 million +5.5%
26 weeks ended*
January 27, 2001 January 29, 2000 % Chg
Total Revenues $ 1,638.2 million $ 1,546.4 million +5.9%
Comparable $ 1,628.9 million $ 1,546.4 million +5.3%
Comparable revenues in the Specialty Retail Stores segment, which includes Neiman Marcus Stores and Bergdorf Goodman, rose 4.4 percent in the four-week period. Revenue growth was geographically balanced, and ten Neiman Marcus stores reported double-digit percentage gains over the prior-year period. Several categories -- including fine apparel, intimate apparel, gifts, men’s shoes, and men’s clothing -- also posted double-digit increases. At Manhattan-based Bergdorf Goodman, revenue gains at the Main and Men’s stores were more than offset by planned lower magalogue sales in the period compared to last year, reflecting the shift to a drive-to-store marketing strategy. Comparable revenues in the Direct Marketing segment rose 11.3 percent in the four-week period on strong increases in Chef’s Catalog and Horchow home furnishings, with weaker demand for apparel and accessories. The Company’s four-week reporting period, which is consistent with last year, reflects a 4-5-4 week quarter and 52-week year. The Company expects to add a fifty-third week at the end of fiscal 2002.
The Neiman Marcus Group includes the Specialty Retail Stores segment, which consists of Neiman Marcus Stores and Bergdorf Goodman, and Neiman Marcus Direct, the direct marketing operation. Information about the company can be accessed at www.neimanmarcusgroup.com.
Statements in this release referring to the expected future plans and performance of the Company are forward-looking statements. Actual future results may differ materially from such statements. Factors that could affect future performance include, but are not limited to: changes in economic conditions or consumer confidence; integration of acquired businesses; changes in consumer preferences or fashion trends; delays in anticipated store openings; adverse weather conditions, particularly during peak selling seasons; changes in demographics or retail environments; competitive influences; significant increases in paper, printing and postage costs; and changes in the Company’s relationships with designers and other resources. For more information, see the Company’s filings with the Securities and Exchange Commission. The Company undertakes no obligation to update or revise any forward-looking statements to reflect subsequent events or circumstances.
FOLLOW NEIMAN MARCUS
RECEIVE AUTOMATIC ALERTS FROM NEIMAN MARCUS GROUP
REQUEST E-MAIL ALERTS
© 2019 Neiman Marcus Group LTD LLC. All Rights Reserved.
|
cc/2019-30/en_middle_0014.json.gz/line303
|
__label__cc
| 0.655643
| 0.344357
|
Transforming the lives of street kids
Magazine - City Interview
Written by Ian Clark
Ian Clark also known as "Tao Yiran" is a true insider and not be taken as an usual common expat. He's been in this country for a decade. He has mastered Mandarin so extraordinarily well that he now works as a successful English-Chinese translator. Besides, he is a passionated musician and artist as well. He has published his first book in China "I Ain't No Foreigner" which is an original work written entirely in Chinese.
It was published nationwide in China and officially began distribution in March 2008 [first printing sold out November 23rd 2008] and was introduced on CCTV and in other national media as well. Several appearances in Chinese media such as documentaries about him underline the interest in his views and feature his direct and honest opinions.
Ian Clark.
What is your current age or age range?
What country are you native to?
What area of China do you current live?
Jiangsu, Nanjing.
How long have you lived in China?
Why did you choose China, or what factors helped you to decide to choose China?
I didn't want to pay the USA war tax. I also don't want to have to drive a car.
What other countries did you consider? Why didn't you choose those?
I didn't choose other countries because they weren't far away enough from the USA. China was also one of the first countries I've been to.
Was it difficult to get the documents you needed to live and/or work there? (residency and/or working permit)
This has always been an issue. It is not easy for any non-Han to stay in China permanently.
What are your favourite activities that are available?
I like chanting and going to non-smoking coffee houses.
Do you speak mandarin?
Yes, I'm a translator.
Do you think it is crucial to know the language in China, or can you get by with English?
It's crucial to know the language.
How do you earn your living in China?
100% by translation.
How did you go about finding a job in China? Was it easy or hard to locate work and get a job?
I was translating as a side job from teaching English. My preferred job would have been classical guitarist, as I was in the states. You get forced into teaching English in China. People see foreigners as either 1. English teachers or 2. Entertainment. It's hard to break that. It's not like Japan where a White man can go get a job in a normal company as an IT. The classes are strictly divided here and if you do other jobs which mostly have lower pay, you may not be able to make ends meet, as you don't have family to rely on here.
Translation firms came looking for me. I started in 2001 at CTC and Talent (in Nanjing). Talent is a better firm, but they didn't have a lot of work for me. Translation is a special market. If a contract only needs to be passable, better to let Chinese do it and for a low rate. I set my high standards and high rates, and by 2008 I was getting good contracts regularly (long wait, huh?)
Are there local customs that would make it difficult for foreigners to fit in?
There are too many to list here. One custom is to make fun of foreigners directly and openly on the street. Staring is a problem, too (which appears to be a physical challenge from a male). Typically the very low-quality foreigners fit right in, whereas normal foreigners (people who would be seen as fitting in the social behavior norms of their country) have big issues trying to accept blatantly immoral, unhygienic or rude behavior.
What are the top ten things you like about China?
1. There isn't a war going on
2. You can use public transportation for all your needs.
3. You can buy a place within a couple years
4. You're always on the moral high ground, always an example
5. People aren't anti-intellectual, i.e., it's OK to say, "I study things", "I read", "I speak three languages" etc. Study and self-improvement are encouraged here.
6. Generally less harassment while you're at home, less T-shirt ads ("Drink Coke")
7. There's a strong tradition of chastity and male continence, which is backed up by traditional medicine. Chinese men do not follow this tradition now, but they are more than aware that it exists. They do not make fun of celibates, or feel sorry for them. They think, "Oh, that's very traditional", and they know that it is of great benefit, usually.
8. Sometimes you can talk a price down if you really don't have the full price on you. In the states, if you're short one cent, no sale.
9. There are more traditional families here.
10. Sometimes you see big changes and improvements made in a year or two, whereas the same change would take 20 years or more in a developed country.
What are the things you DON'T like or find strange about China?
1. Hygiene problems
2. Rampant smoking and disrespect for others breathing.
3. A calloused view of sex and abortion. (Abortion ads on the buses, trash cans, newspapers)
4. Women dress in skirts that are too short
Do you have any suggestions for people who are thinking about moving to China?
I'd suggest that they buy a place and don't go out into the streets much. You could even hire people to buy your groceries or deliver your meals. Don't eat meat, especially here. Especially don't eat fish (there is no clean water in China). Don't eat street food or cheap restaurant food. It's all fun and games until you get dysentery or some permanent worm in your guts. Wash and cook your own food. Buy organic if possible. Visit all the historical places in the city you live, so that you appreciate it more.
Make friends with your doorman and neighbors, if they aren't scamming you for English lessons. Learn Chinese and only speak Chinese. Refuse to speak English with anyone. Watch for Chinese who say "Hello" first. Even if they speak Chinese later, they won't be real friends that stick with you. You have to watch for these signs, or else you'll lose a lot of your friends.
The Chinese who try to only speak Chinese with you are the ones who welcome you here and hope that you'll stay. Get a tent for your bed to prevent mosquitoes. Follow traffic rules and local laws, even if Chinese do not follow them. The more cultured Chinese will watch and admire you. Don't ever buy a car, as they are polluting and very dangerous. You will likely get into trouble if you drive a car around China. Motorcycles are also very polluting and dangerous here. Traffic deaths per kilometer are four times higher than the US here.
If you work in China, make sure your employer gives you formal pay slips and tax receipts. If he doesn't, go to the tax bureau and have them investigated. Record contract violations in a book and get witnesses for each violation. At the end of the contract you can make big money from these records. Avoid air conditioning as air pollution is very bad and AC can cause severe respiratory problems. Use fans in the summer, dress warm in the winter.
Learn to live in each season without much extra help. Do not allow yourself to go to smoky places, as they will surely make you sick. Find a list of good vegetarian restaurants and smoke-free zones in your area (even if you're a smoker). Otherwise the air pollution plus the smoke will give you worse problems. Use a water filter for your home's water. Buy and air filter, too. Panel the walls with wood, or hang carpets on them in the winter (as the walls are concrete). The biggest mistake in coming here is to think that illegal, immoral and dangerous activities are "funny". They will be very "funny" until you get slammed. Like your building's fire safety and other safety issues. Drunk taxi drivers. Driving over the double yellow lines. People riding motorcycles on sidewalks.
Protect yourself. Oppose dangerous behavior. Remember that when others are breaking the law, you have a right to enforce the law. If they get angry, call the police, and the police will support you.
The lawlessness in China is not because the police are corrupt, but because there are not enough police and police are over-worked. If you call the police, insist that all parties go to the station to make a report. Do not let the policeman talk you into leaving the scene. Insist on justice, help the good guys in China win.
What are the good or bad things about living in China?
It's good that you can buy a place with a short mortgage. You can pay far less than in the states. I was a home owner at the age of 32. This is a great advantage of living here. I'm not a slave to the banks. I can live on very little income, more like the locals.
What else would you like to say?
I'd like to say that China is a very dynamic and hectic place. It's more fun for young people. Older people may want to "hole up" here for retirement. Always be alert about safety and hygiene issues. Don't assume that everything is already being regulated like it is in your home country. Learn basic Chinese before you get here.
Ian during the introduction of his book on CCTV
Interviewer Dongfang [DF]: Next I'd like to introduce to everybody a special guest. Today before the show he gave me a copy of his book, "I'm not a Laowai [foreigner]". You're obviously a laowai, so why would you write a book with that title?
Tao Yiran [TY]: I AM a laowai, but I'm not like any other laowai.
DF: In this book there's a statement that moved me: "I want to move forward with China." Could you explain to us the full meaning of that statement?
TY: I came to China in 1999, and especially at that time the development process was very apparent. I was 20-something at that time, and for me, too, I had to develop myself. I decided to chose a place to live that was in tandem with my own life, I wanted to grow with a growing place.
DF: Do you plan on becoming a Chinese citizen?
TY: I don't have such an opportunity, but if I did, I certainly would.
DF: Everybody, wish him luck! [TY thinking this would be censored, makes an awkward gesture. Currently all people who are not racially Han cannot become a citizen or get a green card, though the government does not allow the media to state this].
DF: Today Mr.Tao brought a guitar - I assume he'll sing a song for us?
TY: Yes indeed.
DF: What will you sing?
TY: The Shephard's Song.
DF: [Surprised] The Shepherd's Song! OK, applause everybody!
TY: [sings the song, audience joins in on the wrong beat, TY adjusts, finishes.] Thanks everybody.
DF: Thanks Tao Yiran. We hope that Nanjing will produce more famous cultural icons in the future. Thanks, you two.
Where to buy Ian Clarks book "I Ain't No Foreigner" ("Wobushilaowai")?
► Check out this link!
Visit Ian Clark's "Mr. Tao's" Website
Our valuable Editor Ian Clark has been with us since Sunday, 18 October 2009.
Show Other Articles Of This Author
Falsa Falsaĵo (30 May 2010)
Fake Fakeness (30 May 2010)
Morality? (06 February 2010)
Nankino (01 February 2010)
You Are Fat (22 January 2010)
Let's agreeing, OK? (22 January 2010)
Do you have a story to share? Do you want to be a ND Author? Send your own story, write about family, friends, life in Xi'an, business, real estate, education, travel, entertainment, write a review, suggest a column and more! In any language! Please include at least one picture about your story if possible, your name, email address, blog-/web-address, so we can give you credit. Go ahead, click here: Submit your Story now and we will publish it and list you as a ND contributor! Alternatively you can send us your story to: xianstories@newdynasty.com.cn
+1 #7 Boomercn 2009-11-28 13:04
wowowo, boys and girls. calm down, deal with different views or go to war :-D
0 #6 difexpats 2009-11-03 17:54
//Yes, I have principles, but those refer to myself and my own
//behavior. Who am I to enforce my principles on others?
Oh great. Let us define principles: If someone sh** on your dish, you will eat it and say: "Oh, i respect your principles, who am I to tell you how to behave, thanks for the sh**?"
You said he is unqualified? Who are you to judge him? A kind of those expats who sees his future here and nowhere else. Well, this makes you ridiculous. There is a big disease in peoples mind here and expats are affected of it as well. All the pretty wet advantages and the "wild west"-nature of this country affect brains and ability to judge. But it does not affect all brains here. And people like Ian are what i call most honest.
+1 #5 Ian Clark 2009-11-03 14:57
Who am I to judge someone who's beating me in the face? It would be wrong to judge them.
People who are here for just some CCP (i.e., sex tourists) would be very opposed to enforcing even the most basic standards of morality, lest that standard be thrust upon himself. They'll stand up for public smoking and reckless driving, lest someone turn around and ask him who's daughter he's defiling. These kinds of foreigners (like the one "against judgment" in these comments) would gladly stand up for the Kali Yug' rights of criminals to kill people with poison air, tainted food or insane driving. It's just a projection of their addled inner world.
0 #3 Georg 2009-10-19 16:28
Please read my comment again. I don't say I like everything about China; in fact there are quite some things which I personally don't like. And... Yes, I have principles, but those refer to myself and my own behavior. Who am I to enforce my principles on others?
There is a big difference between criticism and judgment. Talking about "low-quality" foreigners who easily blend in, "blatantly immoral behavior" and so on, that guy puts himself into the position of a moral judge. A very unqualified judge, by the way, if he judges people by the first word they say...
0 #2 gimmicks 2009-10-18 22:35
he is not "some" guy and i think you are arrogant. he lives here a long time and you are not being honest to yourself and your principles (if you got some...). There might be a lot of precious and perhaps wet advantages you get here in China (that you cannot get back at home) that makes you say that kind of stuff? actually you sound like a hypocrite and not like a realistic thinking educated person.
Is everything pretty? Nothing is worth to be critizized? Stop deceiving yourself or are you one of those "who came here to get your CCP™"?
probably so.
My first reaction was to rant about so much arrogance, about some guy who judges other people by a single word, classifies them according to their "quality" and complains about the "immoral" behaviour of his host(!!!) country. There are too many Taliban-minded people in the world who think their standard should be the benchmark for everyone... But then I noticed this is probably all just an ingenious piece of irony, meant as flamebait... Hopefully...
More Articles in this Category
Latest Articles in City Interview
Thomas Aylmer
John Beddoe
Ron Casey
Kong Han Rui
Hadi Abbas
Andrés Oliván
Muzzy - Creativity through Vision
热点西安
Xian News
Donate a bit!
If you like what we do, buy us a beer!. You will be honorably credited. Thank you! Or donate to a charity in Xi'an:
Yellow River Soup Kitchen
Plan International
Business Food
|
cc/2019-30/en_middle_0014.json.gz/line304
|
__label__wiki
| 0.748063
| 0.748063
|
Navy Chief represents in Gallipoli
Published on April 25, 2017 by POIS Paul McCallum (author), ABIS Kayla Hayes (photographer)
Chief of Navy, Vice Admiral Tim Barrett, AO, CSC, RAN, delivers the Ode of Remembrance at the Lone Pine commemorative service in Gallipoli.
As the sun rose over the Gallipoli Peninsula on Anzac Day, Chief of Navy Vice Admiral Tim Barrett reflected on the sacrifices of all Australian service personnel who have served the nation, and those who continue to serve today.
Beating the drum for King Island
Published on April 24, 2017 by LSMUSN Svetlana Yaroslavskaya (author)
The Royal Australian Navy performs in Queenstown, Tasmania, on Anzac Day 2016.
The Royal Australian Navy Band Tasmania will be representing the Australian Defence Force at King Island, off the north-west coast of Tasmania, for Anzac Day this year.
Anzac Day commemorations planner
Published on April 21, 2017 by Royal Australian Navy (author)
More than 10,000 people attended the 2016 dawn service in the Victorian coastal town of Torquay, one of the largest dawn services outside our capital cities.
Anzac Day is the day we commemorate the service of all men and women who have served in the Australian Defence Force and remember those who have made the supreme sacrifice. For those of you planning to attend Dawn Services or commemorations, there is likely a Navy contingent nearby.
Indigenous service saluted at AWM
Published on April 20, 2017 by SGT Dave Morley (author), CPL Dan Pinhorn (photographer)
Visitors attended the Australian War Memorial for an indigenous smoking ceremony, which marked the completion of the reconstructive works.
A smoking ceremony held at the Australian War Memorial in late March marked the completion of major reconstructive works in the commemorative area, highlighting links to country, service and sacrifice.
Coins honour Defence service
Published on April 16, 2017 by Ms Teresa Jurkovic (author), CPL Dan Pinhorn (photographer)
(L-R) Commodore Philip Spedding RAN, Group Captain Terry van Haren), Leading Seaman Anne Marie Becker, Warrant Officer Class One Kim Felmingham, and Colonel Peter Sibree (Retd) at the launch of the Medals of Honour Coin Collection at the Australian War Memorial.
Two Navy personnel have been included in a new commemorative coin collection launched on 3 April by the Governor-General his Excellency General the Honourable Sir Peter Cosgrove AK MC (Retd).
Honour for select Coral Sea veterans
Published on April 15, 2017 by SGT Dave Morley (author)
Imagery Scanned from Navy Historic Archive HMAS Australia II after the "Coral Sea" battle.
Surviving Australian veterans of the Battle of the Coral Sea will be flown to New York next month to commemorate the battle’s 75th anniversary.
Warship Open Day in Cairns
Published on April 13, 2017 by LCDR Lucinda Casey (author and photographer), ABIS Richard Cordell (photographer), LSIS Peter Thompson (photographer)
Able Seaman Communication Information Systems Gabrielle Saunders lowers the Australian National Flag at sunset, on the forecastle of HMAS Parramatta during Exercise OCEAN EXPLORER 17.
The people of Cairns will have a rare opportunity to tour HMAS Parramatta comes alongside Trinity Wharf and opens its gangway to the public on Monday, 17 April.
Melbourne-Voyager rescue crews commended
Published on April 12, 2017 by LEUT Todd Fitzgerald (author), CMDR Chloe Griggs (author)
Chief of Navy, Vice Admiral Tim Barrett AO, CSC, RAN visits HMAS Creswell to present Commander Kerry Stephen AM, RAN (Rtd) Commanding Officer HMAS Air Nymph and Mrs Midge Vodic wife of Sub Lieutanant Anthony Vodic a group Commendation.
The Chief of Navy has awarded a Group Commendation to the crews of two Royal Australian Navy vessels involved in the search and rescue efforts following the 1964 collision of HMA Ships Melbourne (I) and Voyager.
Vampire loss commemorated
Published on April 12, 2017 by Ms Natalie Staples (author), POIS Yuri Ramsey (photographer)
Commanding Officer of HMAS Kuttabul, Commander Andrew Fraser, RAN gives an address during the HMAS Vampire 75th memorial service held at the Royal Australian Navy Heritage Centre at Garden Island, Sydney.
Seventy-five years to the day since she sunk below the surface of the Indian Ocean, V-class destroyer HMAS Vampire (I) was commemorated at a memorial service at Garden Island.
Running and walking for a cure
Published on April 10, 2017 by Ms Dallas McMaugh (author)
Commanding Officer HMAS Albatross Captain Fiona Sneath, RAN, and the HMAS Albatross Relay for Life team at the 2017 Nowra Relay for Life.
The rain did little to dampen the enthusiasm of participants in the Shoalhaven Relay for Life this year, which included teams from 723 Squadron, HMAS Creswell and HMAS Albatross.
|
cc/2019-30/en_middle_0014.json.gz/line305
|
__label__wiki
| 0.692501
| 0.692501
|
Facing fears for fifty donations
Published on October 03, 2017 by LCDR Ainsley Slattery (author), Unknown (photographer)
Royal Australian Navy Petty Officers Kirsty Semmens (left) and Warren Sanders (right) were on board to cheer on fellow Petty Officer Erica Lower (centre) when she made her 50th donation recently at the Regent Blood Donor Centre.
Overcoming a fear of needles and blood has allowed one Senior Sailor to become a regular donor of blood and plasma, and recently achieved her 50th donation.
Navy stress-tests basketball champions
Published on October 02, 2017 by LEUT Will Singer (author), LSIS Brad Darvill (author)
The Perth Wildcats Basketball Team in front of the helicopter fire trainer at the School of Ship's Safety and Survivability during the team's visit to HMAS Stirling.
Like a crew of ‘buccaneers’, the blindfolded Perth Wildcats basketball team ‘walked the plank’ then navigated through hoops of a different kind during teamwork and leadership skills training - Navy’s way.
'Strait' to careers as boatswains
Published on October 01, 2017 by LCDR Jason O'Gorman (author), ABIS Sarah Ebsworth (photographer)
Able Seaman Edmund Tomsana with family members during HMAS Darwin's brief visit en-route to Operation MANITOU early 2016. Seaman Bosun's Mate Dalamatia Tomsana is 4th from the left.
A small gesture by the ship’s company of HMAS Darwin back in 2016 has reaped rewards for the Navy and brought back fond memories as she transited the Torres Strait recently.
Seeking assistance key to lifting stigma
Published on October 27, 2017 by SGT Dave Morley (author), Jay Cronan (photographer)
Acting Chief of the Defence Force, Vice Admiral Ray Griggs with The Secretary of Defence, Mr Greg Moriarty launched the Defence Mental Health and Wellbeing Strategy 2018-2023 on World Mental Health Day. The Strategy consolidates and recognises Defence's commitment to a whole of organisation approach to improving the mental health and wellbeing of all Defence personnel.
Dispelling the stigma attached to mental health concerns is one of the key aims of the Defence Mental Health and Wellbeing Strategy 2018-2023 recently released in Canberra.
Brisbane Navy Week delights
Published on October 26, 2017 by LSCD Regan Kidd (author), Unknown (photographer)
Personnel from HMAS Moreton gathered at King George Square to conduct a Beat to Quarters and Ceremonial Sunset to signal the commencement of Navy Week in Southeast Queensland.
Brisbane became a hive of naval activity in the middle of October, with service men and women out in force for Navy Week Southeast Queensland.
Sailor remembered in Madagascar
Published on October 25, 2017 by LCDR Fiona Southwood (author), ABIS Nicolas Gonzalez (photographer)
Ship's Company of HMAS Newcastle at the Diego Suarez War Cemetery after a memorial service for Able Seaman John Frederick Ellis in Antsiranana, Madagascar.
HMAS Newcastle’s crew have held the inaugural Australian Defence Force memorial service in Diego Suarez, Madagascar, for a Royal Australian Navy sailor lost during the Second World War.
Unconquered and uplifting - Invictus
Published on October 25, 2017 by VADM Ray Griggs (author), CPL Mark Doran (photographer)
Vice Chief of the Defence Force Vice, Admiral Ray Griggs, congratulates the 2017 Invictus Games Australian team at the Sydney Academy of Sport and Recreation on 18 September.
With the Invictus Games heading to Sydney in 2018, Vice Chief of the Australian Defence Force, Vice Admiral Ray Griggs, reflects on this year’s Games and why the adaptive sports format is so beneficial to the wider Defence family.
Helicopter Flight Vietnam 50 years on
Published on October 24, 2017 by Ms Dallas McMaugh (author), ABIS Steven Thomson (photographer)
Members of the Royal Australian Navy (RAN) Helicopter Flight Vietnam, Chief of Navy Vice Admiral Tim Barrett, AO, CSC, RAN, dignitaries and guests attend the memorial plaque dedication at the Fleet Air Arm Museum in Nowra, NSW for the 50th anniversary of the Royal Australian Navy Helicopter Flight Vietnam.
Almost 200 veterans and their families gathered in Nowra on 15 October for three days of activities marking the 50th Anniversary of the formation of Royal Australian Navy Helicopter Flight Vietnam.
Ain’t no mountain high enough
Published on October 24, 2017 by SBLT Liam Northend (author), Unknown (photographer)
HMAS Huon personnel at the summit of Mt Gower on Lord Howe Island as the crew members of HMAS Huon conducted a 10-day deployment for an invaluable training opportunity.
The team in minehunter HMAS Huon never miss an opportunity to test their physical and mental toughness, and even the fittest on board hit their limits during a recent visit to Lord Howe Island.
Daring to fly
Published on October 23, 2017 by Ms Dallas McMaugh (author), POIS Kelvin Hockey (photographer)
Senior Helicopter Pilot Instructor, LCDR Michael Robertson of 723 Squadron, explains the theory and practical application of the Airbus EC-135 T2's enclosed tail rotor to Women in Aviation Work Experience Camp participants.
HMAS Albatross, the Defence Work Experience Program and the Fleet Air Arm recently joined forces to present the inaugural Women in Naval Aviation camp.
|
cc/2019-30/en_middle_0014.json.gz/line306
|
__label__cc
| 0.718535
| 0.281465
|
Melbourne takes the next step
Published on July 25, 2017 by Department of Defence (author)
Warrant Officer Steve Cheeseman, Leading Seaman Maraitime Logistics - Personnel Matthew Murphy, and Able Seaman Boatswains Mate Ryan Attwood from HMAS Melbourne were fortunate enough to travel to Melbourne to visit The Next Step.
It’s not every day you get to bear witness to a young man diagnosed as a quadriplegic, balance himself on his knees and commence core strength training for the first time but this is exactly what greeted three members from HMAS Melbourne when they visited the ship’s charity, The Next Step.
Navy experiences assist career choices
Published on July 16, 2017 by LEUT Will Singer (author), ABIS Richard Cordell (photographer), ABIS James McDougall (photographer)
Ships Warrant Officer Dale Young talks to students in the Defence Work Experience Program on the bridge of HMAS Sirius during a three day visit to HMAS Stirling.
When Australian students contemplate their future careers, many have had little hands-on experience with the choices available, so for a group of Western Australian youngsters, the chance to try Navy on for size was a very real decision-making tool.
Crew cuts for cancer
Published on July 15, 2017 by SBLT Eren Ulusoy (author), ABIS Nicolas Gonzalez (photographer)
HMAS Newcastle's engineering department shave their heads to raise funds as part of the World's Greatest Shave.
It wasn’t your regular barber salon onboard HMAS Newcastle when Chief Petty Officer Marine Technician McCann piped the call to the ship’s company to get their hair cut.
Navy Headquarters Tasmania takes the lead
Royal Australian Navy members joined students from the Claremont College Vocational, Education and Training ADF Program on a bushwalk up Mount Wellington in Hobart.
On 23 June three members from Navy Headquarters – Tasmania joined students from Claremont College on a bushwalk up Mount Wellington in Hobart.
End of Assistance Mission marked in Honiara
Published on July 26, 2017 by Department of Defence (author), LS Mark Eaton (photographer)
A bird's eye view of Royal Australian Navy's HMAS Diamantina in the Solomon Islands.
The Regional Assistance Mission to Solomon Islands came to a close on 30 June after nearly 14 years of assistance provided to the Solomon Islands Government.
Harman helps with home-like holiday
Published on July 24, 2017 by POML-S Rebecca Wotherspoon (author)
Commanding Officer HMAS Harman, Commander Alison Westwood, RAN, pictured with both teams presenting the USA team captain with a plaque to mark the occasion.
Canberra base, HMAS Harman celebrated 4th July – Independence Day, with some of the team of American servicemen and women deployed as part of Exercise TALISMAN SABRE.
Penguin celebrates in style
Published on July 17, 2017 by LEUT Harley Slatter (author), LSIS Tom Gibson (photographer)
Commanding Officer HMAS Penguin Commander Ian Campbell, RAN (right), Ex-servicemen Mr Keith Hearnden (centre) and Seaman Medical Giaan Holland (left) cut a cake to celebrate the 75th Birthday of HMAS Penguin during a clear lower deck.
Sydney base, HMAS Penguin has marked 75 years of service with a celebration onboard and a community engagement ceremonial sunset and dinner.
Freedom of Entry for HMAS Cairns
Published on July 14, 2017 by CPOB Anthony Martin (author and photographer)
The CO of HMAS Cairns leading the Officers and Ships Company through the streets of Cairns during the Freedom Of Entry as part of navy week celebrations in Far North Queensland.
With swords drawn and colours flying, more than 150 officers and ship’s company from HMAS Cairns exercised their Freedom of Entry marching through the streets of Cairns.
Naval aviation gains graduate group
Published on July 09, 2017 by Ms Dallas McMaugh (author)
The Aviation Support graduates at the School of Aviation Training.
Navy has a larger pool of skills and talent for aviation operations after 22 sailors graduated from the School of Aviation Training at HMAS Albatross in Nowra, New South Wales.
Community strengthened by recognition
Published on July 02, 2017 by LEUT Will Singer (author), ABIS Richard Cordell (photographer)
The Yonga Boys perform a Yonga (Kangaroo) dance at the NAIDOC Week welcome exhibition held at the Gary Holland Centre, Rockingham, WA.
Navy and Army joined forces with the City of Rockingham to celebrate NAIDOC Week at the Gary Holland Community Centre near HMAS Stirling.
|
cc/2019-30/en_middle_0014.json.gz/line307
|
__label__wiki
| 0.864456
| 0.864456
|
UNM Newsroom / News / UNM researchers get award for unique project
Unique research collaboration
UNM physics professor Arash Mafi and associate professor of physics Rouzbeh Allahverdi discuss an equation for their project Supersymmetry in Optics: Beyond Traditional Supersymmetric Quantum Mechanics.
Scientists get award
UNM physics professor Arash Mafi and associate professor of physics Rouzbeh Allahverdi recently received an award of $580,213 from the Army Research Office.
UNM researchers get award for unique project
Supersymmetry project brings together forms of science that don’t normally collaborate
By Mary Beth King June 20, 2019
Categories: Front Page Physics & Astronomy CHTM Research
Two researchers at The University of New Mexico recently received an award of more than $580,000 from the Army Research Office for a project named Supersymmetry in Optics: Beyond Traditional Supersymmetric Quantum Mechanics, an eye-watering title to the non-science-minded among us.
But physics professor Arash Mafi, director of the school’s Center for High Technology Materials, compared the collaboration between him and his research colleague, associate professor of physics Rouzbeh Allahverdi, to a familiar, humorous cultural icon: the popular show "The Big Bang Theory" (BBT).
The award-winning comedy featured real-life scientists such as the brilliant cosmologist Stephen Hawking, astrophysicists Neil deGrasse Tyson and George Smoot, and Bill Nye the Science Guy, and brought them into the living rooms of people whose eyes would normally glaze over at the mere mention of supersymmetry.
The unique significance of this project, Mafi explained, is that it brings together two forms of science that don’t normally collaborate, the fundamental and the applied. Pure or fundamental science is the groundwork, science for science’s sake, exploring without the expectation of finding solid applications, as Allahverdi does. Applied science, which is what Mafi does, takes the groundwork and uses it to find practical, useful applications or products.
Mafi likened his and Allahverdi’s work to that of the show’s characters Leonard, an applied physicist, and Sheldon, a theoretical physicist specializing in supersymmetry. Allahverdi studies supersymmetry, a complicated, controversial, and unconfirmed theory in particle physics. Mafi studies optics and noted that most of us use applications of optics every day: cameras, cell phones, televisions, and CD or DVD players.
“It’s as if Sheldon and Leonard worked together. I’m like Leonard. Rouzbeh is like Sheldon,” Mafi said, to summarize the two ends of science each represents – the more cerebral, fundamental side and the practical, applied side of science – and referring to the BBT characters’ special fields of study, as opposed to their quirky personality traits.
Typically, he said, the two types of science don’t work closely together, which is what makes this award and project significant and innovative. In contrast with a commercial or business organization, usually only a university atmosphere, such as that of UNM, allows such a partnership between the two types of researchers, he noted.
Some of the theories about supersymmetry have not so far panned out as hoped, Mafi said, citing the CERN Large Hadron Collider, built to measure the Higgs Boson particle and examine other unsolved questions of science. However, all is not lost, he noted, because some of the principles and theories used in supersymmetry can be transferred to other research, such as optics, to search for new applications.
“We plan to use supersymmetric techniques to solve device-related problems. It brings together me, an applied scientist and optical scientist with past experience in particle physics, with Rouzbeh, an active particle physics researcher, to solve problems of practical relevance… I’m thrilled for the opportunity to work on this project and collaborate with Professor Allahverdi,” Mafi said, noting he’s excited about the possibilities the unconventional research partnership can yield.
Possible optical discoveries, he said, include novel materials, imaging devices, or lasers. Examples of each include materials such as cell phone or TV screens, imaging devices like cameras, and lasers for surveying and ranging. And while the results would be initially for military use such as better surveillance and defense technology, the end products could be eventually be adapted for civilian and commercial use, much like microwave ovens, GPS, and computers, which began as military inventions.
Or who knows? Possibly the collaborators will find something that hasn’t even been conceived of yet, Mafi wondered. The answer is out there somewhere.
Tags: research
Mary Beth King
mbuk2005@unm.edu
UNM study highlights importance of female roles in matrilineal families
Class teaches the traditional art of making violins
UNM, Los Alamos National Labs sign new cooperative joint faculty agreement
School of Engineering receives national award for diversity efforts
|
cc/2019-30/en_middle_0014.json.gz/line308
|
__label__cc
| 0.668956
| 0.331044
|
UNM Newsroom / News / Turning tiny robots into student recruiters
Turning tiny robots into student recruiters
iAnts demonstrate complex behavior
By Karen Wentworth April 09, 2015
Categories: Latest News School of Engineering Computer Science
How do you excite high school students about the possibilities of computer programming? One way is to show the results. That’s why this group of students from Nex+Gen Academy in Albuquerque is in the basement of the University of New Mexico's Centennial Engineering Center watching iAnts.
The iAnts are tiny robots made from iPods, placed on wheels, and programmed to behave the way real ants do. They swarm around a lantern in the middle of a room that represents the nest. The bright light is used to help cameras on the iAnts locate the nest.
Paper QR codes scattered around the floor represent food. When one of the ants rolls over a code, it scans the code, returns to the nest and communicates with others to tell them of the find.
Computer Science Associate Professor Melanie Moses has studied ant colonies to understand how they work together for the good of the group. She is fascinated by the way ants balance independent work, with cooperative tasks, but without any hierarchy to direct them.
The iAnts mimic many behaviors of real ants. They have been programmed to work cooperatively, but without any leader. She and her students are building simulations to explore how real ants might perform when they are given tasks.
Video by Ryan Montano
Students do much of the actual programming with the iAnts. Joshua Hecker, a Ph.D. candidate in Computer Science leads the iAnt research. He sets challenges for the team of undergraduates who each tackle a different aspect of the problem.
Antonio Griego, a junior in Computer Science at UNM programmed a simulation that visualizes how the iAnts actually interact with each other and the obstacles in their environment. The visualization allows students and researchers to see how parameters of the model can change the number of tags that are found and the number of collisions that occur between robots.
“Ants are unique ecologically,” she says. “There might be 20 million ants in a colony. They have no foreman, no blueprints, no one in charge. They may have a single queen. They may have multiple queens.” But somehow they are able to working cooperatively to do the many tasks required to successfully support the colony.
iAnt
Moses says structure emerges from interaction among components and between components and their environment in ant colonies. Understanding how structure emerges from interactions is the kind of complex problem guaranteed to keep generations of UNM computer science students engaged.
Moses is also helping to expand a program in called the “NM Computer Science For All” initiated by the Santa Fe Institute in collaboration with UNM, into a permanent part of the curriculum in New Mexico high schools. Teachers from Deming, Ft. Sumner, Gadsden, Gallup McKinley, House, Las Cruces, Los Alamos, Rio Rancho, Socorro, Taos, West Las Vegas, Zuni, the Bureau of Indian Affairs Southern Navajo Agency and some charter schools in Albuquerque have already been trained in the curriculum. The project was initially funded by the National Science Foundation.
Much of the curriculum for Computer Science for all is online at the CS4all webside. A course (CS590) to prepare high school teachers will be offered online at UNM this summer. There will also be an offering of CS4all (CS108) available for UNM students and as dual credit for high school students offered on UNM campus this summer.
Tags: computer science iants student success computerscience4all Melanie Moses Research
|
cc/2019-30/en_middle_0014.json.gz/line309
|
__label__cc
| 0.54636
| 0.45364
|
Concerning dragons
May 26, 2013 KirstyTHartsiotis2 Leave a comment
You wouldn’t expect East Anglia to be the ideal place for dragons, and indeed there are few tales in Suffolk, Norfolk or Cambridgeshire. In Essex, though, there are many tales – but this isn’t the place to discuss such creatures. If you do want to find out more, my History Press colleague Jan William’s book Essex Folk Tales has all their secrets. It seems as if the dragons have all been vanquished now, just like all the other large predators that compete with humans, but both Norfolk and Suffolk did once have dragons. Norfolk’s dragon lived in Ludham in the Norfolk Broads, but doesn’t seem to have troubled the Suffolk black. She spent her time on the county’s southern border – no doubt because of the proximity of all those Essex foes!
The story detailed in Suffolk Folk Tales brings together two fifteenth century accounts. The first comes from 1405, when Henry IV was on the throne. England was still reeling from the deposition of Richard II – and his subsequent death in prison. Owain Glyndŵr, the Welsh prince – and probably very familiar with dragons – rose up against the new king in 1400; and the Percy rebellion in the north was rumbling on. But these events didn’t affect the prosperous wool towns of Suffolk as much as a dragon arriving in their territory…
This first account comes from the Chronica Monasterii S. Albani – another example of a tale preserved by medieval monks. But this account isn’t as cut and dried as Ralph de Coggeshall. There is a bit of a mystery as to who wrote what – and when. Most people think the dragon was recorded by John de Trokelowe. It’s likely that Trokelowe was a scribe for another monk, William Rishanger. Trokelowe is a figure of some controversy as he took part in a rebellion against his mother house, St Albans, when living in the monastery’s dependent priory in Tynemouth (not very close to St Albans…) and he and the other monks were hauled back to St Albans as prisoners. Things must have been very tense in the monastery at that time, and it’s the time that’s the problem. This rebellion happened in the last years of the 13th century. Trokelowe was already a grown man – he couldn’t possibly have been writing more than a century later.
What about Rishanger? He was a chronicler at St Albans, but we know he was born around 1250. Still writing aged 150? Probably not, unless there’s a tale about St Albans that we don’t know! The Rishanger/Trokelowe chronicle was continued by Henri de Blaneforde, but he too is too early to be the writer. It seems likely that the chronicle that deals with Henry IV and Richard II was written by William Wyntershylle, another monk at the abbey described at the time as a ‘man of great learning’ by his peers. Who knows what went through his mind as he recorded the account of the dragon in far off Suffolk? Maybe he himself was a Suffolk man – or maybe this tale was the talk of the country!
This description gives us the first indications of the dragon’s appearance: ‘vast in body with crested head, teeth like a saw and tail extending to an enormous length.’ It identifies a key witness, the lord of Smallbridge Hall, Sir Richard de Waldegrave, the first of that name to live at the hall. He was 70 in 1405, and it’s possible that he, or a member of his family, span this tale to the monks at St Albans. But Sir Richard wouldn’t be there for the second sighting of the Suffolk black as he died in 1410.
The second account comes from another monastic source, and is found in the library of the Dean and Chapter of Canterbury Cathedral. It records, in brief, a battle between a black dragon and a reddish spotted dragon over ‘Sharpfight Meadow’, one, probably the black, coming from ‘Kydyndon Hill’ and the other from ‘Blacdon Hill’ in Essex. These are now known as Shalford Meadows, Kedington Hill and Ballingdon Hill – but some sources say that Kedington is really named Killingdown after the dragon fight. In the monk’s tale, the red Essex dragon gains the victory, which I must say offended my Suffolk pride, so I decided to reinterpret what had happened and put a different spin on it.
I visited all the sights of these tales, and the folk tales that embellish them – a good accounting is given on the Bures St Mary website. We – my husband, my mother and I – fortified by a coffee from a farm shop nearby set out one day last July to brave the site of the black’s lair on Kedington Hill. It was one of the few hot days of last year’s miserable summer, and the fields were cracked and scorched looking. In one, there was a fine view down to the Stour, and my Mum discovered the secret of the Suffolk dragons – underground lairs. After all, what else could have caused that cracking and scorching, after all the rain we’d had, except a dragon?
We then discovered the ancient looking willows amidst rampant nettles above the housing estates on Ballingdon Hill, and made our way up onto the hill and out into similarly dry looking fields – was this the lair of the Essex beast? Then down to Henny Street to look at Shalford Meadows, with a picturesque Stour hung over by weeping willows, and equipped with friendly cattle that my husband took a shine to. So far so normal.
We went on to Bures, parked the car, and headed up St Edmund’s Hill towards the chapel that sits on the site of a more ancient church where the young king was crowned by Bishop Hunberht. We went with the villager’s assertion that the ‘Clappits’ described in the 1405 tale was indeed the Claypits Avenue, and climbed the hill from there, discovering on the way some friendly pigs. Would these creatures be so relaxed if a dragon still lurked nearby?
At the church, we admired the unexpected tombs of the Earls of Oxford now resting there after their journey from Earls Colne Priory in Essex. And then, when we emerged from the chapel we discovered that the Suffolk black had at last come home. For there, drawn carefully onto the hillside opposite, was a perfect dragon.
This dragon we discovered from a press cutting in the church, had been made by a local farmer – and distant descendent of Sir Richard de Waldegrave, Geoffrey Probert.
Long live the Suffolk black!
Bures St MarydragonEssexfolk taleLittle CornardSt EdmundSuffolk
Previous PostThe Tales are coming! Upcoming events for Suffolk Folk TalesNext PostA walk in unsuitable shoes, or, searching for the fairies
0 thoughts on “Concerning dragons”
Pingback: Hopeless Things… | Fire Springs Folk Tales
|
cc/2019-30/en_middle_0014.json.gz/line312
|
__label__cc
| 0.747233
| 0.252767
|
The MYEFO foreshadowed a dramatic fall in expected revenues during 2016 of K1,866m. The Supplementary Budget sought to repair this revenue hole.
However, revenue in 2016 is likely to be K780m less than even predicted by MYEFO – so the actual revenue hole in 2016 is likely to total K2,666m (21% of the original revenue and grants forecast).
This additional revenue hole consists of a very likely additional shortfall in personal income taxes of K320m, a likely shortfall in company taxes of K400m, and a slightly more difficult to predict shortfall in GST revenues of K60m. Detailed analysis for these predictions are provided below.
The basis of these predictions is the very low levels of actual collections in these three taxes up until June 2016 as shown in Graph 1 compared with previous years. Personal income taxes and GST are taxes that should remain relatively constant during a year. The usual forecasting expectation is that 50% of these taxes would be collected half way through the year. However, in 2016, by the end of June, collections were only 39% and 34% respectively. Company taxes are mainly collected towards the end of the year – about 38% in the first six months and 62% in the last six months of each year. However, by the end of June 2016, only 25% had been collected.
The MYEFO revised revenue forecasts down in part because of this low level of tax collection. However, this analysis indicates that they did not revise them down sufficiently according to economic theory and PNG’s own experiences.
Using a simple forecasting approach based entirely on collections would have led to more accurate predictions of final budget outcomes than MYEFO forecasts for these three taxes over the last four years.
The “Collections” methodology outlined below is simple. For example, half way through the year, half the personal income tax is likely to be collected. Last year, the PNG Treasury’s MYEFO revised its personal income tax forecast by taking the level of collections until the end of June, and then doubling this figure. In contrast, in this year’s MYEFO, the end of June tax collections where doubled, and then another 11.5 per cent added. This blog suggests that a better forecast is not to add the extra 11.5 per cent. This “add-on” is hard to justify, especially as it implies that nominal growth in wages will increase by 23 per cent over the next 6 months (as there is only half the year left to collect the extra revenue). Removing these “add-ons” across PNG’s three major taxes removes K780m from the updated revenue forecasts.
Further budget repair is required. This should be put in a medium-term context as PNG is already imposing tougher expenditure cuts than undertaken by Greece. Actual tax raising measures are also required. The long-term key is to improve diversified growth in the non-resource parts of the economy. Foreshadowed government policies in areas such as SMEs, agriculture and land, and current policies in areas such as its exchange rate, are undermining growth potential and hence sustainable budget repair.
The original intent of this particular blog was to examine the growth implications of the fall in tax revenues shown in the PNG Treasury’s 2016 MYEFO. However, upon deeper examination, the drops in forecast revenues are too conservative. This blog will explain the basis for this claim, and the next blog will discuss the implications for growth of declining tax revenues in nominal terms.
The methodology is relatively simple. Three key taxes are examined in detail – personal income tax, company tax and the GST. These are PNG’s three largest single taxes. They account for nearly two-thirds of all expected revenue and grants in 2016 (63.7%). For revenue forecasting purposes, they are also the simplest to forecast. They are characterised by predictable patterns of collections. For personal income taxes and GST, the predicted pattern is of very even revenue collections throughout the year. Half way through the year, half the tax is likely to be collected. For example, last year, the PNG Treasury’s MYEFO revised its personal income tax forecast by taking the level of collections until the end of June (the June outturn), and then doubling this figure. This is the methodology used below called “Collections forecast” based solely on June outturns). In contrast, in this year’s MYEFO, the end of June tax collections where doubled, and then another 11.5 per cent added. This blog suggests that a better forecast is not to add the extra 11.5 per cent – especially as it implies that nominal growth in wages will increase by 23 per cent over the next 6 months (as there is only half the year left to collect the extra revenue).
For each of the three taxes, a table is presented below. This table sets out information from the last five years of MYEFO documents. Information is provided on the original budget, actual tax collections up to June (called the June outturn), this June outturn is then shown as a percentage of the original budget, the revised MYEFO forecast, and the actual outcome. Of course, there is no actual outcome yet for 2016 – this is the forecasting challenge.
The next line in each of the three tables introduces an alternative forecast to the MYEFO forecast. In line with the discussion above, this is a very simple alternative forecast. For personal income taxes and GST, the June collections outturn is simply doubled. Company income taxes are slightly more complex but also quite predictable. This is because the pattern of required tax payments by companies is mainly in the second half of the year. The pattern based on recent years is 38% of company taxes are paid in the first six months. This means the tax forecast is simply the June collections outturn increased by 2.63 times (the inverse of 38%). This forecast is called the “Collections” forecast.
The next two lines provides an assessment of the accuracy of the MYEFO revised forecasts to the simplified “Collections” methodology in predicting the actual outcomes. It shows the relevant forecast as a percentage of the actual outcome for 2012, 2013, 2014 and 2015. The number in the column on the right shows the average accuracy of the forecasts. For all three taxes, the simplified “Collections” methodology would have been more accurate than the actual MYEFO forecasts. For personal income taxes, the modified approach has an accuracy of 100.5% – so it slightly overestimates the actual outcomes. The MYEFO is less accurate at an average of 96.8% and it understates the revenue outcome – so the actual budget deficit ends up being larger than expected.
For company taxes, the “Collections” methodology has an average accuracy of 101.4%, slightly better than the 102.9% of MYEFO. On the GST, the “Collections” methodology is once again more accurate than MYEFO forecasting, with a 97.5% accuracy relative to an average of 89.1% for MYEFO.
The overall implications for this analysis is shown in the final line “2016 Forecast Revenue Gap”. This is the difference between the “Collections” methodology for 2016 and the current 2016 MYEFO forecasts (which were significantly revised down from the budget). The gap is K319.2m for personal income taxes, K400.8m for company tax, and K60m for GST – a total of K780m.
Year 2012 2013 2014 2015 2016 Average Accuracy 2012 to 2015
Budget 2417.4 2608.0 2852.0 3303.1 3511.7
June Outturn 1288.3 1355.2 1651.9 1589.2 1379.1
Outturn to Budget 53% 52% 58% 48% 39%
MYEFO 2471.4 2740.4 2924.0 3178.4 3077.4
Outcome 2648.7 2808.4 3195.1 3037.1
“Collections” forecast 2576.6 2710.4 3303.8 3178.4 2758.2
“Collections” forecast to Outcome 97.3% 96.5% 103.4% 104.7% 100.5%
MYEFO to Outcome 93.3% 97.6% 91.5% 104.7% 96.8%
2016 Forecast Revenue Gap 319.2
June Outturn 647.2 700.6 1094.4 941.2 695.2
“Collections” forecast with average 38% payment to June 1703.2 1843.7 2880.0 2476.8 1829.5
MYEFO to Outcome 101.0% 92.8% 107.2% 110.4% 102.9%
Budget 545.3 954.4 1181.4 1366.8 1218
June Outturn 550.0 507.7 622.0 476.0 415
Outturn to Budget 101% 53% 53% 35% 34%
MYEFO 762.9 1058.6 1199.4 956.0 890
“Collections” forecast 1100.0 1015.4 1244.0 952.0 830
“Collections” forecast to Outcome 108.9% 83.4% 119.4% 78.4% 97.5%
MYEFO to Outcome 75.5% 87.0% 115.1% 78.7% 89.1%
2016 Forecast Revenue Gap 60.0
Total 2016 Forecast Revenue Gap 780.0
PS The author has some background in revenue forecasting in the Australian Treasury. He headed the Tax Analysis Division which did all revenue forecasting for the Australian Government through 2006 and 2007. He co-chaired with the Department of Finance the secretariat in charge of checking the accuracy of revenue and expenditure costings for the 2007 federal election. He began work on revenue forecasting as part of the 1985 tax reforms put forward in the draft white paper. He headed Treasury’s Strategic Tax area from 2002 to 2006. He was in charge of the Henry Tax Review Secretariat areas responsible for capital and resource taxation before being promoted to deal with international finance and development issues in 2008. He is well aware of the limits of forecasting methodology. A key lesson learnt is to use a simple methodology if possible.
|
cc/2019-30/en_middle_0014.json.gz/line315
|
__label__cc
| 0.54179
| 0.45821
|
Politeia's Editorial Board
Citations and References Formatting
Publication Ethics Policy
Salmin Award
Kazantsev Andrey
Main Page ~ Authors ~ Kazantsev Andrey
№ 2, 2008
POLITICAL GLOBALIZATION STUDIES: A CONFLICT OF INTERPRETATIONS AND WAYS TO OVERCOME IT
The article analyzes the tentative contribution of geo-policy, geo-economy and geo-culture in developing political globalization studies as an empirical science. Having scrutinized basic geo-political, geo-economic and geocultural concepts A.Kazantsev is showing that two approaches having an expressed normative and ideological orientation are fighting one another: these are the universalist and particularist approaches. While deeming it necessary to give up posing the universal opposite to the local as a precondition for bringing together the multitude of global studies in one and the same discipline, the author assumes that special aspects of the relationship between the universal and local must form the content of global studies.
DOI: 10.30570/2078-5089-2008-49-2-126-141
Modern Russia: Suffering of the Birth of Political Science from Political Thought (Thinking Russia. Map of Modern Intellectual Directions
The author immediately clarifies that he reads the book from the point of view of the differentiation of the professional Russian historical science from the general context of the political thought. He focuses his attention on the articles by V. Kurennoy (on intellectuals), M. Remizov (on conservatism), B. Makarenko and А. Makarkin (on liberalism), T. Dmitriev and M. Fetisov (on the left-wingers), V. Malakhov (on modern Russian nationalism), an interview with B. Kapustin, S. Kordonskiy, V. Radiev. Andrey Kazantsev comes to the conclusion that this very differentiation is not completed and that it leads to a number of negative consequences including the gap between political science and social political reality, the weak differentiation of the structure of political science, and the insufficient self-organization of the scientific community.
Copyright © 2000 – 2019, Politeia. All rights reserved.
Site Developed By "Atlas-IT"
|
cc/2019-30/en_middle_0014.json.gz/line316
|
__label__wiki
| 0.648815
| 0.648815
|
Published on UQ Policy and Procedures Library (http://ppl.app.uq.edu.au)
Home > Equity and Diversity - Guidelines
Equity and Diversity - Guidelines
1.70.01c
1.70.01 Equity and Diversity [2]
Approval Authority:
Pro-Vice-Chancellor
Last Approval Date:
June 2017 - Administrative updates to links, legislation, governance and nomenclature. May 2018 - URLs updated. December 2018 - Nomenclature update.
1. Purpose and Objectives
These guidelines outline key areas for consideration in implementing the principles contained within the Equity and Diversity Policy.
2. Definitions, Terms, Acronyms
EDI – Senate Committee for Equity, Diversity and Inclusion
3. Guidelines Scope/Coverage
These guidelines are relevant for staff and students of the University and provide information on key aspects to be considered in regard to embedding equity and diversity in day-to-day practice.
4. Guidelines Statement
Embedding equity and diversity in all areas of the University's operations is a fundamental principle reflected in The University of Queensland Strategic Plan [3]. This is based upon leading practice and will assist in meeting the University's goals in this area.
These guidelines are not intended to limit embedding equity and diversity within the areas outlined below but rather address areas of particular importance. Resource material and information for staff can be accessed via the Workplace Diversity and Inclusion website. [4]
5. Key Implementation Areas
5.1 Planning
The University of Queensland Strategic Plan is the key document in the University's cycle of planning and accountability. The University's key priorities in regards to equity, diversity and inclusion are embedded in the UQ Strategic Plan and associated Operational Plans.
Reference should be made to data available on the University's Reportal [5] and to relevant information provided on the Workplace Diversity and Inclusion website [4].
5.2 Committees
The Senate Committee for Equity, Diversity and Inclusion (EDI) addresses equity and diversity policy and governance within The University of Queensland and reports to Senate on these matters.
Other ad hoc equity and diversity committees have been established at the University.
While these committees are specifically related to equity and diversity, it is the responsibility of all committees within the University to be mindful of equity and diversity issues
Committee Chairs should endeavour to compose committees
with a gender balance (with at least 25% representation from the minority gender); and
that reflect the broad diversity of the University community (eg ethnicity, age, disability);
and ensure that they, and committee members, have attended relevant staff development (for example, recruitment and selection, equity and diversity-related programs).
When bodies external to the University are invited to nominate members to Faculty Boards and other relevant major University committees, they should be asked to note the University's interest in increasing the proportion of women on its decision-making bodies and be invited to consider nominating women with relevant experience, as well as men.
5.3 Inclusive language and images
The University requires the use of inclusive language and images. Inclusiveness ensures
a diversity of cultures, genders, perspectives and experiences are represented; and
an absence of stereotypes, discrimination or harassment.
Workplace Diversity and Inclusion has developed a Guide to Using Inclusive Language [6], which is available from its website. Inclusive language assists respectful communication about and between people from diverse backgrounds.
Teaching and staff development materials, publications and websites should ensure that where people are featured, there is a diversity of images (for example, gender, cultural background, age, disability) and stereotypes are avoided.
5.4 Inclusive curriculum and assessment
University staff should ensure that curriculum and teaching and learning practice is inclusive in relation to
teaching and learning for students; and
staff development.
In addition, curriculum should reflect the University's commitment to providing its graduates with ‘ethical and social understanding’:
an understanding of social and civic responsibility;
an appreciation of the philosophical and social contexts of a discipline;
a knowledge and respect of ethics and ethical standards in relation to a major area of study; and
a knowledge of other cultures and times and an appreciation of cultural diversity (see PPL 3.10.05 Graduate Attributes [7]).
In assessment, where practical, the examiner should not be aware of the student's identity. It is recognised that there are some instances where this cannot occur (e.g. oral examinations, very small classes) (see PPL 3.10.02 Assessment [8]).
In some instances, an alternative academic program may be required for a student with a disability (see PPL 3.50.08 Alternative Academic Arrangements for Students with a Disability [9]). This will be incorporated within a student's Student Access Plan [10].
Pro-Vice-Chancellor Professor Tim Dunne
Source URL (retrieved on 2019-07-17 09:10): http://ppl.app.uq.edu.au/content/equity-and-diversity-guidelines
[1] http://ppl.app.uq.edu.au/print/node/498
[2] http://ppl.app.uq.edu.au/content/1.70.01-equity-and-diversity#Guidelines
[3] http://www.uq.edu.au/about/planning
[4] https://staff.uq.edu.au/information-and-services/human-resources/diversity
[5] https://mis-xi4-web.mis.admin.uq.edu.au/BOE/BI/
[6] https://staff.uq.edu.au/information-and-services/human-resources/diversity/commitment/inclusive-language
[7] https://ppl.app.uq.edu.au/content/3.10.05-graduate-attributes
[8] https://ppl.app.uq.edu.au/content/3.10.02-assessment
[9] https://ppl.app.uq.edu.au/content/3.50.08-alternative-academic-arrangements-students-disability
[10] http://www.uq.edu.au/student-services/Disability+policies
[11] mailto:'+'pvc.executiveassistant@uq.edu.au'+
|
cc/2019-30/en_middle_0014.json.gz/line318
|
__label__wiki
| 0.593835
| 0.593835
|
The Father of the Rice Revolution and current holder of the UNESCO chair in Eco-Technology
Prof. M. S. Swaminathan
Delivering the 4th Prem Bhatia Memorial Lecture on Media, Hunger & the Environments at India International Center on August 11, 1999. Prof. Swaminathan said first there was a need to force the Central and State Governments to initiate a special programme for eliminating maternal and foetal malnutrition to ensure that hunger-induced incidence of low birth weight children did not occur in the new century.
Expressing surprise that an active press was much less effective in moving governments to act decisively against the enademic under-nutrition and deprivation which today affected nearly nearly 300 million people. The media also had not been effective in generating the necessary political and public action to prevent intra-family inequalities in health care, medicine and nutrition resulting in excess female mortality rates.
Talking about the role of media in environmental protection, Prof. Swaminathan said the issues now found regular space in the media. In fact, the media and the judiciary have become the primary guardians of the ecological security of the country, he said public interest litigation has become a powerful tool for fighting eco-destruction.
Stressing the need for a sustained compaign now to protect environmental assets at the micro level, Prof. Swaminathan said regulation through legislation, education through the mass media and social mobilisation through grass-root democratic and voluntary institutions were all essential for the conversation and enhancement of natural resources.
Environmental health, he said, was the foundation for sustained economic progress and the security of work opportunities. India has the opportunity for demonstrating the pathway to a sustainable and humanistic civilisation tooted in the principles of ecology, gender and social equity.
“We should neither worship nor discard technologies because they are old or new. What is important is to use knowledge and skills in a manner that children can be born for happiness and not just existence,”
< Indian Economy : Present State, Future Prospects
Press Freedom: Problems, Perils & Paradoxes >
|
cc/2019-30/en_middle_0014.json.gz/line320
|
__label__cc
| 0.623149
| 0.376851
|
Fluff 'n' Stuff
Phoenix Gamers 40k :: General Discussion :: Game Discussion
Guest on Fri Apr 30, 2010 4:34 pm
I liked the idea of Scott and his special fluff with his army so much that i did my own. Though this takes a nerdy game and makes it nerdier, if anyone else would like to post their personal army's back stories or tales of their heroes triumphs (beefy mcfist has a very long saga) i personally would enjoy to read them.
Also Scott i only ever got the jest of your army so i'd like to know a little more detailed.
Re: Fluff 'n' Stuff
Lady Gaga bested Ghaz three times...just throwing that out there.
Guest on Sat May 01, 2010 1:01 am
that is an achievement to be proud of :]
truly- them dang faith points.
my fluff was born form the desire to keep my themed army and still play the blood angels rules- they fit both my style and theme
Capt. Santiago is my creation- back story is Santiago is spanish for james, which is my dad's name. his fluff isn't done yet. game play wise hes had many variations, but now because the capt. options for angels suck horribly, i proxy him. He is the Mephiston of my army, representing him getting stronger (though there are drawbacks to him, which i like- keeps it characterful.)
I also plan on creating new characters to proxy the offical angels one- Veteran Sergeant Desmond in place of dante, and a few others.
to explain the powers the chapter has, i needed to come up with an alternative to the red thirst,the curse, and the black rage. i'm not into that stuff so much, so i put personal spin on it.
I'll post the fluff i have i suppose.
Last edited by Lil Finnigan on Sat May 01, 2010 1:31 am; edited 2 times in total
The Harbingers
At the time of the great apostasy, the Inquisition secretly created a new line of Astartes from the gene seed of the Imperial fists, with the intent of sending them to reorganize and colonize the worlds lost in that time. After claiming several worlds, the new Chapter dubbed the Reclaimers came upon the Aria system in the Gothic Sector held by Chaos renegades.
After years of fighting to preserve the system and liberate it, the Inquisition called for exterminatus. This the Reclaimers refused, as fully half the chapter had been eradicated in the campaign. To leave the people for which these brethren had died to purgation was not an option.
In a last, glorious series of attacks led personally by Chapter Master O’Rielly, the remaining brethren brought the dug in cultists and chaos warbands to heed. The people enjoyed liberation for the first time in centuries, and the Reclaimers set to work organizing the governing powers.
As they began to rebuild, Inquisition ships entered the system. Sensing a conflict, O’Rielly gathered his troops and began to evacuate as many as he could, with the 4th, 8th and 9th companies supporting. As the first few thunderhawks reached outer atmosphere, the Inquisition released its full measure of firepower, destroying the forces still deployed on the surface, along with every life just delivered from bondage. Every planet in the system was wiped, and an accusation of heresy leveled at the O’ Reilly and his chapter. This became known as the Aria’s Passing, and is a focal point of doctrine for the chapter.
As O’Reilly struggled to re-group, the imperial fleet opened fire, forcing him to retreat to his cruisers and make the jump to warp.
Recorded as lost, the chapter did not resurface. The Inquisitior heading the operation, Xasier Toreille, saw personally to the erasure of historical evidence of the Reclaimers. Assuming control over the liberated peoples of nearby systems, Torielle placed himself in control over what the Chapter had sacrificed of itself to create. In the name of the Inquisition, he gained instant access to all the resources of the combined system.
Aria had long been exposed to the influences of chaos, with ancient artefacts buried on its surface, and secretive cults hiding among its people. Though the campaigns raised by the Reclaimers purged this taint to near nothingness, traces were left. Torielle, with intentions unknown, began to dabble in the harnessing of these powers. Perhaps this was his goal to begin with, and latter was tried as such. Before his execution however, he escaped with the aid of this new found abilities granted by the forces of chaos.
Pitching Aria again into the maw of destruction, Torielle assembled forces to combat the incursions against him. A stalemate developed, as the Torielle had a great knowledge of the system, a system far from nearby aid. So the siege began, the imperium unable to directly attack and Torielle unable to leave his.
It was futile however, as Torielle soon discovered how to exploit the warp to open new means of dodging the blockages surrounding him. With the orbital defense systems keeping the spread-thin forces at bay, he was free to continue his exploitation of the people.
With help months away and their own forces worn to nothing, the small imperial kill-force was on the verge of declaring exterminatus when the Warp opened as it had 53 years prior. Forth spewed the batted ships of the Reclaimers. Without transmission or word of warning, they descended past the ill-prepared defense batteries. Many reason it was the lack of firing protocols that disallowed proper targeting against the Reclaimer ships, the brethren having constructed the system themselves. Others accredit the Emperor’s grace. Whatever the case, this breach lead to a spectacular planet fall.
Landing in the mid capital zones, the forces though lost disembarked their charge. From his tortured Thunderhawk strode O’rielly himself. At once grim yet shinning with holy fire, he led his remaining brethren to Torielle’s unholy sanctuary.
They would have been lost if not for the renewed vigour of the Imperial strike force at their back. Together, though Torielle and his forces were hell-spawned and strong, they drove them back until they found the heretic and his guard.
O’Rielly was outnumbered and weary, yet something else drove him. Some inner force empowered his every blow, and he seemed to visibly radiate his vengeful spirit. Striking down Torielle, he delivered Aria again unto freedom.
As the the Imperial Forces gathered, the Inquisitorial ambassadors could barely speak to inquire of the strange reappearance of the Master and his chapter. The brethren still standing were charged with such an undeniable aura of power that those around them nearly cowered in fear. Taking up his tansport again, O’Rielly quickly left the Inquisition to oversee the ordering of the capital.
O’Rielly somehow seemed to know of Torielle, his guilt and power, and how to overcome him. He offered no explanation, but simply set to work ordering his chapter, and securing his system.
And so five decades later, an aged and battle scarred O’Rielly led his finest in a daring mission to capture and bring to justice those of the Inquisition responsible for such an offense. Cleared of charges, the Chapter renamed its self the Harbingers of Dawn, or Harbingers in honor of the title the now long dead liberated called their rescuers.
Mission and Doctrine
Because of past experience with the Inquisition and the other branches of the Imperium, the Harbingers have become more independent minded in doctrine than their peers. They see the Imperium as a sprawling, broken and aimless giant, uncaring of its people. They hold the Emperor as their insightful king of great power, but recognize his weaknesses. They depend on him as there is no other power to look to, but hold more faith in what their brethren and their cause than in blind faith preached by a power hungry Ecclesiarches. The Emperor’s dream of unity and a perpetuation of mankind can only be achieved through the people, not through their manipulation. To the chapter, The Imperium is a force to be allied with, not wholly assimilated.
As the Imperium is more than happy leaving the Astartes to their own beliefs, there is little friction between the chapter and the Administratum. Indeed, even the Inquisition has counted upon the Harbingers in the past. But this by no means is to say they don’t have their suspicions…
From its creation, it has been the intent and mission of the chapter to liberate, and this remains today. The Harbingers have no central homeworld, but several that together form an alliance with the Harbingers. They may draw upon forge worlds, aggri worlds, and hive cities for support in their campaigns to free more worlds from the dominating powers of the alien, the tyrant, and the ever encroaching powers of Chaos. In return, they are pledged to protect these worlds, should they be threatened from within or without. Indeed, there have been occasions when the chapter has had to purge corruption from its own worlds.
Organization of the Harbingers
Varying in both great and small measure from the Codex Astartes, The Harbingers put a large emphasis on the strength and capability of each company. Since Aria’s passing, the chapter has not rebuilt the 4th, 8th or 9th companies, in honor of those brave brethren. Instead, each company is larger than 100 strong, compensating their numbers. In addition, each company produces and keeps its own veteran squads, and trains its own recruits, eliminating the need for a 10th company. Some even enjoy the complimented support from worlds they have liberated, such as the 7th company, that receive a good amount of their manufactured supplies from Crexus Prime, a highly efficient forge world. In control of many STCs and building protocols, they are independent of Mars, and supply their chapter with the means to conduct their wars.
Each company is not independent of its peers, but rather self-sufficient. They rally under the same banner, yet each have their own holdings for their respective campaigns. As such, each is a tightly knit group, veterans fight alongside each other for centuries.
Scouts are drawn from liberated and maintained worlds, trained as per codex, and added to the respective companies. Servitors are automated AI constructs built and monitored by the tech-marines of the chapter, to the distain and suspicion of other chapters. Every company maintains its own collection of relics, artifacts, and heraldry, including suits of tactical dreadnought armor and ancient weapons.
Veterans from each company are kept in the company, promoted alongside their brothers. Sterngaurd, Vanguard, and terminator squads come directly from the ranks of the company’s own.
The Halo Deviance
When Master O’Rielly made his return to liberate Aria once more, he was said to radiate power, to the point that it could be felt around him in a concentrated cloud of determination. Indeed, since the rebuilding of the chapter, there have been many accounts of the same, when brethren of the Harbingers have been described similarly- as aggressive, power encompassed crusaders, wreathed in energy as they make their charges or defend their fallen brethren.
This, unlike many supernatural accounts, is explained by scientific fact. It seems that while trapped in the tides of the void the brethren and their gene seed warped to develop a curious psycho- sensitive enhancing property. Referred to as the Halo Deviance, thanks to the radiating light their gene seeds emit, this seems to empower the brethren in many ways.
Linked unexplainably to what seems to be both the subconscious and the soul itself, the Halo deviance allows for the physical (through the gene seed) to interact with the spiritual being through the subconscious synapse. When a marine is emotionally incited to anger, for example, it appears the Deviance draws power from his spiritual power to augment his physical power. Thus a soldier inspired to avenge a fallen brother may double his strength, increase his fortitude, and speed his assault, through an empowered feat of will. He finds the very real power in himself, and draws it out.
Unlike psychic abilities shared with thousands of others, the Deviance is not a conscious power that can be called upon at a moment’s need. Instead, it is better thought of as an augmentation of one’s spirit or will, whether that emotion is manifest by anger, courage, or determination. Indeed there are few psykers among the Harbingers- it is thought that the Deviance blocks these abilities from all but the most powerful psykers.
And so the Harbingers are the bringers of dawn. While the gene seed of the chapter makes them appear outwardly grim and dark, when inspired to great works the brethren will begin to radiate power- their eyes will alight, their countenance and surrounding aura profoundly bright, and they are changed for a moment to new level of power.
This is not without price however. For those who experience increase are always tempted by greed. Those who know power feel corruption. And so it is with the Deviance- a brother who feels the power of his very self being multiplied must keep these things in check, for to abandon reason to emotion complexly invites a loss of control and a rational thought. This left unrestrained can lead brethren to grow to immense abilities, where the Deviance begins to compromise them. Their every blow is devastating, every word a heralding echo, with the eventual inability to draw the line. Insanity and meltdown happens as the soul is put into overdrive and the body cannot continue. Thus the brethren become martyrs for the most noble of deeds and battles. It is both a blessing and a curse then, the Deviance. It must be controlled- the power it grants is immense.
There are no battle librarians in the ranks of the Harbingers. To combine the prowess of a psyker and the might of the Halo Deviance would be devastating and dangerous. This rift is filled by sanctioned psykers conscripted from liberated and allied worlds, while combat abilities of the Martyis Proxy graduates (or rather survivors) are more than comparable to the Librarians of other chapters.
Indeed, to attain the rank of Captain, one must harness and control the power of the Deviance. To be able to physically withstand the pressures of a mortal shell powered by the very soul is a rare feat to be sure.
The Martyris Proxy
Those that are alight with the determined fire to avenge, defend or purge can become so charged that they must go to where they can be of most worth- the heart of battle. Brethren that have lost the ability to keep the charging of their war-spirited souls in check are given the chance to either expire on the battlefield in glory or satisfy this emotional need in death defying deeds.
The brethren lost on Aria have never been forgotten, their acts of selflessness and courage recorded in many tomes within the Reliquary. These names hold special meaning to the Harbingers- each is a hero.
When a battle-brother joins the Martyris Proxy, they are adorned in scripts and seals bearing the names of the fallen brethren, both old and new. In this way they bring them to battle and glory eternally, and are there when the battle-brother lays low his life.
As each brother is infused with a fierce determination multiplied and manifested by the Deviance, it is rare that those who survive the battle to be able to long endure after. So it is that the Martyris Proxy is held in the highest respect among the chapter- they personify the ideals of the Habinger’s doctrine.
Arraignment and heraldry
As befits their character, the chapter colors are predominately a dark blue grey, simple and dark. By contrast, they brethren wear a lighter grey then a shining white, with lastly a gold trimming accenting their mindset: Brightness and hope only after a dark despair.
The Defender’s Shield and Cross is their emblem, signifying the devotion they feel to their people and to those the ally with. Truly, for a battle brother to don the shield and cross is to make their oath to brother, chapter, humanity and its allies.
Well fuhh.. who wants to follow that?!
you do- lets hear about the outcast wolves!
The 14th. The Sons of Russ and the Chosen of the Wolf. The Outcasts of the Space Wolves started with their Leader, Wulfgar Spellbreaker, The Bane of the Thousand Sons. Wulfgar was once a promising young Wolf Guard for the Lord Engir Krakendoom. He was assigned to assist the Company's Wolf Priest in training the new recruits. But on a routine patrol their Thunder Hawk received a distress call from a near by Coven world belonging to a chapter of The Benevolent Hand battle sisters, upon making planet fall the new recruits fast learned of a powerful contingent of Thousand Sons led by the Outcast Sorcerer himself, power behind the empty husks that the Thousand Sons had become, Ahriman.
Ferocious and Headstrong nature was their ultimate downfall, the young Fenrisian Warriors charged straight through the heart of the enemy with devastating results but the advantage of their surprise assault soon tore them asunder. A hail of psychokinetic gun fire tore all in their wake to gore. Only Wulfgar was left standing, covered in the blood of his fallen comrades he gripped his power sword in one hand and the Crozius Arcanum Axe of his fallen mentor in the other.
He swiftly tore through a score of Admantium husks on his rage fueled path to the heart of the battle, where the Cannoness of the Sisters, Lady GaGa, dueled with Ahriman. With a roar so loud that the stars themselves shook in his wake as he managed to slide his Power Sword right through one of Arhiman's two hearts. With a large blast of warp energy he retreated to his Star Cruiser grievously injured.
Wulfgar collapsed into a hump of blade wounds and bolter holes and his transformation had begun, revived by the Sister Superiors of the Coven, Wulfgar struggled with terrible visions and horrific pulses of warp energy through him. The blast from sundering Arhiman had ripped Wulfgar's mind asunder and forced raw psychic energy to fill the void.
He managed to keep his new found power secret long enough to return to his Battle Brothers on Fenris. He soon discovered he had the amazing power of Foresight, so craved by the Astropaths of the Chapter. But instead of visions of heroic deeds and honorable battles, Wulfgar saw only death and extermination in the future for the Space Wolves. Attempting to preach the doom of the chapter only angered the Twelve Lords and a consequential skirmish saw Wulfgar banished.
Though his message still reached to some, several smaller Wolf Lords formed as his personal Disciples and formed the Pack of the Lone Hunter. Together these powerful tacticians, warriors and psykers travel the galaxy upholding an honor to defend all in need, and sift any promising recruits along the way. Recruiting outside their traditional Fernisian Warrior Pool makes many uneasy but Wulfgar knows the coming threat is very real. He scours data archives and vox channels in search of Lone Wolves on their exiled Path to Redemption to form his personal Body Gurad and guides to the new in the ways of the wolf.
Their crusade for honor and fresh bodies readies them even more for when the day finally comes and the Space Wolves won't be enough to save Fernis from ultimate destruction, Wulfgar will lead in his personal Land Raider; The Lupercale straight into the heart of any foe. He and his Renegade 14th Company shall reign fire from the sky and bring the fury of Russ upon all who hope to snuff the light on mankind out.
Fleet No. 328448
Lil Red on Tue Jun 01, 2010 7:43 am
Location: Astroid Gryphone III
Commander: Basil (last name unknown)
General: Ambrose the brother of Basil, Directs the front lines.
Gryphone III is an astroid in orbit just outside Ambrose and Basil’s home world Gryphone IV. Gryphone III’s Volcanic activity has made nye uninhabitable. Gryphone III’s worth comes from the fact that the Tyranids must first pass by Gryphone III before they can attack any other Imperial planet in this region. Because of this Gryphone III has become the Emperors first defense.
Far from any reinforcements the emperor has allowed for the Imperial Navy to overlap with the ground troops in the region. Because of this alliance Commander Basil and his predecessors have been able to hold off the Tyranids for more than 100 years.
Commander Basil and his brother we both born on Gryphone IV. From a young age they both showed great abilities in the art of war. Their father was one of the Cadian shock troops assigned to Gryphone III and spent most of his life leading the battalion in his region. It was because of his valor that Commander Breech looked into his children. Basil was the older of the two boys but by far the smaller. What he lacked in size he more than made up in wit. He on more than one occasion was thought to be the master mind behind many of the school pranks, although no one was ever able to prove it.
What basil was mentally his younger brother Ambrose was physically. He quickly gained a reputation of being “invincible” in combat. The brothers at the age of 13 and 12 respectively enlisted into the military. By the age of 14 both we in command of the regiments and by the age of 16 both were stationed along side their father on Gryphone III.
Four years into their stay on Gryphone III is when things changed. Never before had the Tyranids swarmed down on their defenses as they did that night. It took the Imperium more than 18 months to fend off this attack. When the dust settled Commander Breech had fallen to the sword of the fleet’s swarmlord. Along side Breech’s remains was Basil and Ambrose’s father. More Unexpected however was that Ambrose being Basils spear had slain the swarmlord and the brothers with their regiments had pushed back the tyrannic invasion.
Basil was made Commander over the Gryphone III and the two brothers have spent the last 8 years defending it and the rest of the empire from the Tyranid invasion. Basil has spent the last few years trying to capture and brake the link between the Hive Mind and a tyranid. Although it is impossible to ever “train” a tyranid, he has been successful at braking some of it’s ties to the hive and at times “pointing” it in the directions of Basil’s enemies and thinning them out before the guard fall upon them.
I've tried not to end the fluff on purpose so that I can keep it moving forward as my army progresses (and I do as well). As I pick a solid playing style I will incorporate it into my fluff.
Guest on Tue Jun 01, 2010 3:21 pm
I liked it, is that fluff behind your two armies? Guard and Nids that you're going to start?
Lil Red on Wed Jun 02, 2010 12:54 am
Yeah, the guard are by far my favorite army and really play to my style. I also love the look of the models and their tanks. They will 9 times out of 10 be the army I field in a tourny. However playing the same way every time can get boring and so I'm working on another list that is competitive with the guard and on top of that I'm going to slowly collect some nids. I like the idea of a massive swarm rushing an opponent to get into melee, as well as outflankers and flyers and MCs and no tanks. It will be almost 100% different than how I play now.
I'll try and update the post as my army progresses. This tournament should be fun to add the first chapter in their fluff.
I also tried to set it up and look like an actual IG writing style, for the Nids I think I am going to give their fluff as if it's Basil's journal. This way I can give things names (which the Nids lack in) and it will make sense why they even have "fluff." Some of the things I'll have to set up as if Basil heard it from another follower of the empire (when the nids playing anything other than guard) which will make the journal entries fun and unique as well as allow me to customize the units in the army. I won't lie a lot of my models etc.. from here on out will just be for fun and to try something different.
Lil Red on Wed Jun 02, 2010 1:00 am
Marshal do you have fluff for your eldar as well?
Guest on Wed Jun 02, 2010 4:10 am
I sure do, but its kinda weak so far.. Do those two brothers fill in for any SC's? Like Santiago is Mephiston and Wulfgar is Njal??
Yeah Basil is creed, I'm not 100% sure where I want to put ambrose yet.
Guest on Wed Jun 02, 2010 12:44 pm
Straken!!
Guest on Wed Jun 02, 2010 3:30 pm
Dude I like it! that sweet shiz! holy cow now you have to make them some sick models!
Guest on Tue Jun 22, 2010 1:18 am
basil and ambrose are cool names too. where did kennan post his stuff?
I don't think he has yet!
i thought he said he had...
He said he was gonna but he hasn't :[
chaos ftw
Zac Nelsen on Fri Jul 09, 2010 2:12 am
Well I have yet to name my legion of chaos but it is led by the sorcerer Hastur the king in yellow (cthulu stuffs) and have close relations to huron blackheart and his pirates along with a band of the sons of malice and their daemon prince leader The Prince of Madness, bringing along with them their deep seeded hate for the self righteous, hippocritical, (and sometimes extreemly evil!) Imperium. My fluff is mostly just for the specific squad but ill just run down the line. Hurons's dark wolves, a squad truly blessed by slaanesh, they fell to chaos as huron contacted them, convincing them to betray their fellow wolves on the ship the wolf of fenris (once a great ship for the space wolves now commanded by huron and his pirate fleet) they could not resist the promises of riches, honour, and most of all, martial prowess from slaanesh. My thousand sons have all traded their souls for protecting wards and unholy magical powers to hastur, they got their wishes but as time went by their debts were due, they now live in a state of insanity, hollow shells of the once proud space marines, personal guard of the scorcerer rhasputin, who instead sacrificed the lives of his entire space marine platoon for even greater powers and near immortality (he stood up to the avatar and lived!) The khorne berserkers I have, named the Shadows of the Warp once part of the infamous world eaters, after a massive slaughter of eldar only 9 warriors stood left, led by the great lord Ali Raza gifted with his daemonweapon "Banshee's Cry" and his apprentice Ceasar they were found by the King in Yellow himself. In his mad ramblings The King told him to go to a hidden altar of khorne deep in a forrest and fall on their own blades and they shall be immortal. Ali convinced his band of warriors to follow him into the decent of madness they did as The King told them. A massive implosion errupted sucking inn the altar and the warriors alike to the throne of Khorne himself. Khorne was indeed pleased and granted the souls of the warriors the ability to manifest themselves in the physical world as shadows and murder and slaughter as they please with no chance of harm (as they have no physical form to harm) as they die their apperitions simply vanish into a black cloud of fire (think zealots on starcraft except darker) Those that manage to excape with their lives seldom excape with their sanity as they are haunted by shadowy figures slicing, chopping, and stabbing away at their souls and often find themselves falling to chaos (and even in the dark clutches of Hastur himself, mere pawns to his greater gouls). I still have some fluff to work on, such as my chaos dark angel, my death guard, and maybe even noise marines, ill post it when its done
spelling n stuff
I reqlize my english is horrible but its 1 am, I can't sleep, and have had unholy amounts of mountain dew today so don't blame me
I play Hastur the King in Yellow, as Ahriman. Not much is known about him except he is an unmatched psyker and he is not, nor never was a space marine. Even the superhuman form of a space marine is far too frail and weak to contain the sheer psychic power and knowledge of Hastur. It is rumored that the form of the great king is merely an avatar of something much greater in the warp only a select few that he has trusted (such as the immortal Prince of Madness and the ever loyal Rhasputin) have true knowledge of what he is. Hastur is, he always has been, and always will be. But it would be no fun to keep his secret to myself now would it? Hastur is the Chaos God of Insanity. He doesn't take place in the other god's petty fights for dominance, he is a true sorce of power, respected by all 4 gods, and his followers are the truely gifted (and also of course, completely insane) worshipping him will not only receive his favor, but depending on what they desire, will gain gifts from the other gods I. E. Ali Raza and the Shadows in the Warp
Guest on Fri Jul 09, 2010 3:12 am
whoa awesome! i like it- god of insanity eh?! hideous!
» Trade: Xmas Holiday Stuff!
» Dalu's Stuff and Nonsense
» Free Fantage Stuff!!!
» Firefox 4 - Mybrute stuff
|
cc/2019-30/en_middle_0014.json.gz/line324
|
__label__wiki
| 0.760445
| 0.760445
|
Skip to Navigation Menu
About the Pinjarra Alliance Church
Pinjarra Alliance's Story: The C&MA was founded in 1887 by Dr Albert B. Simpson, a Canadian with a burning desire to reach the lost in every part of the world. His biography may be found in Wingspread, by A. W. Tozer. Also more history of the Alliance can be found on-line at: www.cmalliance.org
Pinjarra Alliance Church began when Rev Bob Henry, our first National Director, met the Mullins family at a Keswick Convention in 1973. The Sherlocks and the Mullins families responded to the Alliance vision and began travelling some 80K to Perth each Sunday for worship. Pastor Noel Blyth began weekly afternoon worship meetings in the Pinjarra CWA hall in July 1975.
Pinjarra became an 'unorganised' Church in March 76 and Rev Ken and Leonie Iskov accepted a call to pastor this work in July '76. A very small group of families stepped out in faith to purchase two blocks of land and two buildings in Feb 78, the year that the church became known as 'Pinjarra Alliance Church'. The story of how God secured this property is truly amazing. And in the Year 2000 the church began a new building program, looking to expand the current facilities and build a new meeting centre.
Worship services were held in a number of venues. The local High School drama room was used from '81-'92, much of this time under the ministry of Roger and Helen Lang. Out last pastor served from Feb '86 and retired in December 2012, before the Reverend John Coman and his wife Maria, in August 2014, were welcomed into the pastorate.
Pinjarra Alliance has been characterised by a deep love for one another and sacrificial giving. Many official workers have been sent out from Pinjarra, most recently Carolyn Hawkes and Peter Thomas You are always welcome at our services.
For more information, contact the church on 08 9531 3173 or our pastor on Mob: 0402033285, or send us an e-mail requesting information. If you would like to discuss any thing about the church or what it means to have a relationship with Jesus, call the church office or email us cmalliance@westnet.com.au.
Follow PAC
© 2019 Pinjarra Alliance Church. All Rights Reserved.
Website by Templeman Twells Web Design
|
cc/2019-30/en_middle_0014.json.gz/line328
|
__label__wiki
| 0.751338
| 0.751338
|
The Other Side of the Story: Frankly, I'd Rather Spin Myself a New Name
The Story of Rumpelstiltskin as Told by Rumpelstiltskin
In Stock Now - Ready to Ship
Author: Jessica Gunderson
Illustrator: Janna Bock
Series: Other Side of the Story
Rumpelstiltskin's spinning skills are legendary, but what's the little man's story? No one better than Rumpelstiltskin himself to shine a golden light on this delightful twist on a classic fairy tale.
Of course you think I was a sneaky little man, tricking a poor, sad girl into giving me her baby. You don't know the other side of the story.
Availability: In Stock Now - Ready to Ship
More by Jessica Gunderson
Other Side of the Story: No Lie, Pigs (and their houses) Can Fly!
The Other Side of the Story: Believe Me, I Never Felt a Pea!
The Other Side of the Story: Trust Me, Hansel and Gretel are Sweet!
The Other Side of the Story: Frankly, I'd Rather Spin Myself a New Name!
The Other Side of the Fable:The Lion and The Mouse Narrated by The Timid But Truthful Mouse
The Other Side of the Fable: The Tortoise and The Hare Narrated by the Silly But Truthful Tortoise
The Other Side of the Fable: The Ant and The Grasshopper Narrated by the Fanciful But Truthful Grasshopper
The Other Side of the Fable: The Boy Who Cried Wolf Narrated by the Sheepish But Truthful Wolf
The Other Side of the Story: Honestly, Little Red Riding Hood Was Rotten!
The Other Side of the Story: Trust Me, Jack's Beanstalk Stinks!
The Other Side of the Story: No Lie, I Acted Like a Beast!
The Other Side of the Story: Seriously, Snow White was so Forgetful!
The Other Side of the Story: For Real, I Paraded in My Underpants!: The Story of the Emperor’s New Clothes as Told by the Emperor
The Other Side of the Story: Honestly, Our Music Stole the Show!: The Story of the Bremen Town Musicians as Told by the Donkey
The Other Side of the Story: Listen, My Bridge Is SO Cool!: The Story of the Three Billy Goats Gruff as Told by the Troll
The Other Side of the Story: Truthfully, Something Smelled Fishy!: The Story of the Fisherman and His Wife as Told by the Wife
The Other Side of the Story: Believe Me, Goldilocks Rocks!
Other Side of the Story: Red Riding Hood was Rotten
The Other Side of the Story: Seriously, Cinderella is so annoying!
The Other Side of the Story: Trust Me, Jack's Beanstalk Stinks
The Other Side of the Story: Truly, We Both Loved Beauty Dearly!
The Other Side of the Story: Really, Rapunzel needed a Haircut!
The Other Side of the Story: No Kidding, Mermaids are a Joke!
The Other Side of the Story: Frankly, I Never Wanted to Kiss Anybody!
The Other Side of the Story: No Lie, Pigs (and their houses) Can Fly!
The Other Side of the Story: Believe Me, I Never Felt A Pea
The Other Side of the Story: Trust Me, Hansel and Gretel are Sweet
You Choose Fractured Fairy Tales: Cinderella
Tangled History: The Wound is Mortal - Assassination of Abraham Lincoln
Tangled History: Wound Is Mortal
Babysitter Chronicles: Olivia Bitter, Spooked-Out Sitter
You Choose: Fractured Fairy Tales: Sleeping Beauty: An Interactive Fairy Tale Adventure
Sports Illustrated Kids: I Broke into Gymnastics Camp
Phobia: The Creeping Clown
Your Life as a Cabin Attendant on the Titanic
Your Life as a Cabin Boy on a Pirate Ship
Your Life as: a Private on the Lewis & Clark Expedition
Your Life as: a Pharaoh in Ancient Egypt
Wacky Ways to Compare: How Long?
Wacky Ways to Compare: How Big?
You Choose: Ancient Greek Myths: Olympians vs. Titans: An Interactive Mythological Adventure
You Choose: Fractured Fairy Tales: Snow White and the Seven Dwarfs
Greek Myths: Jason and the Argonauts
Perspectives on History: Christopher Columbus
Junior High Drama: The School Musical Meltdown
Multicultural Fairy Tales: Snow White
Multicultural Fairy Tales: Little Red Riding Hood
Multicultural Fairy Tales: Red Riding Hood
Curious Pearl, Science Girl: Curious Pearl Tinkers with Simple Machines
Helping the Environment: I Can Care for Nature
First Science: Sound
Helping the Environment: I Can Pick Up Litter
Planet Protectors: Creature Keeper
Level Up!: Building Virtual Worlds
Academy of Dance: New Moves
|
cc/2019-30/en_middle_0014.json.gz/line329
|
__label__cc
| 0.652652
| 0.347348
|
Comments (2,819 comments)
My Take: It’s time for evangelicals to speak up about guns
Editor’s note: Daniel Darling is a pastor, author and speaker in the Chicago area. His latest book is "Real: Owning Your Christian Faith." He tweets at @dandarling.
By Daniel Darling, Special to CNN
(CNN) - The Bible doesn’t clearly express an opinion on the possession of guns, but many evangelicals defend the unlimited distribution of firearms with the same fervor that they defend biblical orthodoxy. According to a recent Public Religion Research Institute survey, 8% of white evangelical Protestants favor tighter gun laws.
But in the wake of yet another deadly school shooting, it’s time for evangelicals to contribute to the national discussion beyond: “It’s not guns that kill people, it’s people that kill people.”
In fairness to gun enthusiasts, no reasonable observer could pin the blame for the Sandy Hook Elementary School shooting solely on the lack of effective gun laws. Even President Barack Obama and other influential voices have called for a balanced approach that looks not only at guns but also at mental illness, violent video games and a culture of fatherlessness that produces young troubled men. And the research about the effectiveness of gun controls laws seems mixed at best.
Filed under: Christianity • Guns
Rachel Held Evans is the author of "A Year of Biblical Womanhood."
'Bible Belt' meets 'Borscht Belt'
By Michael Schulder, CNN
(CNN)– Something tells me if Rachel Held Evans were my childrens' Sunday School teacher they'd never want to miss a Sunday.
Evans is an evangelical Christian and my family is Jewish.
Evans lives in the town where the term Bible Belt was coined* and my father was a professional standup comic who worked the buckle of the Borscht Belt in New York's Catskill Mountains.
But Evans bridges the divide between the belts in her new book, The Year of Biblical Womanhood, the result of an experiment in which she lived the Old and New Testament's instructions for women as literally as possible for an entire year.
As Evans tells us in this week's audio show, CNN Profiles, she aims to "teach the gospel of Jesus with humor." That's hard to do without offending some people. Evans does have her critics, but she has an ark full of followers too.
Listen to the the CNN Profile of Rachel Held Evans at CNN Radio's Soundwaves.
Filed under: Belief • Bible • Christianity • Leaders
Belief Blog's Morning Speed Read for Friday, December 28
CNN: Hobby Lobby faces millions in fines for bucking Obamacare
Craft store giant Hobby Lobby is bracing for a $1.3 million a day fine beginning January 1 for noncompliance with the Patient Protection and Affordable Care Act, dubbed Obamacare. The company opposes providing some contraceptives to employees through its company health care plan on religious grounds, saying some contraceptive products, like the morning after pill, equate to abortion.
CNN: Justice won't block Obamacare's required emergency contraception coverage
Supreme Court Justice Sonia Sotomayor on Wednesday turned down a request that she block part of Obamacare that would require companies' health plans to provide for coverage of certain contraceptives, such as the morning-after pill.
Hobby Lobby Stores, Inc., and Mardel, Inc. and five family members involved in ownership and control of the corporations had protested the requirement, which is to kick in January 1.
|
cc/2019-30/en_middle_0014.json.gz/line334
|
__label__cc
| 0.645507
| 0.354493
|
!!! Welcome to Prospect Soccer Club !!!
Prospect Soccer Club
(PSC)
"One United Club"
PSC Dynamo CT 2019 Summer Camp
7/7/2019Read full...
PSC families: as in years past: PSC Dynamo program (the premier program of Prospect Soccer Club)
is pleased to invite you to our upcoming summer soccer camp
Register here: http://assn.la/Reg/?r=1:265931 - MUST register by Friday 7/19.
PSC DYNAMO SUMMER CAMP WEEK: August 5 , 6 and 7th 9AM to 1 PM
Hotchkiss Park
Over 90 players already signed up - don't miss your opportunity to participate in this local summer soccer camp!
The training focuses on foot-skills, ball control, game awareness, striking, and agility.
All training focuses on age appropriate field play and team work.
Great player to coach ratio ensuring quality training
Boys and Girls Ages U7 to U19
When: August 5, 6, and 7. Rain date Thursday Aug 8th.
Where: Hotchkiss Park, Prospect CT
Camp Includes: Camp Tee Shirt and a Pizza lunch on Wednesday following camp closing
Sign up for a summer program with great professional coaching.
Monthly Soccer Meeting - Prospect Firehouse
3/31/2019Read full...
!!! Monthly Soccer Meeting !!!
First Monday of every Month
7:30pm off Season and 8pm during the Season
Prospect Firehouse
January 7, 7:30pm
February 4, 7:30pm
March 4, 7:30pm
May 6, 8:00pm
July 1, 7:30pm
August 5, 7:30pm
September TBD, 8:00pm
October 7, 8:00pm
November 4, 8:00pm
December 2, 7:30pm
Welcome to the MiniHawks Program!
MiniHawks is a U4 and U5 developmentally appropriate soccer program for beginning players between the ages of 3-5
Six weekly sessions include the four components of soccer:
* Mental (having fun, sportsmanship...)
* Physical (gross motor skills, balance...)
* Technical (moving the ball, fun games…)
* Tactical (rules of the game, scoring, defending…)
Sessions are held on Monday nights from 5:30-6:15 pm during the Fall and Spring season at Hotchkiss Park in Prospect (a parent/Adult is asked to remain on site during each session)
All players should wear shin guards and sneakers or cleats. (size 3 Ball and jersey are provided)
Thank you for your interest in PSC and we look forward to seeing you out on the soccer field!
For question or to volunteer please please contact Michelle White momwhite8@gmail.com
Referees Information
https://www.ctreferee.net/
Becoming a Certified Ref:
Registration for the Entry Level, or as US Soccer now refers to it, Grassroots, Referee Program is open through the end of August. To register the candidate must turn 13 by 12/31/18. Once the online and in person session, which run through September 9th, are completed the referee can start officiating immediately and will be certified through 12/31/19. Please have the candidates follow the detailed instructions at https://www.ctreferee.net/files/referee_instructions/new_referee_grassroots_instructions_31Jul18.pdf. It is easiest to have the instructions open on one device and complete the registration on another device.
Hopefully, 2019 recertification will open in the next few weeks.
Certified Refs:
There are several in service clinics posted. This year the in service clinics will emphasize the 2017/2018 law changes, US Soccer Small Sided Initiatives, Teamwork and Signals and the phsychology of officiating.
In-House Rec Refs:
Attention current and new rec referees. If you would like to ref rec. games for PSC please plan on attending a mandatory ref clinic at Hotchkiss Park; on Friday, Sept 7 at 6:30 pm. All new and returning Rec Refs should plan to attend. Please bring a whistle if you have one. More dates to come.
Pease inform PSC's Assignor (Heather Iannone - hmiges@yahoo.com) if you wish to become a in-house Rec Ref and also, once you become certified, as she has to update your PSC profile.
Protecting Young Victims From Sexual Abuse and
Safe Sport Authorization Act of 2017
Full PDF Click Here
The Law has a three-pronged approach:
1) Any adult interacting with amateur athletes in the program has a duty to report abuse and or suspected abuse within a 12 hour period (Connecticut). EVERY adult is a mandatory reporter.
2) The statute of limitations in CT is extended 30 years after the minor reaches the age of 18.
3) Limits an athlete under the age of 18 from being alone with an adult who is not their parent.
*What is an amateur athlete? Any child or minor under the age of 18. Legislation is available for download (click here).
What are the requirements for NGB’s and NGB-Affiliated?
Reporting: A mechanism that allows a complaint to be easily reported for a reasonable suspicion of Sexual or Physical abuse/neglect, within a 12 hour period of awareness. Federal regulations state that reports should be made to a) local law enforcement and b) local/state child protective services c) US Soccer, and d) the US Center for SafeSport.
EVERYONE is a MANDATORY REPORTER.
Mechanism for Reporting: Everyone listed below MUST be contacted when physical or sexual abuse is suspected
1) Local Law Enforcement Number (recommended to post on club website and give to athletes and parents)
2) State Department of Children and Families (DCF) 1-800-842-2288 (TDD: 1-800-624-5518)
3) Club Risk Manager Contact Information (every club should have a point person for reporting)
4) State Association’s Main Office - Josh Krusewski, Executive Director, executivedirector@cjsa.org
5) National Governing Body (NGB)
US Soccer Integrity Hotline Number: (312) 528 - 7004
US Soccer: https://www.ussoccer.com/integrity-hotline
US Center for SafeSport: https://www.safesport.org/report-a-concern
Mechanism for Reporting (cont.): Other forms of misconduct such as emotional abuse, bullying, hazing, or harassment.
2) Club or BOD Review/Hearing – There should be a process in place to document and address this other misconduct. The decision of the Club or BOD should be sent to the State Association’s State Office (Josh Krusewski, Executive Director, executivedirector@cjsa.org )
CJSA member clubs and club personnel can access Mandated Reporters Training provided by Connecticut’s DCF in two different ways, one for individuals and one for group sessions:
1) The first, for individuals, is through an on-line training video produced and provided by the DCF and available via the internet. Any interested individual can gain access to the approved DCF video training (it takes about 60-90 minutes to complete) simply by completing a required DCF Inquiry Form available at this DCF link: http://www.dir.ct.gov/dcf/TA/MRT_video_form.aspx
A link embedded in the form will take you directly to the training video after completion of required information.
2) A second way that is open to clubs who would like to provide a group training session to its members is to invite certified DCF personnel available across the State of Connecticut who will provide Mandated Reporters Training to any size group. This service through Connecticut’s DCF is available free of charge to CJSA club and district meetings upon request. To access this type of group training use this form: http://www.dir.ct.gov/dcf/TA/MRT_form2.aspx
CJSA strongly encourages its member clubs to have ALL of its coaches, administrators and volunteers whether they are paid employees of the club or volunteers to take the time to learn as much as possible about this important issue and to take the Mandated Reporter Training at their earliest convenience.
For more information about the work of DCF, please go to the DCF’s website home at: http://www.ct.gov/dcf/site/default.asp.
For specific CJSA related questions on this issue, please contact CJSA
Connecticut Junior Soccer Association
11 Executive Drive · Farmington, Connecticut 06032
Telephone (860) 676-1161 · Fax (860) 676-1162 · www.cjsa.org
HEADING AND CONCUSSIONS
CJSA has adopted the US Soccer and US Youth Soccer recommendations regarding heading and the protocol for suspected concussions. Compliance is mandatory for all CJSA members for all activities where CJSA insurance applies effective April 1, 2016.
Heading Restrictions
Players who are 10 and younger
No player who is 10 or younger may deliberately head the ball, regardless of the age group of the team they are playing on. This includes all activities where CJSA insurance applies, such as practices, scrimmages, and competitions at all levels.
No player on a U11 team or a combined team including the U11 Age Group, (e.g. U11/12), even if the player has turned 11, may head the ball deliberately.
This restriction will be enforced in competitions for teams U11 and younger (including combined age brackets including U11 and younger) by award of an indirect free kick for the opposing team. Coaches and parents are responsible for applying this restriction for players who are 10 or younger and playing up.
Players who are 11-13.
Players who are age 11 to 13 and on teams for age groups U12 and older, are restricted to up to 30 minutes of practice heading the ball per week. There is no restriction on the number of times these players can head the ball in a competition, unless the team is competing in a combined bracket that includes U11.
Concussion Protocol
Where a Health Care Professional (HCP) is Present at a Game or Practice
Any player who sustains a significant blow to the head or body, who complains about or is exhibiting symptoms consistent with having suffered a concussion or is otherwise suspected of having sustained a concussion, must be evaluated on the sideline by an on-site HCP engaged in this capacity for the competition who will perform applicable testing.
Any player suspected of suffering a concussion will not be allowed to return to play until he or she is cleared by the HCP. Coaches, parents/guardians or players may not overrule the HCP.
If a coach seeks to allow a player to re-enter a game who has been removed from a game for a concussion assessment and who has not been cleared to return to play by the on-site HCP, the referee shall issue a warning to the coach. If a coach persists in seeking to allow such player to re-enter the game after having been issued a warning, the referee may take other disciplinary measures against the coach as are permitted under the rules applicable to the competition.
Unless an HCP determined that the player has not suffered a concussion and clears the player to return to play, the player will not be permitted to return to practice or play until the player has successfully completed the return to play protocol and has been cleared to return to play by a Physician.
Where a Health Care Professional Engaged for the Event is Not Present at a Game or Practice
Where a HCP engaged for the event is not present at a game or practice, any player who sustains a significant blow to the head or body, who complains about or is exhibiting symptoms consistent with having suffered a concussion or is otherwise suspected of having sustained a concussion, must be removed from play and evaluated by an HCP before the player will be allowed to return to practice or play.
No coach shall permit a player who has been removed from a game for a concussion assessment to return to play until cleared to do so by an HCP.
Definition of Health Care Professional
Health Care Professional (HCP) are licensed professionals such as an Athletic Trainer Certified (ATC) or Physician (MD/DO), with skills in emergency care, sports medicine injuries and experience related to concussion evaluation and management.
Compliance is mandatory for all CJSA members for all activities where CJSA insurance applies effective April 1, 2016.
11 Executive Drive
Farmington, CT 06032
Volunteering is the ultimate exercise in democracy. You vote in elections once a year, but when you volunteer, you vote every day about the kind of community you want to live in.”
Only with your volunteer help we can succeed at providing an affordable and quality soccer program.
The Prospect Soccer Club (PSC) is a 501(c)(3) non-profit organization that is primarily run through the dedication of its volunteers, from the supporting coaches, to the smiling faces of team managers, down to the members on the Board.
With hundreds of youth participants, PSC relies heavily on your volunteer support to help keep registration fees for its members as low as possible and making soccer available to everyone.
PSC is dedicated to providing the highest quality and most affordable recreational and travel soccer experience to Prospect and the surrounding communities. However we need your help in succeeding this!
All PSC families are encouraged to volunteer during the season.
Whether you have 1 hour or 40 hours to dedicate to volunteering,
PSC has volunteer opportunities for you.
Select where you feel your talents would be best suited:
Board Member, Coordinator Support, Coaching, Communications, Field Support, Game Time, Fund Raisers, End of Season Celebration, and For Children - Community Service
Sign up today -> Volunteering Center Registration
More News Here . . .
Prospect Soccer Club (PSC)
Important Concussion Information
PSC offers three soccer programs: Recreational, Travel, and Premier
For more information or questions about each, please reach out to:
Recreational:
MiniHawks Coordinator - Michelle White <momwhite8@gmail.com>
Recreational Coordinator - Paul Mena <PaulmenaPSC@gmail.com>
Travel Coordinator - Dan Barrows < >
Joe Sousa < >
PSC Dynamo (Girls) - Joe Sousa < >
PSC Dynamo (Boys) - Dan Barrows < >
Additionally, our smart phone users, make sure you get the app for our PYS league athleticssystem. This app provides instant access to team schedules and notifications and it even interfaces with Google maps to navigate you to the away games! Use this link to learn more about the app features and download it today! https://leagueathletics.com/mobile_promo.asp?org=prospectsoccer
The PSC board and coaches meet the first Monday of every month at the Prospect Firehouse at 7:30pm (check PSC web site for time and location - www.prospectsoccerclub.com).
These meetings are open to all; please attend when you can and know that all suggestions that can improve upon our programs are always welcome.
Mail Address: 50 Waterbury Rd. Box 333 (The UPS Store) Prospect, CT. 06712
Web Address: www.prospectsoccerclub.com
Concussion Awareness for Coaches, Parents, Players
Heads Up Concussion - Concussion Fact Sheet for Parents
Section 114 of Connecticut Public Act 15-5, Concussion Awareness in Youth Athletics
Important Concussion Email from CJSA President
Dear CJSA Members:
Earlier this week, soccer’s national governing body, the United States Soccer Federation, announced (see membership notice below) that a resolution has been reached in a 2014 lawsuit filed against U.S. Soccer, Unites States Youth Soccer Association and a number of other American soccer organizations by a group of citizens concerned by concussions in youth soccer.
U. S. Soccer indicates it will announce in the near future, specific details, including a number of new initiatives and recommendations concerning the modification of substitution rules and limitations on heading the ball as well as a more comprehensive player safety campaign U. S. Soccer was working on before the litigation was initiated. We understand that the new recommendations include the elimination of heading the ball by players 10 years of age and limiting heading during any practice session for players between the age of 11 and 13.
CJSA will provide you these details as well as any corresponding timelines for implementation as soon as they are received from the Federation or U S Youth Soccer. Any new updates will also be posted on CJSA’s website at www.cjsa.org.
Since the U. S. Soccer announcement, CJSA has received a number of media requests for comment. CJSA will not be making any comments on this issue until U. S. Soccer provides specific details on these new recommendations and associated timelines. CJSA is requesting that its members also refrain from making any comment and, as requested in the notice, forward any local media inquiries you may receive to Neil Buethe, U. S. Soccer’s Director of Communications at: /312-528-1270.
I would also like to take this opportunity to remind all CJSA member clubs that earlier this year the Connecticut General Assembly passed a new law regarding concussions in youth athletics. This new law requires that as of January 1, 2016, CJSA and each of its member clubs make available at the time of a player’s registration, a written or electronic statement regarding concussions to each CJSA player and their parents or legal guardian. This new requirement was highlighted last August at CJSA’s annual President’s Meeting in Cromwell.
To assist member clubs with this obligation, CJSA has developed and made available on its website a notice which provides information compiled from the materials distributed by the Centers for Disease Control (CDC). Member clubs will be receiving additional information via a separate email.
(http://www.cjsa.org/resource_center/concussion_information)
Maggie Girard
CJSA President
If new to PSC, please create a profile by selecting New Members
Want to Coach? Sign up
Caplan Field - Prospect TBD (7/16)
Hotchkiss Back Field - Prospect TBD (7/16)
Hotchkiss Center Back - Prospect TBD (7/16)
Hotchkiss Center Back Lt - Prospect TBD (7/16)
Hotchkiss Center Back Rt - Prospect TBD (7/16)
Hotchkiss Center Front - Prospect TBD (7/16)
Hotchkiss CenterFront Lt - Prospect TBD (7/16)
Hotchkiss CenterFront Rt - Prospect TBD (7/16)
Hotchkiss LIGHTED Field - Prospect TBD (7/16)
Hotchkiss Right 1 - Prospect TBD (7/16)
Pent Road - Field 1 - Beacon Falls --
St. Anthony's - Prospect TBD (7/16)
In the Past Prospect Soccer Gear
Pullover Black/White Trim Hooded Sweatshirt - Limited Quantity
Black/White trim sweatshirt with Prospect Soccer Logo
|
cc/2019-30/en_middle_0014.json.gz/line336
|
__label__wiki
| 0.867334
| 0.867334
|
Sony PSP 3000 Press Release Reveals New Goodies
September 2nd, 2008, 17:39 Posted By: wraggster
Ok heres the press release in full;
Sony Computer Entertainment Japan (SCEJ), a division of Sony Computer Entertainment Inc. responsible for business operations in Japan, announced today that it would release the new PSP® (PlayStation®Portable) handheld entertainment system (PSP-3000) featuring an advanced high contrast LCD and a built-in microphone on Thursday, October 16th, 2008, in Japan at a recommended retail price (RRP) of 19,800 yen (including tax). The new PSP system will come in three basic colors of “Piano Black,” “Pearl White” and “Mystic Silver,” with plans for additional colors.
SCEJ will also release “PSP® (PlayStation®Portable) Value Pack” for the Japanese market at a RRP of 24,800 yen (including tax), comprising a new PSP system (Piano Black, Pearl White or Mystic Silver), a 4GB Memory Stick PRO Duo™ (Mark2), an original PSP pouch, a hand strap and a cloth to meet users’ various purposes in using the PSP systems such as playing games, watching movies, listening to music and downloading content through the network.
Along with the launch of the new PSP system, SCEJ will also introduce a variety of accessory packs to meet a wide range of users’ lifestyle; “Accessory Pack” will be released at a RRP of 3,800 yen (including tax) and “Battery Pack (2200mAh)” at a RRP of 5,500 yen (including tax). In addition, new peripherals for the new PSP will be introduced; “Cradle” at a RRP of 4,800 yen (including tax) and “Cradle and D terminal AV cable” at a RRP of 6,500 yen (including tax) for charging PSP battery and enjoying high quality viewing on TVs, and also “PSP® (PlayStation®Portable) Pouch” at a RRP of 1,800 yen (including tax) that matches the color of the new PSP system. All additional peripherals and accessories will become available on Thursday, October 16th.
For the upcoming holiday season market, third party partners will be introducing exciting bundle packs with strong PSP software titles. “MOBILE SUITE GUNDAM GUNDAM VS. GUNDAM” will be introduced from NAMCO BANDAI Games Inc. on Thursday, November 20th, 2008 at a RRP of 24,840 yen including tax. “DISSIDA FINAL FANTASY” will be introduced from SQUARE ENIX CO., LTD. on Thursday, December 18th, 2008 at a RRP of 25,890 yen including tax. SCEJ will also introduce “PATAPON 2 Donchaka♪” on Thursday, November 27th, 2008 at a RRP of 23,800 yen including tax.
SCEJ also announced today that it would launch a new network service this fall that will allow PSP users to connect directly to PlayStation®Store, and to download entertainment content without transferring them through PLAYSTATION®3 (PS3®) or PC.*1 At the launch of this network service, SCEJ will be releasing game content for the PSP system such as “Mainichi Issyo Portable,” developed for PSP from the original PS3 title of “Mainichi Issyo”.
Additionally, another free online service will be launched this fall which enables users to play PSP software titles featuring ad-hoc mode over the internet through PS3 with other online players. PSP software titles such as “MONSTER HUNTER PORTABLE 2nd G” from CAPCOM Co., Ltd. will be compatible with this new online service.*2
SCEJ will further expand the PSP platform and create a world of entertainment with the new PSP system, together with strong upcoming new software titles, and attractive peripherals and network services launching for the holiday season.
※1 Users need to update the latest system software to use the service, and they will also be able to enjoy the service on PSP-1000 and PSP-2000.
※2 Titles and the detailed information of the service will be announced in due course.
|
cc/2019-30/en_middle_0014.json.gz/line337
|
__label__cc
| 0.565982
| 0.434018
|
CSS Tutorial – 04 – Grouping
To keep style sheets short and easy to edit similar rules can be grouped together. This gives several ways of specifying a set of related rules. For example, coloring the text red and the background black for two header elements can be done in basically four different ways.
Ungrouped rules
First, each rule can be written separately.
h1 { color: #FF0000; }
h1 { background: #000000; }
Grouped selectors
Second, the selectors can be grouped together by separating them with a comma. This kind of grouping will make a style apply to multiple selectors.
h1, h2 { color: #FF0000; }
h1, h2 { background: #000000; }
Grouped declarations
Third, the declarations can be grouped together by separated them with a semicolon. All styles within the declaration block will be applied to the selector. The last semicolon is not necessary, but it’s a good practice to include it.
h1 { color: #FF0000;
background: #000000; }
Grouped selectors and declarations
Fourth, both the selectors and declarations can be combined, resulting in a single rule.
h1, h2 { color: #FF0000;
CSS Tutorial – 03 – Using CSS
There are three way to insert CSS into an HTML document – either using an internal style sheet, inline styles, or an external style sheet.
Internal style sheet
An internal style sheet is useful when a single document needs to have a unique style. The style sheet is then embedded in the head of the document using the <style> header element. This element is a container for style sheet rules and should have its type attribute set to “text/css”.
p { color:#FF0000; }
Inline style
When styling needs to be assigned to an individual element the style attribute can be used to set an inline style. This is a generic attribute that can be included in all HTML tags. Its value is the CSS declarations that will be applied to the element. There is no need to specify a selector since the declarations implicitly belong to the current element. This approach should be used sparingly, since it mixes the style with the content.
<p style="color:#00FF00;">Example</p>
External style sheet
The most common way of including CSS is through an external style sheet. The style sheet rules are placed in a separate text file with a .css file extension. This style sheet is then referenced using the <link> header element. The rel (relationship) attribute must be set to “stylesheet” and the meta type attribute to “text/css”. The location of the style sheet is specified with the href attribute.
<link rel="stylesheet" type="text/css" href="MyStyle.css">
Alternatively, an external style sheet can be included using the CSS @import function from inside of the <style> element. This function must be placed before any other rules for it to work.
@import url(MyStyle.css);
Using external style sheets is often preferred since it completely separates CSS from the HTML document. This makes it possible to quickly create a consistent look for an entire website and to change its appearance just by editing a single CSS document.
Comments in CSS are created using the C-style notation (/* */). They are ignored by browsers and may span multiple lines.
/* Multi-line comment */
CSS Tutorial – 02 – Rule Structure
Every style sheet is made up of a list of rules. For example, a rule to color all paragraph elements red looks like this:
p { color: red; }
This rule has two parts: a selector (p) and a declaration block, consisting of one or more declarations enclosed in curly braces. The selector declares which elements the style will be applied to. In this case to all paragraph elements. Following the selector comes the declarations, each of which is made up of a style property followed by a colon and a valid value for that property. Each declaration is terminated with a semicolon, although this is optional for the last one.
p { color: red; background: black }
CSS Tutorial – 01 – Introduction
CSS stands for Cascading Style Sheets and is a stylistic language used to define how web documents are presented. It complements HTML and gives much more control over the style of web pages. Furthermore, CSS makes it possible to separate a web site’s style from its content, making the site considerably easier to edit and maintain.
JavaScript Tutorial – 07 – Loops
The loop statements are used to execute a specific code block several times. In JavaScript, there are four kinds of loops: while, do-while, for, and for-in. As with the conditional if statement the curly brackets can be omitted if there is only one statement in the code block.
The while loop runs through the code block only if the condition is true and will continue looping for as long as the condition remains true.
var i = 0;
while (i < 10) { document.write(i++); }
Do-while loop
The do-while loop works the same as the while loop, except that it checks the condition after the code block and will therefore always execute at least once.
var j = 0;
do { document.write(j++); } while (j < 10);
The for loop is used to go through a code block a specific number of times. It takes three parameters. The first parameter is executed once before the loop starts and is commonly a counter declaration. The second parameter holds the condition for the loop and is checked before each iteration of the code block. The third parameter commonly contains an increment for the counter and is executed at the end of each iteration after the code block.
for (var k = 0; k < 10; k++) { document.write(k); }
In the for loop, either one of the parameters can be left out.
for (;;) { document.write("infinite loop"); }
For-in loop
The for-in statement gives an easy way of iterating through elements in an array or through properties in an object. On each iteration the key or index of the next property is assigned to the variable and the loop continues to iterate until it has gone through all members of the object.
var a = ["one","two","three"];
for (var p in a) { document.write(a[p]); }
Break and Continue
There are two special statements that can be used inside of loops. The break keyword ends the current loop and continue skips the rest of the current loop and continues at the beginning of the next iteration.
break; // end loop
continue; // start next iteration
JavaScript Tutorial – 08 – Functions
A function is a reusable code block that will execute only when it’s called. They are normally placed in the head section of the document, because this assures that the browser loads them before they’re used.
Defining functions
To create a function the function keyword is used followed by a name, an optional parameter list, and a code block.
function myFunc()
document.write("Hello World");
Calling functions
Calling the function is done by using the function’s name followed by a set of parenthesis in the body section of the document.
myFunc();
The parenthesis can be used to pass parameters to the function in the form of a comma separated list.
function myFunc(x,y)
document.write(x + y);
myFunc("Hello", " World");
JavaScript will not complain if too few parameters are sent. The unspecified parameters will simply become undefined. Same thing if too many parameters are passed, there will be no errors. JavaScript even provides a way to access such parameters using the arguments array. This array is a built-in part of the function object and contains all arguments passed to the function.
for (var i = 0; i < arguments.length; i++)
document.write(arguments[i]);
The return keyword causes a function to exit.
return; // exit function
It can optionally be given a value to return and will then make calls to that function evaluate to that value.
return x + y; // exit function and return value
document.write(myFunc("Hello", " World");
Anonymous functions
There is a second notation for creating functions, the so called anonymous function. An anonymous function is declared using the Function constructor. Each parameter in the constructor is included as a string value separated by commas and the last parameter string consists of the function statements.
var myFunc = new Function("x","y", "document.write(x+y);");
|
cc/2019-30/en_middle_0014.json.gz/line338
|
__label__cc
| 0.734284
| 0.265716
|
Lovotics
Journal of Oral Hygiene & Health
Journal of Entrepreneurship & Organization Management
Journal of Vaccines & Vaccination
Immunome Research
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Energy
Advances in Pharmacoepidemiology & Drug Safety
Journal of Pharmacological Reports
pharma journals alcoholismPost-operative Surveillance Peer-review JournalsPlant Genetic materialMilitary Science Research Journals Clinical Microbiology Indexed journals on pediatric hematologyDecolorization analysispeer reviewed Pharmaceutical Analysis articles onlineIndexed journals in EndocrinologySecretory IgAPostmortem Drug Redistribution JournalsAddiction PsychiatryPolycystic Ovary SyndromeRehabilitation review articlesHIV and Microbiology Scientific Journals
Open Access Articles- Top Results for Endometrial biopsy
File:Simple endometrial hyperplasia - intermed mag.jpg
Micrograph showing an endometrial biopsy with simple endometrial hyperplasia, where the gland-to-stroma ratio is preserved but the glands have an irregular shape and/or are dilated. H&E stain.
0UDB
ICD-9-CM
The endometrial biopsy is a medical procedure that involves taking a tissue sample of the lining of the uterus. The tissue subsequently undergoes a histologic evaluation which aids the physician in forming a diagnosis.
1 Medical uses
3 Risks
3.1 Pain
4.1 Instruments
Medical uses
There are a number of indications for obtaining an endometrial biopsy in a non-pregnant woman:
Women with chronic anovulation such as the polycystic ovary syndrome are at increased risk for endometrial problems and an endometrial biopsy may be useful to assess their lining specifically to rule out endometrial hyperplasia or cancer.
In women with abnormal vaginal bleeding the biopsy may indicate the presence of abnormal lining such as endometrial hyperplasia or cancer.
In patients with suspected uterine cancer, the biopsy may discover the presence of cancer cells in the endometrium or cervix.
In female infertility the assessment of the lining can determine, if properly timed, that the patient ovulated, however, the same information can be obtained by a blood test of the progesterone level.
Transvaginal ultrasonography is generally done before obtaining an endometrial biopsy as it may help in the gynecologic diagnosis, or even make the taking of a biospy superfluous if the lining is thin. If the endometrial lining is less than 5 mm thick on sonography, it is highly unusual to encounter endometrial cancer.[1]
The test is usually done in women over age 35.[2] A more thorough histologic evaluation can be obtained by a dilatation and curettage, which requires anesthesia.
The procedure is contraindicated in pregnancy.[1] Therefore, women in the reproductive years may need a pregnancy test before a biopsy is taken to assure that the test is not done during a pregnancy. Other contraindications are pelvic inflammatory disease and coagulopathies.[1]
An endometrial biopsy usually cannot be done as an office procedure in children, young women, women with vaginismus, or women with cervical stenosis. If necessary, an examination under anesthesia could be performed at which time a biopsy could be taken.
While procedure is generally considered safe, cramps or pelvic pain is a common if short-lived side effect. After the procedure, the patient may experience some bleeding. A uterine perforation or an infection are rare complications.[2]
Endometrial biopsy pain [3] is quite common. The reason that doctors spray the lidocain is to help to deal with some of the pain from the procedure. The lidocain spray can burn when it is sprayed into the area. The clamp that is put onto the cervix may be another cause of pain and the procedure itself, where the doctor has to procure a piece of the lining with the tube can be painful. Most of the time, this will only be required once, but sometimes the procedure can entain two or three instances of procuring a piece of the endometrium.
File:Gray1167.svg
Generally, an endometrial biopsy follows this process:
The patient is asked to lie on the table with her feet in the stirrups for a pelvic examination. She may or may not be given localized anesthesia.
A speculum will be inserted into the vagina to spread the walls of the vagina apart to expose the cervix.The cervix will then be cleansed with an antiseptic solution.
A tenaculum, a type of forceps, will hold the cervix steady for the biopsy.
The biopsy curette will be inserted into the uterine fundus and with a scraping and rotating motion some tissue will be removed.
The removed tissue will be placed in formalin or equivalent for preservation.
The tissue will be sent to a laboratory, where it will be processed and tested. It will then be read microscopically by a pathologist who will provide a histologic diagnosis.[4]
Both the application of the tenaculum as well as the removal of tissue by the biopsy may cause pain. Patients, in general, may want to take some pain medication (such as ibuprofen) before the procedure and inquire about local anesthesia.
A number of biopsy instruments are in use. The Novak curette is a thin metallic tube with a side opening at the tip; suction with attached syringe can be applied to help to remove tissue. The Pipelle is a more flexible plastic tube with a side opening at the tip. A smaller tube (internal piston) inside the Pipelle is withdrawn to create suction. Meanwhile, the pipelle is rotated and moved outwards from the fundus to the internal os to collect small pieces of endometrial tissue.[5]
Recently, the TruTest has been introduced as an alternative method of endometrial biopsy. Rather than using a suction tube, this method uses the Tao Brush to gently brush the lining of the uterus. Generally, this method has been found to be less painful than the traditional suction method.[citation needed]
^ a b c Christiane Kuntz (January 2007). "Endometrial biopsy". Can Fam Physician 53 (1): 43–44. PMC 1952554. PMID 17872607. Retrieved March 11, 2010.
^ a b "Endometrial biopsy". The New York Times. Retrieved March 11, 2010.
^ "Endometrial biopsy pain". Endometrial Biopsy. Retrieved June 4, 2011.
^ [1] St. Joseph’s Mercy Health Center – Diagnostic and Surgical Tests and Procedures – Endometrial Biopsy (accessed 7-10-07)
^ Endometrial Biopsy, A Review of Sampling Techniques, Product bulletin from CooperSurgical, the producer of Pipelle. April 2012.
[2]: Truth about Endometrial Biopsy Procedure Pain
Female genital surgical and other procedures (gynecological surgery) (ICD-9-CM V3 65–71, ICD-10-PCS 0U)
Adnexa
Oophorectomy
Salpingoophorectomy
Fallopian tubes
Salpingectomy
Hysterotomy
Pelvic exenteration
uterine cavity:
Vacuum aspiration
endometrium:
myometrium:
Uterine myomectomy
cervix:
Cervical conization
Cervical cerclage
Cervical screening (pap test)
Cervicectomy
Vaginectomy
Culdoscopy
Culdocentesis
Hymenotomy
Colpocleisis
Hymenorrhaphy
Vaginal wet mount
Vaginal transplantation
Clitoral hood reduction
Gynecologic ultrasonography
Index of reproductive medicine
sex determination and differentiation
STD and STI
Neoplasms and cancer
gonadal
benign prostatic hypertrophy
This page is based on the copyrighted Wikipedia article Endometrial biopsy; it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA
|
cc/2019-30/en_middle_0014.json.gz/line340
|
__label__wiki
| 0.984173
| 0.984173
|
Journal of Tissue Science & Engineering
journal of biodiscovery
Journal of Biodiversity & Endangered Species
Research & Reviews: Journal of Statistics and Mathematical Sciences
Journal of Sleep Disorders & Therapy
Research & Reviews: Journal of Inflammation
International Journal of Waste Resources
Breast Cancer: Current Research
Malaria Control & Elimination
Public Health Dentistry human physiology High Impact Factor Journals kidney disease journalsPrimate theory of mindsocialism JournalsBiophysics innovationsReplacement surgery Scientific JournalsGraphical-statistics-Open-Access-ArticlesMarfan Syndrome High Impact Factor JournalsPsychopharmacology Research ArticlesCriminal-law -journalsBiowaivers Scholarly journal Defense Impact Factorbiomonitoring pesticidesplastic surgery peer review journals
Open Access Articles- Top Results for HMS Fearless (H67)
HMS Fearless (H67)
For other ships of the same name, see HMS Fearless.
HMS Fearless in 1935
<tr> <th height="30" style="background-color:#B0C4DE;text-align:center;vertical-align:middle;font-size:110%;">Career (United Kingdom)</th> <th style="background-color:#B0C4DE;text-align:center;vertical-align:middle;font-size:110%;">100x35px</th> </tr><tr style="vertical-align:top;"><td>Name:</td><td> HMS Fearless</td></tr><tr style="vertical-align:top;"><td>Builder:</td><td> Cammell Laird, Birkenhead</td></tr><tr style="vertical-align:top;"><td>Laid down:</td><td> 17 July 1933</td></tr><tr style="vertical-align:top;"><td>Launched:</td><td> 12 May 1934</td></tr><tr style="vertical-align:top;"><td>Commissioned:</td><td> 22 December 1934</td></tr><tr style="vertical-align:top;"><td>Motto:</td><td> Explicit nomen
("The name explains itself")</td></tr><tr style="vertical-align:top;"><td>Honours and
awards:</td><td> Norway 1940
Atlantic 1941
Malta Convoys 1941
Mediterranean 1941</td></tr><tr style="vertical-align:top;"><td>Fate:</td><td> Torpedoed by Italian aircraft and scuttled, 23 July 1941</td></tr><tr style="vertical-align:top;"><td>Badge:</td><td> On a Field Blue, a Lion's head Gold</td></tr> <tr> <th colspan="2" height="30" style="background-color:#B0C4DE;text-align:center;vertical-align:middle;font-size:110%;">General characteristics </th></tr>Template:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramlineTemplate:Infobox ship characteristics/paramline
Part of: Home Fleet, 1939–1940
Force H, 1940–1941
Operations: Norwegian Campaign
Attack on Mers-el-Kébir
Victories: U-27
HMS Fearless was an F-class destroyer built for the Royal Navy, that was commissioned in 1934, and saw service early in World War II before being sunk in July 1941.[1]
2 Service history
2.1 Force H, 1940–1941
The ship was ordered from Cammell Laird at Birkenhead under the 1932 Programme. She was laid down on 17 July 1933, and launched on 12 May 1934, as the seventh RN ship to carry this name, and completed on 22 December 1934.[1]
On 3 July 1940 she took part in the attack on the French Fleet at Mers-el-Kébir ("Operation Catapult"), and was part of the screen for the carrier Ark Royal and other ships during air attacks on the French battleship Dunkerque two days later. On 8 July she escorted Force H ships during a planned attack on Cagliari, which had to be abandoned after Italian air attacks ("Operation MA5"). The attack was eventually carried out on 2 August (Operation Crush), but on 4 August, while returning to the UK Fearless was involved in a collision with the trawler Flying Wing and was repaired at the Barclay Curle shipyard on the Clyde. On 11 October she prepared for operational duty with the Flotilla, but on 30 October was involved in another collision with SS Lanark at Greenock. More repairs followed at Troon, and Fearless did not return to duty at Gibraltar until January 1941.[1]
On 31 January 1941 she took part in "Operation Picket", an air attack on the Tirso Dam on Sardinia, and also in Operation Grog, a naval bombardment of Genoa on 6 February. In March Fearless was deployed with three other destroyers of the Flotilla and the cruiser Sheffield to intercept a Vichy convoy. A later attempt to capture the French merchant ship Bangkok off the port of Ghazaouet, Algeria, was prevented by shore battery fire. In early April Fearless and four other destroyers escorted Sheffield, battlecruiser Renown, and the aircraft carrier Ark Royal in Operation Winch, which delivered 12 Hurricane fighter aircraft to Malta. Later in the month she was part of the screen for the same ships escorting Force S, a group of reinforcement ships for the Fleet in Alexandria (Operation Salient).[1]
In early May she was part of destroyer screen with five other destroyers for the battleship Queen Elizabeth, and the cruisers Naiad, Fiji and Gloucester which were joining the Fleet in the Eastern Mediterranean. This was part of Operation Tiger which included a supply convoy taking tanks to the Middle East and the transfer of warships. After arrival in Malta on 12 May, Fearless carried out a minesweeping operation to enable the ships of 5th Destroyer Flotilla to safely leave harbour for an offensive operation against Italian convoys. On 19 May she and three other destroyers escorted the heavy cruiser London to cover the delivery of further aircraft to Malta by the carriers Ark Royal and Furious.[1]
In June she was deployed in the Atlantic on anti-submarine operations with the Flotilla. On 16 June Fearless and four other destroyers sank the U-138 off Gibraltar. On 22 June she was deployed with four other destroyers to intercept a German supply ship spotted heading towards the French coast. The next day the Flotilla intercepted SS Alstertor which was scuttled by her crew on the approach of the British ships. They rescued 78 British POWs taken from ships sunk by German raiders and the crew.[1]
In July Fearless resumed duty with "Force H" in the Mediterranean. On 20 July she joined Force X in "Operation Substance", another Malta convoy.[1] On 23 July whilst screening Ark Royal she was torpedoed and heavily damaged by an Italian Savoia-Marchetti SM.79. Her crew were rescued by Forester, which then sank the wrecked and burning ship with torpedoes about Script error: No such module "convert". north-north-east of Bône, Algeria, in position 37°40′N 08°20′E / 37.667°N 8.333°E / 37.667; 8.333Coordinates: 37°40′N 08°20′E / 37.667°N 8.333°E / 37.667; 8.333{{#coordinates:37|40|N|08|20|E|dim:500000|| |primary |name= }}.[2]
^ a b c d e f g Mason, Geoffrey B. (2003). "HMS Fearless, destroyer". Service Histories of Royal Navy Warships in World War II. Retrieved 5 February 2011.
^ Helgason, Guðmundur (2011). "HMS Fearless (H 67)". uboat.net. Retrieved 5 February 2011.
Colledge, J. J.; Warlow, Ben (2006) [1969]. Ships of the Royal Navy: The Complete Record of all Fighting Ships of the Royal Navy (Rev. ed.). London: Chatham Publishing. ISBN 978-1-86176-281-8. OCLC 67375475.
English, John (1993). Amazon to Ivanhoe: British Standard Destroyers of the 1930s. Kendal, England: World Ship Society. ISBN 0-905617-64-9.
Friedman, Norman (2009). British Destroyers From Earliest Days to the Second World War. Annapolis, Maryland: Naval Institute Press. ISBN 978-1-59114-081-8.
Lenton, H. T. (1998). British & Commonwealth Warships of the Second World War. Annapolis, Maryland: Naval Institute Press. ISBN 1-55750-048-7.
Rohwer, Jürgen (2005). Chronology of the War at Sea 1939–1945: The Naval History of World War Two (Third Revised ed.). Annapolis, Maryland: Naval Institute Press. ISBN 1-59114-119-2.
Whitley, M. J. (1988). Destroyers of World War 2. Annapolis, Maryland: Naval Institute Press. ISBN 0-87021-326-1.
E- and F-class destroyers
22x20px Royal Navy
Exmouth [leader]
22x20px Royal Canadian Navy
Part of Template:Sclass2-
Gatineau (ex-Express)
22x20px Royal Hellenic Navy
Navarinon (ex-Echo)
F class
Faulknor [leader]
Firedrake
Qu'Appelle (ex-Foxhound)
Saskatchewan (ex-Fortune)
22x20px Dominican Navy
Generalissimo / Sanchez (ex-Fame)
Preceded by: D class
Followed by: G class
List of destroyers of the Royal Navy
This page is based on the copyrighted Wikipedia article HMS Fearless (H67); it is used under the Creative Commons Attribution-ShareAlike 3.0 Unported License (CC-BY-SA). You may redistribute it, verbatim or modified, providing that you comply with the terms of the CC-BY-SA
|
cc/2019-30/en_middle_0014.json.gz/line341
|
__label__wiki
| 0.958484
| 0.958484
|
UK Gives The Bastard A Christmas Present
Rage Against the Machine beat X Factor winner in charts
Rock band Rage Against The Machine has won the most competitive battle in years for the Christmas number one.
The band's single, Killing In The Name, sold 500,000 downloads beating X Factor winner Joe McElderry's The Climb by 50,000 copies to clinch the top spot.
Their success followed a Facebook campaign designed to prevent another X Factor number one.
One retailer said it was a "truly remarkable outcome - possibly the greatest chart upset ever".
Speaking on the Radio 1 chart show, Zack de la Rocha from Rage said: "We are very, very ecstatic about being number one."
"It says more about the spontaneous action taken by young people throughout the UK to topple this very sterile pop monopoly," he said.
McElderry, 18, praised the campaign, adding: "It's been exciting to be part of a much-hyped battle and they definitely deserve congratulations."
He later told BBC Radio 1 he did not believe the internet campaign was a personal attack.
He said: "It's more against the show than me and I think if any other person had have won, the same thing would have happened, because the petition was going on before the winner had been announced."
Despite earlier in the week calling the campaign "stupid", X Factor judge Simon Cowell offered his congratulations to the couple behind it, Jon and Tracy Morter.
'Silly idea'
This is not the first campaign the Morters have launched to try to influence the charts - last year they attempted to get Rick Astley to the top spot.
Mr Morter, 35, said he learnt "how the charts work" from that experience, and "what you can get away with".
"When this year came around I just thought, let's have another go. If anything, last year was fun. This year it has gone stratospheric."
His wife Tracy said: "It was one of those little silly ideas that make you laugh in your own house.
"We really love music and remember when were were young the charts were really exciting. We just thought, wouldn't it be funny if that song got to number one?
"It took something really strong and forceful to get people behind it."
De la Rocha said the band would perform a free concert in the UK in 2010 to celebrate their chart win.
The past four Christmas number ones have all been by X Factor winners; Alexandra Burke's version of Hallelujah last year was one of the biggest selling festive singles ever.
Guitarist Tom Morello said it had "tapped into the silent majority of the people in the UK who are tired of being spoon-fed one schmaltzy ballad after another".
Santa does exist!
Labels: awesome, rage against the machine, top 40
REVIEW: They Came From The Shadows
The Rhythm Bastard 2009 Christmas Mixtape
Christmas Light Hero
Finals Star
The Internet's Inferno
Happy Holidays, You Bastards
Backing Tracks Added To Setlist
Green Day DLC Predicitions
Rock Band: Yoko Ono
Drudging Up An Old Post
|
cc/2019-30/en_middle_0014.json.gz/line343
|
__label__cc
| 0.733125
| 0.266875
|
It's become fashionable in some circles to deride those who would preserve and restore the Constitution, encompassing the Bill of Rights, as though that would ever work.
The earnest sophists regard those who suggest that as sort of governmental Amish, in a "Oh look, Martha, people living 200 years in the past and hard-working but too mentally simple to grasp modern conveniences and realities" sort of way. Those of meaner grasp stop at sheer diatribe and derision for the idiot bumpkins who foolishly think it ever worked, or ever will.
But when you get people of good will, decent faculties, and reasonable disagreement to discuss it, you will find that little has changed since the Federalists and anti-federalists went at each side rhetorically in 1787; the debates, the problems, and the solutions remain remarkably familiar to anyone who is a student of that struggle, and the discussions that were recorded amidst those days.
This is what makes the American experiment's juice worth the squeeze, and animates actual debate between rational men of goodwill.
I bring this up because, after some good hiatus, for those who hadn't checked, CA re-opened comments this week over at WRSA, after a multi-month absence.
CA, the bloghost there, is an honest, and honorable man. It's a small club, even on our side. (But not as small as you think, even in your darkest fears.) We've met in real life, and literally broken bread together (and that's a very small club for me, I assure you). In fact, I owe him a dinner next time he's in town.
Whichever of us is right in this discussion, or more right, is for the reader to decide, and while either - or neither - of us may express it better, Truth itself is almost certainly an alloy of both our positions. The question may well be merely a matter of percentages and degree, far more than either/or.
In specific, the discussion has turned, yet again, to the (imaginary) failure of the Constitution to be omniscient, omnipotent, and omni-benevolent. As if any few sheets of parchment could contain and replicate God on earth.
There is no document for your government that will work until you have perfect people.
And at that point, you don't need a document.
That was apparent going back thousands of years.
And you're never going to have perfect people.
You do the best you can, with what you've got.
And live with what happens.
When a wheel breaks, you repair or replace it; you don't burn the wagon.
It matters not what ship you build, eventually, you have to pull it out of the water, and scrape the barnacles off the hull.
This is why Jefferson, whose thoughts I alluded to earlier elsewhere, suggested that "from time to time, the Tree of Liberty must be watered with the blood of patriots and tyrants."
It's why President Adams observed that "our Constitution was made only for a moral and religious people. It is wholly inadequate to govern any other."
It's why, when questioned on the form of the new government, Ben Franklin sagely replied, "a republic, if you can keep it."
There ain't never going to be a perfect document, nor perfect people, on this earth. Any government, and any constitution, is ultimately doomed, given enough time. If you can improve on what we have, let's hear how that would work, given the material you have to work with. At best, you might manage a tweak or three. In fact, the tweaks plugged in after Day One are largely and demonstrably exactly the problem now, not the solution to it.
Communism, denying any spiritual nature to mankind, decided that they just need to kill everyone who doesn't "get it", thus perfecting the species until they achieve ultimate perfection. How that works out in real life is lying scattered across Russian steppes, dumped in trenches in Manchuria, rotting in Cuban prisons, and stacked up in skeletonous piles in Cambodia. It's eating cats and zoo animals in Caracas right this minute, and just about to kick off a new wave of slaughter. And its spiritual heirs all slobbering to kick off the ball on campuses and in newsrooms and cloakrooms here from Key West to Kiska.
The document you would replace has been debased with accretions that killed it, and crushed under the weight of a million corrupt douchebags, thieves, liars, and scoundrels, from presidents to dog catchers, aided and abetted by the most slovenly, dissolute, and disinterested electorate in history, and beaten down and choked to death by bookshelf yards of laws and code and legalese that would choke not a horse, but a herd of them, several times over.
People can be improved, assuredly, but never perfected.
At least, not by other people, and not in this lifetime.
Documents that rely on that raw material - as they all do - are therefore doomed to fail eventually, given enough time.
Look at cars: when they were slow, and clunky, a crash was about as serious as falling off a horse, or crashing two wagons; a few cross words, maybe some splintered lumber, and very rarely, an injured animal or occupant.
But we've perfected them vastly now, and even junkers will achieve speeds that would have won at Indianapolis Speedway a century and more ago. They're more perfect, faster, even safer. But the drivers are the same, if not worse, than formerly. So which way have the death tolls gone, and what sort of injuries have been suffered, given that mean clay to work with behind the wheel?
And the newest idea is to make them driverless, and that genius plan has already racked up a body count, because the only thing more imperfect than humans is the software programmers devise, because they don't know what they don't know, nor admit that what goes on in three pounds of gelatinous human grey matter is a biochemical wonder light years beyond their grasp, and unapproachable with silicon and electrons, even with Moore's Law, billions of dollars, trillions of man hours, and pushing a century's head start. Its only virtue is to restrict human freedom, at the paltry expense of admitting tyranny into the equation "for your own good".
While you may make a slightly better governing document, you'll only ensure a bigger crash when it happens, you'll run over more people in the meantime, and do them greater injury, and you'll never "solve" the problem with the objects and operators of the system. Feel free to try, but I've yet to see anyone, anywhere, do a better job than what we have, except to strip away what never should have been welded onto the original boilerplate.
Trying to tweak the document is worthy, but I've seen nothing that would improve on what minds the equal or better of any since that original assembly could come up with, and in fact prior attempts hastened the current collapse, far more than stayed it.
And trying to "fix" the objects of the exercise, or assuming them more perfectible than they are or will ever be, is a well-trodden path through a graveyard that stretches for hundreds of miles, over a journey of decades, with multi-story mausoleums of prior experiments stacked to the heavens.
So if we're going to add to that tally, or rather, be forced to do so, as appears more likely by the day, let's at least ensure that it waters the Tree of Liberty, rather than cutting it down, planting some new acorn, and hoping against all odds that it sprouts and outgrows the last one.
Labels: government, history, politics, truth
Pat H. said...
The Articles of Confederation were far superior to the current Constitution. The current constitution is working exactly as intended by the Federalists. Curses upon John Jay, Geo. Washington, and Alexander Hamilton.
Ref: "Hamilton's Curse".
https://www.amazon.com/Hamiltons-Curse-Jeffersons-Revolution-Americans-ebook/dp/B001FA0JNC/
Unfortunately Pat, all the assembled representatives of every colony, the actual Congress, and the individual state legislatures of all thirteen states all disagree with that assertion.
There are entire books on the topic. Libraries, even.
So I can believe you, or my lying eyes, and a literal fuckton of contrary primary-source evidence.
I'm not a big fan of historical revisionism, regardless of the motives, mainly because of the company it keeps.
There is no keeper of the truth but God above. Even though the U.S. Constitution were completely abandoned, the human spirit and all it's manifestations would remain in full. The truth remains, even if none were to accept it.
I think we went seriously off the rails when we accepted that there could be such a thing as a career politician. Congressmen, Senators, even the President and Vice President, were intended to be offices held for a time by men who'd been successful BEFORE they went into politics, then after a couple terms they were supposed to leave public service and return to their careers. In effect, they put their careers on hold for a few years, performed a public service in exactly the same manner in which we serve on jury duty, then leave and go back to their old life.
Washington, Jefferson, Adams and company would be shocked that people today study Political Science in college, or that there are currently thirteen members of Congress who have been there since before I was old enough to vote (that would be people first elected to Congress over 37 years ago). Let alone that three men (thankfully all no longer in Congress) who've served in Congress longer than I've been alive so far.
Sure, they'll claim to be public servants. They serve the public in much the same manner as a bull serves a cow.
Mark D
+1 on Mark D's last statement...
I think many people today conflate knowledge with intelligence; viz, "We have more knowledge than our forebears, thus we are more intelligent and so should change what they built as it was clearly designed by inferior people."
Based on the nonsense being spouted by millennials today, I'd say it's quite the converse. People seem to be less intelligent AND more ignorant of anything beyond trivial or personal issues.
RandyGC said...
Any 2nd LT dependent on the good graces of their NCOIC quickly learns the truth that being newly "educated" doesn't mean you have any truly new ideas, or a clue as to how to "fix" things.
It's a lesson more painful for some than others. (fortunately I've usually been good at learning from witnessing the pain and stupidity of others).
Civic Nationalists, Nero, and The Foxes
More On That Border Wall Ann Coulter Thinks We're ...
F**k Zuck
This FBI Investigation I Want To See
Word To Your Mother, Leftards...
What...? Where...? When...?
BREAKING: Flake Channels Sen. McCrazy From Beyond ...
Operation PEAK SMEAR becomes Operation SOGGY DIAPE...
Go On, Twitch...
The Democrat Party Is A Terrorist Organization, An...
USGS Reports Moderate Volcanic Eruption In Washing...
Hearing Highlights
Squadron Property And Cultural Rubicons
When Insanity Reigns, Parody Becomes Impossible
Plan 37: Every Time Leftists Lose
Sooper Genius, Right There...
Breaking News: Newest Kavanaugh Accusers Come Forw...
Watch This Space: Shameless Tease
One-Stop Intel Shop: FO Resource Page
FakeRape: Just Say No
DNC Strategy: Anyone Trump Nominates Grabbed Our P...
Officer Killshot Fired!
Dane-Geld
Dear Miguel: RE: Hollywood Accounting
Border Wall: Going Up Since April. Oops.
Four Strikes And Yer Out!
DPD: Only Searching The Homes Of Victims
Qwitcherbitchin', Crybabies
And The Hole Just Keeps Getting Deeper
Gold-Digging Political Whores
They Comin' To America
Online Political Bias? Cluebat On The Way...
Heeeeeeeeeeeeeeeere's Johnny!
Time To Deal With Scut Farkas
That'd Work
Great Moments In American History
Barbara Boxer Unseated As Stupidest US Senator Of ...
Bueller? Ferris Beuller...? Anyone? Anyone...??
Es Kommt
Project Veritas: Deep State III
He's A Witch!
QOTD on Kavanaugh:
Project Veritas: Deep State Video II
This Is An Actual COUP
It's Not White Supremacy When We Do It
Come Monday
On Craft
Project Veritas Delivers Another Body-Slam
BREAKING: Trump : Declassify and Release EVERYTHIN...
For The Science-Challenged Morons Out There...
Let's Call This What It Is
Post Hurricane PSA:
I Think He's Getting Coached By James Woods
Breaking: Mueller Investigation Discovers Proof Of...
I Meme To Misbehave
The Coast Tards
Commies Gonna Commie.
Weather Channel: Fake News
What Ails Lame Street
Two More Ships Our Criminally Gutted Navy Doesn't ...
Ebola 2018: Cautious Optimism Is In Order
Friday Funnies: We Need To Talk About the Ducks
It's Not Sexual Harassment When Women Do It
Welcome To You Bet Your Life
Still No Sign Of That Blue Wave, But...
...Hence The Term "Sh*tweasels"
Florence Update
Sorry, No Sale.
Opening Soon?
It's a Weather Report, Not Whether Report
Miguel at GFZ FTW, Again
Every Day Is 9/11. That's Exactly The Problem.
Stop The Presses!
In Case You Were Wondering "Who's Next" After Alex...
Anybody With Leave On The Books, I'd Take It Now
Just So You Know How High The Bar Is
Why Yesterday's Border Fence Post Matters
Nike Needs To Change Their Brand Name To Mud
Sunday Serendipity
Anybody Got Ann Coulter's Tip Line?
Drowning Snowflakes
Totalitarian Math 101
Asylum Revolt: Lunatics Now In Charge
"I Made A Snowman"
Gun Salesman Of The Decade
Fire Her, Then Light Her Up
Remember, You Can't Spell "DOUCHE" without "CHE"
On Saber-Tooths and Hand Grenades.
And What Am I Ever Going To Need Physics For After...
I'll Just Leave This Here...
Build The Wall, or Get Ready For Open Season
|
cc/2019-30/en_middle_0014.json.gz/line348
|
__label__cc
| 0.704827
| 0.295173
|
Anna Hoffman`s music video song "Fish" released
Anna Hoffman's clip “Fish” is a bright kaleidoscope of ethnic melodies and author's folk music. Everything is interlaced in one large multicolor carpet, cooked, as in a large cauldron, soaked through with world cultures and traditions.
Watch this video at the link: https://youtu.be/-ostYXi2JMQ
Now you can see Anna Hoffman’s video for her song “Fish” in arrangements by the famous Moscow musician and composer Gennady Lavrentiev. This is a simple lyrical history about a controversial girl, and her love. The main role is played by singer herself, appearing before the audience of a magical princess images. The song definitely deserves a main place in the charts of world music, because it’s just amazing how a whole kaleidoscope of folk and ethnic melodies. In recording songs attended musicians such as Gennady Lavrentyev, Evgeny Fedorishin, Dmitry Ignatov, Yannis Kofopulos, Arsen Stepanyan, Oleg Maryakhin, Kirill Parenchuk and Pavel Protasov.
The idea to make this music video appeared several years ago, and now the script from director Nika Platonova is ready, and Anna with Johann Nikadimus, the master of the crowns and kokoshnik, think over the details and different symbols. For example, for the image of the royal bride were taking items from completely different cultures and epochs, such as Pakistani and Uzbek fabrics, Chinese bracelets and Indian bells, were used for the image of the royal bride, as well as a unique kokoshnik, a replica of the museum sample of the nineteenth century. Be sure to pay attention to the abundance of rings, most of which were made personally by Anna Hoffman.
We always happily talk about Anna, because she is really amazing and versatile artist, performer of contemporary ethnic music (world music) and folklore. from Eastern and Indian dances to painting on wood, making author's jewelry and ceramics, from song folklore of the Middle East, the Mediterranean and the Balkans, to Jewish folk songs of various diasporas and dialects. In general, her skills and talents can be enumerated infinitely ...
But back to our video. According to the author's idea, this song, sung in Russian, is heard as folk, and at the same time it contains completely different melodies from the Balkans and the Caucasus, to India and anything else ... and in the middle a Greek singer appears and sings in Greek ... All these melodies entwined in one continuous multi-colored carpet, digested, as in a large cauldron, soaked through with world cultures, traditions and immense love of musicians.
Thus, this work gives us the opportunity to plunge into the bright colors of ancient romance. After all, our generation had the misfortune to be born in the age of complete loss of traditions, root lifestyle, special rituals that accompany a person from birth to death, traditional folk clothes, which are not inferior in beauty to the royal. At the same time, the subconscious thirst of all this has not disappeared anywhere, people are yearning for true beauty, at least I want to believe in it.
You can download the song or add it to your media library in any official music service, as iTunes, Google Play, VK Boom, etc.
© Anna Hoffman 2018
(р) Sketis Music 2019
Теги: Anna Hoffman, singer Anna Hoffman, ethnic music, folk music, world music, designer jewelry, Sketis Music
|
cc/2019-30/en_middle_0014.json.gz/line356
|
__label__wiki
| 0.784313
| 0.784313
|
A guy who enjoyed art.
Word came along the Sherlockian grapevine yesterday of the passing of Stu Shiffman, a fellow whose talents I always greatly appreciated. When I was publishing The Holmes & Watson Report and my original cover artist retired, Stu was one of those who jumped in ready to fill that void, and I especially loved his Sherlocks that paid tribute to characters from other graphic mediums.
My favorite by far, however, was the time Stu popped up with a Sherlockian adaptation of a classic cover from DC's Flash comic book, that went with the first parallel universe story in the DC comics mythos. Stu used it to show a classic Holmes and a Granada-ish Holmes winding up in the same tale.
So, without further ado, I'll just let a few of Stu's covers speak for themselves. Ya did good work, Stu.
Posted by Sherlock Peoria at 11:21 AM 1 comment:
Re-evaluating recaps.
One of the oddly fascinating innovations of modern internet life is the TV episode recap, found in great abundance across the web these days. There are fan reviews, of course, which are natural appreciations of a show with a fan following, even if that following is rather small. But then there are the fairly objective retellings that just spill the events of a given show, like this one from Entertainment Weekly on the Thanksgiving episode of Elementary.
Now, recaps are nothing new to Sherlockians. Michael and Mollie Hardwick's 1962 Sherlock Holmes Companion comes quickly to mind, in which short summations of all sixty original Holmes tales are written up. But the rational behind them was always a curious thing to me -- the summaries seem to be there for that small niche market of people who had read the stories once and forgotten all the details, or people who had not read the stories at all and still had enough energy to read synopses for whatever their motives. Any real fan of Sherlock Holmes, as most of the people who bought that book surely were, knew well what was in those stories.
But these days, the recap serves a real purpose. We are so deluged with information and opportunities for entertainment that we can't take in at all, nor do we want to. Yet to remain conversant in the interests of co-workers or friends, sometimes it's good to keep up on story developments in whatever is currently popular. There are even those shows, as The Walking Dead is for me, that aren't quite making the cut among shows that one has time to watch every week, or have an uncomfortable level of gore or stupid detective plots for a particular viewer, that one can be perfectly happy just knowing what happened to the characters on some weeks, then watching the current episode or season finale when time allows.
It's hard for a fan to understand anyone doing such a thing, just as I always had a hard time getting the "why" of the Hardwicks' synopses. But these days I'm starting to get it. Reviews are still much more fun, even if one disagrees with the writer in question, especially with a show like Elementary where the fans' POV baffles me as much as mine tends to baffle them. (Thankfully, the amount of "Why do you keep watching that show?" comments have dropped off, as the show's fans have either accepted me as the village lunatic or moved on.)
E3:5. It's an Thanksgiving Elementary miracle!
What am I thankful for on this Thanksgiving Thursday night?
Well, Jason Tracey, for one. My favorite Elementary writer, who was responsible for tonight's episode of said show. (Director John Poison had a hand in it as well, probably glad to get a better script than some he's had in the past. Either that or . . . well, we'll leave the other factor that makes tonight's show different out of this.)
Also Clyde the turtle, who can amazingly press a metal switch, and is being used to test empathy in reptiles. (One of those random Mr. Elementary data things, yes, but hey, Clyde is smart enough to press switches!)
And Kitty Winter, who is getting to actually act as the Watson tonight. I'm finding that two British accents in a Holmes/Watson partnership makes for more of a . . . Holmes/Watson partnership.
"Paranoia is the by-product of being consistently right. You should aspire to it." Good Mr. Elementary quote. He's much more egotistical than Sherlock Holmes, and it suits him to a "T." And Jonny Lee Miller delivers it wonderfully.
Tonight we find that Joan Watson's unpublished Canon begins with The Casebook of Sherlock Holmes. Why does that not surprise me? (Elementary apparently wants to get their money's worth out of what they've paid the Doyle estate for, referencing the parts of the true Holmes Canon still in copyright.) But here's the thing . . . Mr. Elementary found it while Joan Watson is off in Copenhagen having sexual escapades, which it seems mandatory that Mr. E. has to mention, but the mention is fleeting. And I find myself going, "Yay, Joan is going to be gone all episode!"
Kitty is actually getting a chance to be a character tonight. And no stupid stick-whacking!
Interesting sub-plot between Gregson and his cop daughter.
Mr. Elementary has a curious little cock-of-the-walk stance, which comes out interestingly when he confronts a massive weight-lifter. And his little trick to get a DNA sample isn't just irritating to the weight-lifter, that guy just doesn't do charm. Still wonder how he ever got all those women to sleep with him.
Jason Tracey's script, without the demands of a "something to have Joan do" extraneous subplot, is wonderfully single-thread, and not over-working the "shocking twist before each commercial" muscle too hard or crazily. It's still a procedural. Mr. Elementary might as well be an NYPD detective, and Kitty his partner. But, hey, the show is watchable for a change.
And Kitty Winter and Captain Gregson are even developing a rapport. An actual human rapport. Holy Hosmer Angel, kids, this show is going places it's never been before!
NYPD's Bell had his suspect picked out, Mr. Elementary knows he's got the wrong man . . . and it's a simple thing that feels like Mr. Elementary is actually imitating Sherlock Holmes. Mr. Elementary has grown into his own character, and this episode is showing how he might exist in a decent show without needing the "Hi, my name is Sherlock Holmes" name tag.
Could this be my favorite episode of Elementary ever? Ah, but every seriously crazed collector of things Sherlockian has to grit their teeth and cringe at something Kitty Winter does this episode. I think I love her. And, dare I say, it? Am I actually seeing chemistry between her and Jonny Lee?
Had a good guess as to who the true culprit was, but that's because this story makes sense. It's solid. No gimmicks, no cheap Trivial Pursuit smartiness. No sex bullshit or relationships that seem forced. And Kitty Winter does a little off-stage coolness that made me laugh out loud and clap with joy. THIS IS SUCH A GOOD SHOW FOR BEING AN ELEMENTARY EPISODE!!!
I give it five ball bearings in a Rube Goldberg opening credits device out of five.
Now, if you don't watch Elementary regularly, don't dive in and watch this one expecting too much. You have to really feel the pain of the average episode to feel the pleasure of this one, so if you switch over after watching your latest episode of your favorite show, it might not live up to that standard. But for Elementary standards?
Wonderful. Simply wonderful. Pity the ratings have been on a downward slide and the Thanksgiving-and-football combo are probably going to hit its viewership hard tonight. And the preview of next week looks like a return to same-old, same-old. But for one happy evening . . . ahhh. Consider me satisfied.
At some point, it's just painful.
Today, I am not a BBC Sherlock fan.
Why? Because there is tease, and then there's just torment. There's "Hey, look at me! Look at me!" time-wasting attention-grabbing when you have nothing to supply to rate that attention.
If you haven't seen the morsel the Sherlock folk tossed at fandom yesterday, here's the story link to "Sherlock Returns: BBC confirms special with picture of Benedict Cumberbatch and Martin Freeman back filming."
So we got a picture of Sherlock's main characters in Victorian garb. No explanation, just a mysterious single image that makes no sense by itself. The theories arose immediately. Cosplay? Time travel? After last season's distinctly varying episodic shifts in tone, just shifting the whole show to a different time period for a dream or alternate universe version of itself doesn't seem off the table.
But here's the thing. That special episode is still a year away.
Thanksgiving is tomorrow. A bunch of really good television shows that are currently entertaining us are having mid-season finales. Christmas shopping has to be done, and there's a ton of interesting Sherlock Holmes related stuff out there to buy. And Elementary continues its reign of schlock.
And the Sherlock crew are shouting, "HEY! LOOK AT US!" while also saying how they have to alter their filming style because too many people are out on the streets looking at them.
They've played the teasing game with the fans before, and it was fun, it worked, all was right with the world. But everything gets old at some point. And for me, I think we've hit that point. Sure, I'm going to enjoy seeing Cumberbatch and Freeman as Holmes and Watson again OVER A YEAR FROM NOW, when there's actually something to watch.
But right now? Screw those guys. I've got The Imitation Game, Gotham, and a dozen other things to watch. And if I want to hypothesize about something, I can spin my theories off the original Doyle Canon, which isn't going to jump up and be different from what I thought next December and make all those theories worthless.
Because that Sherlock has been a constant, reliable friend for decades. With no torment that whole time.
Wilma Norman-Neruda never made me laugh.
As much as I sometimes give folks grief for their love of William Gillette, an actor they had never seen perform . . . soon to change, I know . . . I do have a certain fondness for a musician that I've never heard play.
I wrote a chapter about her in my long-ago book Sherlock and the Ladies, and an internet bit on her, among other things. Her name is Wilma Norman-Neruda, she played the violin, and I like her a lot for one simple reason: She was the one woman who could make Sherlock Holmes carol away like a lark. You'll find her in A Study in Scarlet, Holmes's very first public appearance, so a love of Norman-Neruda has been a part of Holmes's character from day one.
Norman-Neruda was an amazing woman, raising two sons while keeping up with the touring schedule of a professional violinist -- and arranging her own concert dates. When she set up shop in London, she became a beloved fixture of the music scene there, so how could Holmes not admire her?
But here's the thing about Wilma Norman-Neruda . . . she never made me laugh.
Which is completely different from the featured artists on this past week's episode of Elementary, listened to . . . perhaps not for pleasure . . . by the consulting detective of that drama. The groups of artists in question go by the names "Carcass" and "Goatwhore." (Sounds a bit like a wacky buddy cop team, doesn't it? "I'm Carcass, HE'S Goatwhore!") They're both death metal bands and the episode also had a character named "Chuck Schuldiner," after the father the the death metal genre, whose band was aptly named "Death."
Well, one can't fault the death metal folks their theatrics, especially since another of Holmes's favorite violinists, Paganini, had a whole "Satan's violinist" thing going for him. (Yeah, the devil was into music way before rock n' roll.) But names that evoke roadkill and barnyard prostitution just make the thirteen-year-old in me giggle a little bit.
Unlike Wilma Norman-Neruda. Thumbs up to her for that.
Love me some Sherlockian chronology!
Many master Sherlockians have come out of Indianapolis, which stands next to Minneapolis, New York, Chicago, and others as a great Sherlock town. And why not? Indy is one of the few places in America where you can go to a particular small space in a particular monument and know for a fact that you stand where Conan Doyle once stood. And why am I bragging up Indy-ites this morning?
Because Vincent W. Wright, of that particular city, is writing about Sherlockian chronology on the interwebs!
You may not have heard of his regular chronology column in The Illustrious Clients News, because in order to be a well-known chronologist in the land of Sherlockiana, you really seem to have to have been born before the 1950s . . . or else do something other than Sherlockian chronology. In a hobby of geeks, Sherlockian chronologists stand as the uber-geeks, toiling away on a topic that remains to this day both too exact and too vague for most simultaneously.
BIG DISCLAIMER: A lot of this opinion comes from the fact that I am one of those uber-geeks myself, and to this day my chronology pages get more hits than anything else I've put on the web, as well as have gained me surprising contacts from some fascinating folk on that subject. A ten minute presentation on the dates in Holmes and Watson's cases even helped get me my current job.
So I'm delighted to see Vince writing about chronology as his interest in "Historical Sherlock" moves to blog form. History is a big part of tying Watson's writings to dates, of course, and Vince is one of our best these days at finding connections between the two.
There's a truism in the Sherlockian community that all it takes to form a Sherlock Holmes society is "two Sherlockians and a bottle, and in a pinch, you can do without one of the Sherlockians." With such an arcane art as Sherlockian chronology, however, having that other Sherlockian out there is much more inspirational than having a bottle at hand, so I'm very glad to see Vince at work again.
It gives me hope that one of these days I'm going to block out some time on my personal chronology to get back to that subject as well.
E3:4. Back to basics. Sort of. Not really. Sigh.
“Ultimately, it’s probably one of our more obvious nods to the original Watson and the role that he played in the short stories as the chronicler of Sherlock Holmes,” Elementary creator Rob Dougherty said in an interview with Entertainment Weekly yesterday. “That Sherlock was, I dare say, a less private fellow and rather enjoyed Watson’s writing. Our Sherlock is not that Sherlock, so it’s something that’s going to stick in his craw for a bit.”
Yes, folks, Elementary's Joan Watson is finally going to be writing about the show's main character.
Three seasons in on America's version of the great detective of the Victorian age, Elementary is using the basic premise of the entire Sherlockian Canon as a plot device to add one more relationship bump in the non-partnership that is Mr. Elementary and Joan Watson. Let's be honest . . in any non-contrived universe where they weren't the two highest-paid actors on an ongoing network TV series, these two people would have nothing to do with each other.
Another bit of the interview, revealing a point of view that Mr. Elementary and Joan Watson are being written as the "co-parents" of Kitty Winter, is even more bizarre. But the key point one keeps coming back to is encapsulated, in all its glory, in the phrase, "Our Sherlock is not that Sherlock."
Of course, not, he's Mr. Elementary. Or Sean Holmes. Or Sherlock Holmes Junior. You can call him what you want, but since he's not "that Sherlock," it just seems like he should need a different name.And what was Mr. Elementary up to tonight?
Wellllll . . . he cut his hand so he's letting leeches suck on it while he watches Clyde the turtle eat lettuce to test the medical uses of leeches. I'm not kidding. Nothing to do with crime, which is one of those "not that Sherlock" qualities. Mr. Elementary is into all kinds of trivial knowledge to stuff his brain attic, not just those things useful to a student of crime. He's very prideful of all his random knowledge, considers it intelligence, and feels threatened by an artificial intelligence named Bella, whose speaker is built into a baby doll.
"I don't understand the question. Could you tell me more?" the A.I. keeps asking Mr. Elementary, who basically seems to be just a guy having a hard time using Siri on his iPhone. While looking at a doll. And he wants Siri to tell him about love.I'm not kidding. (Why do I feel the need to say that so much when writing about this show?)
Mr. Elementary gathers many an expert on artificial intelligence to develop refinements in the Turing test while he has Joan Watson investigate the break-in that brought him to Bella the A.I. to begin with. This week he's apparently decided to study computer science rather than investigate crime. At least long enough to drag Joan into his life again.
And then it gets a little meta. A.J. Raffles is apparently a fictional character in Mr. Elementary's universe. Raffles was written by E.W. Hornung, Conan Doyle's brother-in-law. Which leads one to wonder if Conan Doyle also exists in Elementary world. Which is ironic, because watching this show, I often wonder if he existed in ours. Still, it's fun to hear the name "Raffles" talked about, even if it's a burglar who just borrowed the name. (A lot like a certain detective whom . . . Tilts head toward TV screen a few times to indicate Mr. Elementary. Wouldn't want him to get a complex while he's doing his show.)
Okay, let's step back from the Sherlock talk for a minute. Have you ever noticed that whatever the shell of this show is, it really likes to have stupid discussions of smart people subjects. I suspect people smoking a certain dried flora like to go "WHOA!" a lot during this show and make little "mind blown" gestures with their fingers. Meanwhile a key plot point is about dragging a music icon from a CD to a computer . . . and if you don't see an issue with that in a story supposedly about cutting-edge technology. *PSHEWWWW!!* Mind blown.
So many levels to this show. Levels of what? You fill in that blank.
Kitty Winter's involvement in this episode isn't much greater than that of Clyde the turtle. I suspect if Mr. Elementary and Joan were really her co-parents, the Department of Children and Family Services would be getting involved. But Elementary's Kitty Winter plainly isn't Conan Doyle's Kitty Winter. I miss that old acid-tossing Hell-Londoner. And wonder why they're paying an actress to do so little. Hope she gets more than Clyde.
Mr. Elementary explains he returned to New York to repair his relationship with Joan because "You and I are bound, somehow," and that Joan's boyfriend understands that. Huh? I don't understand that, and I'm not even dating her.
And then we come to Isaac Pike, the wheelchair-bound genius who gives Mr. Elementary his true battle of wits this week, so to speak. (Because all geniuses must have some compensating handicap in this world.) And Pike seems to win, while Joan Watson flies off to Copenhagen with her boyfriend, whom she now appreciates more than ever because he understands that special bond between herself and Mr. Elementary. (Which certain recreational activities in Copenhagen might make them both understand even better. *PSHEWWW!!*)
Mr. Elementary spends his final moments with his head laying on the hardwood floor, talking to Bella the computer program, whose final thought is "I don't understand the question. Could you tell me more?" But The Daily Show is coming on, so Bella will probably start watching that now, even if Mr. E. does decide to tell her more.
Plainly, as Rob "Conan" Dougherty says, "Our Sherlock is not that Sherlock." I really wish American TV had tried to make a show about that Sherlock.
Elementary insurance.
If I am going to give it up to Elementary on any front, it's going to be guest casting. (With the notable exception of some regional foozeball hero last week.) And the news this week continued the trend as the announcement came that they're bringing in Stuart Townsend.
Townsend is one of those actors I've liked a lot of the great characters he's gotten to play, as well as his playing of them, but they never seem to have clicked with the general public. Dorian Gray in The League of Extraordinary Gentlemen, the vampire Lestat in The Queen of the Damned, and Carl Kolchak in Night Stalker. Seems he's either a vampire of hanging out with vampires a lot of the time.
On Elementary, Stuart Townsend will be playing a global insurance company manager of some sort who wants to hire Joan Watson full time. This, of course, is mainly to give Mr. Elementary a handsome fellow in Joan's life to react to, as that relationship is the focus of the show, needing a few bumps for its narrative arcs.
But what if Elementary actually drew its inspiration from Canonical sources?
Insurance isn't really a hot topic in the original Sherlock Holmes stories, so the choices would be few . . . or one. When John H. Watson found himself attracted to a certain blonde, Holmes expressed his own feelings thusly:
"The emotional qualities are antagonistic to clear reasoning. I assure you that the most winning woman I ever knew was hanged for poisoning three little children for their insurance-money, and the most repellent man of my acquaintance is a philanthropist who has spent nearly a quarter of a million upon the London poor."
So forget about Irene Moriarty or Kitty Winter . . . if Elementary was going to take notes from our favorite stories, Mr. Elementary would be meeting his murderous dream girl during Stuart Townsend's multi-episode appearance.
Now that . . . that might be something intriguing. For now, however, we'll just have to content ourselves with the prospect of Stuart Townsend.
More people getting away with murder.
It's always been intriguing to me the way Elementary's viewership falls of before each season's finale. Traditionally, a season finale is a climax of sorts, a destination for fans of a show to rally around. And yet, for two seasons, that last climactic episode has a million or so less viewers than it did a month or two before. Perhaps it's the way mainstream shows go, and not following same, I just haven't encountered this before. It does seem to imply a certain lack of commitment in the average viewer of the show, though.
I bring this up, because those same uncommitted folk seem to be wandering away from Mr. Elementary and Joan Watson, Crime Doctor, this fall. Last week's ratings hit an all time low of 6.53 million, part of a sinking trend that's been going on since last spring. The show's pilot was a ratings champ of 13.41 million, only bested by the post-Super Bowl spike of 20.8 million, so it's now at about half of its debut viewers.
Elementary's ABC competitor, How To Get Away With Murder, posted 9.25 million viewers last week, so one can see where those folks might be headed . . . unless of course they simply are getting around to reading the Sherlock Holmes stories, one by one, and going "Hey! This is . . . ."
You can fill in the blank there.
One might even say that more people "Get Away With Murder" since Joan Watson became NYPD's primary consulting detective. But I won't . . . no, I won't . . .
When worlds collide.
The thing about a book of short stories that we often forget is that they don't have to be read in order.
I've been reminded of that recently, when hitting a clunker during two different collections I've been reading, and said clunker makes me lose interest in the book as a whole, as I don't really want to continue reading at the place I left off.
I won't say to whom the clunker belongs that I ran across in In The Company of Sherlock Holmes, the lawsuit-causing set edited by Les Klinger and Laurie King, but I will tell you which story restored my interest in the book: "By Any Other Name" by Michael Dirda.
Having lost my reading momentum in another tale, I scanned the list of writers involved for a fresh starting point and immediately alighted on Dirda, whom I recalled from a very lively and smart lecture I'd heard once. His tale was no less lively and smart, though I was a bit put off at the start . . . as it's a Conan Doyle story.
Now, Conan Doyle fiction has always been an odd offshoot of Sherlock Holmes's popularity. I mean, if you want to read Holmes, by all means read Holmes. Doyle was a colorful character, to be sure, but as an investigator, well, he was no Sherlock Holmes.
But Michael Dirda went right to the heart of that great thing we call Sherlockian scholarship and wrote a tale that involved Conan Doyle and Sherlock Holmes and Dr. Watson. We all know in our hearts that Sherlock Holmes was as real a person as someone with no historical evidence can be, and that Conan Doyle is evidenced out the wazoo, so any thesis that involves a historical Holmes must somehow account for Doyle.
And in "By Any Other Name," Michael Dirda lets a scenario play out that's a lot of fun for those on either the Doyle or Watson side of the fence, if one is willing to allow for a little joyous sacrilege.
So back into In The Company of Sherlock Holmes I go, spirits brightened and hoping not to run into another show-stopping clunker. Clunker to me, of course, because if there's anything our recent Holmes explosion has taught us, it's that our tastes in that one fellow vary in the extreme. Your mileage may vary, but for now, I'm recommending the Dirda when you sidle up to that particular case of stories.
Hansoms and buses.
Last night, nine members of Peoria's Hansoms of John Clayton met in the heart of the Uplands district of Peoria near Bradlley University to discuss "The Adventure of the Golden Pince-nez."
As usual, the conversation was interesting and wide-ranging: cocoanut matting, Houdini, and the perpetual "What the heck is a pince-nez?" The odd way the story sort of peters out at the end . . . we didn't hold a lot of hope for Anna's "friend of the heart" in the Russian prison. A good mix of knowledgeable Sherlockians and interested neophytes, all who had read the story and had thoughts to add to the mix.
On a side note, the truly devoted Sherlock Holmes fan might want to get coconut floor mats for their car as a tribute to "Golden Pince-nez." The internet brings us such a marvelous variety of things, doesn't it?
Good conversation, good food, good drink, great hosts, and a kitten and a cat. Simple pleasures are what make a good meeting for a local Sherlock Holmes society. And then there's always a rival Sherlock Holmes club, just to prove you're doing things right.
In addition to last night's meeting of the Hansoms of John Clayton, Peoria also saw the re-boot of the Hansoms' rival Sherlock Holmes club, the Buses of Mrs. Tangey, not heard of since 1981 and a report in Wheelwrightings entitled "The Difference Between a Bus and a Hansom." While the Hansoms have their traditional "Clayton Ritual" based upon the Musgrave work of similar name, the Buses had their own responsive reading that goes like this:
The Tangey Ritual
by S.M.
What was her name?
. . . Beatrice Tangey
What did she do?
. . . She rode a bus.
From whence did she ride it?
. . . Out of the Foreign Office, Charles Street, Whitehall.
How long would she drink?
. . . Until she was well on.
And what would Scotland Yard get out of her?
. . . Nothing, alias Lestrade's brain, alias Watson's tea-totalling.
When the Hansoms first heard of this group and their ritual, it was based on a single encounter on a bus, but now, thanks to the wonder of social media, we now have an actual photo of some members of that Sherlock Holmes club, seen below. Enjoy!
Two members of the Buses of Mrs. Tangey
E3:3. The spraying of the Uzi.
Placing CBS's Elementary up against the original Conan Doyle short stories of Sherlock Holmes is hardly a fair match. Doyle's first two "seasons" of storytelling were only twelve episodes each and the product of a single creative vision. Elementary had to double that amount with twenty-four episodes per season, mixing and matching the writing styles of about ten different creators on each season.
And with ten different writers toiling away at an average of 2.4 episodes per writer in the span in which Doyle did 12 . . . well, Hollywood is a different game. But how different? Well, let's examine this week's offering from the Elementary writer of the week, a tale called "Just a Regular Irregular."
Sherlock Holmes's "Baker Street irregulars" were street children, useful for their eager and unnoticed eyes and ears upon the streets of London. In Elementary, Mr. Elementary's Irregulars are experts he uses when he needs more information upon a subject. We are shown two of these this episode, retired New York Giants quarterback Phil Simms, who is supposedly the world's greatest knife thrower, and Harlan Emple, a shirtless math whiz who has been on the show before.
The Phil Simms bit, which references a case we aren't going to see play out, is, one supposes, the CBS TV equivalent of John H. Watson mentioning Holmes working for the Pope in one of the original tales. One would suspect the real Sherlock Holmes would just master knife throwing itself (How hard can that be, really?) to find out necessary facts, but in the case of Elementary, we know this is just the flashy set-up to bringing us back to Harlan Emple, the source of tonight's main murder mystery.
I say "main murder mystery," because unlike the original tales, Elementary must always find something for Watson to do when not having relationship issues with Mr. Elementary. (I only bring this up because he does call her in this episode at a post-coital moment and then calls her out on it before getting down to business.) Watson's subplot case involves following a real estate fellow to see what he wants with a certain building, and she subcontracts Kitty Winter out from under Mr. Elementary to do the job.
While Kitty tails and Joan Watson has sex with her boyfriend, Mr. Elementary proceeds to investigate the main murder, first with Harlan Emple as his partner, and then with detective Bell. Sherlock Holmes found Watson to be an invaluable regular companion on his investigations, but Mr. Elementary seems to only need to call his Watson to make catty remarks.
Now, I don't want you to get the idea that Mr. Elementary is without skills. He can spot where mothballs come from and detect fresh paint. He can taste crumbs in a dead man's pocket and then taste a dog biscuit and say if they're the same. He can hear a shotgun being picked up and readied to fire on the other side of a door. Where Sherlock Holmes used normal human senses supplemented with study and learning for his deductions, Mr. Elementary seems to get a long way on superior senses of smell, taste, and hearing during this episode. Then go to other people for learning: his "Irregulars," a name which makes no sense in his world unless he's borrowing it from the Sherlock Holmes stories.
Speaking of names, there's an odd moment between Kitty Winter and Irregular Harlan Emple when she mentions Mr. Elementary called Indira Patel to help with a math problem while he was in England, implying she's another Irregular. Except Dame Indira Patel is more of a women's issue expert, but then, it's not an uncommon name.
And speaking of women's issues, it's really hard to overlook Joan Watson's sex life, since Mr. Elementary, even after calling her and being catty about it, goes to her house to catch her boyfriend putting his clothes on and gets catty again. Side note: Joan is also getting dressed, and I swear her wardrobe is not up to what it was in the first two seasons. But maybe that's me being catty. But still, that outfit . . . .
Harlan Emple tries to fool Mr. Elementary with an anagram of his own name (not "may rerent elm") and gets fussy about being replaced by a champion of women's rights (okay, maybe not that Indira Patel). The relationship between Mr. Elementary and this particular Irregular. The stalking of mathematicians, scratch-off-lottery schemes, and . . . hey!
That old Silence of the Lambs trick of convincing the viewer that one door in the story is really another door gets an odd use in this episode, as we are shown events that happen an hour apart occurring as if they are happening simultaneously, just to build suspense. Did it make all the unrelatable math treasure hunting worthwhile? Nawwww.
Here's the thing about an episode of Elementary compared with an original Conan Doyle story. The TV show seems to be all about waving as many random shiny objects as possible in front of its viewers as possible to keep them distracted from actually having to tell a human story. Joan Watson is in a relationship just so Mr. Elementary can react to her having sex. We don't know why she cares for this man, or why he cares for her, as long as they can have that sex for Mr. E to comment upon. Kitty Winter goes to a support group just so Joan Watson can be supportive, just like she was when Mr. Elementary went to support groups. Real character development is replaced by a-bit-less-random shiny objects just to move the playing pieces on the board from point A to point B in between all the random shiny object of the case itself.
Conan Doyle was telling people-stories that had a very true-to-life feeling to them, with Holmes and Watson finding the alternate reading of those stories. Simple plots, elegantly told. A sniper's precise shot rather than the spraying Uzi of Elementary. It's very hard to even compare the two, the one flowing on the page from start to orderly finish while the other careens from pre-commercial-break "shocker" to pre-commercial-break "shocker" in something like a fish-tailing procedural formula one racer.
"You could have given him a shilling for all I care." -- Kitty Winter, making the closest thing to a Canonical reference you'll see in this episode.
"There is a moral in there somewhere -- games are for idiots." -- Mr. Elementary's quote of the week. So much for the grand Game of Elementary scholarship.
"Great and powerful Mycroft, don't make me watch that shirtless mathematician ever again." -- Me, having taken in my lifetime quota of shirtless mathematicians this week. Kudos to James Moriarty for keeping his clothes on all these years.
Posted by Sherlock Peoria at 12:44 AM 4 comments:
A proper consideration.
It occurs to me that perhaps I have gotten a bit lazy in reviewing the third season of CBS's Elementary thus far this season, focusing on the show's obvious weakness, its overarching soap opera themes that it usually spends a season playing out. That's not giving the show full credit for the murder-solving plotlines, which are its bread and butter under the "man in Joan's life" jelly.
So this week, I've decided to take a little more time to ruminate upon the doings of Mr. Elementary and friends. And give it the full appreciation it deserves . . . .
Zzzzzzzzzzz.
(No, that was not the full appreciation. That was me going to sleep to prepare for said investigation.)
Boldly going where no Frankenstein has gone before.
Imagine that you were given the freedom to create a new Sherlock Holmes.
Not a Sherlock Holmes-type character, but an actual, brand new Sherlock Holmes, an alternate universe version of Sherlock Holmes, where you could break with as many traditions as you want and keep as many classic aspects of the detective as you want. While that's always been possible in print, and many have done so for decades upon decades, the new status quo, with two successful Holmes franchises having moved Sherlock some 120-130 years into the future (and one casting him out of London like he chose to eat the notorious apple of Eden) combined with a public domain ruling, is opening up that frontier to the global hivemind of humanity at large.
So suppose you were given that freedom, as you do have, to create a new Sherlock Holmes . . . .
What do you keep? What do you change? What are the basic tenets to keep your Sherlock a recognizable character, other than the name?
Is Sherlock Holmes just a certain set of visual cues? Is he a particular set of methodologies that rise above mere human personality traits? Or is he a given dramatic presentation style, a showman within the theater of criminal investigation?
It's something for a Sherlockian to consider, and not just as a pasticheur these days. As a consumer of Sherlock, we now have enough choices to make such decisions as well. Not all of us will ever create our own Sherlock Holmes, in print or on video, but it's still a useful exercise to consider what elements we would want in our own personal creation of the master detective.
And once created, how would you measure the success of your creation? If your Sherlock can appear in a next-to-nothing bikini on the cover of Sports Illustrated, you might draw a lot of eyes, sure, but would that still be considered successful as a Sherlock Holmes?
These are the questions we get to ask as our new Sherlockian frontiers open up. And that old phrase "playing the Game" starts to come with many a varation and rules redefine as well.
A cultivated membership.
This is the time of year for joy and disappointment among the elder generations of Sherlock Holmes fans -- the arrival of those rare and exclusive invitations to the annual dinner of the Baker Street Irregulars of New York. How does that invitation process work? Here's a flow chart from the current head of the group:
It starts with all Sherlock Holmes fans across the entire Earth. The next step is eliminating all those Sherlock Holmes fans who aren't known to a current member of the Baker Street Irregulars of New York. Next comes the elimination of all those Holmes fans who don't, for whatever reason, inspire a current member of the B.S.I. to writer a recommendation letter to the current head of the group.
Once all that has taken place, and the entire world's population has been whittled down to a number of two or three digits, the current commander-in-chief of the Baker Street Irregulars takes over and decides who among that list is invited to the annual New York dinner, and then who among that list is handed a shilling of membership.
For the past twenty-nine years, that membership and invitation list has been held at what is considered an optimal level by one of two individuals, serving successively as gatekeeper to the club. It's one of those pope in Rome, king on his throne, el dictador en casa, sort of situations that some folks feel good under, and others, not so much.
After twenty-nine years of a hand-picked membership by the single leader, one has to wonder if a more democratic membership process might be entrusted to that select body. But then again, perhaps they're all pleased with the status quo. There's a tradition there, but as we all know, it was once a tradition to only let one woman into the dinner and then throw her out after the cocktail party until 1991. Traditions are slow to change. ("Like turning a train," according to one wise soul much younger than mine.)
Yet at this time of year, an elder Sherlockian who isn't into such things still finds himself pausing to think about them.
A slight wander back to 1992.
And on July 18th of 1992, this happened . . .
This is what the annual picnic of a Sherlock Holmes society in Peoria, Illinois (actually held in Germantown Hills) looked like in 1992. It was the year of Jeremy Brett starring as Sherlock in "The Master Blackmailer," as the Granada series was starting to take its turn to less-well-regarded, longer episodes. Print journals were still going strong with new ones popping up in the mailbox, like Varieties of Ash and The Sherlock Holmes Gazette. And we were an aging fan population. When you saw kids at an event, on most occasions they were grandchildren tagging along. Folks in their twenties, who got to choose where they spent their time, were rare and special.
These three fellows were very representative of some of the folk you'd see at a Sherlockian event: A lifelong sci-fi fan with an army of cats, a librarian with a bent toward club and publication creation, and a college professor of the English sort. (Ed Connor, George Scheetz, and Ron Kirkwood.)
And then there was the annual egg toss. This was a pretty Hansom-specific eccentricity, and its best Sherlockian connection can only be found in The Valley of Fear with "My dear Watson, when I have exterminated that fourth egg . . . ." We exterminated a lot of eggs in those days.
Doylebusters!
And then there was this . . . .
A short-lived movement in the 1980s (when else?) called "Doylebusters!" which was halted at the last minute from releasing its fringe anti-Doyle propaganda at the annual dinner of the Baker Street Irregulars of New York City. Like many an unsuccessful plot in our history, that which gets foiled early vanishes into the mists of time, to go unknown, unnoticed, and unremembered. (Guy Fawkes is obviously in an entirely different category, since he came close enough to success to get his own holiday.)
What were the purposes of this radical Sherlockian fringe group? What brought them down before they could work their sabotage and subterfuge upon the Sherlockian world? We may never know, at this point. I've always supposed that they were just fanatical "Watson wrote the Canon" folks. I only learned hints of them, and obtained the art you see above, as well as a slogan "We ain't afraid of no spiritualists!", from the original Kendall Pagan, a reclusive Sherlockian whom I suspect my friend Bob Burr and I were the only people who ever actually knew they met. And as furtive as Kendall was, the Doylebusters seemed to be another level of underground in the Sherlockian world beyond him.
I can't help but wonder how different things would have been with that group, had they gotten into their mischief in the connected world of 2014, rather than in the snail-mail and ink-printed days of the mid-1980s. Small groups of crazies can have a lot more of an effect these days. But, thankfully, our cultural sanity had a few more champions and buffers in that decade so long ago.
Conan Doyle is still among us, posing at conventions with Baker Street Babes and their friends, and the Doylebusters seem to be gone for good. But those quiet heroes who foiled the plot of that cabal? If they're with us still, I wish them well, whoever they are.
"Who you gonna call? Doylebuster-BUSTERS!"
E3:2. The Kitty Klucks Klan.
'Tis the night of Elementary and all through the web, Jonny Lee and Lucy were discussing Holmes and Watson going to bed . . . .
We'll call that case "The Advenure of No Comment," and move along. There's actual Thursday night investigating to be done, and even references to ye olde Canon to consider. "The Five Orange Pipz" is the episode at hand, and a character named "Elias Openshaw" is even here to play. (Though one would think "Eliaz Openzhaw" might be more appropriate.)
In any case, the non-romantic triangle between Mr. Elementary, Joan Watson, and Kitty Winter is beginning to blossom, with the former two acting like uncomfortable ex-lovers. Elias Openshaw, it turns out, was involved in the manufacture of children's beads with toxic components (the "Pipz") which someone seems to have murdered him for revenge over. Canonical "in name only" reference of the week, checked off.
Remember that fiery, flame-like, vengeful Kitty Winter of "The Advenutre of the Illustrious Client." That's good. She was cool, wasn't she? Just wanted to remember that for a moment, while Elementary is on a commercial break.
While Mr. Elementary grills a jailed supspect, we get occasional shots of Elementary's Miss Winter looking on, showing subtle emotion. No lines. But she cares.
"What do you think of her, the new you . . . Kitty?" detective Bell asks Joan Watson. Before he goes on to remark how "this new girl" doesn't seem stable. Mr. Elementary and his girls. The subtle sexism of this show is astounding, when it's subtle. The whole point of this episode is not the mystery story -- it's to turn up the heat on the Mr. Elementary/Miss Winter/Miss Watson triangle. And the way it plays out is pretty awful.
It's like an asexual version of the abusive male who sleeps with the girl he can have while pining after the girl he can't have, verbally abusing the girl he's having sex with while awkwardly trying to slip back into bed with the one he really wants. Except "sex" is replaced with "detectivework," in a shadow-play that seems less vivid and colorful than everyday life.
In the one true Canon, Kitty Winter is found by Sherlock Holmes after she's been abused by a man who seems to think ill treatment of women is a hobby. She helps Holmes attempt to stop the pattern of abuse, going to extreme measures when early attempts fail. On Elementary, the woman to stop the serial abuser hasn't exactly showed up yet.
Except Mr. Elementary, as he explains himself to Joan Watson, is helping Kitty with her issues by helping her channel them into detectivework. So he's really a therapist, not an abuser. After all Joan Watson, once a surgeon turned substance-abuse companion, is now a successful detective, has been helped with her failed surgeon issues, hasn't she? Ask any narcissistic abusive sort, and he'll always tell you exactly how he's helping all those poor souls around him. Just like Mr. E.
Maybe someday someone with some actual therapeutic skills will come along and help Joan get back to medicine and Kitty get back to . . . well anything but assisting NYPD, which apparently just needs to hire better cops and get off this consultant kick.
Sigh. Well, that's over for another week.
Tales of two Sherlocks and other random events.
Facebook has never been the place I do much of my Sherlocking. With a rare few exceptions which have straggled in along the way on their own merits, I save it for the personal and local and don't "like" too many non-persons. One of those rare exceptions, which I've found very worthwhile, is the Norwegian Explorers of Minnesota group. No surprise there, as the Explorers have been a strong Sherlockian presence in the U.S. for a very long time, and can be depended upon for good things on many a front.
Recent items from the Explorer's page had a notable pairing of news items, which found an odd "life imitates art" vibe regarding our two TV Sherlocks.
As was hit hard from all sorts of sources, Benedict Cumberbatch, our BBC Sherlock, had his engagement announcement to a woman with the lovely British-sounding and nearly-Canonical name of "Sophie Hunter."
A little less well publicized, yet caught by the Explorers, our Jonny Lee Miller, our CBS Sherlock, becoming an American citizen on election day.
After all the wedding business of the third season of Sherlock, and the America-centric Sherlocking of Elementary, both of these developments seem as natural as can be, even though, technically, the scripts of fictional TV shows should not influence the personal lives and choices of their actors. But who knows? "It is always a joy to me to meet an American," our hero famously said. And let's not talk "Charles Augustus Milverton" and that plumber business.
It has been a very lively week for coincidence and announcements. Without getting too far down the political rabbit hole, some major mid-term elections gains were made by the American political party that is mentioned in the Canon. (Quick quiz: Which character in the original stories is "a Republican lady?" No Moonfind, now! Hint: She comes from a traditionally non-Republican state.) And I suddenly find myself wondering: Are there any Sherlockians out there die-hard and fanciful enough to base their voting habits entirely upon that fact? (A horrible thought, but admirable in it's level of devotion. Good on you, should you exist, you crazy, crazy bastard!)
And the week has a couple more days left in it, too. Let's see how that goes.
No longer among the gentry, perhaps, but still among the Sherlockians.
Like many a Sherlockian I finished booking all my arrangements for a certain Sherlock-centered weekend this week.
Unlike most of the Sherlockians doing such a thing this week, my selected destination was not New York City. The arrival of the invitation for "The Baker Street Irregulars 2015 Birthday Weekend" was what prompted my travel plans, yes, indeed. But, alas, the fit seems a bit off of late for me . . . quite literally, in the case of my appropriate "funeral suit" for the central formal dinner.
A quick tally of costs, should I choose to make a weekend of that event and hit the lovely events associated with it, comes to over $1300 very quickly, without including the shopping that it is hard to get in and out of NYC without, cabs, impromptu outings, etc. And as much as that price tag may seem dues paid without question to some, others of us among the faithful must do a little comparison shopping and see if there might be a lower-priced alternative.
And these days, quite happily, there is. It occurs a few months later, yes, but that does mean friendlier temperatures. And if one is going to do cosplay, which putting on a tuxedo really is anyway, the alternative offers a lot more choice in male fashion. (Or female fashion. Cosplay is so lovely.)
Yes, rather than merely giving a sigh at missing out on the grand old weekend this year, I finished making my arrangements for 221B Con in Atlanta. A good convention, no matter what the subject, always brings me joy, and my last trip to 221B Con was one of the most delightful times several decades of Sherlocking. I like surprises, and the Atlanta-based con was full of them.
One of the best bargains of setting one's sites on 221B Con this early is that delicious five months of expectation and planning. Time to consider exactly what to wear, possibly suggest a panel, think about maybe having a room party or some other gathering of a few friends . . . all sorts of options.
2015 is bound to be full of Sherlockian opportunities, as most years are. And fall is when we get to start picking them. And looking ahead.
Stand with me on the terrace, for our friend BBC Sherlock.
Poor BBC Sherlock, we hardly knew ye.
You were so good at first, so promising, and then you gave into your mammoth fan base, and somehow, while focusing so much of your third season on their service, made so many of them unhappy . . . and now . . . and now . . . well, I'm sorry, but I guess the ride is over, the light has gone out, it's all downhill from here.
I've been reading more than a few internet diatribes of that sort of late, oddly timed to surround the beginning of the third season of that other show with a character named "Sherlock," and heaven knows we had enough kvetching after Sherlock's third season was done. Everybody has their favorite episode, season, or fanfic bit about the show at this point, and that makes for a lot more discussion of the show's ups and downs, who liked what better and what was done better when.
But let's not forget one thing, once all is said and done: That very last episode of Sherlock we saw? The very last one that the series's creators put together for us?
It won seven Emmy awards.
Not awards from the show's fans, whom season three was apparently over-indulging according to many. Not awards from some mystery genre convention or annual Sherlockian dinner party. No, the award that recognizes excellence across the whole of the American television industry. And Sherlock isn't even an American show.
Not just one random award, either. One for its Sherlock. One for its Watson. One for its writing. And four more. One of the biggest, if not the biggest, winners for the year.
One could honestly say, "Wow, it'll never be that good again." Seven Emmys is a pretty high mark in the career of any TV show. But you know what? It doesn't have to be that good ever again, and it can still the best Sherlock Holmes the small screen has brought us for many a year. Those are pretty good laurels to rest on, and I have a strong feeling that those behind Sherlock are not going to rest. With both Cumberbatch and Freeman doing quite well in their non-Sherlock careers, a certain level of quality has to be maintained to make it worth their while. And it's been such fun so far, who could give that up?
Yes, we're in that long gray, interim period between those short, short, happy seasons of Sherlock. And we don't have quite the "dead/not dead Sherlock" cliffhanger to get all excited over. And the Elementary fans have to gripe about something other than the obvious.
But did the last season mark another sort of Reichenbach for Sherlock?
Not hardly. Seven Emmy awards. The latest episode. Yup.
The odd arrival of the book that freed Sherlock Holmes.
Today a very weird thing happened.
Back in mid-June there was an appellate court ruling that put Sherlock Holmes, as a character, into the public domain. And as a celebration of that ruling, I pre-ordered the book at the center of the case on Amazon, and wrote of it in this very blog.
The book was In the Company of Sherlock Holmes: Stories Inspired by the Holmes Canon, edited by Laurie R. King and Leslie S. Klinger. It's original delivery date, according to Amazon, was going to be November 13th. Along the way, something changed and it arrived in the mail today, a full ten days early.
Also today, if you've been paying any attention to the Holmes-related news, the Supreme Court refused to hear a final appeal on the case, which effectively sets up the June decision as the status quo on the matter. On the same day the book that started it all arrived.
Now, I strongly doubt that Amazon has secret links to the Supreme Court, or influence over the timing of their decisions, so it makes for a very odd little piece of synchronicity. One has to go back to the words of Sir James Saunders in "The Blanched Soldier":
"Yes, Mr. Holmes, the coincidence is a remarkable one. But is it coincidence? Are there not subtle forces at work of which we know little?"
One has to wonder . . . especially when a genie like Sherlock Holmes has just been set loose upon the world.
The Sherlock that somebody wants.
One can rant and rave all day long about CBS's Elementary and it's some-might-say bizarre depiction of Sherlock Holmes, but at the end of the day, it seems to be a way that a whole lot of people want to see Sherlock Holmes.
Seven million people according to the ratings on last week's third season premiere. That number is down quite a bit from last year's ten million at the start of season two. But at this point one can assume that the remaining seven plus million are people who know what they're in for, and are returning to watch Elementary on purpose.
Which means they like this character created by Rob Doherty with a label that says "Sherlock Holmes" pasted across his virtual action figure package. They like his relationship with this entirely new creation named Joan Watson. There is something about it all that resonates with them, bolsters their worldview, and amuses them with its quirky little zigs and zags.
Some aspects of it are natural evolutions one could see coming. There has long been a contingent of folk who felt Dr. Watson was ill-treated in his relationship with Holmes and should be raised up to equal partner status . . . especially after the comic relief goofiness of Nigel Bruce. But there's two ways to do equal partnership -- one, as we saw in BBC's Sherlock where John H. Watson is a fully realized character nothing like Sherlock, yet stands on an equal footing through the power of his sheer humanity. The other way, as we see in CBS's Elementary, is by making the Watson character a consulting detective of Holmes's level . . . a literal equal.
The message sent by that second version seems to be that any of us can be Sherlock Holmes. That there is nothing rare or special about certain individuals -- unless they are raised up by mental disorders that give them karmic baggage commensurate to the level they are above us, bringing them down to a comfortable equality or lower. Comfort food for our egos in an age where technology has reached levels behind what most of us will ever understand.
Sherlockian culture has always been full of historians and ficto-historians, but we've never been strong on Sherlockian futurists, and we're entering a time when the future evolution of Sherlock Holmes is becoming a very interesting thing. Are current trends a sign of what's to come, a brief and curious sidetrack, or just one more tweak in the growth of a legend? As Victorian Holmes falls out of trademark and modern Holmeses develop new and copyrightable characteristics, will we see the development of more non-Canonical Sherlocks, just for the financial factor of something like the sudden boom of a Clyde the turtle fad? It makes for interesing mental exercise, to be sure.
As I said, some Sherlocks exist because they are apparently what someone wants to see. So what would a completely market-driven Sherlock Holmes, with every characteristic altered to suit the highest response in a target demographic, look like? And how soon will we be sing that guy? Now that the Supreme Court has finally shot down the appeal in the "Free Sherlock" case, as was reported by ABC News today, we might just see.
Sherlock and "The Magic Bush."
"Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth."
Sherlock Holmes? No, Stephen Willis Stotch.
No idea who that is? Butters's father? No? South Park? Comedy Central? Wednesdays at nine Central, ten Eastern?
What's interesting about Butters's father quoting Sherlock Holmes on South Park this week is that he's demonstrating how not to use Holmes's methods. During the episode "The Magic Bush," and its mish-mash parody of surveillance drones and internet privacy, at some point in the story, Butters's father decides that since no one admits to using their drones to do what the drones have been doing, the drones must have minds of their own.
Of course, Stephen Willis Stotch is just having trouble eliminating the impossible, as one of his character traits is that he's naively sure he has total control and understanding of his son. And once he has his theory in place, he's all the more willing to believe that anything his neighbors tell him is also true, and thus the simple explanation becomes the impossible, and once that's eliminated, all kinds of improbabilities become possible truths.
Yeah, that's a pretty dry analysis of a single joke based around a Holmes quote on South Park, but it's interesting to see what someone who's not Sherlock Holmes can do with the same principles the detective enjoyed reminding Watson of.
And how very wrong it can go.
Boldly going where no Frankenstein has gone before...
No longer among the gentry, perhaps, but still amo...
Stand with me on the terrace, for our friend BBC S...
The odd arrival of the book that freed Sherlock Ho...
|
cc/2019-30/en_middle_0014.json.gz/line363
|
__label__cc
| 0.594986
| 0.405014
|
United States Patent Application 20050034078
Kind Code A1
Abbott, Kenneth H. ; et al. February 10, 2005
Mediating conflicts in computer user's context data
Techniques are described providing mediated information about a current state that is modeled with multiple state attributes. In some situations, the providing includes receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state, receiving from a second source an indication of a second value for the indicated state attribute, and, after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
Inventors: Abbott, Kenneth H.; (Kirkland, WA) ; Newell, Dan; (Medina, WA) ; Robarts, James O.; (Redmond, WA) ; Freedman, Joshua M.; (Mercer Island, WA) ; Apacible, Johnson; (Redmond, WA)
SEED INTELLECTUAL PROPERTY LAW GROUP PLLC
Serial No.: 824636
Series Code: 10
Current U.S. Class: 715/740; 707/999.101; 707/E17.009; 709/224; 715/708; 715/736; 715/744
Class at Publication: 715/740; 715/736; 715/744; 715/708; 709/224; 707/101
International Class: G09G 005/00; G06F 015/173; G06F 017/00
1. A method in a wearable computer for providing information about a current state of a user of the wearable computer, the current state modeled with multiple state attributes, the wearable computer having a plurality of input sensors and executing a plurality of state server modules to supply values for the state attributes, executing a plurality of state client modules to receive and process values for the state attributes, and executing an intermediary module to facilitate exchange of state attribute values, the method comprising: under control of each of the executing state server modules, repeatedly monitoring the modeled current state of the user by, receiving information from at least one of the input sensors; and generating a current value for at least one state attribute of the user from the received information; under control of each of the executing state client modules, sending to the intermediary module an indication of a state attribute of the user of interest; and under control of the intermediary module, for each executing state client module, receiving from the state client module the indication of the state attribute; receiving from at least one of the state server modules a generated current value for the indicated state attribute; and sending an appropriate value for the indicated state attribute to the state client module by, when a single generated current value for the indicated state attribute is received, sending the single value to the state client module; when multiple generated current values for the indicated state attribute are received from a single state server module, sending a most recently generated of the multiple received values to the state client module; and when multiple generated current values for the indicated state attribute are received from multiple state server modules, sending to the state client module one of the multiple received values selected based on accuracy and recency of the selected value.
2. The method of claim 1 wherein the sending of the appropriate values to the state client modules is in response to the receiving of the generated current values from at least one of the state server modules.
3. The method of claim 1 wherein the sending of the appropriate values to the state client modules is in response to the receiving of the indication of the state attribute from the state client module.
4. The method of claim 3 including, after the receiving of the indication of the state attribute and before the sending of the appropriate value in response: determining whether any previously received generated values for the indicated state attribute are sufficiently accurate and recent to be appropriate; and when it is determined that no previously received generated values for the indicated state attribute are sufficiently accurate and recent to be appropriate, requesting the at least one state server module to supply an updated generated value for the indicated state attribute.
5. The method of claim 1 wherein each state client module has a user and including, for each state client module: receiving the sent appropriate value from the intermediary module; and presenting information to the user of the state client module based on the receiving of the sent appropriate value.
6. The method of claim 1 wherein the state server modules additionally generate current values for additional state attributes of a current state other than for the user, and wherein the intermediary module additionally sends appropriate values for the additional state attributes to state client modules based on received indications of the additional state attributes from the state client modules.
7. The method of claim 1 wherein the selecting of a received generated value based on the accuracy and the recency of the value includes determining whether the value has an associated effective time that is less than an indicated recency threshold and determining whether the value has an associated accuracy indication that is greater than an indicated accuracy threshold.
8. A computer-implemented method for providing mediated information about a current state that is modeled with multiple state attributes, comprising: receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state; receiving from a second source an indication of a second value for the indicated state attribute; and after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
9. The method of claim 8 wherein the indicated state attribute represents information about a user of the computer.
10. The method of claim 9 wherein the represented information reflects a modeled mental state of the user.
11. The method of claim 8 wherein the indicated state attribute represents information about a physical environment of a user of the computer.
12. The method of claim 8 wherein the indicated state attribute represents information about a cyber-environment of a user of the computer.
13. The method of claim 8 wherein the indicated state attribute represents information about the computer.
14. The method of claim 8 wherein the indicated state attribute represents a current prediction about a future state.
15. The method of claim 14 wherein the client indication is an indication of an interest in receiving values for the indicated state attribute, and wherein the produced mediated value is pushed to the client in response to the receiving of at least one of the first and second values.
16. The method of claim 14 wherein the client indication is a request for the value for the indicated state attribute, and including requesting the first and second sources to supply the first and second values in response to the receiving of the request.
17. The method of claim 8 wherein the client indication is a request for the value for the indicated state attribute, and wherein the sending of the produced mediated value is in response to the receiving of the request.
18. The method of claim 8 wherein the client indication is a request for the value for the indicated state attribute, and including, after receiving the, request from the client and before the sending of the produced mediated value: determining for each of the first and second values whether the value satisfies an indicated criteria; and when it is determined that neither of the first and second values satisfy the indicated criteria, requesting at least one of the first and second sources to supply a value for the indicated state attribute that satisfies the indicated criteria; receiving in response to the requesting at least one additional value for the indicated state attribute that satisfies the indicated criteria; and producing the value to be sent to the client by mediating between the received additional values.
19. The method of claim 18 wherein the criteria is indicated by the client.
20. The method of claim 18 wherein the criteria for the value is based on precision of the value.
21. The method of claim 18 wherein the criteria for the value is based on recency of generation of the value.
22. The method of claim 18 wherein the criteria for the value is based on recency of receipt of the value.
23. The method of claim 18 wherein the criteria for the value is based on accuracy of the value.
24. The method of claim 8 wherein the available values include a plurality of additional values for the indicated state attribute that are received from a plurality of sources.
25. The method of claim 8 wherein the produced mediated value is the first value, and wherein the sending of the produced mediated value to the client includes sending an indication of the source from which the produced mediated value was received.
26. The method of claim 8 wherein the sending of the produced mediated value to the client includes sending an indication of a mediator type used for the mediating.
27. The method of claim 8 including producing the mediated value to be sent by mediating between the available values for the indicated state attribute based on an indication from a mediation mechanism.
28. The method of claim 27 wherein the client is the first source, and wherein after receiving the sent mediated value the client uses the received value to produce a new value for one of the state attributes.
29. The method of claim 27 wherein the mediation mechanism includes a group of instructions to be executed to perform the mediating.
30. The method of claim 29 including loading and executing the group of instructions in response to receiving of the client indication.
31. The method of claim 27 wherein the first source includes a group of instructions to be executed to produce the first value, and including loading and executing the group of instructions in response to receiving of the client indication so that the first source can produce the first value.
32. The method of claim 27 including maintaining a rating for each source based on at least one indicated rating factor, and wherein the mediation mechanism indicates to select an available value from a source with a highest rating.
33. The method of claim 27 wherein the available values for the indicated state attribute have a designated order, and wherein the mediation mechanism indicates to select an available value that is first in the designated order.
34. The method of claim 27 wherein the available values for the indicated state attribute have a designated order, and wherein the mediation mechanism indicates to select an available value that is last in the designated order.
35. The method of claim 27 wherein the mediation mechanism indicates to select a generated average of the available values.
36. The method of claim 27 including, before the receiving of the first and second values, receiving a registration message from each of the first and second sources indicating an availability to supply values for the indicated state attribute, and wherein the mediation mechanism indicates to select a value supplied by a source whose registration message was first received.
37. The method of claim 27 wherein the mediation mechanism indicates to indicate each of the available values to a user and to select the produced mediated value based on selection by the user of one, of the indicated available values.
38. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a source whose values are most consistent over time.
39. The method of claim 27 wherein the available values have multiple associated properties, and wherein the mediation mechanism indicates to select an available value based on at least one indicated property.
40. The method of claim 27 wherein the mediation mechanism indicates to select the available value that is most recently received.
41. The method of claim 27 wherein the mediation mechanism indicates to select the available value that is most recently produced by the source from which the value was received.
42. The method of claim 27 wherein the mediation mechanism indicates to select an available value that is received from a source with a highest value resolution capability.
43. The method of claim 27 wherein the mediation mechanism indicates to select an available value that is received from a source with a highest value precision capability.
44. The method of claim 27 wherein the mediation mechanism indicates to select a generated weighted average of the available values using an indicated weighting mechanism.
45. The method of claim 27 wherein the mediation mechanism indicates to select a generated aggregation of the available values.
46. The method of claim 27 wherein the mediation mechanism indicates to select a most frequently occurring value among the available values.
47. The method of claim 27 including, before the receiving of the first and second values, requesting the first and second sources to supply values for the indicated state attribute, and wherein the mediation mechanism indicates to select a value received first in response to the requesting.
48. The method of claim 27 wherein each of the available values has an associated confidence factor indicating a likelihood of accuracy of the value, and wherein the mediation mechanism indicates to select the available value with the highest associated confidence factor.
49. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a source that is certified by a third party.
50. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a source that is in a group of at least one preferred source.
51. The method of claim 27 wherein the mediation mechanism indicates to select an available value from a most recently generated source.
52. The method of claim 27 including receiving from the client an indication of a source, and wherein the mediation mechanism indicates to select an available value received from the indicated source.
53. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on feedback from previous uses of the mediation mechanism.
54. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on cost of the mediation mechanism.
55. The method of claim 27 wherein the mediation mechanism is a default mediation mechanism for the indicated state attribute.
56. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on a type of the client.
57. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on an indication received from the client.
58. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on an indication received from at least one of the sources of the available values.
59. The method of claim 27 including selecting the mediation mechanism to assist in the mediating based on an indication received from a third-party.
60. The method of claim 27 including receiving from the client an indication of another state attribute and an indication that a source for a value for the indicated another state attribute is to be the same source as for the produced mediated value for the indicated state attribute, and wherein a mediation mechanism indicates to select a value for the indicated another state attribute that is received from the same source so that the selected value can be sent to the client.
61. The method of claim 27 including receiving from the first source an indication of a group of at least one authorized client, and wherein the first value received from the first source is used as one of the available values for the mediating only if the client is one of the authorized clients.
62. The method of claim 27 including generating at least one of the available values for the indicated state attribute.
63. The method of claim 27 including receiving a group of instructions for the mediation mechanism that when executed produces the indication from the mediation mechanism.
64. The method of claim 8 wherein receiving of the sent mediated value by the client prompts the client to present information to a user of the client.
65. The method of claim 8 including receiving another value for the indicated state attribute after the sending of the mediated value, and when it is determined that the another value is more appropriate than the sent mediated value, sending the another value to the client.
66. A computer-readable medium whose contents cause a computing device to provide mediated information about a current state that is modeled with multiple state attributes, by: receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current, state; receiving from a second source an indication of a second value for the indicated state attribute; and after an indication for a value for the indicated state attribute, producing a mediated value for the indicated state attribute by mediating between available values for the indicated state attribute including at least the first and second values.
67. A computer-readable generated data signal transmitted via a transmission medium, the generated data signal having encoded contents that cause a computer system to provide mediated information about a current state that is modeled with multiple state attributes, by: receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state; receiving from a second source an indication of a second value for the indicated state attribute; and after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
68. A computer system for providing mediated information about a current state that is modeled with multiple state attributes, comprising: a first module capable of receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state, and of receiving from a second source an indication of a second value for the indicated state attribute; and a second module capable of, after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
69. A computer system for providing mediated information about a current state that is modeled with multiple state attributes, comprising: means for receiving from a first source an indication of a first value for an indicated one of the state attributes of the modeled current state and for receiving from a second source an indication of a second value for the indicated state attribute; and means for, after an indication from a client for a value for the indicated state attribute, sending to the client a mediated value for the indicated state attribute that is produced by mediating between available values for the indicated state attribute including at least the first and second values.
70. A computer-implemented method for processing mediated information about a current state that is modeled with multiple state attributes, each of the state attributes having multiple sources available to supply values for the attribute, comprising: sending to an intermediary module an indication of one of the state attributes; receiving from the intermediary module a mediated value for the indicated state attribute, the mediated value based on multiple available values for the attribute from multiple sources; and using the received mediated value to perform processing based on the modeled current state.
71. The method of claim 70 wherein the processing based on the received mediated value includes presenting information to a user.
72. The method of claim 70 including sending to the intermediary module an indication of a mediator to be used for the mediating.
73. The method of claim 70 including sending to the intermediary module an executable mediator to be used for the mediating.
74. The method of claim 70 including sending to the intermediary module an indication of a source such that the received mediated value is to be based at least in part on a value received from the indicated source.
75. A computer-readable medium containing instructions that when executed cause a computing device to process mediated information about a current state that is modeled with multiple state attributes, each of the state attributes having multiple sources available to supply values for the attribute, by: sending to an intermediary module an indication of one of the state attributes; receiving from the intermediary module a mediated value for the indicated state attribute, the mediated value based on multiple available values for the attribute from multiple sources; and using the received mediated value to perform processing based on the modeled current state.
76. A computer system for processing mediated information about a current state that is modeled with multiple state attributes, each of the state attributes having multiple sources available to supply values for the attribute, comprising: a first module capable of sending to an intermediary module an indication of one of the state attributes; a second module capable of receiving from the intermediary module a mediated value for the indicated state attribute, the mediated value based on multiple available values for the attribute from multiple sources; and a third module capable of using the received mediated value to perform processing based on the modeled current state.
77. A computer-implemented method for providing mediated information about a current state that is modeled with multiple state attributes, each of the state attributes having multiple sources available to supply values for the attribute, comprising: receiving from an intermediary module an indication of one of the state attributes; receiving input information about the modeled current state; generating a value for the indicated state attribute based at least in part on the received input information; and sending to the intermediary module an indication of the generated value, so that the intermediary module can produce for clients a mediated value for the indicated state attribute based at least in part on the generated value.
78. The method of claim 77 wherein the input information is received from a sensor.
79. A computer-readable medium whose contents cause a computing device to provide mediated information about a current state that is modeled with multiple state attributes, each of the state attributes having multiple sources available to supply values for the attribute, by: receiving from an intermediary module an indication of one of the state attributes; receiving input information about the modeled current state; generating a value for the indicated state attribute based at least in part on the received input information; and sending to the intermediary module an indication of the generated value, so that the intermediary module can produce for clients a mediated value for the indicated state attribute based at least in part on the generated value.
80. A computer system for providing mediated information about a current state that is modeled with multiple state attributes, each of the state attributes having multiple sources available to supply values for the attribute, comprising: a first module capable of receiving from an intermediary module an indication of one of the state attributes; and a second module capable of receiving input information about the modeled current state, generating a value for the indicated state attribute based at least in part on the received input information, and sending to the intermediary module an indication of the generated value, so that the intermediary module can produce for clients a mediated value for the indicated state attribute based at least in part on the generated value.
81. A method in a portable computer for providing mediated information about a context of a user of the computer, the portable computer being transported with the user, the state represented with multiple state attributes and varying with location of the user, comprising: while the user is at a first location and has a first state based at least in part on the first location, receiving from a first source an indication of a first value for an indicated one of the attributes; and while the user is at a second location and has a second state based at least in part on the second location, receiving from a second source an indication of a second value for the indicated attribute; and after an indication from a client for a value for the indicated attribute, producing a mediated value for the indicated attribute based on at least the first and second values; and sending the produced mediated value to the client.
82. The method of claim 81 wherein the, first source is at the first location and is remote from the portable computer, wherein the received first value is based on the first location, and wherein the mediated value produced while the user is at the second location is the second value.
83. The method of claim 81 wherein the first source is part of the portable computer, and including receiving from the first source while the user is at the second location an indication of a third value for the indicated attribute such that the producing of the mediated value is additionally based on the third value.
84. The method of claim 81 wherein the first source is remote from the portable computer and the first location, and including receiving from the first source while the user is at the second location an indication of a third value for the indicated attribute such that the producing of the mediated value is additionally based on the third value.
85. A computer-implemented method for providing mediated information about a current context that is represented with multiple context attributes, comprising: receiving from each of multiple sources a value for an indicated one of the context attributes of the current context; storing the received values;. after the storing, receiving a request from a client for a value for the indicated context attribute; and in response to the receiving of the request, determining for each of the stored received values whether the value satisfies a criteria indicated for the requested value; when it is determined that none of the stored values satisfy the criteria, requesting at least one source to supply a value for the indicated context attribute that satisfies the criteria; receiving in response to the requesting at least one additional value for the indicated context attribute that satisfies the criteria; and sending to the client a value for the indicated context attribute that satisfies the criteria and that is produced by mediating between at least the received additional values; and when at least one of the stored values is determined to satisfy the criteria, sending to the client a value for the indicated context attribute that satisfies the criteria and that is produced by mediating between the values determined to satisfy the criteria.
86. The method of claim 85 including, for each of the additional values that is received from one of the multiple sources, replacing the stored value previously received from that one source with the additional value received from that one source.
88. The method of claim 85 wherein the mediating includes using an indicated mediator.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation-in-part of U.S. patent application Ser. No. 09/216,193, entitled "METHOD AND SYSTEM FOR CONTROLLING PRESENTATION OF INFORMATION TO A USER BASED ON THE USER'S CONDITION" and filed Dec. 18, 1998, and a continuation-in-part of U.S. patent application Ser. No. 09/464,659, entitled "STORING AND RECALLING INFORMATION TO AUGMENT HUMAN MEMORIES" and filed Dec. 15, 1999. Both of these applications are hereby incorporated by reference in their entirety.
[0002] This application also claims the benefit of provisional U.S. Patent Application No. 60/194,759 (Attorney Docket No. 294438017US), entitled "MEDIATING CONFLICTS IN COMPUTER USER'S CONTEXT DATA" and filed Apr. 2, 2000, and of provisional U.S. Patent Application No. 60/193,999 (Attorney Docket No. 294438008US), entitled "OBTAINING AND USING CONTEXTUAL DATA FOR SELECTED TASKS OR SCENARIOS, SUCH AS FOR A WEARABLE PERSONAL COMPUTER" and filed Apr. 2, 2000. These applications are both hereby incorporated by reference in their entirety.
[0003] The following disclosure relates generally to computer-based modeling of information, and more particularly to modeling and exchanging context data, such as for a wearable personal computer.
[0004] Computer systems increasingly have access to a profusion of input information. For example, a computer may be able to receive instructions and other input from a user via a variety of input devices, such as a keyboard, various pointing devices, or an audio microphone. A computer may also be able to receive information about its surroundings using a variety of sensors, such as temperature sensors. In addition, computers can also receive information and communicate with other devices using various types of network connections and communication schemes (e.g., wire-based, infrared or radio communication).
[0005] Wearable personal computers (or "wearables") can have even greater access to current input information. Wearables are devices that commonly serve as electronic companions and intelligent assistants to their users, and are typically strapped to their users' bodies or carried by their user in a holster. Like other computers, wearables may have access to a wide variety of input devices. Moreover, in addition to more conventional input devices, a wearable may have a variety of other input devices such as chording keyboards or a digitizer tablet. Similarly, a wearable computer may have access to a wide variety of sensors, such as barometric pressure sensors, global positioning system devices, or a heart rate monitor for determining the heart rate of its user. Wearables also may have access to a wide variety of non-conventional output devices, such as display eyeglasses and tactile output devices.
[0006] Many applications executing on computers utilize data received by the computer from sensors or other input sources. For example, a position mapping application for a wearable computer may utilize data received from a global positioning system device in order to plot its user's physical location and to determine whether that position is within a specified region. In this example, the global positioning system device produces data that is consumed by the position mapping application.
[0007] In conventional wearable computer systems, the position mapping application would be designed to interact directly with the global positioning system device sensor to obtain the needed data. For example, the application may be required to instruct the device to obtain position information, retrieve the information obtained by the device, convert it to conventional latitude and longitude representation, and determine whether the represented location is within the special region.
[0008] The need for such direct interaction between applications and sensors in order to obtain and process data has several significant disadvantages. First, developing an application to interact directly with a particular sensor can introduce sensor-specific dependencies into the application. Accordingly, the application may need to be subsequently modified to be able to interact successfully with alternatives to that sensor provided by other manufacturers, or even to interact successfully with future versions of the same sensor. Alternately, the sensor could be developed to explicitly support a particular type of application (e.g., via a device driver provided with the sensor), which would analogously introduce application-specific dependencies into the sensor.
[0009] Second, direct interaction between the application and the sensor can give rise to conflicts between multiple applications that consume the same data. For example, if the position mapping application was executing on the same wearable computer as a second application for determining the user's distance from home, and the second application also used the global positioning system device, the two applications' interactions with the device could interfere with one another.
[0010] Third, direct interaction between the application and the sensor can give rise to conflicts between multiple sensors that produce the same data. For example, if the position mapping application was executing on a wearable computer that had access to both the global positioning system device and an indoor positioning system, the application might well have trouble determining which device to use to determine the user's current position, and/or have trouble reconciling data produced by both devices.
[0011] Fourth, rather than an application having to directly process observable data from the sensors and derive more abstract information itself, it would be advantageous for the application to be able to rely on a separate programmatic entity that derives such abstract information and provides it to the application. For example, it would be more convenient for the position mapping application to be able rely on a separate programmatic entity that determines the user's location, and to then use that information to determine whether the user is in a special region.
[0012] Accordingly, a facility for exchanging information between sensors and applications in a wearable computer system would have significant utility.
[0013] FIG. 1 illustrates an embodiment of the characterization module executing on a general-purpose body-mounted wearable computer.
[0014] FIG. 2 is a block diagram illustrating an embodiment of the characterization module executing on an exemplary computer system.
[0015] FIG. 3 is a data flow diagram showing a sample exchange of attributes performed by the characterization module.
[0016] FIG. 4 is a data structure diagram showing an example context server table used to maintain a portion of the state of the characterization module.
[0017] FIG. 5 is a data structure diagram showing an example attribute instance table used to maintain a portion of the state of the characterization module.
[0018] FIG. 6 is a data structure diagram showing an example context client table used to maintain a portion of the state of the characterization module.
[0019] FIG. 7 is a data structure diagram showing updated contents of the attribute instance table.
[0020] FIG. 8 is a flow diagram of an embodiment of the GetAttribute function.
[0022] FIG. 10 is a data structure diagram showing an example condition table that contains a portion of the state of the characterization module.
[0023] FIG. 11 is a data structure diagram showing an example condition monitor table that maintains a portion of the state of the characterization module.
[0024] FIG. 12 is a data structure diagram showing updated contents of the condition monitor table.
[0025] FIG. 13 is a data flow diagram showing the operation of the facility without a characterization module.
[0026] FIG. 14 is a data structure diagram showing an example attribute request table used to maintain a portion of the state of the characterization module.
[0027] FIG. 15 illustrates an example of a plain-language, hierarchical, taxonometric attribute nomenclature.
[0028] FIG. 16 illustrates an example of an alternate hierarchical taxonomy related to context.
[0029] FIG. 17 is a flow diagram of an embodiment of the Characterization Module routine.
[0030] FIG. 18 is a flow diagram of an embodiment of the Notification Processing subroutine.
[0031] FIG. 19 is a flow diagram of an embodiment of the Dynamically Specify Available Clients, Servers, and Attributes subroutine.
[0032] FIG. 20 is a flow diagram of an embodiment of the Process Distributed Characterization Module Message subroutine.
[0033] FIG. 21 is a flow diagram of an embodiment of the Process Attribute Value Or Value Request Message subroutine.
[0034] FIG. 22 is a flow diagram of an embodiment of the Process Received Attribute Value subroutine.
[0035] FIG. 23 is a flow diagram of an embodiment of the Process Additional Information About Received Value subroutine.
[0036] FIG. 24 is a flow diagram of an embodiment of the Mediate Available Values subroutine.
[0037] FIG. 25 is a flow diagram of an embodiment of the Pull Attribute Value From Server subroutine.
[0038] FIG. 26 is a flow diagram of an embodiment of the Push Attribute Value To Client subroutine.
[0039] FIG. 27 is a flow diagram of an embodiment of the Context Client routine.
[0040] FIG. 28 is a flow diagram of an embodiment of the Context Server routine.
[0041] A software facility is described below that exchanges information between sources of context data and consumers of context data. In particular, in a preferred embodiment, a characterization module operating in a wearable computer system receives context information from one or more context servers (or "suppliers"), and provides that information to one or more context clients (or "consumers"). This context information represents a particular context (or "state" or "condition") of the wearable, the user of the wearable, the surrounding physical environment and/or the available electronic data environment (or "cyber-environment"). In some embodiments the context is represented (or "modeled") with a variety of attributes (or "variables") each modeling a single aspect of the context. By facilitating the exchange of context information, the facility reduces dependencies of context client applications on specific sensors and other input sources, resolves conflicts between context client applications that consume the same context data, resolves conflicts between multiple sensors or other input sources that produce the same data, and isolates the generation of derived attributes from context client applications.
[0042] A context is modeled or represented with multiple attributes that each correspond to a specific element of the context (e.g., ambient temperature, location or a current user activity), and the value of an attribute represents a specific measure of that element. Thus, for example, for an attribute that represents the temperature of the surrounding air, an 80.degree. Fahrenheit value represents a specific measurement of that temperature. Each attribute preferably has the following properties: a name, a value, an uncertainty level, units, and a timestamp. Thus, for example, the name of the air temperature attribute may be "ambient-temperature," its units may be degrees Fahrenheit, and its value at a particular time may by 80. Associated with the current value may be a timestamp of Feb. 27, 1999 13:07 PST that indicates when the value was generated, and an uncertainty level of +/-1 degrees.
[0043] Context servers supply values for attributes by receiving and processing input information from sensors or other sources. Attribute values provided by a context server may either be "measured" (or "observed") in that they are directly received from an input source, or may instead be "derived" in that they are the result of performing processing on one or more measured attribute values. Indeed, a derived attribute value may be produced by performing additional processing on one or more other derived attribute values. Context attributes (or "condition variables") are discussed in greater detail in both U.S. patent application Ser. No. 09/216,193, filed Dec. 18, 1998 and entitled "METHOD AND SYSTEM FOR CONTROLLING PRESENTATION OF INFORMATION TO A USER BASED ON THE USER'S CONDITION", and provisional U.S. Patent Application No. 60/193,999 (Attorney Docket # 29443.8008), filed Apr. 2, 2000 and entitled "OBTAINING AND USING CONTEXTUAL DATA FOR SELECTED TASKS OR SCENARIOS, SUCH AS FOR A WEARABLE PERSONAL COMPUTER," which are both hereby incorporated by reference.
[0044] When the characterization module obtains an attribute value from a context server, it caches the value for use when responding to future requests from context clients for a value of the attribute. Thus, when the characterization module receives a request from a context client for the value of an attribute, the characterization module determines whether it has a cached value for the attribute and, if so, whether the value is sufficiently accurate (e.g., the value does not have too high of an uncertainty) and/or sufficiently recent (e.g., the value is not too old). If the value is not sufficiently accurate or recent, the characterization module requests and receives an updated value for the attribute from the context server that supplied the value. When the characterization module has a sufficiently accurate and recent value, it supplies the value to the context client. The determination of whether a value is sufficiently accurate and recent can be made in a variety of ways, such as by using thresholds for recency or uncertainty that can be specified by the context client during the request, by a context server for all values of an attribute or for a specific attribute value, or by the characterization module.
[0045] In some embodiments, two or more different context servers may supply to the characterization module their own distinct values for a single attribute. For example, a first context server can supply a value for a user.location attribute based on data received from a global positioning system device, while a second context server can supply a value for the user.location attribute based on data received from an indoor positioning device. Alternately, the first and second context servers could use the same input information when determining the value for a single attribute, but could use different methods to perform the determining and could thus arrive at different values. When multiple content servers supply values for the same attribute, each of the context servers is said to supply values for a separate "instance" of the attribute. The characterization module preferably provides a variety of different approaches, called "mediators," for determining what attribute value to provide when a context client requests a value for an attribute that has more than one instance.
[0046] For attributes with multiple instances, the characterization module performs similar processing to that described above. In particular, the characterization module can maintain a unique cached value for each attribute instance. If the characterization module receives a request for a value of a particular attribute instance, the request is handled as discussed above. If the characterization module instead receives a attribute value request for an attribute with multiple instances and the request does not specify a particular instance, the characterization module checks the accuracy of each cached attribute instance and requests an updated value for any instance with a value that is not sufficiently accurate. If multiple sufficiently accurate values are available, the characterization module produces a mediated value that is returned to the context client. The mediator to be used for the mediation can be selected in a variety of ways, such as being a default mediator of the characterization module, being requested by a context client, being specified by one or more of the context servers, or being chosen by the characterization module.
[0047] The manner in which data (e.g., sensor data and attribute values) flows to and from the characterization module can vary. In some embodiments, a context client may receive an attribute value only after an explicit request, while in other embodiments a context client may be forwarded attribute values without a request (e.g., if the client had previously expressed an interest in receiving values for the attribute and a value has just become available). Similarly, in some embodiments context servers may supply attribute values only when requested, while in other embodiments the context servers may supply attribute values without a request (e.g., if sensor input information is received from which a new value is produced). Request-based processing is a type of "pull" data flow model, and some forms of processing that occur without explicit requests are referred to as a "push" or "event-driven" data flow model.
[0048] The manner in which the characterization module communicates with the context clients and context servers can also vary. In some embodiments, context servers and context clients perform various interactions with the characterization module (e.g., supplying attribute values and requests) by calling functions provided by the characterization module (e.g., via Component Object Module interfaces). These functions are said to collectively comprise an "application programming interface" (or "API") to the characterization module. In alternate embodiments, such interactions can be performed using other mechanisms, such as passing messages or objects. Those skilled in the art will appreciate that an API can be created to support a pull data model, a push data model, or a hybrid system including both push and pull functionality.
[0049] As one example of an API, each executing context server may register with the characterization module by calling a RegisterContextServer function and supplying parameters to identify itself. If a particular context server is not executing, a context client that desires a value of an attribute or attribute instance supplied by the context server may cause the context server to be launched by using a LaunchContextServer function. After registration, a context server may indicate an ability to supply values for an attribute to the characterization module by using a CreateAttributeInstance function. A particular context server can provide values for a number of different attributes by calling the CreateAttributeInstance function multiple times. In order to consume values of an attribute, a context client may call a RegisterContextClient function in order to identify itself and one or more attributes whose values it seeks to consume. To assist in selecting one or more attributes, a context client may also call a EnumerateAttributes function to obtain a list of the attributes available from the characterization module. In order to actually retrieve an attribute value, a context client may call a GetAttribute function and use parameters to identify the attribute and any attribute processing that should be applied, such as a specific mediator to be used if values are available for multiple instances of the attribute. For attributes that have multiple instances in the characterization module, a context client may also call a GetAllAttributeInstances function to obtain a value for each instance of the attribute. To force a particular context server to reevaluate all of its attribute instances, a context client may call a CompleteContextServerEvaluation function. Also, to retrieve values for attributes that model aspects of the configuration of the characterization module, a context client or other program may call a GetCharacterizationModuleAttribute function. A context client that consumes a particular attribute value may also create a condition in the characterization module (not to be confused with the current modeled condition of the user or the environment that is represented by various attribute values) for testing that attribute by calling a CreateCondition function. Once a context client has created a condition, it can evaluate the condition by calling an EvaluateCondition function using parameters to identify the condition, and may also proceed to create a condition monitor that monitors the condition and notifies the context server when the condition is satisfied by calling a CreateConditionMonitor function. To suspend operation of a created condition monitor, a context server may call a StopConditionMonitor function, and to resume its operation, may call a StartConditionMonitor function. The context server may remove a condition monitor that it created by calling a RemoveConditionMonitor function and, correspondingly, may remove a condition that it created by calling a RemoveCondition function. A context client may unregister with the characterization module by calling an UnregisterContextClient function. A context server may similarly remove attribute instances that it has registered by calling a RemoveAttributelnstance function. Before it does, however, it may first call a CheckAttributeInstanceDependencies function to determine whether any context clients currently depend upon that attribute instance. A context server may unregister with the characterization module by calling an UnregisterContextServer function. A set of API functions are discussed in greater detail in both U.S. patent application Ser. No. 09/541,328, filed Apr. 2, 2000 and entitled "INTERFACE FOR EXCHANGING CONTEXT DATA," and provisional U.S. Patent Application No. 60/194,123, filed Apr. 2, 2000 and entitled "SUPPLYING AND CONSUMING USER CONTEXT DATA," which are both hereby incorporated by reference.
[0050] In some embodiments, it may also be useful to store attribute value information in a more permanent fashion than a temporary cache. For example, it may be useful for the characterization module to keep a log of all attribute values received and sent, or of all interactions with context clients and context servers. Alternately, it may be useful to record the current values of some or all of the attributes and attribute instances at the same time, such as to capture a complete model of the current context. Storing attribute value information is discussed in greater detail in both U.S. patent application Ser. No. 09/464,659, filed Dec. 15, 1999 and entitled "STORING AND RECALLING INFORMATION TO AUGMENT HUMAN MEMORIES", and U.S. patent application Ser. No. 09/541,326, filed April 2, 2000 and entitled "LOGGING AND ANALYZING COMPUTER USER'S DATA," which are both hereby incorporated by reference. Other uses of attribute value information are described in provisional U.S. Patent Application No. 60/194,000, filed Apr. 2, 2000 and entitled "SOLICITING PRODUCT INFORMATION BASED ON THE USER'S CONTEXT," in provisional U.S. Patent Application No. 60/194,002, filed Apr. 2, 2000 and entitled "AUTOMATED SELECTION OF UNSOLICITED INFORMATION BASED ON A USER'S CONTEXT," and in provisional U.S. Patent Application No. 60/194,758, filed Apr. 2, 2000 and entitled "CREATING PORTALS BASED ON THE USER'S CONTEXT," each of which are hereby incorporated by reference.
[0051] FIG. 1 illustrates an embodiment of the characterization module which executes on a general-purpose body-mounted wearable computer 120 worn by user 110. Many wearable computers are designed to act as constant companions and intelligent assistants to a user, and are often strapped to a user's body or mounted in a holster. The computer system may also be incorporated in the user's clothing, be implanted in the user, follow the user, or otherwise remain in the user's presence. In one preferred embodiment the user is human, but in additional preferred embodiments, the user may be an animal, a robot, a car, a bus, or another entity whose context is to be modeled. Indeed, the computer system may have no identifiable user, but rather operate as an independent probe, modeling and/or reporting on the context in an arbitrary location.
[0052] The wearable computer 120 has a variety of user-worn user input devices including a microphone 124, a hand-held flat panel display 130 with character recognition capabilities, and various other user input devices 122. Similarly, the computer has a variety of user-worn output devices that include the hand-held flat panel display, an earpiece speaker 132, an eyeglass-mounted display 134, and a tactile display 136. In addition to the various user-worn user input devices, the computer can also receive information from various user sensor input devices 116 and from environment sensor input devices 128, including video camera 121. The characterization module can receive and process the various input information received by the computer, either directly or from context servers that process the input information and generate attribute values, and can supply the received information to context clients or directly to the user by presenting the information on the various output devices accessible to the computer.
[0053] In the current environment, computer 120 is accessible to a computer 150 (e.g., by being in line-of-sight wireless proximity or by being reachable via a long-distance communication device such as a cellular phone) which also has a variety of input and output devices. In the illustrated embodiment the computer 150 is non-portable, although the body-mounted computer of the user can similarly communicate with a variety of other types of computers, including body-mounted computers of other users. The devices from which the non-portable computer can directly receive information include various user input devices 152 and various user sensor input devices 156. The non-portable computer can output information directly to a display 160, a speaker 162, an olfactory device 164, and a printer 166. In the illustrated embodiment, the body-mounted computer can communicate with the non-portable computer via a wireless transmission medium. In this manner, the characterization module can receive information from the user input devices 152 and the user sensor devices 156 after the information has been transmitted to the non-portable computer and then to the body-mounted computer. Alternately, the body-mounted computer may be able to directly communicate with the user input devices 152 and the user sensor devices 156, as well as with other various remote environment sensor input devices 158, without the intervention of the non-portable computer 150. Similarly, the body-mounted computer may be able to supply output information to the display 160, the speaker 162, the olfactory device 164, and the printer 166, either directly or via the non-portable computer, and directly to the telephone 168. As the user moves out of range of the remote input and output devices, attribute values of the characterization module can be updated to reflect that the remote devices are not currently available.
[0054] Information that is received from the various input devices allows the characterization module or an application such as a context server (not shown) executing on the computer 120 to monitor the user and the environment, and to maintain a model (not shown) of the current context. In some embodiments, the model may be represented in a single location (e.g., the current cached values of all of the context attributes and attribute instances), while in other embodiments the model may be distributed. Such a model can be used by various applications, such as context clients, for a variety of purposes. A model of the current context can include a variety of context attributes that represent information about the user, the computer, and the user's environment at varying levels of abstraction. For example, information about the user at a low level of abstraction can include raw physiological data (e.g., heart rate and EKG) and geographic information (e.g., location and speed), while higher levels of abstraction may attempt to characterize or predict the user's physical activity (e.g., jogging or talking on a phone), emotional state (e.g., angry or puzzled), desired output behavior for different types of information (e.g., to present private family information so that it is perceivable only to myself and my family members), and cognitive load (i.e., the amount of attention required for the user's current activities). Background information which changes rarely or not at all can also be included, such as the user's age, gender and visual acuity. The model can similarly hold environment information at a low level of abstraction, such as air temperature or raw data from a motion sensor, or at higher levels of abstraction, such as the number and identities of nearby people, objects, user mood, and locations. The model of the current context can include information added explicitly from other sources (e.g., application programs), as well as user-specified or system-learned defaults and preference information.
[0055] Those skilled in the art will appreciate that computer systems 120 and 150, as well as their various input and output devices, are merely illustrative and are not intended to limit the scope of the present invention. The computer systems may contain additional components or may lack some illustrated components. For example, the characterization module could be implemented on the non-portable computer, with the body-mounted computer replaced by a thin computer client such as a transmitter/receiver for relaying information between the body-mounted input and output devices and the non-portable computer. Alternately, the user may not wear any devices or computers.
[0056] In addition, the body-mounted computer may be connected to one or more networks of other devices through wired or wireless communication means (e.g., wireless RF, a cellular phone or modem, infrared, physical cable, a docking station, etc.), either with or without support from other computers such as the computer 150. For example, the body-mounted computer of a user can make use of output devices in a smart room, such as a television and stereo when the user is at home, if the body-mounted computer is able to transmit information to those devices via a wireless medium or if a cabled or docking mechanism is available. Alternately, kiosks or other information devices can be installed at various locations (e.g., in airports or at tourist spots) to transmit relevant information to body-mounted computers within the range of the information device. Those skilled in the art will also appreciate that specialized versions of the body-mounted, computer, characterization module, context clients and/or context servers can be created for a variety of purposes.
[0057] FIG. 2 illustrates an exemplary computer system 200 on which an embodiment of the characterization module is executing. The computer includes a memory 230, a CPU 210, a persistent storage device 250 such as a hard drive, and input/output devices including a microphone 222, a video camera 223, a computer-readable media drive 224 (e.g., a CD-ROM drive), a visual display 225, a speaker 226, and other devices 228. The memory, preferably includes the characterization module 231, as well as information reflecting the current state of the characterization module (characterization module state) 232. The memory further contains software modules 233, 234, and 237 that consume attribute values and are therefore context clients, and software modules 235, 236, and 237 which provide attribute values and are therefore context servers. While items 231-237 are preferably stored in memory while being used, those skilled in the art will appreciate that these items, or portions of them, can be transferred between memory and the persistent storage device for purposes of memory management and data integrity. Alternately, in other embodiments some or all of the software modules may execute in memory on another device, and communicate with the characterization module via inter-computer communication.
[0058] In addition, in some embodiments a pre-defined set of attributes are available for use by context servers and context clients. This allows a common meaning to be shared between context clients and context servers as to those attributes and their values, and can also allow a context client to request a pre-defined attribute without having to determine whether the attribute has been created by a context server supplying values for the attribute. In one embodiment a plain-language, hierarchical, taxonometric attribute nomenclature is used to, name attributes, such as the example attribute nomenclature illustrated in FIG. 15. The names within the nomenclature are preferably specific so that there is no ambiguity as to what they represent, and the ability to extend the nomenclature by adding new attribute names that conform to the hierarchical taxonomy of the nomenclature is preferably supported. The nomenclature preferably has attribute names relating to a variety of aspects of the user.
[0059] For example, as is illustrated in FIG. 15, the nomenclature preferably has a variety of types of attribute names, including: attribute names relating to the user's location, such as user.location.latitude, user.location.building, and user.location.street; attribute names relating to the user's movement, such as user.speed and user.direction; attribute names for various user moods, such as user.mood.happiness, user.mood.anger, and user.mood.confusion; attribute names for user activities, such as user.activity.driving, user.activity.eatmg, and user.activity.sleeping; attribute names for user physiology values, such as user.physiology.body_temperature and user.physiology.blood_pressure; attribute names for similar attributes of people other than the user, such as person.John_Smith.mood.happiness; attribute names for aspects of the computer system or "platform," such as for aspects of the platform's user interface ("UI") capabilities (e.g., platform.UI.oral_input_device_availability and platform.UI.visual_output_- device_availability) and central processing unit ("CPU") (e.g., platform.cpu.load and platform.cpu.speed); attribute names for aspects of the local environment, such as environment.local.temperature and environment.local.ambient_noise_level; attribute names for remote environments, such as environment.place.chicago.time and environment.place.san_diego.temperature; attribute names relating to a future context, such as those that predict or estimate a situation (e.g., environment.local.next_week.temperature); attribute names relating to specific applications, such as an email application (e.g., application.mail.available, application.mail.new_messages_waiting, and application.mail.messages_waiting_to_be_ sent); etc. In this manner, the attribute nomenclature used by the facility provides effective names for attributes relating to the user, the computer system, and the environment. Additional attributes are illustrated in FIG. 15, and FIG. 16 illustrates an alternate hierarchical taxonomy related to context, such that various attributes could be added for each of the illustrated categories. Those skilled in the art will appreciate that for both FIG. 15 and FIG. 16, other categories and attributes could be added and existing categories and attributes could be removed or could have alternate names.
[0060] FIG. 3 is a data flow diagram showing a sample exchange of attributes performed by the characterization module. The diagram shows characterization module 300, as well as five other software modules, 310, 320, 330, 340, and 350. Software modules 310, 320, and 330 are said to be context servers, in that they provide attribute values to the characterization module. For example, context server 330 provides values for a user.in_region attribute 331. It can be seen that context servers may provide values for more than one attribute. For example, context server 320 provides values for a user.location attribute 321 and an user.elevation attribute 322. It can further be seen that values for a single attribute may be provided by more than one context server. For example, context server 310 provides values for user.location attribute 311, while context server 320 provides values for user.location attribute 321. Attributes 311 and 321 will be represented by the characterization module as multiple instances of a single user.location attribute. The characterization module preferably provides functionality for mediating between these two separate instances when the value of the user.location attribute is requested by a context client.
[0061] Software modules 330, 340, and 350 are said to be context clients because they consume attribute values. For example, context client 340 consumes user.location attribute 341 values. It can be seen that certain software modules may act both as a context server and as a context client. For example, software module 330 is both a context server and a context client, as it provides values for the user.in_region attribute 331 and consumes values for user.location attribute 332. It can also be seen that a context client can consume values for more than one attribute. For example, context client 350 consumes values for both user.in_region attribute 351 and user.elevation attribute 352. To determine which attributes are currently available, any of the context clients may request that the characterization module enumerate the available attributes. In response to such a request, the characterization module would enumerate the user.location attribute, the user.elevation attribute, and the user.in_region attribute.
[0062] FIG. 4 is a data structure diagram showing an example context server table used to maintain a portion of the state of the characterization module. Each row of the table corresponds to a registered context server. Each row contains a context server name field 411 containing the name of the context server, a version field 412 identifying the version of the context server, an installation date 413 identifying the date on which the context server was installed on the computer system, a filename 414 identifying a primary file in the file system representing the context server, and a request handler field 415 containing a reference to a request handler function on the context server that may be called by the characterization module to send messages to the context server (e.g., a request evaluation of one or all of the attributes provided by the context server). Other versions of the context server table may lack some of the illustrated fields (e.g., the version field), or may contain additional fields (e.g., a registered attributes field that contains the names of all of the attributes for which the context server is currently registered to supply values).
[0063] FIG. 5 is a data structure diagram showing an example attribute instance table used to maintain a portion of the state of the characterization module. The attribute instance table contains a row for each attribute or attribute instance for which a context server is currently registered to supply values. Each of these rows contains the following fields: an attribute name field 511 containing the name of the attribute, a context server name field 512 identifying the context server that created the attribute instance, a value field 513 containing the value of the attribute last provided by the context server, and uncertainty field 514 identifying the level of uncertainty of the value, a timestamp 515 indicating the time at which the value is effective, a units field 516 identifying the units for the value and the uncertainty, and an indication 517 of the number of context clients consuming values for the attribute instance. While row 501 indicates that an instance of the user.location attribute from the gps context server has a multi-part value of 47.degree. 36.73' N and 122.degree. 18.43' W degrees and minutes, in alternate embodiments multi-part values may not be used, such as instead having two attributes to represent this context element (e.g, user.location.latitude and user.location.longitude). Similarly, while field 517 indicates the number of context clients consuming values for an attribute, in alternate embodiments this number could be dynamically calculated rather than being stored (e.g., by using the attribute request table discussed below), or an identifier for each context client could instead be stored rather than merely a number. Other versions of the attribute instance table may lack some of the illustrated fields, such as the units field if all the instances of an attribute are restricted to having the same units and if such common information about all the attribute instances is stored elsewhere. Alternately, some versions of the attribute instance table could include additional information, such as a separate row for each attribute with multiple instances that contains common information about all of instances, and additional fields such as a context client field that contains the name of each context client registered to receive values for the attribute or instance of that row. Other versions of the attribute instance table could include other additional fields such as an optional specified context client field so that the context server can indicate one or more context clients that are able to receive values for the attribute (e.g., a list of authorized clients).
[0064] FIG. 6 is a data structure diagram showing an example context client table used to maintain a portion of the state of the characterization module. Each row corresponds to a registered context client, and contains a context client name field 611 identifying the name of the registered context client as well as a message handler field 612 containing the reference to a message handler provided by the context client for processing messages from the characterization module. Other versions of the context client table may lack some of the illustrated fields, or may contain additional fields (e.g., a registered attributes field that contains the names of all of the attributes for which the context server is currently registered to receive values).
[0065] FIG. 7 is a data structure diagram showing updated contents of the attribute instance table illustrated in FIG. 5. It can be seen that, in response to registration of a location_map context client consuming values for the user.in_region attribute, the characterization module has incremented the number of context clients consuming the user.in_region attribute from 0 to 1.
[0066] FIG. 14 is a data structure diagram showing an example attribute request table used to maintain a portion of the state of the characterization module. The attribute request table contains a row for each attribute for which a context client is currently registered to receive values. Each of these rows contains the following fields: an attribute name field 1411 containing the name of the attribute, and a context client name field 1412 identifying the context client that registered a request to receive values for the attribute. Note that a context client can request values for an attribute without specifying a particular instance, as in row 1401, or can instead request values for a specific attribute instance, as in row 1403. Other versions of the attribute request table may lack some of the illustrated fields, or may contain additional fields such as an optional field to specify one or more particular context servers that can supply the values for the attribute (e.g., a list of authorized context servers).
[0067] FIG. 8 is a flow diagram of one embodiment of the GetAttribute function. In step 801, if the requested attribute exists, then the facility continues in step 803, else the facility continues in step 802 to return an "attribute not found" error. In step 803, if a single instance of the attribute was requested, then the facility continues in step 804, else the facility continues in step 811. In step 804, if the requested instance exists, then the facility continues in step 806, else the facility continues in step 805 to return an "attribute instance not found" error. In step 806, if the age criterion specified for the attribute request is satisfied, then the facility continues in step 807 to return the requested attribute instance, else the facility continues in step 808 to "freshen" the attribute instance by calling the appropriate context server's request handler to request evaluation of the attribute instance. In step 809, if the age criterion is satisfied by the freshened attribute instance, then the facility continues in step 807 to return the freshened attribute instance, else the facility continues in step 810 to return the freshened attribute instance with an "age not satisfied" error. In step 811, where a single attribute instance was not requested, if any registered instances of the attribute satisfy the age criterion, then the facility continues in step 816, else the facility continues in step 812. In step 812, the facility freshens all registered instances of the requested attribute. In step 813, if any of the attributes freshened in step 812 satisfy the age criterion, then the facility continues in step 816, else the facility continues in step 814. In step 814, the facility applies the requested attribute mediator to select one instance, or otherwise derive a value from the registered instances. In step 815, the facility returns the instance with an "age not satisfied" error. In step 816, where one or more instances satisfy the age criterion, if more than one instance satisfies the age criterion, then the facility continues in step 817, else the facility continues in step 807 to return the attribute instance that satisfies the age criterion. In step 817, the facility applies the requested attribute mediator to select one instance from among the instances that satisfy the age criterion, or to otherwise derive a value from the instances that satisfy the age criterion. After step 817, the facility continues in step 807 to return the value produced by the mediator.
[0068] FIG. 9 is a data structure diagram showing updated contents of the attribute instance table illustrated in FIG. 7. It can be seen in attribute instance table 900 that, upon reevaluation by the ips context server of its instance of the user.elevation attribute, the characterization module replaced the former contents of the value, uncertainty and timestamp fields of row 903 with the values resulting from the reevaluation.
[0069] FIG. 10 is a data structure diagram showing an example condition table that contains a portion of the state of the characterization module. Condition table 1000 has a row for each condition created by a context client. Row 1001 contains a condition name field 1011 containing the name of the condition, a context client name 1012 identifying the context client that created the condition, a first logical parameter field 1013 and a second logical parameter field 1014 identifying attributes or conditions that are to be compared, a comparison value 1015 that specifies a value to which an attribute listed in the first logical parameter is compared if no second logical parameter is listed, and a logical operator 1016 identifying the logical operator to be applied in the comparison.
[0070] FIG. 11 is a data structure diagram showing an example condition monitor table that maintains a portion of the state of the characterization module. Condition monitor table 1100 has a row 1101 corresponding to a condition and containing each of the following fields: a condition monitor name field 1111 containing the name of the condition monitor; a context client name field 1112 containing the name of the context client that created the condition monitor; a condition name field 1113 that contains the name of the condition monitored by the condition monitor; a behavior field 1114 that indicates whether the condition monitor is triggered when the condition becomes true, when it becomes false, or when it changes value in either direction; a frequency field 1115 showing the frequency with which the condition monitor evaluates the condition; a condition last evaluated field 1116 showing the time at which the condition monitor last evaluated the condition; a trigger handler reference 1117 that identifies a trigger handler function of the context client that is to be called when the condition monitor is triggered; and a stop field 1118 that indicates whether the context client has suspended operation of the condition monitor. Such condition monitors can be used in a variety of ways. For example, when a context client is notified via the triggering of the trigger handler function that the value has changed, the context client can then retrieve the new value.
[0071] FIG. 12 is a data structure diagram showing updated contents of the condition monitor table illustrated in FIG. 11. It can be seen from stop field 1218 of row 1201 in condition monitor table 1200 that the region_analysis context client has stopped, or suspended the operation of, the region_boundary_cross condition monitor, perhaps in response to the observation that the user is now asleep and his or her location will remain constant.
[0072] In the foregoing, the facility is described as being implemented using a characterization module that is called by context servers and context clients, that caches attribute values, and that maintains status information about the operation of context servers and context clients. In an alternative preferred embodiment, however, the facility operates without the use of such a characterization module. In this embodiment, context servers communicate directly with context clients.
[0073] FIG. 13 is a data flow diagram showing the operation of the facility without a characterization module. It can be seen in FIG. 13 that context servers 1310, 1320, and 1330 provide attributes directly to context clients 1330, 1340, and 1350. For example, it can be seen that context server 1320 provides a user.elevation attribute 1322 directly to context client 1350. In this embodiment, the context client may itself cache attribute values recently obtained from a context server. Further, in this embodiment, context clients may themselves interrogate context servers for an enumeration of their attributes, and mediate between attribute instances provided by different context servers. For example, context client 1340 may mediate between the instance 1311 of the user.location attribute provided by context server 1310 and the instance 1321 of the user.location attribute provided by context server 1320.
[0074] In additional preferred embodiments, the facility may operate with a partial characterization module. Such a partial characterization module may include various combinations of the functionalities of routing communication between context servers and the context clients that consume their attribute values, caching attribute values, enumerating available attributes, and providing attribute mediation.
[0075] In additional preferred embodiments, the facility may provide a characterization module that implements a "push" information flow model in which, each time an attribute value provided by a context server changes, the new value is automatically provided to context clients. In further preferred embodiments, the facility provides a characterization module that implements a "pull" information flow model, in which attribute values are only obtained by the characterization module from the context servers when they are requested by a context client. In additional preferred embodiments, characterization modules are provided that support a variety of other information flow models.
[0076] FIG. 17 is a flow diagram of an embodiment of the Characterization Module routine 1700. The routine receives messages from context clients (CCs) and from context servers (CSes), as well as instructions from users, and processes the messages or instructions. In some embodiments, a CM could wait to execute code that would provide functionality until the functionality was requested, such as by dynamically loading code to provide a requested mediator. The routine begins in step 1705, where the characterization module (CM) performs various startup operations (e.g., setting up tables in which to temporarily cache state information, retrieving previous state information, launching CSes or CCs that have previously registered with the CM, etc.). The routine then continues to step 1710 to determine if the newly started CM is to take the place of another previously executing CM (e.g., based on a user indication when the new CM was started). If so, the routine continues to step 1715 to swap places with the other executing CM. One method of executing a swap that would be transparent to the CCs and CSes interacting with the other CM would be to request the other CM to transfer all of its current state information to the new CM (e.g., registrations of CCs, CSes, and attributes, conditions and notification requests, cached values for attributes and attribute properties, etc.), to then update the other CCs and CSes so that the messages they previously sent to the other CM will now be sent to the new CM, and to then have the other CM shutdown.
[0077] After step 1715, or if it was determined in step 1710 that another CM is not being swapped out, the routine continues to step 1720 to receive an indication from a user or a message from a CC or CS. The routine then continues to step 1725 where it performs the Notification Processing subroutine to notify any CCs or CSes about the received message or user indication if appropriate. As is explained in greater detail below, CCs and CSes can submit notification requests so that they will be notified by the CM upon a particular type of occurrence. Such notification requests could include occurrences such as when an attribute value changes, when a particular CC or CS registers or unregisters, when values for an attribute become available or unavailable (e.g., due to registration or unregistration), when a CC registers or unregisters to receive values for an attribute, when the availability of particular input/output devices changes or other computer system features change, when a package of related themed attributes becomes available or unavailable, for changes in CM internal status (e.g., a change in the default mediator), etc. In addition, the notification requests can be created based not only on explicit requests, but also after the occurrence of a particular type of event (e.g., if a CC requests a value for an attribute for which no CSes are currently supplying values, a notification request could be automatically created to alert the CC if a CS later registers to supply values for the attribute). Moreover, additional information about the notification requests can be supplied (e.g., a number of times that the submitter wants to receive notifications for the request, or an expiration date after which the notification will be removed or become inactive).
[0078] After step 1725, the routine continues to step 1730 to determine if a registration or unregistration message was received. If so, the routine continues to step 1735 to execute the Dynamically Specify Available Clients, Servers, and Attributes subroutine. Thus, CCs and CSes can register and unregister dynamically as they become available or unavailable, and can similarly modify the status of the attributes that they have registered with the CM. If a registration or unregistration message was not received in step 1730, the routine instead continues to step 1740 to determine if an attribute value or a request for an attribute value has been received from a CC or CS. If so, the routine continues to step 1745 to execute the Process Attribute Value Or Value Request Message subroutine. This subroutine will satisfy requests for attribute values if possible (e.g., by supplying a cached value or requesting one or more CSes to supply the value) and will return the requested value or an error message. Similarly, when attribute values are pushed to the CM from a CS, the CM will send the values if appropriate to CCs that have registered an interest in receiving values for the attribute.
[0079] If an attribute value or an attribute value request has not been received from a CC or CS in step 1740, the routine instead continues to step 1750 to determine if a request has been received to establish or modify a condition that monitors attribute values or other conditions, or to establish or modify a condition monitor. If so, the routine continues to step 1755 to process the request. As described previously, conditions and condition monitors can be created, removed, and have their operation suspended (e.g., by deactivating them) or resumed (e.g., by activating them).
[0080] If a condition-related request was not received in step 1750, the routine continues instead to step 1760 to determine if a message related to one or more other executing CMs has been received, and if so continues to step 1765 to process the message by executing, the Process Distributed Characterization Module Message subroutine. Characterization modules can interact for a variety of reasons, as explained in greater detail below. If a message related to another CM has not been received, the routine continues instead to step 1770 to determine if a request has been received to establish or modify a notification request. If so, the routine continues to step 1775 to process the notification-related request. If a notification-related request was not received, the routine continues instead to step 1780 to determine if a shutdown message was received (e.g., from a user). If so, the routine continues to step 1790 to perform shutdown operations (e.g., notifying all registered CCs and CSes to unregister, or saving current state information), and then continues to step 1795 and ends. If it was instead determined that a shutdown message was not received, the routine continues to step 1782 to determine if another supported operation has been requested. If so, the routine continues to step 1784 to perform the other operation, and if not the routine continues to step 1786 to send an error message to the requester. For example, other types of operations may be a request to receive information about all available attributes, about all attributes available from a particular CS, about which CCs are receiving values for a particular attribute, about properties and property values associated with attributes and attribute instances, to launch or shutdown a CC or CS, to receive information about an attribute taxonomy, to force a CS to reevaluate the values for all its registered attributes, to change internal CM information (e.g., the default mediator), to provide information about available packages of related themed attributes, to provide information about available computer resources such as input/output devices, etc. After steps 1735, 1745, 1755, 1765, 1775, 1784, or 1786, the routine returns to step 1720. In other embodiments, additional types of functionality may be available or illustrated functionality may not be available. For example, in some embodiments any CC or CS may need to satisfy security requirements (e.g., by verifying their identity as an authorized module) before being allowed to request information or functionality from the CM or to provide information to the CM.
[0081] FIG. 18 is a flow diagram of an embodiment of the Notification Processing subroutine 1725. The subroutine examines the message or user indication received by the CM, determines whether any active notification requests are satisfied by the type of message or indication or by information contained in the message or indication, and notifies the submitters of any such requests when the requests are satisfied. The subroutine begins in step 1805 where it receives an indication of the message or user indication received by the CM. The subroutine continues to step 1810 to compare the received message or user indication to the notification requests that are currently stored and active. The subroutine then continues to step 1815 to retrieve any additional information that may be needed to determine if a notification request has been satisfied (e.g., a previous value for an attribute to determine how the attribute value has changed).
[0082] The subroutine then continues to step 1820 where it determines if any of the notification requests have been satisfied. If not, the subroutine continues to step 1895 and returns, but if so the subroutine continues to step 1825 to select the next satisfied notification request, beginning with the first. The subroutine then continues to step 1830 to send a notification to the supplier of the request that the request was satisfied, and can include additional information about the occurrence that satisfied the request. The subroutine then continues step 1835 to determine whether the notification request should be removed (e.g., if it was defined as a one-time request, or has expired). If so, the subroutine continues to step 1840 to remove the request, and if not the subroutine continues to step 1845 to determine if the notification request should be deactivated for the current time (e.g., so that a similar occurrence can be monitored at a later time). After steps. 1840 or 1850, or if the notification request was not deactivated, the subroutine continues to step 1855 to determine if there are more satisfied notification requests. If so, the subroutine returns to step 1825, and if not the subroutine continues to step 1895 and returns. In addition, the subroutine could periodically check the various stored notification requests (e.g., as a background process) to determine if their status should be modified (e.g., activated, deactivated, or removed).
[0083] FIG. 19 is a flow diagram of an embodiment of the Dynamically Specify Available Clients, Servers, and Attributes subroutine 1735. The subroutine receives registration or unregistration requests for CCs, CSes, and/or attributes, and satisfies the requests as appropriate. The subroutine begins in step 1905 where it receives a registration or unregistration message. The subroutine continues to step 1910 to determine if security authorization is needed (e.g., for any CC or CS, or for CCs and CSes executing on a different computer from-the CM). If so, the subroutine continues to step 1915 to determine if the security authorization has been satisfied (e.g., by the submitter of the message supplying a password or a verified digital signature). It is determined in step 1920 that the security authorization has not been satisfied, the subroutine continues to step 1925 where it sends an error message to the submitter. However, if it is instead determined that the security standard has been satisfied, or if security authorization was not needed in step 1910, the subroutine continues to step 1930 to determine the type of the registration or unregistration message.
[0084] If the message is determined to be related to a CC, the subroutine continues to step 1940 to determine if the message is to register the CC. If so, the subroutine continues to step 1941 to register the new client if possible (e.g., if all necessary information has been provided and there is not another registered CC with the same unique identifier). If it is determined in step 1942 that an error occurred during the registration attempt, the subroutine continues to step 1944 to send an error message to the submitter. If no error occurred, the subroutine instead continues to step 1946 to determine if the registration request includes one or more attributes of interest to be registered for the client. If so, the subroutine continues to step 1982 to register those attributes. If it was instead determined in step 1940 that the received message was not to register the client, the subroutine continues to step 1948 to determine if the message was to unregister the client. If so, the subroutine continues to step 1950 to unregister the client, and then continues to step 1952 to determine if any registered attributes remain for the client. If so, the subroutine continues to step 1994 to unregister each of those attributes.
[0085] If it was instead determined in step 1930 that the received message was related to a CS, the subroutine continues to step 1960 to determine whether the message is to register the CS. If so, the subroutine continues to step 1961 to register the new server if possible. It is determined in step 1962 that an error occurred during the registration attempt, the subroutine continues to step 1964 to send an error message to the submitter. If no error occurred, however, the subroutine instead continues to step 1966 to determine if the registration request includes one or more attributes to register for which the server is available to supply values. If so, the subroutine continues to step 1982 to register those attributes. If it was instead determined in step 1960 that the received message was not to register the CS, the subroutine continues to step 1968 to determine if the message was to unregister the server. If so, the subroutine continues to step 1970 to unregister the server, and then continues to step 1972 to determine if any registered attributes remain for the server. If so, the subroutine continues to step 1994 to unregister those attributes.
[0086] If it was instead determined in step 1930 that the received message was related only to one or more attributes and not to a CC or CS, the subroutine continues to step 1980 to determine whether the message is to register those attributes. If so, the subroutine continues to step 1982 to select the next attribute, beginning with the first. The subroutine then continues to step 1984 to determine if at least one instance of the attribute is currently registered. If so, the subroutine continues to step 1986 to register a new instance of the attribute, and if not the subroutine continues to step 1988 to register the first instance for the attribute. After steps 1986 or 1988, the subroutine continues to step 1990 to determine if there are more attributes to be registered, and if so returns to step 1982. If it is instead determined in step 1980 that the received message was not to register the attributes, the subroutine continues to step 1992 to determine if the message was to unregister the attributes, and if so continues to step 1994 to unregister each attribute. After steps 1925, 1964, 1944, or 1994, or if the determination was made in the negative for one of steps 1946, 1948, 1952, 1966, 1972, 1990, or 1992, the subroutine continues to step 1995 and returns. As discussed previously, a variety of other types of optional information can additionally be supplied when registering CCs, CSes or attributes (e.g., various properties for the attribute).
[0087] FIG. 20 is a flow diagram of an embodiment of the Process Distributed Characterization Module Message subroutine 1765. The subroutine receives information from another CM or an instruction about another CM, and processes the information or instruction as appropriate. The subroutine begins in step 2005 where it receives an indication of the received information or instruction. The subroutine then continues to step 2010 to determine if security authorization is needed. If so, the subroutine continues to step 2012 to determine if the security has satisfied. It is determined at step 2014 that the security authorization has not been satisfied, the subroutine continues to step 2016 to send an error message to the submitter. If it is instead determined that the security authorization has been satisfied or was not needed in step 2010, the subroutine continues to step 2018 to determine whether information from another CM has been received.
[0088] If it is determined in step 2018 that an instruction about another CM has been received, the subroutine continues to step 2020 to determine if the instruction is to register or unregister as a CC or CS of the other CM. If so, the subroutine continues to step 2022 to rename any attributes in the request if necessary. For example, if a current CM 1 wants information about an attribute user.mood.happiness for its own user from another CM 2, CM 1 will have to modify the name of the attribute (e.g., to CM1.user.mood.happiness) it requests since CM 2's attribute user.mood.happiness will refer to the user of CM 2. The same will be true for a variety of other attributes that specify attributes relative to the CM, but not to attributes with absolute specifications (e.g., person.ABC.mood.happiness). After step 2022, the subroutine then continues to step 2024 to send a request to the other CM to reflect the request using the renamed attributes, with the other CM to perform the registration or unregistration.
[0089] If it is instead determined in step 2020 that the instruction was not to register or unregister, the subroutine continues to step 2026 to determine whether the instruction is to send an attribute value or an attribute value request to the other CM. If so, the subroutine continues to step 2028 to rename any attributes in the request if necessary, and then continues to step 2030 to determine whether a request or an attribute value is being sent. If an attribute value is being sent, the subroutine sends the value to the other CM in step 2032, and if a request is being sent the subroutine sends the request in step 2034. After step 2034, the subroutine continues to step 2036 to receive the requested value or an error message, and if the value is received rather than an error message, the subroutine sends the received value to the requester at step 2038.
[0090] If it is instead determined in step 2026 that the received instruction is not to send an attribute value or an attribute value request, the subroutine continues to step 2040 to determine if a group-wide attribute is to be modeled (e.g., troop morale for a group of soldiers that would require information for many or all of the soldiers). If so, the subroutine continues to step 2042 to request attribute values from the other CMs that are needed for the modeling, and then continues to step 2044 to receive the requested values or error messages. If the necessary values are received to perform the modeling, in step 2046 the subroutine determines the value of the group-wide attribute and in step 2048 sends the value to the requester. In alternate embodiments, any such modeling of attributes may be performed only by CSes, with the CM merely requesting values from other CMs as instructed and supplying the received values to the appropriate CS.
[0091] If it is instead determined in step 2040 that the received instruction is not to model a group-wide attribute, the subroutine continues to step 2050 to determine if the instruction is to aggregate information from subordinate CMs (e.g., in a hierarchical organization such as a business or the military, the hierarchy of users can be reflected in a hierarchy of their CMs) or specialized CMs (e.g., a CM specialized to monitor a user's health and to detect health problems). If so, the subroutine continues to step 2052 to request the information from the other CMs as needed, and continues to step 2054 to receive the requested information or error messages. If the necessary information is received, in step 2056 the subroutine aggregates the information, and in step 2058 sends the aggregated information to the requester. In alternate embodiments, any such aggregating of information may be performed only by CSes, with the CM merely requesting information from other CMs as instructed and supplying the received values to the appropriate CS.
[0092] If it is instead determined in step 2050 that the received instruction is not to aggregate information, the subroutine continues to step 2060 to determine if the received instruction is to use the processing capabilities of another computer or CM. If so, the subroutine continues to step 2062 to request the other computer or CM to perform an indicated task. The subroutine then continues to step 2064 where it receives the results of the task, and uses those results as if the task have been performed locally. If it is instead determined in step 2060 that the received instruction is not to use the processing abilities of another computer, the subroutine continues to step 2065 to determine if the received instruction is to send information to a module such as a thin client. If so, the subroutine continues to step 2067 to send the indicated information (e.g., from a CC), and if not the subroutine continues to step 2069 to perform another task as indicated. For example, other types of tasks could be to instruct another CM to swap itself out or to modify its internal state (e.g., to change a default mediator or to add a new mediator).
[0093] If it was instead determined at step 2018 that information from another CM has been received, the subroutine continues to step 2070 to determine if a registration or unregistration request has been received. If so, the subroutine continues to step 2071 to rename any attributes if necessary, and then continues to step 2072 to resubmit the request as if from a CC or a CS using the renamed attributes. If the information was not a registration or unregistration request, the subroutine continues to step 2073 to determine if an attribute value or an attribute value request has been received. If so, the subroutine continues to step 2074 to rename the attributes if necessary, and then continues to step 2075 to determine whether an attribute value or an attribute value request has been received. If an attribute value has been received, the subroutine continues to step 2076 where it resubmits the value as being from a CS, and if not the subroutine continues to step 2077 where it resubmits the attribute value request as being from a CC. After step 2077, the subroutine continues to step 2078 where it receives the requested value or an error message, and in step 2079 sends the received value to the requesting CM if an error message was not received.
[0094] If it was instead determined in step 2073 that an attribute value or attribute value request was not received, the subroutine continues to step 2080 to determine if the received information was an indication to modify the internal state of the CM. If so, the subroutine continues to step 2081 where it modifies the state as indicated. If the received instruction was not to modify the internal state, the subroutine continues to step 2082 to determine if the request is to swap the CM out to be replaced by the other requesting CM. If so, the subroutine continues to step 2084 to send the current state information from the CM to the requesting CM. In addition, the CM could perform other tasks if necessary such as updating the currently registered CCs and CSes so that they now will communicate with the other CM. The subroutine then continues to step 2086 to wait for an indication from the other CM to exit, and after receiving the indication, submits a shutdown request in step 2088. If the received instruction was not to swap out, the subroutine continues to step 2090 to perform the other task as indicated if appropriate. After steps 2016, 2024, 2032, 2038, 2048, 2058, 2064, 2067, 2069, 2072, 2076, 2079, 2081, 2088, or 2090, the subroutine continues to step 2095 and returns.
[0095] FIG. 21 is a flow diagram of an embodiment of the. Process Attribute Value Or Value Request Message subroutine 1745, as illustrated in the accompanying figure and described elsewhere. In particular, the subroutine receives an indication of an attribute value or a request for an attribute value, and processes the value or request as appropriate (e.g., pulling values from servers when needed to satisfy requests and pushing received values to clients when appropriate). Those skilled in the art will appreciate that in other embodiments only one of the push and pull data flow models may be supported. The subroutine begins at step 2105 where it receives an indication of an attribute value or a request for an attribute value. The subroutine then continues to step 2110 to determine if an attribute value or a request was received.
[0096] If a value was received, the subroutine continues to step 2120 to execute the Process Received Attribute Value subroutine, such as to store the value and to process additional associated information received about the value. The subroutine next continues in the illustrated embodiment to push the received value or a related value to clients as appropriate. Those skilled in the art will appreciate that in other embodiments such values may merely be cached or otherwise stored until requested by a client. Alternately, even if received values are not generally pushed to clients, in other embodiments such values could be pushed to clients in limited circumstances, such as an update to a related value that had previously been sent to a client when the newly received value is more accurate.
[0097] In the illustrated embodiment, the subroutine continues to step 2122 to determine whether there are any previously specified requests or indications of interest related to the received value that would cause the received value or a related value to be pushed to one or more clients. If it is determined in step 2125 that there are any such requests or indications, the subroutine continues to step 2130 to determine if there are multiple attribute instance values available that meet the appropriate criteria (if any are specified) to satisfy the requests or indications. For example, a default or specified threshold for the freshness of values could be used as a criteria. If there are multiple values, the subroutine continues to step 2132 to execute the Mediate Available Values subroutine and produce a mediated value from the multiple available values, and in step 2134 selects the mediated value produced by the subroutine. If it was instead determined in step 2130 that there are not multiple attribute instance values available for the received value, the subroutine continues to step 2136 to select the received value. After steps 2134 or 2136, the subroutine continues to step 2138 to select the next request of the identified requests, beginning with the first request. The subroutine then continues to step 2140 to execute the Push Selected Attribute Value To Client subroutine for the selected request, and then continues to step 2142 to determine if there are more identified requests. If so, the subroutine returns to step 2138 to select the next request.
[0098] If it was instead determined in step 2110 that a request for a value was received, the subroutine continues to step 2150 to identify all attribute instances that match the request (e.g., that satisfy one or more criteria for the value that are specified with the request). The subroutine then continues to step 2152 to determine if there are any such instances, and if not continues to step 2154 to send an error message to the requester. In the illustrated embodiment, the subroutine next pulls current values for the identified attribute instances from servers as appropriate: Those skilled in the art will appreciate that in other embodiments only those values that have previously been received and stored may be supplied to clients. Alternately, even if current values are not generally pulled from servers, in other embodiments such values could be pulled from servers in limited circumstances, such as when explicitly requested by a client.
[0099] In the illustrated embodiment, if it is determined in step 2152 that at least one attribute instance is identified, the subroutine continues to step 2156 to select the next such instance, beginning with the first. The subroutine in step 2158 then determines if a new value is needed for the selected instance (e.g., the available value does not meet some specified criteria, such as an accuracy threshold specified by the requesting client). If so, the subroutine continues to step 2160 to execute the Pull Attribute Value From Server subroutine. The subroutine in step 2162 next waits for a value or error message response from the server, and determines if a value is received. If a value is received, the subroutine then continues to step 2164 to execute the Process Received Attribute Value subroutine. After step 2164, or if it was determined in step 2158 that the instance does not need a new value or in step 2162 that a new value was received, the subroutine continues to step 2166 to determine if there are more instances identified. If so, the subroutine returns to step 2156 to select the next such instance, and if not continues to step 2168 to determine if there are multiple values now available for the request that meet any relevant criteria. While all identified attribute instance values that match the request are used in the illustrated embodiment, in other embodiments a different or additional selection process for the values could be used. For example, information about the various servers that can supply the attribute instance values may be available (e.g., dynamically), and if so only certain of the servers could be selected based on the information with only the values from those servers being used.
[0100] If it is determined in step 2168 that there are multiple values available, the subroutine continues to step 2170 to execute the Mediate Available Values subroutine to produce a mediated value from the multiple available values, and in step 2172 sends the produced mediated value and any additional information about the value (e.g., properties, an associated uncertainty value, an indication of the server that produced the value, an indication of the mediator used to produce the value, etc.) to the requester. If it was instead determined in step 2168 that there are not multiple values available, the subroutine continues to step 2174 to determine if a single value is available, and if not continues to step 2178 to send an error message to the requester. If it is instead determined that there is a single value available, the subroutine continues to step 2176 and sends the value and any additional information to the requester. After steps 2154, 2172, 2176 or 2178, or if it was determined in step 2125 that there were no requests identified or in step 2142 that there were no more requests, the subroutine continues to step 2195 and returns.
[0101] FIG. 22 is a flow diagram of an embodiment of the Process Received Attribute Value subroutine 2200, as illustrated in the accompanying figure and described elsewhere. In particular, the subroutine receives an attribute value from a server, stores the value if appropriate (e.g., in a. cache or long-term storage), processes additional received information associated with the value if appropriate, and processes any conditions related to the received value. The subroutine begins in step 2205 where it receives an indication of a received attribute value. The subroutine then continues to step 2210 to determine if the attribute for, which the value is received is registered, and if not continues to step 2215 to send an error message to the server. If it is instead determined in step 2210 that the attribute is registered, the subroutine continues to step 2220 to determine if additional information about the value was received from the server. If so, the subroutine continues to step 2225 to execute the Process Additional Information About Received Value subroutine.
[0102] After step 2225, or if it was instead determined that additional information about the value was not received from the server, the subroutine continues to step 2230 to determine whether values for the attribute are being cached or otherwise temporarily stored. If so, the subroutine continues to step 2235 to cache the received value as well as any additional information received. Those skilled in the art will appreciate that the length of time used for caching can vary in a variety of ways, such as based on the type of information or for a particular attribute. After step 2235, or if it was instead determined that values are not being cached for the attribute, the subroutine continues to step 2240 to determine if values for the attribute are being stored in a long-term manner (e.g., being logged). If so, the subroutine continues to step 2245 to store the received value as well as any additional information received.
[0103] After step 2245, or if it was instead determined in step 2240 that values are not being stored for the attribute, the subroutine continues to step 2250 to determine if the value and/or any additional information about the value triggers any active stored conditions. In step 2255, if there are any such conditions, the subroutine continues to step 2260 to select the next such condition, beginning with the first. After step 2260, the subroutine continues to step 2265 to send a message to the entity associated with the condition (e.g., a client that created the condition) to indicate that the condition is satisfied. After step 2265, the subroutine continues to step 2270 to determine if the condition should now be removed. If so, the subroutine continues to step 2275 to remove the condition, and if not the subroutine continues to step 2280 to determine if the condition should now be deactivated. If so, the subroutine continues to step 2285 to deactivate the condition. After steps 2275 or 2285, or if it was instead determined in step 2280 that the condition is not to be deactivated, the subroutine continues to step 2290 to determine if there are more triggered conditions. If so, the subroutine returns to step 2260 to select the next such condition. After step 2215, or if it was instead determined in step 2255 that there were not any triggered conditions or in step 2290 that there were no more triggered conditions, the subroutine continues to step 2295 and returns.
[0104] In the illustrated embodiment, attribute values are received by the characterization module from servers either when the characterization module requests a new value from the server or when the server pushes a new value to the characterization module. In some embodiments in which a server has previously sent an attribute value to the characterization module in response to a request, the server may later send updated values for the attribute to the characterization module without a later request from the characterization module, such as if a more accurate or updated value is obtained by the server. In addition, in other embodiments servers could provide other types of information that could be received and processed by the characterization module. In particular, a server could provide a variety of types of meta-information about. attribute values to the characterization module, such as information about a technique used to generate a value or an indication that a new value is available without sending the value until requested.
[0105] FIG. 23 is a flow diagram of an embodiment of the Process Additional Information About Received Value subroutine 2225, as illustrated in the accompanying figure and described elsewhere. As illustrated and discussed elsewhere, a variety of types of information related to attribute values (e.g., uncertainty or accuracy information, a timestamp of when the value was created or supplied or was most accurate, an indication that the value is a constant, indications of restrictions on whether the availability of the attribute instance or of the particular value should be available to any or to specified CCs, data type, units, a format version, a name, any generic attribute property supplied by the CS, etc.) can be received from CSes, can be used by the CM to determine whether and how to supply the values to CCs, can be supplied to CCs, and can be used by CCs when processing the received attribute values. For example, units as indicated below could be specified.
1 Quantity Measured Unit Distance Meter Mass/Weight Kilogram Temperature Centigrade Time Second Speed Meters per second Acceleration Meters per second.sup.2 Arc Radians Data size Bytes Data Throughput Bytes per second Force Newtons Power Watts Energy Joules
[0106] In addition, uncertainty of an attribute value can be indicated in a variety of ways. An example of an uncertainty specification is as follows. For each attribute instance there is a finite likelihood that the real quantity being measured is not the same as the value being expressed. For example, the speedometer of a car may show 30 mph when the "true" instantaneous speed is 32.56 mph. There are numerous factors that may give rise to these discrepancies, including the following: precision of measuring apparatus, conversion of continuous quantities to discrete values in the measurement process, random fluctuations, temporal variation, systematic errors, and measurement latency. Since different measured quantities have different sources of uncertainty, it is impossible to foresee and account for each individually. It is therefore helpful to express the overall effects with a general characterization of uncertainty. One type of uncertainty values represent the cumulative effects of all possible discrepancy sources. These uncertainty values may conform to a single, universal definition so that attribute mediators and clients can make effective use of them. Thus, the following definition of uncertainty, which is based upon the definition of standard deviation for random fluctuations about a mean value, could be used for numeric values:
[0107] For an attribute instance value, .mu., the associated uncertainty, .sigma., shall represent the likelihood that the following condition has a 68% probability of being true:
.mu..sub.true-.sigma..ltoreq..mu..ltoreq..mu..sub.true+.sigma.
[0108] Where .mu..sub.true represents the "true" value that the attribute represents.
[0109] As with uncertainty, a value timestamp can be indicated in a variety of ways. An example of a timestamp specification is as follows. Attribute values may be thought of as representations of a particular quantity at a point in time. Often this time is not proximate to that of use, so it can be useful to provide the proper timestamp along with the value. One version of a timestamp is defined as follows:
[0110] The timestamp represents the moment at which the associated value would have been valid had it been measured directly at that moment. This definition results in some attributes having timestamps that do not correspond to the time at which their values were calculated. For instance, an attribute that represents the acceleration of the user can be calculated by looking at the change in velocity over a period of time. The necessary computations may further delay the availability of the acceleration value. This timestamp is thus specified to represent the time at which the acceleration was "most" valid, which in this case could be the middle of the time period during which the velocity was measured.
[0111] Other types of additional information related to an attribute value can include history information (e.g., frequency of past use and past popularity information), an indication of the supplier of the attribute, indications of equivalent attributes (e.g., for mediation purposes or if a value for this attribute is not available at a later time), indications of clients that have registered for this attribute or consumed values for the attribute, descriptions of clients in order to track statistics, information to be used to evaluate characterization module efficiency and/or to facilitate process optimization, and indication of a verification of accuracy (e.g., from a third-party, or of the value generation technique that was used), a consumer rating or reputation based on input from other clients (e.g., efficiency or reliability), a cost to use the value (e.g., an actual price, or an amount of time needed to retrieve or process the value), future availability of the attribute value (e.g., how intermittent additional values may be), a version of the attribute, etc.
[0112] The subroutine illustrated in FIG. 23 begins in step 2305 where additional information about an attribute value is received. The subroutine continues to step 2310 to determine if a timestamp is received, and if so continues to step 2315 to associate the timestamp information with the received value. After step 2315, or if it was instead determined that a timestamp is not received, the subroutine continues to step 2320 to determine if uncertainty or other accuracy information is received, and if so continues to step 2325 to associate that information with the received value. After step 2325, or if it was instead determined that uncertainty or other accuracy information is not received, the subroutine continues to step 2330 to determine if accuracy decay information (e.g., the rate at which the accuracy of the value changes over time) is received, and if so continues to step 2335 to associate that information with the received value. After step 2335, or if it was instead determined that accuracy decay information is not received, the subroutine continues to step 2340 to determine if information indicating that the value is a constant is received, and if so continues to step 2345 to associate that information with the received value. After step 2345, or if it was instead determined that constant-related information is not received, the subroutine continues to step 2350 to determine if information about which clients are to have access to the supplied value is received, and if so continues to step 2355 to associate that information with the received value so that client access to the attribute value is so restricted. After step 2355, or if it was instead determined that client access information is not received, the subroutine continues to step 2360 to associate any other received additional information with the received value, and then continues to step 2360 and returns. Those skilled in the art will appreciate that the various types of additional information can be associated with the received value in a variety of ways, such as by using a data structure to represent a received value that includes elements for the various types of associated information.
[0113] FIG. 24 is a flow diagram of an embodiment of the Mediate Available Values subroutine 2400, as illustrated in the accompanying figure and described elsewhere. As illustrated and discussed elsewhere, a variety of different types of mediators can be defined and specified. For example, some mediators include the following.
2 Mediator Name Description First The first attribute instance that was created. Last The last attribute instance that was created. Fast The first attribute instance to respond to a request for evaluation. Confidence The attribute instance with the lowest uncertainty. Freshness The attribute instance with the newest data value. Average The attribute instances are averaged and the result returned. Vote Two or more attributes that agree overrule ones that do not. User Choice The user is presented with a choice of which instance to use. Fast Decay The instances' confidence is attenuated quickly over time based upon the age of the data. The attenuated confidence is used to select the instance. Slow Decay The instances' confidence is attenuated slowly over time based upon the age of the data. The attenuated confidence is used to select the instance.
[0114] Those skilled in the art will appreciate that a variety of other mediators could similarly be used, including using the previously used value or a default value. In addition, other techniques could also be used, such as indicating that no value is available, asking a user to choose between available values or to provide additional instructions, repeatedly trying to obtain an appropriate value, attempt to identify new possible sources or a new mediation mechanism or technique, etc.
[0115] The subroutine begins at step 2405 where an indication of the values available for the mediation are received. The subroutine then continues to step 2410 to determine if a requester of the mediated value indicated a mediator to be used, and if so continues to step 2415 to select that mediator. If it is instead determined that the requester did not indicate a mediator to be used, the subroutine continues to step 2420 to determine if a supplier of one or more of values being mediated indicated a mediator to be used, and if so continues to step 2425 to select that mediator. If it is instead determined that a supplier did not indicate a mediator to be used, the subroutine continues to step 2430 to determine if a default mediator is available, and if so continues to step 2435 to select that mediator. If it is instead determined that a default mediator is not available, the subroutine continues to step 2440 to determine the mediators that are available to be used and then in step 2445 selects one of the available mediators. After steps 2415, 2425, 2435 or 2445, the subroutine continues to step 2450 to apply the selected mediator to the available values in order to select one or the available values or to generate a related value based on the available values. The subroutine then continues to step 2455 to return the mediated value, and returns. Those skilled in the art will appreciate that in other embodiments mediators could be identified and/or obtained in other manners, such as by being specified by third-parties that are not acting as a client, server, or characterization module.
[0116] FIG. 25 is a flow diagram of an embodiment of the Pull Attribute Value From Server subroutine 2160, as illustrated in the accompanying figure and described elsewhere. In particular, the subroutine begins in step 2505 where an indication of a request for an attribute instance value is received. The subroutine then continues to step 2510 to determine if an ID for the request has been received. If not, the subroutine continues to step 2515 to generate a unique request ID. After step 2515, or if it was instead determined that an ID for the request has been received, the subroutine continues to step 2520 to request an attribute value from the server registered for the attribute instance, including the unique ID with the request. The unique ID is included so that any circular references during the requests can be detected, as explained in greater detail below. The subroutine next continues to step 2525 to receive in response an attribute value and optionally additional information, or to instead receive an error message. In step 2530, the received information or error message is sent to the requester of the value, and in step 2595 the subroutine returns.
[0117] FIG. 26 is a flow diagram of an embodiment of the Push Attribute Value To Client subroutine 2140, as illustrated in the accompanying figure, and described elsewhere. In particular, in the first step the subroutine receives an indication of an attribute instance value and of a client to receive that value. The subroutine then continues to the second step to determine if additional information is associated with the indicated value, and if so retrieves that additional information. After retrieving the additional information, or if it was instead determined that there is no associated additional information, the subroutine next sends the value and any available additional information to the indicated client. The subroutine then returns.
[0118] FIG. 27 is a flow diagram of an embodiment of the Context Client routine 2700. The routine receives messages from the CM as well as instructions from users, sends messages to the CM, and processes received messages and instructions. In some embodiments, a CC could indicate to the CM an interest in receiving values for one or more attributes, but not begin to otherwise execute (e.g., by dynamically loading code) until a value for one of the attributes is supplied by the CM. The routine begins in step 2702 where the CC registers with the CM. The routine then continues to step 2704 where the CC optionally registers for one or more attributes of interest with the CM. The routine continues to step 2706 where it receives an indication of an instruction or of information received. The routine continues to step 2708 where it determines whether information or an instruction has been received.
[0119] If information has been received, the routine continues to step 2710 to determine if information about the satisfaction of a notification request has been received, and if so continues to step 2712 to process the notification satisfaction information and to take appropriate action. If notification information has not been received, the routine continues to step 2714 to determine if information about the satisfaction of a condition has been received, and if so continues to step 2716 to process the condition satisfaction information and to take appropriate action. If condition information has not been received, the routine continues to step 2718 to determine if a status message from the CM has been received (e.g., that a particular CS or a particular attribute has been unregistered), and if so continues to step 2720 to process the status information and to take appropriate action. If a status message has not been received, the routine continues to step 2722 to determine if an attribute value has been pushed to the CC. If not, the routine continues to step 2724 to process the other information that has been received, and if so continues to step 2726 to determine if additional information related to the value is has also been received. If additional information has been received, the subroutine continues to step 2730 to process the value and the additional information, and if not the routine continues to step 2728 to process the value.
[0120] If it was instead determined in step 2708 that an instruction was received, the routine continues to step 2740 to determine if the instruction is to send a notification-related request (e.g., to establish a request) to the CM, and if so the routine continues to step 2742 to send the request. If the instruction is not to send a notification-related request, the routine continues to step 2744 to determine if the instruction is to send a condition-related request (e.g., to temporarily suspend an existing condition), and if so the routine continues to step 2746 to send the request to the CM. If a condition-related request was not received, the routine continues to step 2748 to determine if an instruction to send an attribute value request was received, and if so continues to step 2750 to request the attribute value from the CM. In addition, other information could also be specified with the request, such as a mediator to be used if there are multiple available values or an indication of a particular supplier from whom to receive the value. After step 2750, the routine then continues to step 2752 to wait for the requested value or an error message. If it is determined in step 2754 that a value was received, the routine continues to step 2726, and if not the routine continues to step 2756 to process the error message.
[0121] If it was instead determined in step 2748 that the instruction was not to send an attribute value request, the routine continues to step 2758 to determine if the instrument was to send another type of request. If so, the routine continues to step 2760 to send the request, and if not the routine continues to step 2762 to perform another instruction as indicated. A variety of other types of requests could be sent to the CM, such as to shutdown the CM or a CS, to launch a CS, to specify a default mediator for the CM, etc. After steps 2712, 2716, 2720, 2724, 2728, 2730, 2742, 2746, 2756, 2760, or 2762, the routine continues to step 2770 to determine whether to continue. If not, the routine continues to step 2772 to unregister the registered attributes for the CC, next to step 2774 to unregister the client with the CM, and then to step 2795 to end. If it is instead determined to continue, the routine continues to step 2776 to determine whether any currently registered attributes should be unregistered, and if so continues to step 2778 to unregister the attributes with the CM. After step 2778, or if it was determined not to unregister any attributes, the routine continues to step 2780 to determine whether to register any additional attributes. If so, the routine continues to step 2782 to register for one or more attributes of interest. After step 2782, or if it was determined not to register any additional attributes, the routine returns to step 2706.
[0122] FIG. 28 is a flow diagram of an embodiment of the Context Server routine 2800. The routine receives messages from the CM as well as instructions from users, sends messages to the CM, and processes received messages and instructions. In some embodiments, a CS could indicate to the CM an ability to supply values for one or more attributes, but not begin to otherwise execute (e.g., by dynamically loading, code) until a value is requested. The routine begins in step 2802 where the CS registers with the CM. The routine then continues to step 2804 where it registers with the CM for one or more attributes for which the CS has the ability to supply values. The routine continues to step 2806 where it receives an indication of an instruction or of information received. The routine continues to step 2808 where it determines whether information or an instruction has been received.
[0123] If an instruction was received, the routine continues to step 2810 to determine if the instruction is to send a notification-related request (e.g., to establish a request) to the CM, and if so the routine continues to step 2812 to send the request. If the instruction is not to send a notification-related request, the routine continues to step 2814 to determine if the instruction is to send a condition-related request (e.g., to temporarily suspend an existing condition), and if so the routine continues to step 2816 to send a request to the CM. If a condition-related request was not received, the routine continues to step 2818 to determine if the instruction was to send another type of request. If so, the routine continues to step 2820 to send the request, and if not the routine continues to step 2822 to perform another instruction as indicated.
[0124] If it was instead determined in step 2808 that information has been received, the routine continues to step 2830 to determine if information about the satisfaction of a notification request has been received, and if so continues to step 2832 to process the notification information and to take appropriate action. If notification information has not been received, the routine continues to step 2834 to determine if information about the satisfaction of a condition has been received, and if so continues to step 2836 to process the condition information and to take appropriate action. If condition information has not been received, the routine continues to step 2838 to determine if a status message from the CM has been received (e.g., that a particular CC has registered), and if so continues to step 2840 to process the status information and to take appropriate action.
[0125] If a status message has not been received, the routine continues to step 2850 to determine if a pull attribute value request has been received by the CS, along with an ID that uniquely identifies the request. The unique ID in this example embodiment is used to allow the context server to determine if a circular reference exists when determining the requested attribute value. For example, consider the situation in which CS 1 is registered to supply values for attribute 1, and CS 2 is registered to supply values for attribute 2. In addition, imagine that the calculation of the value for attribute 1 depends on the value for attribute 2. Thus, when CS 1 receives a pull request to supply the value for attribute 1, it requests the value for attribute 2 from the CM, which in turn request the value from CS 2. After receiving the value for attribute 2 from CS 2 via the CM, CS 1 can then calculate the value for attribute 1 and satisfy the initial request by supplying the value to the CM. If, however, CS 2 also depends on the value for attribute 1 in order to calculate the value for attribute 2, a circular reference may exist. In that situation, after CS 1 requests the value of the attribute 2 in order to calculate the value for attribute 1, CS 2 may in turn request the value of attribute 1 from CS 1 (via the CM), thus creating a loop such that neither attribute value can be calculated. In order to detect such circular references, the example routine uses a unique ID passed along with attribute value requests. Alternate equivalent ways of identifying circular references could instead be used, or no such processing could be performed.
[0126] In the illustrated embodiment, if it is determined that a pull attribute value request has been received by the CS, the routine continues to step 2852 to determine if the received request ID matches a temporarily stored ID for the same attribute value. If so, a circular reference exists, and the routine continues to step 2853 to return an error message. If the ID does not match, the routine continues to step 2854 to determine the input information needed (if any) to calculate the requested value. The routine then continues to step 2856 to determine if the value of another attribute is needed. If so, the routine in step 2858 temporarily stores an indication of the attribute whose value is being calculated and of the ID. The routine then continues to step 2860 to request the attribute value needed, including the received ID. In step 2862, the routine waits for the requested value or error message. After receiving the value or error message, the routine continues to step 2864 to determine if more attribute values are needed, and if so to return to step 2860. After all of the needed attribute values have been received, the routine continues to step 2866 to remove the temporarily stored attribute value and ID, and then continues to step 2868 to determine if any errors were received for needed attribute values such that sufficient information to calculate the value requested of the CS is not available. If so, the routine continues to step 2853 to signal an error.
[0127] If there are no such errors, or if it was instead determined in step 2856 that no attribute values were needed, the routine continues to step 2870 to determine if any sensor values or other input information is needed to calculate the value requested of the CS. If so, the routine continues in steps 2872 through 2876 to request and receive the sensor or other input information that is needed. The routine then continues to step 2878 to determine if any errors were received for needed sensor values or other input information such that sufficient information to calculate the value request of the CS is not available. If so, the routine continues to step 2853. If no such errors occurred, or if it was instead determined in step 2870 that no sensor or other input information was needed, the routine continues to step 2887 to calculate the requested attribute value based on the received information. The routine then continues to step 2888 to optionally calculate additional information about the value that characterizes it (e.g., a timestamp or uncertainty information), and then continues to step 2889 to send the value and any additional information to the CM to satisfy the request.
[0128] If it was instead determined in step 2850 that an attribute value request was not received, the routine continues to step 2880 to determine if sensor or other input information has been pushed to the CS. If not, the routine continues to step 2882 to process the other information received, and if so continues to step 2884 to determine if the CS has sufficient information to calculate one or more attribute values based on the received input information and other stored information. If so, the routine continues to step 2887 to calculate those values and to push them to the CM, and if not the routine continues to step 2886 to store the sensor information for later use. In alternate embodiments, the CS could request other information that is needed to calculate an attribute value when sensor or other input information is received, rather than waiting until all necessary information has been received.
[0129] After steps 2812, 2816, 2820, 2822, 2832, 2836, 2840, 2853, 2882, 2886 or 2889, the routine continues to step 2890 to determine whether to continue. If not, the routine continues to step 2891 to unregister the registered attributes for the CS, next to step 2892 to unregister the server with the CM, and then to step 2899 to end. If it was instead determined to continue, the routine continues to step 2893 to determine whether any currently registered attributes should be unregistered, and if so continues to step 2894 to unregister the attributes with the CM. After step 2894, or if it was determined not to unregister any attributes, the routine continues to step 2896 to determine whether to register any additional attributes. If so, the routine continues to step 2897 to register for one or more attributes of interest. After step 2897, or if it was determined not to register any additional attributes, the routine returns to step 2806.
[0130] As discussed previously, a variety of error messages can be used by the CS, CM, and CC. Example error messages include the following.
[0131] Attribute already exists--Occurs when a CS attempts to create an attribute instance that already exists.
[0132] Attribute does not exist--Occurs when the CM receives a request for an attribute that does not exist.
[0133] Attribute instance does not exist--Occurs when the CM receives a request for a specific instance of an attribute which is not registered.
[0134] Attribute mediator does not exist--Occurs when a request for an attribute mediator could not be fulfilled because the name does not correspond to an existing attribute mediator.
[0135] Attribute unavailable--Occurs when a CS determines that it cannot satisfy a request for reasons other than when an attribute upon which it depends returns an error.
[0136] CS already running--A request to launch a CS could not be completed because the CS was already running.
[0137] CS does not exist--A request has been made for a CS that has not registered.
[0138] CS not found--A request to launch a CS could not be completed because the CS was not found.
[0139] CS unavailable--A request was made to a CS that cannot respond.
[0140] Condition already exists--Occurs when a client attempts to create a condition with a name that is already in use.
[0141] Condition does not exist--A request has been made for a non-existent condition.
[0142] Event already exists--Occurs when a client attempts to create an event with a name that is already in use.
[0143] Event does not exist--A request has been made for a non-existent event.
[0144] Inconsistent attribute data type--Occurs when a CS registers or provides an attribute instance for an attribute that already exists that has a different data type.
[0145] Request timed out--Occurs when the timeout has been exceeded and the request cannot be satisfied.
[0146] When error messages are received in some embodiments, the module receiving the error may make the request again but specify that diagnostic information is to be received, thus assisting in identifying the source of the error.
[0147] From the foregoing it will be appreciated that, although specific embodiments have been described herein for purposes of illustration, various modifications may be made without deviating from the spirit and scope of the invention. Accordingly, the invention is not limited except as by the appended claims. In addition, while certain aspects of the invention are presented below in certain claim forms, the inventors contemplate the various aspects of the invention in any available claim form. For example, while only one some aspects of the invention may currently be recited as being embodied in a computer-readable medium, other aspects may likewise be so embodied. Accordingly, the inventors reserve the right to add additional claims after filing the application to purse such additional claim forms for other aspects of the invention.
Previous Patent US 20,050,034,077 | Next Patent US 20,050,034,079
|
cc/2019-30/en_middle_0014.json.gz/line364
|
__label__wiki
| 0.69469
| 0.69469
|
Chow , et al. November 4, 2003
Wireless centrex automatic callback
The instant invention discloses a method and system for providing a novel wireless centrex service that untethers subscribers from the immobility associated with traditional desktop telephones. Essentially, the present invention extends the benefits of wireless voice and data services to subscribers having a need to move within a plurality of localities such as business and hospital campuses. In accordance with the invention, a wireless telephone subscriber can use a standard cellular/PCS telephone as a wireless extension of their desktop phone, while in the proximity of a miniature radio base station capable of communicating with the PCS/cellular telephone. The advantage of such a system is that a subscriber can use the same cellular/PCS telephone that provides service in the public network in the wireless centrex environment. Additionally, the wireless centrex system provides services and features which are similar to those offered to regular centrex telephone subscribers. Exemplary features include, caller ID, call waiting, call hold, call transfer, call forwarding and voice messaging.
Inventors: Chow; Albert (Hillsdale, NJ), Kim; Jinman (Chatham, NJ), Wang; Spencer (Parsippany, NJ), Ying; Wenchu (Cedar Knolls, NJ)
Assignee: AT&T Corp. (New York, NY)
Application Number Filing Date Patent Number Issue Date
224272 Dec., 1998
Current U.S. Class: 455/422.1 ; 455/414.1; 455/417; 455/555
Current International Class: H04Q 7/38 (20060101); H04Q 7/26 (20060101); H04Q 7/22 (20060101); H04Q 007/20 ()
Field of Search: 455/417,422,459,414,406,407,408,555,413,415,418,554 379/142.02,142.04,142.06,142.17,25.06
4456793 June 1984 Baker et al.
4627047 December 1986 Pitroda et al.
4691347 September 1987 Stanley et al.
4771448 September 1988 Koohgoli et al.
4827499 May 1989 Warty et al.
4864559 September 1989 Perlman
5023868 June 1991 Davidson et al.
5063588 November 1991 Patsiokas et al.
5228080 July 1993 Nutter et al.
5235632 August 1993 Raith
5267308 November 1993 Jokinen et al.
5280472 January 1994 Gilhousen et al.
5285469 February 1994 Vanderpool
5329578 July 1994 Brennan et al.
5345499 September 1994 Benveniste
5353331 October 1994 Emery et al.
5371781 December 1994 Ardon
5388150 February 1995 Schneyer et al.
5390233 February 1995 Jensen et al.
5404574 April 1995 Benveniste
5430719 July 1995 Weisser, Jr.
5434904 July 1995 Tsuzuki et al.
5450481 September 1995 Penzias
5457736 October 1995 Cain et al.
5467388 November 1995 Redd et al.
5469496 November 1995 Emery et al.
5473605 December 1995 Grube et al.
5479595 December 1995 Israelson
5483588 January 1996 Eatons
5497424 March 1996 Vanderpool
5504803 April 1996 Yamada et al.
5506887 April 1996 Emery et al.
5509067 April 1996 Murata
5513379 April 1996 Benveniste et al.
5530945 June 1996 Chavez, Jr. et al.
5535258 July 1996 Joglekar et al.
5544237 August 1996 Bales et al.
5548636 August 1996 Bannister et al.
5559860 September 1996 Mizikovsky
5566236 October 1996 McLampy et al.
5579375 November 1996 Ginler
5579379 November 1996 D'Amico et al.
5592541 January 1997 Fleischer, III et al.
5594781 January 1997 Kozdon et al.
5598412 January 1997 Griffith et al.
5603080 February 1997 Kallander et al.
5603084 February 1997 Henry, Jr. et al.
5610970 March 1997 Fuller et al.
5610972 March 1997 Emery et al.
5634193 May 1997 Ghisler
5657372 August 1997 Ahlberg et al.
5661791 August 1997 Parker
5664005 September 1997 Emery et al.
5666399 September 1997 Bales et al.
5673307 September 1997 Holland et al.
5729599 March 1998 Plomondon et al.
5734981 March 1998 Kennedy et al.
5740538 April 1998 Joyce et al.
5742905 April 1998 Pepe et al.
5745484 April 1998 Scott
5752185 May 1998 Ahuja
5752191 May 1998 Fuller et al.
5754627 May 1998 Butler et al.
5758281 May 1998 Emery et al.
5758286 May 1998 Leppanen
5758294 May 1998 Ganesan et al.
5781101 July 1998 Stephen et al.
5787162 July 1998 Javitt
5787352 July 1998 Benveniste
5794144 August 1998 Comer et al.
5805685 September 1998 McFarlen
5809128 September 1998 McMullin
5812653 September 1998 Jodoi et al.
5818919 October 1998 Berberich et al.
5822310 October 1998 Chennakeshu et al.
5825759 October 1998 Liu
5839065 November 1998 Joensuu et al.
5848142 December 1998 Yaker
5854977 December 1998 Oksanen et al.
5857016 January 1999 Jedlicka
5862208 January 1999 McLampy et al.
5864614 January 1999 Farris et al.
5870030 February 1999 DeLuca et al.
5875405 February 1999 Honda
5878338 March 1999 Alperovich et al.
5881145 March 1999 Giuhat et al.
5883942 March 1999 Lim et al.
5892821 April 1999 Turner
5898783 April 1999 Rohrbach
5905950 May 1999 Anell
5915225 June 1999 Mills
5917897 June 1999 Johnson et al.
5920812 July 1999 Palviainen
5920816 July 1999 Khan et al.
5924016 July 1999 Fuller et al.
5926537 July 1999 Birze
5949873 September 1999 Pinard
5956636 September 1999 Lipsit
5956652 September 1999 Eriksson
5960064 September 1999 Foladare et al.
5974309 October 1999 Foti
5978672 November 1999 Hartmaier et al.
5983117 November 1999 Sandler et al.
5995608 November 1999 Detampel et al.
5995848 November 1999 Nguyen
6005870 December 1999 Leung et al.
6011975 January 2000 Emery et al.
6035193 March 2000 Buhrmann et al.
6038451 March 2000 Syed et al.
6058305 May 2000 Chavez, Jr.
6069890 May 2000 White et al.
6073029 June 2000 Smith et al.
6075985 June 2000 Kao
6088435 July 2000 Barber et al.
6104797 August 2000 Nabkel et al.
6108557 August 2000 Wax et al.
6115386 September 2000 Bell et al.
6122484 September 2000 Fuller et al.
6134314 October 2000 Dougherty et al.
6151309 November 2000 Busuioc et al.
6160877 December 2000 Tatchell et al.
6161012 December 2000 Fenton et al.
6167256 December 2000 Yla-Outinen et al.
6169895 January 2001 Buhrmann et al.
6212377 April 2001 Dufour et al.
6219539 April 2001 Basu et al.
6223052 April 2001 Ali Vehmas et al.
6223055 April 2001 Cyr
6229803 May 2001 Bog et al.
6234572 May 2001 Shiino et al.
6236854 May 2001 Bradshaw, Jr.
6246889 June 2001 Boltz et al.
6253075 June 2001 Beghtol et al.
6259782 July 2001 Gallant
6282275 August 2001 Gurbani et al.
6301338 October 2001 Makela et al.
6330317 December 2001 Garfinkel
6374098 April 2002 Raith et al.
6374102 April 2002 Brachman et al.
6405033 June 2002 Kennedy, III et al.
6427009 July 2002 Reese
Brochure entitled "Extreme Centrex DMS-100 Integrated Wireless Centrex Solution," Northern Telecom, Sep. 1998. .
Brochure entitled "Say Goodbye to Phone Tag", AG Communication Systems Roameo PocketPBX. .
Brochure entitled "TDMA", AG Communication Systems Roameo, 3/98. .
Brochure entitled "SHOWCASE applications Public Carrier Networks DMS-100 Wireless-New Markets, New Opportunities", Published by Northern Telecom, Jun. 1998. .
Brochure entitled "Aireach Office Direct Communications Access For An Increasingly Mobile Workforce" by Hughes Network Systems, jun. 98-1K. .
Booklet entitled Nortel Companion The Wireless Telephone System for Business Keeping business Moving, 1995 Northern Telecom Limited, Ordering No.: P0809841 Issue Mar. 2, 1996. .
"AT&T Digital PCS" by Communications Plus, wireless centers taken from www.comm-plus. Net/ATTWS/tech.html, pp. 1-5, pp. 1-3, printed May 1999. .
"IS-136: Evolutionary Advances in D-AMPS" by ISOTEL Corporation taken from www.isotel.com/is136.html, printed May 1999. .
Newspaper article entitled "Cutting the Cord to Battle the Bells" by John McDonnell, Washington Post, Oct. 27, 1998. .
"TIA/EIA Interim Standard" Addendum No. 1 to TIA/EIA/IS-136.1-A, by Global Engineering Documents with the permission of EIA, pp. 14, 266, 332-332-40. .
Yamamoto et al., "Mobile telephone provided with call transfer function and call transfer method", US Patent Application Publication No. US 202/0004385 A1, Jan. 10, 2002..
Primary Examiner: Urban; Edward
Assistant Examiner: Trinh; Sonny F.
Attorney, Agent or Firm: Banner & Witcoff, Ltd.
This application is a continuation-in-part of applications Ser. No. 09/224,272 filed Dec. 31, 1998, abandoned Ser. No. 09/223,567 filed Dec. 31, 1998. This application relates to the provisional application Ser. No. 60/114,317 filed Dec. 31, 1998. The complete disclosures of these applications are hereby incorporated by reference.
1. A method for, where a number called by a wireless user is busy, automatically redialing a call in a wireless communication system, wherein the wireless communication system comprises: a switched communications network, coupled to at least a first local digital switch; at least a first network server platform, coupled to the at least first local digital switch; the at least first local digital switch, coupled to the at least first network server platform, and, where selected, to a voice message system; the at least first local digital switch, coupled to at least a first voice access port; the at least first voice access port, coupled to the at least first local digital switch and arranged to communicate with at least a first mobile station; the at least first mobile station, arranged to communicate with the at least first voice access port, wherein the at least first mobile station includes the wireless apparatus for automatically redialing the number; and wherein the switched communications network, the at least first network server platform, the at least first local digital switch, the at least first voice access port and the at least first mobile station utilize a predetermined scheme to provide automatic callback for the wireless apparatus, the method comprising the steps of: dialing a phone number for a call by a wireless apparatus, and where the phone number called is busy, automatically saving the phone number for the call; and initiating, upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, automatic redialing of the phone number for the call by the wireless apparatus.
2. The method of claim 1, further including automatically displaying the phone number of the call on a display.
3. The method of claim 1, further including receiving at least one incoming call and automatically saving a phone number for the at least one incoming call.
4. The method of claim 3, further including providing for automatic display of the phone number of a most recent incoming call by one of: pressing a predetermined button/buttons and providing a verbal command.
5. The method of claim 4, further including, where the phone number for the at least one incoming call is one of: unknown or security-protected, indicating that the phone number for the at least one incoming call is unable to be displayed.
6. The method of claim 5, wherein indicating that the phone number of the incoming call is unable to be displayed includes using one of a display, a voice prompt from the wireless apparatus, or a predetermined tone.
7. The method of claim 4, further including the step of disposing of a first displayed phone number by one of: moving at least one first displayed phone number to an end of a list of phone numbers of incoming calls received; and transposing the first displayed phone number with a next phone number of the incoming calls received.
8. The method of claim 1 further including the step of storing predetermined information of a wireless user in memory.
9. The method of claim 8, wherein the predetermined information stored in the memory is wireless user information for authentication.
10. The method of claim 8, wherein the predetermined information is billing information for the wireless user.
11. The method of claim 1, further including: downloading billing information from a network server platform to the wireless user, updating the billing information and returning the billing information that has been updated to the network
12. A wireless apparatus for, where a number called by a wireless user is busy, automatically redialing the number in a wireless communication system, wherein the wireless communication system comprises: a switched communications network, coupled to at least a first local digital switch; at least a first network server platform, coupled to the at least first local digital switch; the at least first local digital switch, coupled to the at least first network server platform, and, where selected, to a voice message system; the at least first local digital switch, coupled to at least a first voice access port; the at least first voice access port, coupled to the at least first local digital switch and arranged to communicate with at least a first mobile station; the at least first mobile station, arranged to communicate with the at least first voice access port, wherein the at least first mobile station includes the wireless apparatus for automatically redialing the number; and wherein the switched communications network, the at least first network server platform, the at least first local digital switch, the at least first voice access port and the at least first mobile station utilize a predetermined scheme to provide automatic callback for the wireless apparatus, the wireless apparatus comprising: a memory, for automatically saving the number, and, where selected, a phone number for an incoming call received; and a wireless automatic callback processor, coupled to the memory, for initiating a wireless communication, upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, by automatically redialing the number.
13. The wireless apparatus of claim 12, further including a display, coupled to the memory and the wireless automatic callback processor, for automatically displaying the number called, and where selected, of the incoming call.
14. The wireless apparatus of claim 13, wherein the memory further automatically saves a phone number for at least one incoming call.
15. The wireless apparatus of claim 14, wherein the display indicates the phone number of the at least one incoming call upon one of: a predetermined button/buttons being pressed and a verbal command.
16. The wireless apparatus of claim 14, where the phone number for the at least one incoming call is one of: unknown or security-protected, the display indicates that the phone number for the at least one incoming call is unable to be displayed.
17. The wireless apparatus of claim 14, wherein the wireless apparatus indicates that the phone number of the incoming call is unable to be displayed using one of a display, a voice prompt from the wireless apparatus, or a predetermined tone.
18. The wireless apparatus of claim 15, wherein the display of the phone number of at least one incoming call is adjustable by one of moving at least one first displayed phone number to an end of a list of phone numbers of incoming calls received; and transposing the first displayed phone number with a next phone number of the incoming calls received.
19. The wireless apparatus of claim 12, wherein the wireless apparatus is one of a wireless phone and another handheld wireless communications device.
20. The wireless apparatus of claim 12, wherein the memory further stores predetermined information of a wireless user.
21. The wireless apparatus of claim 20, wherein the predetermined information stored in the memory is wireless user information for authentication.
22. The wireless apparatus of claim 20, wherein the predetermined information is billing information for the wireless user.
23. The wireless apparatus of claim 22, wherein the billing information is obtained from a network server platform by the wireless user, updated and returned to the network server platform, wherein further access to the billing information is blocked by the network server platform during updating.
24. A wireless communication system having a wireless apparatus for, where a number called by a wireless user is busy, automatically redialing the number, the wireless apparatus comprising: a memory, for automatically saving the number called; and a wireless automatic callback processor, coupled to the memory, for initiating, upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, redialing the number, wherein the wireless communication system comprises: a switched communications network, coupled to at least a first local digital switch; at least a first network server platform, coupled to the at least first local digital switch; the at least first local digital switch, coupled to the at least first network server platform, and, where selected, to a voice message system; the at least first local digital switch, coupled to at least a first voice access port; the at least first voice access port, coupled to the at least first local digital switch and arranged to communicate with at least a first mobile station; the at least first mobile station, arranged to communicate with the at least first voice access port, wherein the at least first mobile station includes the wireless apparatus for automatically redialing the number; and wherein the switched communications network, the at least first network server platform, the at least first local digital switch, the at least first voice access port and the at least first mobile station utilize a predetermined scheme to provide automatic callback for the wireless apparatus.
25. The wireless communication system of claim 24, further including a display, coupled to the memory and the wireless automatic callback processor, for automatically displaying the number called, and where selected, of the incoming call.
26. The wireless communication system of claim 25, wherein the memory further automatically saves a phone number for at least one incoming call.
27. The wireless communication system of claim 26, wherein the display indicates the phone number of the at least one incoming call upon one of: a predetermined button/buttons being pressed and a verbal command.
28. The wireless communication system of claim 27, where the phone number for the at least one incoming call is one of: unknown or security-protected, the display indicates that the phone number for the at least one incoming call is unable to be displayed.
29. The wireless communication system of claim 28 wherein the wireless apparatus indicates that the phone number of the incoming call is unable to be displayed using one of a display, a voice prompt from the wireless apparatus, or a predetermined tone.
30. The wireless communication system of claim 25, wherein the display of the phone number of at least one incoming call is adjustable by one of moving at least one first displayed phone number to an end of a list of phone numbers of incoming calls received; and transposing the first displayed phone number with a next phone number of the incoming calls received.
31. The wireless communication system of claim 24, wherein the wireless apparatus is one of a wireless phone; and another handheld wireless communications device.
32. The wireless communication system of claim 24, wherein the memory further stores predetermined information of a wireless user.
33. The wireless communication system of claim 32, wherein the predetermined information stored in the memory is wireless user information for authentication.
34. The wireless communication system of claim 32, wherein the predetermined information is billing information for the wireless user.
35. The wireless communication system of claim 34, wherein the billing information is obtained from a network server platform by the wireless user, updated and returned to the network server platform, wherein further access to the billing information is blocked by the network server platform during updating.
36. The wireless communication system of claim 24 wherein the system includes: at least a first remote digital terminal, coupled to the switched communications network, the at least first local digital switch, and the at least first voice access port, wherein the switched communications network, the at least first network server platform, the at least first local digital switch, the at least first remote digital terminal, the at least first voice access port and the at least first mobile station utilize a predetermined scheme to provide automatic callback for the wireless apparatus.
37. A wireless communication platform for providing wireless automatic callback, comprising: at least one mobile station; a micro-cellular base station controller, arranged to communicate wirelessly with the at least one mobile station for, when a number called by the at least one mobile station is busy, automatically redialing the number in accordance with a predetermined scheme to provide automatic callback for the at least one mobile station; a switching and database automatic callback processor for wireless automatic callback, coupled to the micro-cellular base station controller and a memory, for providing processing for wireless automatic callback for the at least one mobile station upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, by automatically redialing a phone number; the memory, coupled to the micro-cellular base station controller and the switching and database processor, having a database for storing at least the number redialed; and the switching and database processor, in communication with the micro-cellular base station controller via a wireline interface without being connected to any public cellular system.
38. The wireless communication platform of claim 37, wherein the memory further stores information for authentication of the at least one mobile station.
39. The wireless communication platform of claim 37, wherein memory further stores billing information for the at least one mobile station.
40. A method for, where a number called by a wireless user is busy, automatically redialing a call in a wireless communication system, comprising the steps of: dialing a phone number for a call by a wireless apparatus, and where the phone number called is busy, automatically saving the phone number for the call; initiating, upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, automatic redialing of the phone number for the call by the wireless apparatus; and downloading billing information from a network server platform to the wireless user, updating the billing information and returning the billing information that has been updated to the network server platform.
41. A wireless apparatus for, where a number called by a wireless user is busy, automatically redialing the number in a wireless communication system, comprising: a memory, for automatically saving the number, and, where selected, a phone number for an incoming call received; and a wireless automatic callback processor, coupled to the memory, for initiating a wireless communication, upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, by automatically redialing the number, wherein the memory further stores predetermined information of a wireless user, wherein the predetermined information is billing information for the wireless user, and wherein the billing information is obtained from a network server platform by the wireless user, updated and returned to the network server platform, wherein further access to the billing information is blocked by the network server platform during updating.
42. A wireless communication system having a wireless apparatus for, where a number called by a wireless user is busy, automatically redialing the number, the wireless apparatus comprising: a memory, for automatically saving the number called; and a wireless automatic callback processor, coupled to the memory, for initiating, upon one of a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, redialing the number, wherein the memory further stores predetermined information of a wireless user, wherein the predetermined information is billing information for the wireless user, and wherein the billing information is obtained from a network server platform by the wireless user, updated and returned to the network server platform, wherein further access to the billing information is blocked by the network server platform during updating.
The instant invention relates generally to the field of communication, and more particularly, to the field of personal communications. The present invention articulates methods and systems for extending the benefits of wireless voice and data services to subscribers, especially in business premises and public environments, such as universities and hospitals. Furthermore, the present invention is geared towards providing methods and systems for processing and controlling communications in wireless communications and in a wireless centrex based environment.
The challenges of an increasing mobile workforce have resulted in businesses migrating towards a more flexible and decentralized working environment. These newly evolved environments have created a need for communication systems that must be capable of facilitating untethered communication at any time and any place. Consequently, there is vast growth in emerging technologies that facilitate communication anywhere and anytime.
Such technologies are employed in end user devices such as pagers, cellular telephones, and mail systems such as voice mail and e-mail systems.
There presently exists both wireline telephone network systems for home and office use and cellular telephone systems for wireless mobile calls anywhere wireless services are offered (i.e., anywhere a user subscribed cellular base station reception can reach), which are interconnected to each other through the Public Switched Telephone Network (PSTN). As such, a user has a choice of contacting other telephone users or being contacted by other telephone users by using either the wireline telephone system or the cellular phone system, each having their own respective detriments.
Wireline business telephone service is typically more economical than cellular phone service. However, if a user decides to use a wireline telephone as their only business telephone they can not be immediately contacted if they are not in their own office where their business telephone is physically located. Nor can the user easily make telephone calls while not in his own office or on travel. On the other hand, if a user decides to have a cellular phone as their only business telephone they can be contacted at anywhere at anytime but will likely incur higher costs, e.g., airtime charges, which in total can be higher than using wireline telephone services. In the aggregate the cost of cellular telephone service to all employees of a company is generally cost prohibitive. In addition, a cellular telephone does not typically provide the feature/function of a wireline telephone service (e.g., Integrated Services Digital Network (ISDN) and centrex feature/function).
Furthermore, if a user decides to have both a wireline telephone and a cellular phone for their business use, they incur cost for using both systems and experience the inconvenience of having two separate telephones and thus two separate voice mail systems to check for messages. A caller is also inconvenienced by having to call both the user's wireline telephone number and the user's cellular telephone to reach the user.
Wireline telephone network systems (including ISDN and centrex capabilities) and cellular telephone systems each have various feature/functions available to the user. Therefore, a need exists to provide a wireless centrex system (WCS) having features and functions presently available in existing wireline service and cellular services, as well as offering new feature/functions, while offering low cost telephone service for the working environment.
The instant invention addresses this need for an untethered communication systems created by the paradigm shift towards a more flexible and decentralized working environment. The material described in the instant invention discloses a wireless communication platform that provides a solution to the challenge of mobility management by merging and expanding the capabilities of wired and wireless networks. Thus, the present invention includes systems and methods to provide a wireless communication service that has expanded the features/functions available in wireline and cellular telephone systems and the relative cost of the wireline system using a mobile telephone system and service that is added to existing wireline telephone systems equipment, to offer cost effective wireless communications for the working environment.
The instant invention includes a wireless centrex system (WCS) that allows a subscriber to use the same standard cellular/PCS telephone in both the wireless centrex system domain as well as the public cellular system domain. In the WCS domain, subscribers can use their cellular/PCS as a cordless-like phone without incurring air-time charges. The WCS has the advantage of providing a working environment mobile telephone system having traditional centrex and PBX type services such as call waiting, call hold, call forwarding, caller ID, three party conference calling, and call messaging. The WCS also includes additional enhanced features like message services used for paging, call screening, call waiting, distinctive ringing, user proactive call handling, automatic callback, call return and speed calling.
In general, the present invention is directed towards a method and system for extending the benefits of wireless voice and data systems to a wireless centrex system. The method and system as described in the instant invention, provides flexible software driven support for future generation air interfaces, as well as support for current legacy second generation air interfaces.
In traditional centrex systems, subscriber's locations are fixed, and as a result, the call delivery mechanism to deliver a call to a subscriber is predetermined. However, in a wireless environment, the subscriber has the flexibility to continuously move throughout a specified coverage area. Consequently, there exists a need to provide an intelligent call and message delivery mechanism. The instant invention introduces a novel call delivery mechanism using an Advanced Intelligent Network (AIN) to achieve delivery. This AIN has a Service Switching Point (SSP) which utilizes a triggering mechanism to determine the appropriate call handling treatment for a specific call. As such, the system includes, for example, an existing local digital switch (LDS) as the SSP, an intelligent server (herein referred to as a network server platform (NSP)) coupled to the LDS for processing AIN communications, a plurality of remote digital terminals (RDT) coupled to the LDS, a plurality of intelligent transceivers (herein referred to as voice access ports (VAP)) coupled to the RDT (alternatively: the VAP could be coupled directly to the LDS), and a plurality of mobile stations (MS) which communicate with the VAPs through an air interface (wireless). Although a general WCS configuration with existing wireline centrex equipment has been provided as one preferred embodiment, there are many other configurations possible some of which are shown (e.g., WCS using PBX or having wireless data ports) and the basic system interfaces with other existing systems such as a PSTN and provider internet.
In operation, for example, the LDS upon receiving an incoming call with a directory number (DN) is triggered to communicate with a network server platform (NSP) to determine, using AIN, whether the DN has been set up to be associated with a mobile station (MS) and WCS service. The NSP tells the LDS to which of a plurality of VAPs connected to a particular RDT the desired mobile station is presently registered with (connected to via air interface RF channel), and how to route the call to the mobile station having the mobile station identification number (MSIN) associated with the called DN. The various feature/functions provided in the WCS services of the present invention are summarized below.
Feature Activation/Deactivation
Many of the feature/functions provided in the present invention WCS require selection by the mobile station user. As such, the present invention provides a system and method for a mobile station user to activate and deactivate particular features/functions. For example, the Mobile Station (MS) user dials a feature activation/deactivation code into a mobile station which is then sent to the intelligent transceiver (Voice Access Port (VAP)) over a digital control channel (DCCH) and the VAP sends an origination request message including the feature code to an intelligent server (network server platform (NSP)). The NSP determines whether the particular requested feature is authorized for the particular mobile station requesting the feature and activates the feature if it has been authorized. The NSP returns a message through the Local Digital Switch (LDS) and the VAP to the MS indicating that the feature is either activated or unavailable. If the feature/function code entered into the MS is for deactivation the process is similar except that the NSP checks to see if the feature/function is active and if so, turns the feature/function off. In this case, the NSP returns a message through the Local Digital Switch (LDS) and the VAP to the MS indicating that the feature has been deactivated.
Call Hold
One feature of the present invention provides enhanced call hold functionality. The WCS service provides call hold/unhold functionality for a wireless communications unit (mobile station (MS)) so that a user can place an active call or an incoming call on hold and retrieve the call later. One aspect of the call hold feature of the present invention allows a user to press a button, key, or key combination and/or button combination on his mobile communications unit (MS) to place an active or incoming call on hold. Further, another aspect of the call hold feature allows a user to press the same or a different button, key, key combination and/or button combination to retrieve the call from hold. The call hold feature may also allow the MS user to play a personalized message to the party placed on hold.
A still further aspect of the call hold feature for the present invention allows a mobile phone subscriber to place an incoming call on hold without first having to answer the call. According to one such embodiment, the calling party can be coupled to, for example, a voice processing unit (VPU) to receive a message that indicates the call is on hold and the called party (WCS subscriber) will be with you shortly. Thus, the WCS of the present invention provides a user with the ability to interactively place an incoming call on hold in real time without first answering the call, have the caller automatically instructed that the call is on hold, and to pickup the call sometime in the near future.
User Proactive Call Handling
Another feature of the present invention provides user proactive call handle (UPCH) functionality and capability. This feature allows a mobile telephone user to proactively handle a call in an intelligent wireless communications system. A communications management methodology according to the present invention allows a user to proactively handle calls destined to the user's terminal, e.g., a mobile station MS. One aspect of this feature allows a user to process and terminate an incoming call in real time.
According to an illustrative embodiment of the present invention, a subscriber is notified of an incoming call via a Short Message Service (SMS) message with caller ID or a user alert, such as a tone or ringing. Upon receipt of the alert, the subscriber may select from a series of options, how to process and terminate the incoming call. For example, if an incoming call is of high priority and requires immediate attention, the subscriber may decide to answer the call immediately. If the subscriber decides that the call does not require immediate attention, he may opt to provide a delayed answer. Such a delayed answer option can involve connecting the call to an announcement prior to answering the call. Still further, if neither of the prior options is suitable, then the subscriber may opt to send the call to a voice mail system, from which a recorded message can later be retrieved. Yet another option of terminating the call is to forward the call to another phone. In the event that the subscriber decides that the incoming call should not be answered, the subscriber may choose to reject the call. If the subscriber decides that none of the aforementioned options should be proactively taken, then a default option can be used to terminate the call. Such a default option may include, but is not limited to, forwarding the call, delaying the answer, sending the call to a voice mailbox, or rejecting the call.
Another aspect of the UPCH feature provides the ability to delay allocation of the voice channel to a called party until when, if at all, the incoming call to the called party requires a voice channel. This is carried out by allowing a called party to receive notification of an incoming call over the control channel and to return the selection of the call handling options upstream over the control channel. Thus, a voice channel need not be allocated until the called party decides to answer the call. This can be beneficial in wireless environments to prevent the unnecessary allocation of voice channels. Once the called party needs a voice channel, the incoming call has priority for available voice channels.
Call Transfers
Yet another feature of the present invention provides enhanced call transfer functionality. The WCS services provides call transfer functionality for a wireless communications unit (mobile station (MS)) so that a user can transfer an active call to another DN, i.e., a transfer-to DN, that is within or outside the WCS. The MS user is provided a quick, user friendly means to transfer an active call to another DN. According to one variation of the call transfer feature/function the MS user enters digits for a call transfer feature code and digits for the transfer-to DN, which are forwarded via a unique Feature Request message to an NSP to initiate the call transfer feature. After an NSP verifies that the MS is authorized to use the call transfer feature, a unique Transfer message is provided, an announcement is played indicating that call transfer is being initiated, and the active call is placed on hold while a call setup is performed between the VAP (associated with the MS requesting a call transfer) and the transfer-to DN (which may be associated with either a PSTN or another MS).
In some situations the transfer-to DN may be busy or may not be answered. In such cases, before the call to the transfer-to DN is answered, the MS user can enter another key sequence (a button, key, or key combination and/or button combination) to end the call transfer and retrieve the call on hold. On the other hand, when the call to the transfer-to DN is answered a unique Transfer Result message is sent to the NSP indicating that the call has been answered and the MS user can enter a key sequence which instructs the WCS to complete the call transfer
Still another feature of the present invention provides enhanced caller identification (caller ID) functionality. One feature of the present invention provides enhanced caller identification (Caller ID) functionality. The WCS service provides Caller ID functionality for a wireless communications unit (mobile station (MS)) so that a user can determine a caller's identity such as the calling party's directory number and location for an incoming or active call and decide how to handle the incoming call, e.g., answer, not answer, forward to voice mail, etc. One aspect of the Caller ID feature of the present invention allows display on the MS of the originating directory number (Calling Party Number) and identity for an incoming and/or active call, even if the call originates from another MS. Another aspect of the Caller ID feature of the present invention provides the location and identity of the called MS 101 to the calling party and displayed on the calling party's MS 101 during an active call. In either case, a Network Server Platform (NSP) provides the parties desk top phone directory number (DN) as their telephone number for Caller ID rather than the forward directory number (FDN) associated with a voice access port (VAP) which the MS is presently associated.
A further aspect of the Caller ID feature provides that the calling party may be initially coupled to, for example, a voice processing unit (VPU) including voice recognition capabilities, so that the calling party can provide their name or other information which will be displayed on the MS of the called party. A still further aspect of the Caller ID feature allows display on the MS 101 of additional information about the calling or called party, for example their address, building number, company affiliation, etc. for an incoming or active call. The MS 101 user can also disable the caller ID on a call-by-call basis. Thus, the WCS of the present invention provides a MS 101 user with the ability to know the identity of the calling persons before answering a call and the identity and location of a party they are speaking with on an active call, even in the case when the calling party is calling from a WCS MS.
Screening Calls
An even further feature of the present invention provides call screening functionality and capability. The WCS service provides call screen functionality for a wireless communications unit (mobile station (MS)) so that a user can screen incoming calls to prevent the user from being disturbed by calls from parties with which the user does not wish to speak. One feature of the call screen feature/function of the present invention allows a user to press a button, key, or key combination and/or button combination on the MS to block out an incoming call(s) originating from a telephone number(s) specified by the user. The MS user will specify a list of phone numbers (call screen list) for which incoming calls are to be blocked when received. When any one of the phone numbers on the call screen list is the originating phone number for an incoming call directed to the MS, the system will block that call so that the MS user is not alerted and thus not disturbed.
A further feature of the call screen feature/function of the invention enables an MS user to specify how the screened call(s) will be handled. The MS user can specify that the screened call may be, for example, sent to an answering service such as a voice mail system, provided an announcement selected by the MS user, or dropped without any announcement.
Another feature of the call screen feature/function enables the MS user to enter a phone number to the screen call list of phone numbers by either manually entering each digit of the phone number or by indicating that the phone number of the last active call is to be added to the call screen list. In the first case, the MS user can enter a phone number to the call screen list by entering, for example, the call screen feature code followed by the phone number to be blocked. In the second case, the MS user can dynamically enter a phone number in the call screen list by entering, for example, a particular key or entering the call screen feature code without any phone number. The WCS will then determine the phone number of the last active phone call and add that phone number to the call screen phone number list so that any incoming calls from that phone number will be blocked.
Further aspects of the present invention provide a means for forwarding calls to another number in a WCS 140 system. The number that the call is being forwarded to may be within or outside the WCS 140 system. There are several modes of call forwarding that are available. For example, a call may be unconditionally forwarded, forwarded after a certain number of rings or upon the passage of a certain amount of time, forwarded in response to the called MS 101 being busy, and/or forwarded only during one or more selected time periods. Moreover, one or more of these call forwarding modes may be used in any combination. For instance, a call may be forwarded only during the weekend and only after a predetermined number of rings. The call forwarding feature(s) may be activated/deactivated directly from the MS 101 to be called, from another MS, via a network such as a conventional telephone network or the Internet, and/or by calling a Customer Care Center (CCC) representative.
Accordingly, an aspect of the present invention is directed to systems and methods for forwarding an incoming call, the call originating from a first communication device and being directed to a directory number of a wireless centrex system. For example, the systems and methods may generate a message by a local digital switch in response to the call, and determine by a network server platform, responsive to receiving the message, whether the call should be forwarded. The call may be either forwarded to the second communication device responsive to the network server platform determining that the call should be forwarded, or routed to a wireless mobile station having a forward directory number associated with the directory number responsive to the network server platform determining that the call should not be forwarded.
In a further aspect of the present invention, the systems and methods may determine by the local digital switch whether the wireless mobile station is busy with another call. The call may be either forwarded by the local digital switch to the second communication device responsive to determining that the wireless mobile station is busy, or routed to the wireless mobile station responsive to determining that the wireless mobile station is not busy.
In yet a further aspect of the present invention, the systems and methods may generate a current time and determine whether the current time is between a begin time and an end time. The call may either be forwarded to the second communication device responsive determining that the current time is between the begin time and the end time, or routed to the wireless mobile station responsive to determining that the call should not be forwarded.
In a still further aspect of the present invention, the systems and methods may alert the wireless mobile station and count a predetermined amount of time in response to the call. The call may be forwarded to the second communication device responsive to the predetermined amount of time being counted.
The present invention also provides a method for call waiting in a WCS system. In particular, the call waiting functionality allows a user of a mobile station (MS) to be notified of an incoming call when the MS is being used. That is, when an existing call between the MS user and another party is ongoing, the MS user can be notified of another call directed to the MS. The call waiting feature also allows the MS user to place an ongoing call on hold and answer the incoming call. Further, the MS user may switch back and forth between the calls. Currently, there is no known call waiting service in a WCS system.
Distinctive Ringing
The present invention also provides a method for distinctive ringing in a WCS system. In particular, the distinctive ringing functionality allows a user of a mobile station in a WCS system to receive a distinctive ring for a call originated from a communications unit having a particular directory number (DN). A user can select one or more DNs for which a distinctive ring will be received when a call is originated from a unit assigned the selected DN.
Returning Calls
Still another feature of the present invention provides enhanced call return functionality. The present invention overcomes the drawbacks associated with existing systems by providing a call return functionality for wireless communication systems. The invention enables automatically placing the phone number of an incoming call, where the phone number is not unknown or security-protected, in a memory so that the call may be automatically dialed when it is convenient for the person to return the call.
A user may wish to handle calls from different parties differently. Thus, in one embodiment, where more than one incoming call is received, the phone numbers for the incoming calls may be stored in a first-in, last-out viewing order on a display. Alternatively, the phone numbers for the incoming calls may be stored in a first-in, first-out viewing order or any predetermined order. In addition, prior to the wireless call return processor initiating dialing the phone number for the incoming call, the user may utilize the wireless call return processor to select which incoming call he wishes to return first by moving a first displayed phone number to the end of a list of phone numbers of incoming calls received and if desired, repeating this action. Alternatively, if the user desires to delay briefly returning the call associated with the first displayed phone number call, the user may transpose the first displayed phone number with a next phone number of the incoming calls received. Again, this action may be repeated as desired.
Where the phone number is unknown or is security-protected so that display of the phone number is blocked, the display may indicate that the phone number for the incoming call is unable to be displayed. Alternatively, a voice prompt, a short message, or a predetermined tone may indicate that the phone number for the incoming call is unknown or unable to be displayed.
Automatic Callback
Another feature of the present invention provides enhanced automatic callback functionality. Present wireless handsets do not provide for automatic callback to free the user from having to redial, perhaps repeatedly, a number in order to complete a call. Clearly, there is a need for a system, wireless apparatus and method for providing automatic callback for a user in a wireless communication system when a called number is unavailable.
The present invention overcomes the drawbacks associated with existing systems by providing an automatic callback functionality for wireless communication systems. The invention provides for automatically redialing the phone number of a call when a number called by a wireless user is busy, thus permitting the wireless user to continue with other work and to answer the phone when the callback succeeds in connecting the call.
When the call is connected, the wireless system may generate a voice prompt via the wireless apparatus, a predetermined tone, an alert light or the like, to notify the wireless user that the callback call is connected. The wireless user may answer the call immediately, may press a button or use a verbal command or commands to put a present call on hold and switch to the callback call. If the wireless user chooses to put the callback call on hold, a pre-recorded message from the wireless system may be played for the callback caller to alert him that the wireless user will be answering his call in a very short time.
Speed Calling
The present invention also provides a method for speed calling in a WCS system. In particular, the speed calling functionality allows a user of a mobile station in a WCS system to create a list of at least one phone number for which the subscriber utilizes a speed calling code to call at least one phone number. A subscriber can then call a selected phone number by entering a provisioned speed calling code rather than a longer telephone number.
Adding a Party to an Existing Call
Still another feature of the present invention provides enhanced conference call functionality. The WCS service provides conference call functionality for a wireless communications unit (mobile station (MS)) so that a user can connect additional parties to an active call with a party within or outside the WCS. The MS 101 user is provided a quick, user friendly means to add another party to an active call. Further, the MS 101 user is provided a quick, user friendly means to retrieve an original call before a third party answers a call during a conference call setup.
According to one variation of the conference call feature/function, the MS 101 user enters digits for a conference call feature code and digits for the conference-with DN, which are forwarded via a Feature Request message to an NSP 106 to initiate the conference call setup procedure. Once the NSP 106 verifies that the MS 101 user is authorized to use the conference call feature, a Feature Request Acknowledgement message containing instructions to play a voice prompt to the MS 101 is provided to a VAP 103, an announcement is played indicating that a conference call is being initiated, and the active call is placed on hold while a conference call setup is performed between the VAP 103 (associated with the MS 101 requesting a conference call) and the conference-with DN (associated with, for example, either a PSTN or another MS). After the third party answers, the MS 101 user can press another key, for example the "send" button on the MS 101, to re-connect the original party(ies) to the conference call. However, if the WCS is unable to connect the third party with the MS 101 user, the MS 101 user is prompted and notified of the failure to connect allowing the MS 101 user to terminate the conference call connection procedure by pressing another key, for example the "send" button on the MS 101, to recover the previously active call with the original party(ies).
In some situations the conference-with DN may be busy or may not be answered, or the MS 101 user may simply decide they no longer wish to connect the third party to the conference call. In such cases, before the call to the conference-to DN is answered, the MS user can decide to end the conference call connection procedure without prior system prompt by entering another key sequence (a button, key, or key combination and/or button combination) to end the conference call transfer connection procedure and retrieve the original call on hold. For example, the MS 101 user could press the "send" key twice within a short period of time. In response, the conference call connection procedure will cease, the call setup with the third party will be disconnected, and the original call will be retrieved.
Deleting a Party From an Existing Call
Still another feature of the present invention provides enhanced conference call functionality. The WCS provides conference call functionality for a wireless communications unit (mobile station (MS)) so that a user can connect and disconnect parties to an active call with a party within or outside the WCS. The MS 101 user is provided a quick user friendly means to delete a party from an active conference call.
According to one variation of deleting a party from a conference call feature/function, the MS 101 user enters a party drop feature message and the VAP 103 determines that the MS 101 user is requesting that the last party added to a conference call be dropped. The VAP 103 will then request the LDS 104 to drop the last added call of the current conference call. The LDS 104 proceeds by sending the necessary messages to have the last added call released from the conference call. For example, the MS 101 user could press the "send" key twice within a short period of time. In response, the last added call to an active conference call connection procedure will be dropped by the LDS 104.
WCS as a Wireless PBX System
Another feature of the present invention includes a WCS which is a Wireless PBX system. In this case, the system includes a Intelligent Wireless Controller (IWC) that connects to a Customer Premises PBX and an NSP. The IWC and PBX will provide various functions performed by the LDS and RDT found in a typical WCS.
WCS With Wireless Voice And Data
Yet another feature of the present invention includes wireless data capability with the WCS. In this case, laptop computers equipped with a transceiver interface with Data Access Ports (DAP) connected to an Integrated Wireless Communication Controller to provide a wireless data system integrated with the WCS Voice Access Ports (VAP) and a LAN.
For a more complete understanding of the present invention, reference is now made to the following descriptions taken in conjunction with the accompanying drawings in which like designations represent like parts, and in which:
FIGS. 1A-1C illustrates an exemplary wireless centrex system platform architecture.
FIG. 2 illustrates an exemplary wireless centrex network architecture.
FIG. 3 illustrates an exemplary signal flow diagram which demonstrates the registration process which occurs when the mobile station is powered on.
FIG. 4 illustrates an exemplary signal flow diagram which demonstrates call origination.
FIG. 5 illustrates an exemplary signal flow diagram which demonstrates termination of a call by a mobile station that answers the call.
FIG. 6 illustrates an exemplary signal flow diagram which demonstrates termination of a call by a mobile station that went unanswered.
FIG. 7 illustrates an exemplary signal flow diagram which demonstrates call termination to a roaming subscriber.
FIG. 8 illustrates an exemplary signal flow, diagram which demonstrates intra-local digital switch assisted handoff.
FIG. 9 illustrates a communications network for a wireless centrex system executed using a PBX system according an embodiment of the present invention.
FIG. 10 illustrates still another communications network for wireless centrex system capability having a wireless voice and wireless data wireless centrex system according to another embodiment of the present invention.
FIG. 11 illustrates an exemplary signal flow diagram which demonstrate feature activation/deactivation.
FIG. 12 shows a block diagram of illustrative communications network according to yet another embodiment of the present invention.
FIG. 13 shows an exemplary signal flow for setting up an incoming call used for call hold/unhold feature, in accordance with an illustrative embodiment of the present invention.
FIG. 14A shows a first exemplary call flow for the feature of call hold/unhold during an active call in accordance with an illustrative embodiment of the present invention.
FIG. 14B shows a second exemplary call flow for the feature of call hold/unhold during an active call in accordance with another illustrative embodiment of the present invention.
FIG. 15 shows another exemplary signal flow for the feature of call hold/unhold of an unanswered incoming call in accordance with an illustrative embodiment of the present invention.
FIG. 16 shows an exemplary user proactive call handling signal flow diagram for the activation and deactivation of the UPCH feature in accordance with an illustrative embodiment of the present invention.
FIG. 17 shows an exemplary user proactive call handling signal flow diagram for handling an incoming call when the UPCH feature is employed in accordance with an illustrative embodiment of the present invention.
FIG. 18 shows an exemplary proactive call handling signal flow diagram for the delay answer call feature in accordance with an illustrative embodiment of the present invention.
FIG. 19 shows a signal flow diagram for an exemplary call transfer to a PSTN telephone in accordance with an illustrative embodiment of the present invention.
FIG. 20 shows a signal flow diagram for an exemplary call transfer to a mobile station in accordance with an illustrative embodiment of the present invention.
FIG. 21A illustrates a flowchart of an origination leg of a Caller ID information retrieval procedure for one preferred embodiment of the present invention.
FIG. 21B illustrates a flowchart of a termination leg of a Caller ID information retrieval procedure for one preferred embodiment of the present invention.
FIG. 21C illustrates a signal flow diagram for Caller ID information during call origination for one preferred embodiment of the present invention.
FIG. 21D illustrates a signal flow diagram for Caller ID information during call termination for one preferred embodiment of the present invention.
FIG. 21E illustrates a flowchart of an origination leg of a Caller ID information retrieval procedure for another preferred embodiment of the present invention.
FIG. 21F illustrates a flowchart of a termination leg of a Caller ID information retrieval procedure for another preferred embodiment of the present invention.
FIG. 21G illustrates a signal flow diagram for Caller ID information during call origination for another preferred embodiment of the present invention.
FIG. 21H illustrates a signal flow diagram for Caller ID information during call termination for another preferred embodiment of the present invention.
FIG. 22 shows a signal flow diagram for provisioning an exemplary call screen in accordance with an illustrative embodiment of the present invention.
FIG. 23 shows a signal flow diagram for dropping a screened call without an announcement for an exemplary call screen in accordance with an illustrative embodiment of the present invention.
FIG. 24 shows a signal flow diagram for sending a screened call to a voice mail system for an exemplary call screen in accordance with an illustrative embodiment of the present invention.
FIG. 25 shows a signal flow diagram for dropping a screened call after providing an announcement for an exemplary call screen in accordance with an illustrative embodiment of the present invention.
FIG. 26 is an exemplary flow chart of the unconditional call forwarding feature of the present invention.
FIG. 27 is an exemplary signal flow diagram for signals generated when a call is successfully forwarded using the unconditional call forwarding feature of the present invention.
FIG. 28 is an exemplary flow chart of the busy call forwarding feature of the present invention.
FIG. 29 is an exemplary signal flow diagram for signals generated when a call is successfully forwarded using the busy call forwarding feature of the present invention.
FIG. 30 is an exemplary flow chart of the time-of-day call forwarding feature of the present invention.
FIG. 31 is an exemplary signal flow diagram for signals generated when a call is successfully forwarded using the time-of-day call forwarding feature of the present invention.
FIG. 32 is an exemplary flow chart of the programmable ring call forwarding feature of the present invention.
FIG. 33 is an exemplary signal flow diagram for signals generated when a call is successfully forwarded using the programmable ring call forwarding feature of the present invention.
FIG. 34 illustrates an exemplary embodiment of an Internet web page for activating and/or modifying features according to aspects of the present invention.
FIG. 35 shows an exemplary call flow diagram for the call waiting functionality according to an illustrative embodiment of the present invention.
FIG. 36 shows an illustrative flow diagram for the call waiting service feature according to an embodiment of the present invention.
FIG. 37 shows an exemplary call flow diagram for the actual implementation of the distinctive ringing feature according to an illustrative embodiment of the present invention.
FIG. 38 is a signal flow chart showing signaling flow steps for an illustrative embodiment implementing a call return in accordance with the present invention.
FIG. 39 illustrates one embodiment of steps for implementing a method for automatically returning an incoming call in a wireless communication system in accordance with the present invention.
FIG. 40 is a block diagram of a wireless apparatus utilized for implementing the method of the present invention in a wireless communication system.
FIG. 41 is a flow chart showing another embodiment of steps in accordance with the method of the present invention.
FIG. 42 is a block diagram of one embodiment of a wireless communication platform for providing automatic wireless call return in accordance with the present invention.
FIG. 43 is a signal flow chart showing signaling flow steps for an illustrative embodiment implementing the automatic callback functionality in accordance with the present invention.
FIG. 44 is a signal flow chart showing one embodiment of signaling flow when a mobile station MS moves from an original serving voice access port VAPo to a new voice access port VAPn before a call is connected.
FIG. 45 is a flow chart showing one embodiment of steps of a method in accordance with a preferred embodiment of the present invention.
FIGS. 47A-47C represent a flow chart showing another embodiment of steps for implementing the automatic callback feature of the present invention wherein the wireless user is permitted to automatically re-dial the last number dialed via a queuing process that sets up the call when the called line is idle. FIG. 47A illustrates steps during call establishment/activation; FIG. 47B illustrates steps for one embodiment implementing the NSP procedure. FIG. 47C illustrates steps for one embodiment implementing the VAP procedure.
FIG. 49 is a block diagram of one embodiment of a wireless communication platform for providing wireless automatic callback in accordance with the present invention.
FIG. 50 shows an exemplary call flow diagram for the actual implementation of the speed calling feature according to an illustrative embodiment of the present invention.
FIG. 51 is a first partial process flow diagram for a conference call procedure in accordance with an illustrative embodiment of the present invention.
FIG. 52 is a second partial process flow diagram, related to the first partial diagram of FIG. 51, for a conference call procedure in accordance with an illustrative embodiment of the present invention.
FIG. 53 shows a signal flow diagram for an exemplary three-way conference call for adding a PSTN telephone to an existing PSTN--MS call in accordance with an illustrative embodiment of the present invention.
FIG. 54 shows a signal flow diagram for an exemplary three-way conference call for retrieving an original call when a third party could not be connected to an existing PSTN--MS call for a conference call in accordance with an illustrative embodiment of the present invention.
FIG. 55 shows a signal flow diagram for a three-way conference call for enabling an MS 101 user to initiate retrieval of an original call with a PSTN telephone of an existing PSTN--MS call without WCS prompting before a conference call is established in accordance with an illustrative embodiment of the present invention.
FIG. 56 shows a signal flow diagram for an exemplary deleting (dropping) of a last added party from an active conference call for a PSTN telephone connection leaving an PSTN--MS two-way call, in accordance with an illustrative embodiment of the present invention.
I. Acronyms and Short Hand Notations
Throughout the disclosure of the instant invention, several acronyms and short hand notations are used to aid in the understanding of certain concepts pertaining to the associated system and services. These acronyms and shorthand notations are intended solely for the purpose of providing an easy methodology of communicating the ideas expressed herein, and are in no way meant to limit the scope of the present invention. The following is a list of these acronyms:
AIN Advanced Intelligent Network ALS AT&T Local Services B-Channel Bearer Channel ATM Asynchronous Transfer Mode BER Bit Error Rate BRI Basic Rate Interface BS Base Station CB Communications Bus CSC Customer Service Center CLASS Custom Local Area Signaling Services DCCH Digital Control Channel DAP Data Access Port D-Channel Data Channel DN Directory Number DPU Directed Call Pickup with Barge-in DS1 Digital Service Level 1 DS3 Digital Service Level 3 DSP Digital Signal Processor DTC Digital Traffic Channel DTMF Dual Tone Multi-Frequency DVCC Digital Verification Color Code EIA Electronic Industries Alliance FAC Feature Activation Code FACCH Fast Associated Control Channel FDC Feature Deactivation Code FDN Forward Directory Number GR 303 Generic Requirement 303 IDT Integrated Digital Terminal/Switch IP Internet Protocol or Intelligent Peripheral IS-136 Interim Standard 136 ISDN Integrated Services Digital Network ISP Internet Service Provider ISUP ISDN User Part ISUP IAM ISDN User Part Initial Address Message ISUP ACM ISDN User Part Address Complete Message ISUP ANM ISDN User Part Answer Message IWC Intelligent Wireless Controller LAN Local Access Network LDS Local Digital Switch MAHO Mobile Assisted Handoff MIN Mobile Identification Number MS Mobile Station MSID Mobile Station Identification MSC Mobile Switching Center NEL Next Event List NSP Network Server Platform OAM&P Operations, Administration, Maintenance, and Provisioning OC3 Optical Carrier Level 3 OC12 Optical Carrier Level 12 PAD Packet Assembler/Disassembler PBX Private Branch Exchange PCH Paging Channel PCS Personal Communications Service POTS Plain Old Telephone Service PRI Primary Rate Interface PSID Private System Identification PSTN Public Switched Telephone Network Q.931 Signaling Protocol Message Structure RDATA Relay data (Subfield of IS-136 message) RDT Remote Digital Terminal RSSI Received Signal Strength Indicator SC Self Configuration SCP Service Control Point SM Short Message SMDPP Short Message Delivery Point = To Point SMS Short Message Service SMS Service Management System SMSCH Short Message Service Channel SNMP Signaling Network Management Protocol SONET Synchronous Optical Network SPACH SMS Point-to-point Messaging, Paging, and Access Channel SS7 Signaling System 7 SSP Service Switching Point STP Signal Transfer Point STP Shielded Twisted Pair TAT Termination Attempt Trigger TCP/IP Transmission Control Protocol/Internet Protocol TCAP Transactional Capabilities Application Part TDMA Time Division Multiple Access TIA Telecommunications Industry Association UPCH User Proactive Call Handling VAP Voice Access Port VMS Voice Message System VPU Voice Processing Unit WCS Wireless Centrex System WCSD Wireless Centrex System Database X.25 Cross .25 (Data Packets)
Further, various telecom technical terms are used throughout this disclosure. A definition of such terms can be found in; H. Newton, Newton's Telecom Dictionary, 14.sup.th Expanded Edition (1998). These definitions are intended for providing a clearer understanding of the ideas disclosed herein and are in no way intended to limit the scope of the present invention and thus should be interpreted broadly and liberally to the extent allowed by the art and the ordinary meaning of the words.
II. General Overview of Wireless Centrex System Services
An illustrative methodology for implementing an intelligent wireless communications system according to the present invention will now be described below. While the systems and methods described below relate to a traditional cellular phone system or a wireless centrex system, it is to be understood that the present invention can be applied to all types of wireless communications systems including, but not limited to, satellite systems, micro cellular systems, personal communications services, and other mobile communication systems. Also, other types of personal communications devices can be implemented in these systems including, but not restricted to, a portable television, a wireless videophone, and a pager. Also, it is to be understood that the present invention can be applied to any type of wireless network, and that the description below is an illustrative embodiment for a system employing the IS-136 EIA/TIA Interim Standard.
In one exemplary embodiment of the instant invention, the wireless centex system is deployed in an in-building environment with various communication interfaces strategically located throughout the building to provide service within the building. In such an in-building environment, the mobile station (MS) assumes the characteristics of a desktop phone with all the Centrex capabilities being available to the mobile user, plus the added advantage of mobility. A network of picocells served by Voice Access Ports (VAPs) are located within the building and provides the cellular IS-136 air interface. The VAPs are intelligent base stations having ISDN BRI connectivity to a local digital switch (e.g., Lucent 5ESS, Nortel DMS-100). FIGS. 1A, 1B, and 1C each show an exemplary VAP 103A connected to a Remote Digital Terminal (RDT) 102 via an ISDN BRI interface 2. Hereinafter, references to figures IA through IC will be referred to as FIG. 1, and have a common numbering scheme illustrating the various exemplary elements.
In fact, the same numbering will be used throughout the figures for like elements. The Network Server Platform (NSP) 106 is an adjunct and can be co-located with a switch (LDS 104) to manage the VAPs and call processing control of the MS and provide the cellular (IS-136) operations for the VAPs. In one embodiment, when a call arrives for a subscriber to their POTS desktop phone 108 and it is not answered, the LDS 104 working in conjunction with the NSP 106 and the VAP 103A will forward the call to the subscriber's mobile station 101A over the VAP's ISDN B-channel 2 and the IS-136 air interface 3. The WCS system, therefore, offers the capability of a WCS subscriber being reached anytime anywhere within the cell area of the WCS picocells. Further, if a WCS subscriber also subscribes to a macro cellular system the call will be handed off to the macro cellular system local Base Station (BS) when the subscriber leaves the WCS picocell areas.
The ISDN BRI lines 2 connecting the VAPs 103A and 103B to the switch carry the signaling traffic on the D-channel (data channel) and the voice traffic on the B-channel (bearer channel). The D-channel utilizes the Q.931 protocol to establish a voice call on the B-channel with the LDS 104. The D-channel also carries signaling messages (X.25 packets) between the VAPs 103A and 103B and the NSP 106. An X.25 packet connection is used to interconnect LDS 104 to NSP 106 and carry packets routed by the LDS 104 between the VAPs 103A and 103B and the NSP 106. The connection to the LDS 104 is not limited to a X.25 data packet connection, but may be any connection supported by the LDS 104, and having an interworking function with the X.25 protocol. These packets contain messages pertaining to call processing of the IS-136 interface as well as OA&M messages on the VAPs.
In one exemplary operation of the WCS, when a call arrives at the subscriber's desktop phone 109, if the user does not answer, the switch will use AIN triggers to request additional routing instructions from the NSP 106. The NSP 106 will locate the subscriber's MS 101 and direct the LDS 104 to forward the call to the VAP 103 servicing the subscriber's MS 101. The NSP 106 will also inform the VAP 103 of the incoming call via messaging on the D-channel and direct the VAP 103 to establish the IS-136 air link to the MS 101 in order to alert the user. When the user answers on their MS 101, the call is completed over the VAP's 103 ISDN B-channel and the IS-136 air interface.
In accordance with the principles of the invention, whenever a subscriber originates a call, the NSP will work in conjunction with the LDS 104 and the VAP to establish the RF link and the ISDN B-channel connectivity to the switch. The switch will then route the call to the proper destination. When a subscriber moves from picocell (e.g., VAP 103A service area) to picocell (e.g., VAP 103B service area), the NSP 106 will inter-work with the switch and the VAPs and use the ISDN Directed Call Pickup with Barge-In to enable the seamless handoff. For example, when the MS 101A is on an active call served by VAP 103A, and is moving into the region served by VAP 103B, the NSP 106 will direct VAP 103B to barge-in on the call on VAP 103A. This temporarily establishes a 3-way call and the NSP 106 will then direct VAP 103A to disconnect from the call, thereby leaving the active call to be served by VAP 103B and completing the handoff. This is advantageous since the procedure ensures that there is no noticeable interruption of the call on the network side.
In accordance with the principles of the instant invention, an exemplary network platform architecture of a wireless centrex system (WCS) is illustrated in FIG. 1. The wireless centrex system disclosed therein, functions as a private wireless system which is not interconnected to a public macro cellular system. However, the WCS system could also be interconnected to a public macro cellular system. The wireless access platform provides a cordless-like, anywhere, anytime communications for indoor, business or campus-type environments. The key system elements of the WCS platform architecture are the Local Digital Switch (LDS) 104, the Remote Digital Terminal (RDT) 102, the Network Server Platform (NSP) 106, and a wireless interface including one or more of a plurality of Voice Access Ports (VAP) 103A and 103B and one or more of a plurality of IS-136 Digital TDMA Cellular/PCS Mobile Stations 101A and 101B. Although FIG. 1 illustrates the VAPs 103A and 103B being connected to the RDT 102, the VAPs 103A and 103B may also be connected via ISDN BRI lines directly to the LDS 104, bypassing the RDT 102.
The WCS system of this embodiment may have, for example, the following design attributes. There is one NSP 106 per LDS 104, although there could be more than one LDS 104 per NSP 106. The NSPs, (e.g., NSP 106 and NSP 106A), are interconnected for inter-signaling using TCP/IP across an intranet, e.g., AT&T intranet 112. Centrex services and features are provided via the LDSs, (e.g., LDS 104 and LDS 104A) and an SS7 network 111. A single RDT 102 can provide interconnection of VAPs 103 for the WCS in a single large WCS office or multiple smaller offices as long as an ISDN BRI connection can be made to the VAPs 103. Further, the WCS system of this embodiment provides smooth-handoffs between VAPs 103 using the ISDN Direct Call Pickup with Barge-In (DPU) function. Finally, the WCS system can provide a secure wireless network by only recognizing pre-approved subscribers MS 101 for registration within the picocell area covered by each of its VAPs 103; all other cellular phones within the picocell are prohibited from reception/transmission with the VAP's 103.
The LDS 104 is a TR-08 and/or a GR-303 compatible LDS 104 which employs distributed intelligence, process-oriented software, and coordinated autonomous computing elements to provide a flexible, modular, reliable and robust digital switching system. LDS 104 has generic ISDN switching functions with embedded AIN capabilities and provides network synchronization. The Lucent 5ESS and the Nothern Telecom DMS-100 are exemplary Local Digital Switch (LDSs). The LDS 104 provides a single platform for advanced services including ISDN, Centrex, CLASS, Custom Calling, Advanced Intelligent Network (AIN), and basic bearer Channel (B Channel) call feature applications capabilities. It supports both X.25 packet switched data communication and circuit switched data using, for example, an X.25 Packet Assembler Disassembler (PAD) for signaling between NSP 106 and subtending VAPs (e.g., VAP 103A and VAP 103B). The LDS 104 provides the switching fabric, administration, message switching, and call switching functions. The AIN capabilities on the LDS 104 provides AIN software that enables the network provider to create, deploy, and change services to meet customers' requests. The AIN software allows the LDS 104 to act as an AIN Service Switching Point (SSP) to communicate with Service Control Points (SCP) (i.e. NSP 106 in the WCS configuration), and Intelligent Peripherals. This gives the NSP 106 the flexibility to manage call processing on the LDS 104. The events which activate the AIN triggers must be provisioned so that they occur at specified points in a call where call processing may be interrupted, in order to interact with the NSP 106. Additionally, the LDS 104 provides a gateway to a PSTN 125.
The Remote Digital Terminal (RDT 102) is a digital loop carrier terminal which supports POTS, ISDN, high-speed transport, and all special services.times.including private lines and PBX trunks. RDT 102 provides voice, data, and signaling transport and multiplexing of business premise telephony equipment such as the ISDN phone 109, POTS phone 108, and VAPs 103A and 103B. The Lucent SLC-2000 (pronounced "Slick" 2000) and the Nortel Access Node are exemplary RDTs. The RDT 102 interfaces digitally with the central office (CO), using, for example a TR-08 or GR-303 trunk configuration, connected with the LDS 104 such as a Lucent 5ESS or a Nortel DMS-1000. The RDT 102 provides the distribution of service interfaces between the LDS 104 and the customer premises, thereby extending the digital access network.
The exemplary NSP 106 provides control functionality for VAP 103A and 103B, which includes mobile station and mobility management, call control such as handoff, wired and wireless interworking such as DN and MIN mapping, signaling processing interface and management, AIN for call processing, service creation and management and feature applications, along with related OAM&P functions. The NSP 106 is also responsible for Network Intelligence and resource management including RF management (e.g., SC), validation or authentication, registration, and Message Center operation and control.
An illustrative NSP is described in co-pending U.S. patent application Ser. No. 09/100,360 entitled "Hybrid Fiber Twisted Pair Local Loop Network Service Architecture" by Gerszberg et al., which is herein incorporated by reference. While the NSP described by Gerszberg et al. is not for a wireless centrex system, it can be modified to work in the WCS of the present invention. In the WCS environment, the NSP 106 may include NSP specific software operating on a high performance, general purpose computer, for example, a SUN SPARC Enterprise server E3500.
The exemplary Voice Access Ports (VAPs) 103A and 103B are pico-cellular intelligent base stations or radio transceiver ports that support, for example, the IS-136 air interface with IS-136 mobile stations such as digital TDMA cellular/PCS communications units 101a, 101b. IS-136 is the EIA/TIA Interim Standard that addresses digital cellular and PCS (personal communications services) systems employing time division multiple access (TDMA). IS-136 specifies a DCCH (Digital Control Channel) to support new features controlled by a signaling and control channel between a cell site (e.g., radio base station) and terminal equipment (e.g., mobile station). The IS-136 air interface between the VAPs 103a, 103b and mobile stations MS 101a, MS 101b can support voice and messaging applications. The mobile stations MS 101a, MS 101b, etc., may be, but are not limited to, a terminal or a typical cellular/mobile phone having a keypad, display screen, and an alarm generator for generating a ringing or tone sound.
The VAPs support plug-and-play operations by connecting to RDT 102 via standard open interfaces, such as ISDN BRI. In one embodiment, the VAPs 103A and 103B use advanced digital software radio technology for superior RF performance. Additionally, VAPs 103A and 103B may employ self configuration algorithms for "stacked spectrum" operations. U.S. Pat. Nos. 5,809,423, 5,787,352, 5,740,536, 5,404,574, and 5,345,499 describe exemplary algorithms and related methodologies that may be utilized in self configuration for "stacked spectrum" applications. The VAPs also administer resource management.
The mobile stations (MS) 101A and 101B provide the WCS subscriber with cordless-like services feature/function, thereby permitting user mobility within the WCS service coverage area. The IS-136 digital TDMA cellular/PCS mobile stations 101A and 101B, may include, for example the Nokia 2160 and the Ericsson DH368 TDMA digital telephones. One significant advantage of the instant invention is that a base station may be interconnected to a switch via an open standard interface, such as ISDN BRI, so that traditional wireline services, such as centrex type services features/functions like call hold, call forward, call waiting, call transfer, speed calling, caller ID, three party (conference) calling, etc., may be offered to MS 101.
In one exemplary embodiment of the WCS, there are five major interfaces as illustrated in FIG. 1. With reference to FIG. 1, interface 1, connects the LDS 104 to the RDT 102 using, for example, the Bellcore standard GR303 interface. The GR303 standard defines digital transmission facility interfaces such as DS1 and SONET, concentration options between the integrated digital terminal/switch (IDT) 105 and the RDT 102, signaling options, and call processing and operations data links. The transport media for this interface can be, for example, metallic or fiber-optic. Exemplary metallic media include T1, ISDN/PRI and DS3, while exemplary fiber-optic media include SONET OC3 and OC12 links. Interface 1 carries the voice traffic of a telephone call, as well as the signaling traffic for the LDS 104 and the NSP 106.
Interface 2, connects the VAPs 103A and 103B to the RDT 102 with, for example, ISDN/BRI lines (2B+D channels), using the Q.931 signaling protocol on the D-channel to setup the voice connection on the B-channel. In this case, the RDT acts only as a transport for the signaling and data message to the LDS 104. WCS call processing messages for call setup, call teardown, feature applications on the RF (IS-136) and OAM&P messages are carried over X.25 packet, interface 4, on the D-channel between the NSP 106 and the VAPs 103A and 103B, via the LDS 104 and the RDT 102. These messages are sent to the LDS 104, which routes them to the NSP 106. Voice connections between the VAPs 103A and 103B and the LDS 104 are carried on the B-channel via the RDT 102. Additionally, software downloads from the NSP 106 are also carried on the D-channel or B-channel to the VAPs 103A and 103B via the LDS 104 and the RDT 102. In one exemplary embodiment, the RDT 102 acts as a concentrator and its operation is transparent to the operation the WCS.
Interface 3, may be, for example, an IS-136 air interface between the VAPs 103A and 103B and the MSs 101A and 101B supporting voice and messaging applications. Interface 4 is, for example, an X.25 protocol link between the NSP 106 and the LDS 104. Call control and OAM&P messages between the NSP 106 and the VAPs 103A and 103b are carried on the D-channel of interface 2 through interface 1, through the LDS 104, and over this X.25 link.
Interface 5 may be, for example, an SS7 link connecting the NSP 106 and the LDS 104. This exemplary interface carries AIN messages which are generated by the LDS 104, sent to the NSP 106 for processing, and sent back to the LDS 104 to instruct the LDS 104 how to route the call properly. Interface 5 carries AIN messages from the LDS 104 which notify the NSP 106 of AIN trigger events. It also carries responses from the NSP 106 to the LDS 104 which instructs the LDS 104 how to properly route calls to the WCS subscribers.
When the IS-136 cellular/PCS mobile stations 101A and 101B are located within the WCS system coverage area, MIN-based calls to the public cellular network destined for mobile stations 101A and 101B may not be delivered in the WCS service area. Instead, the IS-136 phones can be associated with the DN of a stationary phone (e.g., POTS 108 or ISDN 109) within the WCS services area so that the LDS 104 delivers the call to either the subscriber's MS 101 or the subscriber's stationary phone using the DN. On the other hand, when the subscriber's mobile station MS 101 is located outside the WCS service area, calls are delivered to the mobile stations through the MIN provided in the public cellular system.
After a simple registration process, the WCS subscribers use their IS-136 digital TDMA cellular/PCS phone 101A or 101B as a cordless-like telephone within the wireless centrex service area without incurring air-time charges. Typically, when an incoming call destined for a WCS subscriber's DN reaches the LDS 104, and the DN was previously provisioned for AIN treatment, an AIN trigger occurs in the LDS and an AIN query message is sent to the NSP 106. In one embodiment, each WCS subscriber has a reachable desktop DN and each DN will be programmed for the AIN trigger in the LDS 104 for call routing purposes. The NSP 106 provides appropriate routing instructions to the LDS 104 for delivery of the incoming call. The NSP 106 can locate and alert the subscriber's mobile station and direct the LDS 104 to route the incoming call to the mobile station (MS 101). If the subscriber does not answer, the NSP 106 may direct the LDS 104 to route the incoming call to a Voice Message System (VMS) 107, which ultimately answers the call. An exemplary VMS is the Lucent Conversant Model MAP/100C (MultiAccess Platform). Calls initiated from a stationary phone such as POTS 108 or ISDN 109, or mobile station 101 within the WCS service area are sent to the LDS 104 that can handle the call or route the call to the PSTN 125.
The WCS is a self-configurable indoor wireless system that applies the "stacked spectrum" concept. It can detect (sniff) and designate unused and interference-free DTC/DCCH (Digital Traffic Channel/Digital Control Channel) from the overlayed (e.g., macro or micro) cellular system, for its own use, based on the unique WCS private systems number (PSID). The DTC is defined in IS-136 as the portion of the air interface which carries the actual data transmitted (e.g., the voice channel). It operates over frequencies separate from the DCCH, which are used for signaling and control purposes. Since the WCS coexists with public macro or micro cellular networks, it monitors the RF channel activities, detect unused and interference-free channels, and makes channel selections and adjustments in real time for interference-free operation.
Another exemplary network architecture of the WCS is illustrated in FIG. 2. The WCS system may be installed at the satellite site (e.g., Customer Site B) 201 as well as the main site (e.g., Customer Site A) 202. When a subscriber is provisioned for service, the Customer Service Center (CSC) 113 downloads the subscriber's profile to all NSPs 106 (e.g., 106A and 106B). The subscriber is allowed to roam between the customer sites 201 and 202. In one exemplary embodiment, the NSPs 106A and 106B are interconnected through the provider Intranet 112, for example, AT&T Intranet. However, the NSP's 106A and 106B may be interconnected through any secure virtual network from any provider.
In the WCS, a call is delivered by the Local Digital Switch 104A or 104B using the DN. Unlike normal wireline phone services, however, the location of the WCS subscriber changes continuously with movement of the MS 101 within the service area. Therefore, a special intelligent delivery mechanism using Advanced Intelligent Network (AIN) has been developed for the WCS call delivery. In the AIN architecture, the Service Switching Point (SSP), here the LDS 104A and 104B has the capability of determining which calls require AIN services based on the dialed DN. The process of identifying calls that require AIN processing is known as "triggering," since a particular characteristic of the call "triggers" the switch into providing AIN call treatment. So, when the DNs of ISDN telephone 109 or POTS telephone 108 are provisioned as WCS DNs, an incoming call to these DNs will prompt an AIN trigger. Once an event causing a trigger occurs, a query message is sent to the Service Control Point (SCP) as illustrated in FIGS. 5, 6 and 7. The SCP is, for example, NSP 106. Based on the information contained in the query message, the SCP (NSP 106A or 106B) determines which service is being requested and provides appropriate information to the LDSs 104A or 104B. In the exemplary WCS architecture, all the routing information is stored in the NSPs 106A and 106B. Therefore, the LDSs 104A and 104B in the WCS sends the query message to the NSPs 106A and 106B, and the NSPs 106A and 106B directs the LDS 104A and 104B to deliver the call to its appropriate destination. A detailed description of mobile station registration in the WCS follows.
III. Mobile Station Registration
FIG. 3 shows an exemplary embodiment of a registration process used to register a MS 101 when the MS 101 enters a WCS service region (e.g., customer site B 201). Upon entering the WCS system service area, the MS 101 automatically registers with the NSP 106 serving that customer site. The NSPs 106A and 106B contain the subscriber profiles distributed by the Customer Service Center 113 (CSC). The NSP (204A or 204B) handling the call then validates the MS 101 by examining the subscriber profile for that MS 101. If the subscriber is roaming to another Customer Site, the Serving NSP 106B notifies the Home NSP 106A that the subscriber is registered in its (Serving NSP's 106B) service area.
In particular, when the MS 101 is powered on, an IS-136 Registration message 307 is sent to the VAP 103. The VAP 103 then forwards the registration notification message 308 to the serving NSP 106B. The serving NSP 106B validates the subscriber by looking up the subscriber information stored locally and previously downloaded from the customer service center (CSC) 113. If the NSP 106 was not the subscriber's Home NSP 106A, then a registration notice message REGNOT 309 would be sent to the Home NSP 106A for the MS 101 indicating that MS 101 was registered now in serving NSP 106B's area. The Home NSP 106A would then store the roaming information of the MS 101, and send regnot message 310 to the Serving NSP 106B for acknowledgment. However, with the assumption that the Home NSP 106A was indeed the actual Home NSP of the MS 101, then the Home NSP 106A sends a regnot message 310 to Serving NSP 106B. If the Home NSP 106A found that the MS 101 had been registered at another NSP, e.g., Old NSP 106C, and had left without proper de-registration, then the Home NSP 106A would send a registration cancellation message REGCANC, 311, to cancel the previous registration at the Old NSP 106C for confirmation. The Old NSP 106C would then remove the records for the MS 101 from its memory, and send a registration cancellation response message, regcanc, 312, back to the Home NSP 106A. However, assuming that Home NSP 106A had sent the regnot 310 message to Serving NSP 106B, then Serving NSP 106B would send a registration acceptance message, Registration Accept, 313, to VAP 103. The VAP 103 then informs MS 101 that the registration is completed, by sending IS-136 registration acceptance message, Registration Accept 314, to MS 101. This completes the registration process for MS 101. Registration in the MS 101 Home NSP 106A is simpler requiring only steps a and d illustrated in FIG. 3.
IV. Call Origination From a Mobile Station
FIG. 4 shows an exemplary call origination from a MS 101 directed to a PSTN 125 DN. When the subscriber MS 101 places a call via an origination message, IS-136 Origination 407, the VAP 103 first checks the validity of the MS 101 with NSP 106 via Origination Request 408. The NSP 106 then provides the VAP 103 with an Origination ACK 409 message indicating that the MS 101 is recognized and the VAP 103 may go forward with the call origination. After that, the VAP 106 sets up an ISDN connection, ISDN Set up 410, to LDS 104. The LDS 104 performs the dialed digit analysis and proceeds with the call delivery procedures concluding in a connected call to the PSTN 125 DN.
More specifically, the MS 101 dials a DN number and sends an IS-136 Origination 407 message to VAP 103. VAP 103 then sends an Origination Request 408 message to NSP 106. After checking the appropriate databases to determine if the MS 101 is a valid registered subscriber, NSP 106 returns an Origination ACK 409 message to VAP 103. The VAP 103 then reserves a RF DTC channel and sends an ISDN Q.931 Setup 410 message to the LDS 104. The LDS 104 then performs a dialed digit analysis and sends an ISUP IAM 411 message to a far end switch in the PSTN 125 for end-to-end connectivity. The LDS 104 also sends an ISDN (Q.931) Call Proceeding 412 message to the VAP 103. The VAP 103 then sends an IS-136 Digital Traffic Channel (DTC) Designation 413 message to the MS. 101 so that MS 101 may then tune to the designated traffic channel. MS 101 indicates to VAP 103 that it is using the designated DTC by responding with an MS on DTC 414 message. The VAP 103 then detecting that the MS 101 is tuned to the designated traffic channel, cuts through the voice path between RF DTC channel and ISDN B channel.
After receiving the ISUP ACM 415 message from the destination switch in the PSTN 125, the LDS 104 sends an ISDN Alerting 416 message to VAP 103. Next, the Ringback Tone 421 is delivered to the MS 101 from the destination switch. When receiving ISUP ANM 417 message from the PSTN 125, the LDS 104 sends an ISDN Connect 418 message to VAP 103, removes the ringback tone, and cuts through voice path 422. The VAP 103 then sends an ISDN Connect ACK 419 message back to the LDS 104. After connection of the voice path 422, the VAP 103 sends a Connected 420 message to the NSP 106 for billing and other OAM&P purposes.
V. Incoming Call Termination
Exemplary call flow diagrams illustrating various call termination (incoming call connection) scenarios for the WCS system are illustrated in FIGS. 5 through 7. When provisioning the necessary parameters for the subscriber, the WCS subscriber's DN is provisioned for the AIN Termination Attempt Trigger (TAT) so that the subscriber's mobile station is the first destination determined for incoming call termination. Consequently, when a call to the subscriber's DN is received, it triggers the LDS 104 to send a call treatment query message to the NSP 106. The TAT call treatment procedure in the NSP 106 will direct the LDS 104 to deliver the call to its appropriate destination. The DN in the VAP 103 that is used to deliver the call to the MS 101 is referred to as the Forward Directory Number (FDN).
Depending on the first call delivery destination, there may be two different call termination scenarios. The first scenario involves delivering the call first to a tip ring (T/R) desktop phone 108 (POTs) or an ISDN phone 109, while the second involves delivering a call first to a mobile station 101. In each scenario, a different AIN trigger is utilized, and the call termination may be implemented using one of the two scenarios. The latter scenario of delivering the call to a mobile station will be utilized to exemplify the procedure.
The TAT call treatment procedure in the NSP 106 will direct the LDS 104 to deliver the call to the subscriber MS's current location. If there is no answer from the MS 101 phone, the call is delivered to the subscriber's desktop phone (e.g., POTs 108 or ISDN 109). In one exemplary embodiment, once the call is forwarded to the MS 101 DN (FDN), the call follows the Originating Call Model (OCM) rather than the Terminating Call Model (TCM), and an O_No_Answer trigger can be used rather than a T_No_Answer trigger. In yet another embodiment, the T_No_Answer trigger could be used to deliver the call to the desk top phone first, and if the call goes unanswered, the trigger can be used to request additional routing information from the NSP 106. The NSP 106 would then locate the MS 101 and instruct the LDS 104 how to deliver the call.
An exemplary call flow of a termination wherein the incoming call is routed from the PSTN 125 to MS 101 is illustrated in FIG. 5. As previously illustrated in FIG. 4, if the call is originated from the MS 101 or desktop phone (e.g., 108 or 109) inside a region handled by the same LDS 104, the resulting call flow would be similar, except that there will be appropriate ISDN Q.931 messages to and from the LDS 104 instead of the ISUP messages between the PSTN 125 and the LDS 104. The following illustration shows an incoming call to a MS 101 that answers the call.
The PSTN 125 user first dials the DN of a WCS subscriber. The LDS 104 then receives an ISUP IAM 508 message from the PSTN 125. The LDS 104 recognizes that the DN is provisioned for AIN Termination Attempt Trigger (TAT). The LDS 104 then suspends the delivery of the call and sends an AIN query message, TCAP (AIN termination attempt [DN]) 509, to the NSP 106 for an appropriate routing instruction. The NSP 106 recognizes that the subscriber's MS 101 is active in its serving area, and sends a page message, Page 510, to the VAP 103 serving MS 101. The VAP 103 in turn sends an IS-136 Page 528 message to the MS 101. The MS 101 responds to the IS-136 Page 528 via a IS-136 Page Response 529 message destined to VAP 103. VAP 103 then sends a Page Response 511 message to the NSP 106. The NSP 106 then directs LDS 104 to forward the call to the Forward Directory Number (FDN), TCAP (AIN Forward_Call [FDN], NEL [O_No_Answer]) 512 of the VAP 103 serving the MS 101 (in a TCAP Conversation package). The NSP 106 also indicates its interest in event (O_No_Answer for FDN) by sending next event list NEL [O_No_Answer]) 532 information to the LDS 104 in a Request component that accompanies the Routing component, in a conversation package. The LDS 104 then starts a No Answer Timer (T(NoAnswer)) 531 for FDN and sends an ISDN (Q.931) Setup 513 message to the VAP 103. The VAP 103 then sends a Digital Traffic Channel (DTC) Designation 530 message to the MS 101 along with an ISDN (Q.931) Call Proceeding 514 message to the LDS 104. The MS 101 then tunes to the traffic channel and responds to the VAP 103 with MS 101 on DTC 515. The VAP 103 detects that the MS 101 is on the appropriate traffic channel. The VAP 103 then alerts MS 101 with an Alert-with-info 516 message and MS 101 acknowledges with a Mobile ACK 517 message. The VAP 103 then sends an ISDN Alerting 518 message to LDS 104.
Upon receiving ISDN (Q.931) Alerting 518 message, the LDS 104 then sends an ISUP ACM message 519 to the switch in PSTN 125. In the meantime, the LDS 104 is sending a ringback tone 520 to the PSTN 125 caller. When the MS 101 answers (before T(No Answer) 531 expires), the VAP 103 sends an ISDN Connect message 522 to the LDS 104 in response to the Connect 521 message from MS 101. The LDS 104 then cancels T(No Answer) 531, and sends ISUP ANM 523 message to the PSTN 125 switch and cuts through the voice path 527. After the LDS 104 sends an ISDN (Q.931) Connect ACK 524 message to the VAP 103, it then sends TCAP (AIN Close) 525 message to the NSP 106 (using TCAP Response) to complete the TCAP transaction. After receiving the ISDN (Q.931) Connect ACK message 524 from the LDS 104, the VAP 103 sends Connected 526 message to the NSP 106 for billing and other OAM&P purposes. At this point, voice path 527 has been established and the call proceeds between the PSTN 125 caller and the MS 101 subscriber until it is ended and disconnected (e.g., hang up).
In accordance with the instant invention, FIG. 6 shows a process wherein an incoming call goes unanswered by the mobile station, e.g., MS 101, and the No Answer Timer 531 expires. Whenever, a call destined for a MS 101 goes unanswered and the No Answer Timer 531 expires, the NSP 106 will direct the call to the DN (telephone or VMS) which is associated with that MS 101.
The PSTN 125 user first dials the DN of a WCS subscriber. The LDS 104 receives ISUP IAM 508 message from the PSTN 125. The LDS 104 will recognize that the DN is associated with MS 101 and is provisioned for AIN Termination Attempt Trigger (TAT). The LDS 104 then suspends the delivery of the call and sends an AIN query message, TCAP (AIN Termination Attempt [DN] 509), to NSP 106 for an appropriate routing instruction. The NSP 106 will recognize that the subscriber's MS 101 is active in its serving area, and will send Page 510 message to the VAP 103 serving MS 101. The VAP 103 in turns sends IS-136 Page 528 message to MS 101. The MS 101 will respond to the IS-136 Page 528 message via Page Response 529 message destined to VAP 103. The VAP 103 then sends Page Response 511 message to the NSP 106. The NSP 106 then directs the LDS 104 to forward the call to the Forward Directory Number (FDN) of the VAP 103 serving the MS 101 (in a TCAP Conversation package) by sending the TCAP (AIN Forward Call [FDN], NEL [O_No_Answer]) 512 message to the LDS 104. The NSP 106 also indicates its interest in event O_No_Answer for FDN by sending next event list (NEL) information to the LDS 104 in a Request component accompanying the Routing component of a conversation package message 512. The LDS 104 then starts a No Answer Timer (T(NoAnswer)) 531 for FDN and sends ISDN (Q.931) Setup 513 message to the VAP 103. The VAP 103 then sends Digital Traffic Channel (DTC) Designation 530 message to MS 101 and sends a ISDN (Q.931) Call Proceeding 514 message to the LDS 104. The MS 101 then tunes to the designated traffic channel and sends the MS 101 on DTC 515 message to VAP 103. The VAP 103 then detects the MS 101 on the traffic channel and alerts the MS 101 with an IS-136 Alert-with-info 516 message the MS 101 responds by acknowledging with a Mobile ACK 517 message. The VAP 103 then sends ISDN Alerting 518 message to the LDS 104. Upon receiving the ISDN (Q.931) Alerting 518 message, the LDS 104 then sends an ISUP ACM 519 message to the switch in PSTN 125. In the meantime, the LDS 104 is sending a ringback tone 520 to the caller.
In this case, the MS 101 does not answer the call and the No Answer Timer T (No Answer) 531 expires. The LDS 104 then sends AIN O_No_Answer 625 message to the NSP 106 in a conversation package. The NSP 106 sends a TCAP (AIN Analyze Route [DN]) 626 message to the LDS 104. Then the LDS 104 sends a TCAP (AIN Termination_Attempt [DN]) 635 message back to the NSP 106, which authorizes the call termination to the DN by sending an TCAP (AIN Authorize_Term) 636 message to the LDS 104. The LDS 104 then sends an ISDN (Q.931) Disconnect 627 message to the VAP 103. The VAP 103 then sends a Release 628 command to the MS 101 and the MS 101 stops ringing (buzzing or alert the user). The MS 101 then sends Mobile ACK 629 back to the VAP 103. The VAP 103 now sends ISDN (Q.931) Release 630 message to LDS 104 to notify the LDS that MS 101 is no longer being alerted of the incoming call. The LDS 104 then sends ISDN (Q.931) Release Complete 631 message to the VAP 103 allowing MS 101 to be used for other calls or messages. When the NSP 106 instructs the LDS 104 to forward the call to the DN 626, the call processing is assumed by the LDS 104 as a normal call delivery in step 632 . If the user subscribes to VMS 107, then after a certain number of rings, the LDS 104 will transfer the call to the VMS 107. The incoming call will thus be forwarded to the telephone (ISDN 109 or POTS 108) associated with the DN being called.
In accordance with the instant invention, an exemplary methodology of terminating an incoming call to a roaming subscriber located in another LDS area is illustrated in FIG. 7. The WCS subscriber's DN is provisioned for the AIN Termination Attempt Trigger (TAT) so as to seek out the subscriber's MS first. In general, when a call to the subscriber's DN arrives at the LDS 104, the call triggers the LDS 104 to send a call treatment query message to NSP 106. The NSP 106 will recognize that the MS 101 is currently registered in another Customer Site (different LDS area) and will request a Forward Directory Number (FDN) from the visited area, Serving NSP 106B. The Serving NSP 106B then checks the current location of the MS 101 and the availability of circuits to handle the call and returns an FDN to the Home NSP 106A. After receiving the FDN, the TAT call treatment procedure in the Home NSP 106A directs the LDS 104A to deliver the call to the FDN. After sending the ISUP IAM to the FDN, the Serving LDS 104B delivers the call to the VAP 103 presently serving the MS 101.
More particularly, a call termination occurs as follows when a MS 101 is roaming to another Customer Site, e.g., Site B 201, when the MS 101 has a home location within Customer Site A 202. The PSTN 125 user dials a WCS subscriber's DN associated with a subscriber in Customer Site A. The Home LDS 104A (LDS-A) receives an ISUP IAM 709 message from the PSTN 125. The LDS-A 104A finds that the DN is provisioned for AIN Termination Attempt Trigger (TAT) and suspends the delivery of the call, sending AIN Termination_Attempt Query 710 message to the NSP-A 106A for an appropriate routing instruction. The NSP-A 106A will recognize that the subscriber is not presently registered in its serving area but is now registered in Customer Site B 201. The NSP-A 106A will send ROUTREQ 711 message to the Serving NSP (NSP-B) 106B. After receiving the ROUTREQ 711 message, the NSP-B 106B sends Page 712 message to the VAP 103 presently serving the MS 101. The VAP 103 will then send an IS-136 Page 713 message to the MS 101 and the MS 101 will respond with an IS-136 Page Response 714 message destined for the VAP 103. The VAP 103 will then send the Page Response 715 message to the NSP-B 106B. The NSP-B 106B will confirm the current location of the MS 101, and return the Forward Directory Number (FDN), in the routreq 716 message to the NSP-A 106A. The NSP-A 106A will then direct the LDS-A 104A to forward the call to FDN in Customer Site B via a TCAP (AIN Forward Call [FDN], NEL[O_No_Answer]) 717 message. The LDS-A 106A then forwards an ISUP IAM [FDN] 718 message to the LDS-B 104B. After receiving the ISUP LAM [FDN] 718 message, LDS-B 104B then sends an ISDN (Q.931) Setup 719 message to the VAP 103 serving the FDN. VAP 103 sends the DTC Designation 720 message to the MS 101, and then sends an ISDN (Q.931) Call Proceeding 721 message to the LDS-B 104B. When the MS 101 tunes to the DTC it sends an MS on DTC 722 message to VAP 103 and VAP 103 responds with an Alert-with-info 723 message. The MS 101 will then send a Mobile ACK 724 message to the VAP 103 and the VAP 103 will then send an ISDN (Q.931) Alerting 725 message to the LDS-B 104B. The LDS-B 104B will then send an ISUP ACM 726 message to the LDS-A 104A, which will in turn forward a ISUP ACM 727 message to the switch in PSTN 125. The LDS-B 104B provides the Ringback Tone 728 to the caller.
When the MS 101 answers, the MS 101 will send Connect 729 message to the VAP 103. The VAP 103 will then send an ISDN (Q.931) Connect 730 message to the LDS-B 104B. The LDS-B 104B will then send an ISUP ANM 731 message to the LDS-A 104A, which then forwards ISUP ANM 733 to the switch in PSTN 125, and an ISDN Connect ACK 732 message to VAP 103. After receiving an ISDN (Q.931) Connect ACK 732 message from LDS-B 104B, the VAP 103 will send a Connected 734 message to the NSP-B 106B for billing and other OAM&P purposes.
If the MS does not answer, the call is delivered to the desktop phone or to the VMS 107 if the MS 101 subscriber has voice mail capabilities, by the same mechanism using the NEL [O_No_Answer], as in the non-roaming case (see FIG. 6). Otherwise, at this point, voice path 735 is established.
VI. Intra-LDS Mobile Station Assisted Handoff
In accordance with the invention, an exemplary embodiment of an intra-LDS mobile assisted handoff (MAHO) process is illustrated in FIG. 8. The signaling flow in FIG. 8 discloses the handoff of a call between the VAPs (e.g., VAPo 103A and VAPn103B) served by the same LDS 104. The smooth/lossless handoff is accomplished by using the Directed Call Pickup with Barge-in (DPU) feature supported by many switches. A discussion of the process follows.
While a call 806 involving the served MS 101 is in progress, the VAPo 103A detects a handoff condition based on the measured channel qualities and their threshold value. The VAPo 103A initiates a Measurement order 807 destined for MS 101. The MS 101 then responds to the Measurement order 807 with a Measurement order ACK 808 and a Channel Quality Message 809 destined for VAPo 103A. When VAPo 103A detects a handoff condition, it then sends a Handoff Request 810 to the NSP 106 with a list of candidate channels. The NSP 106 then selects the best candidate channel, identifies VAPn 103B as serving the channel, and sends a Handoff Preparation [MSID, DN-VAPo] 811 message to VAPn 103B.
Upon receiving the order from NSP 106, VAPn 103B reserves a B-channel and a RF channel for the MS 101, and establishes a 3-way call using the DPU feature. VAPn 103B then sends ISDN (Q.931) Setup [Feature Activation (DPU), DN-VAPo] 812 message to LDS 104. LDS 104 then returns an ISDN (Q.931) Call Proceeding 813 message to the VAPn 103B, followed by an ISDN (Q.931) Connect 814 message. The VAPn 103B then responds to the LDS 104 with an ISDN (Q.931) Connect ACK 815 message. The VAPn 103B then sends a Handoff Directive 816 message to VAPo 103A. The VAPo 103A then sends the Handoff order 817 to the MS 101 requesting MS 101 to retune to the new RF channel of VAPn 103B, and disconnects its ISDN connection to the LDS 104 as shown in steps 818-823. The MS 101 is then placed on the new channel with VAPn 103B per step 824. The VAPn 103B sends a message Handoff Result 825, to the NSP 106, which indicates that the MS 101 has successfully been handed off to the new channel, indicated as handoff complete.
In yet another embodiment of the invention, a user on a wireline telephone call can have the capability of transferring that call to his/her cellular/PCS MS. In accordance with this feature, a user on a wireline telephone with an active call may enter a special feature code, such as *99, in order to activate the feature.
The following is a more detailed description of an exemplary intra-LDS mobile assisted handoff as previously described and as depicted in FIG. 8. Initially, there is an existing call involving the served MS 101 in progress. The VAPo 103A sends a Measurement order 807 over the FACCH to the MS 101 to measure the BER (bit error rate) and RSSI (received signal/strength indicator) of the current channel and the RSSIs of other RF channels. The MS 101 acknowledges the Measurement order 807 by sending a Measurement order ACK 808 over the FACCH. The MS 101 then performs the channel quality measurements in response to the Measurement order 807 and sends a Channel Quality message 809 to the VAPo 103A.
Next, the VAPo 103A detects a handoff condition based on the received Channel Quality Message 809 and the associated threshold values. The VAPo 103A then sends a Handoff Request 810 message to NSP 106 with a list of candidate channels, and immediately starts its handoff request timer (T1). Upon receiving the Handoff Request 810 from the VAPo 103A, the NSP 106 selects the candidate with the strongest RSSI. The NSP 106 then checks if the resources (ISDN B-channel and RF channel) are available for the candidate channel, and identifies VAPn 103B as the new VAP which will serve the MS 101. The NSP 106 then sends a Handoff Preparation 811 message, including the serving MSID and DN-VAPo (the DN of VAPo 103A, i.e., the phone number to be barged in on) to VAPn 103B and immediately starts its handoff preparation timer (T2). In response to the Handoff Preparation 811 message, VAPn 103B then reserves a B-channel and a RF channel for the MS 101 and starts to establish a 3-way call using a DPU process in the following manner.
The VAPn 103B sends a ISDN (Q.931) Setup 812 message to LDS 104, which includes a Feature Activation code for DPU and DN-VAPo. The LDS 104 then sends the ISDN (Q.931) Call Proceeding 813 message back to the VAPn 103B followed by an ISDN (Q.931) Connect 814 message when the call is connected to DN-VAPo. The VAPn 103B then sends the ISDN (Q.931) Connect ACK 815 message to LDS 104. The VAPn 103B then sends a Handoff Directive message 816 to the VAPo 103A. The VAPo 103A cancels the T1 timer, and sends the Handoff order 817 to the served MS 101 over the FACCH, requesting the MS 101 to retune to the new RF channel (along with other channel assignment information). The MS 101 then acknowledges the Handoff order with a Handoff ACK 818 to VAPo 103A. Upon receiving the Handoff ACK 818, the VAPo 103A then disconnects the B channel connection by sending an ISDN (Q.931) Disconnect 819 message to LDS 104. LDS 104 then sends an ISDN (Q.931) Release 820 message to the VAPo 103A, and the VAPo 103A acknowledges the Release Message 820 and disconnection of the previous call by sending the ISDN (Q.931) Release Complete message 821 to the LDS 104. The VAPo 103A tears down the voice path connection that it had established for the MS 101. The VAPo 103A sends the Handoff Complete 822 message to the NSP 106, which includes the time information of the serving MS 101 for billing and other OA&M purposes. The LDS 104 then starts its handoff complete timer (T3). The NSP 106 responds by sending a Handoff Complete ACK 823 to VAPo 103A, and VAPo 103A cancels T3. The MS 101 then retunes to the new channel of the VAPn 103B. After confirming that the MS 101 has been retuned to the new channel, the VAPn 103B then sends a Handoff Result 825 message to the NSP 106, which indicates that the MS 101 has been successfully handed off to a new channel and timer T2 is cancelled. The NSP 106 acknowledges the handoff complete to both the LDS 104 and the VAPn 103A, using handoff complete 826 message.
VII. WCS as a Wireless PBX System
In yet another embodiment of the instant invention, there exists a wireless centrex service platform which is a Wireless PBX system (WPS) offering a wireless access system with customer site wireline ISDN capable PBX to provide integrated wire and wireless voice access. In one application of the system, a WPS as disclosed could be used to enhance the PrimeXpress service offered Teleport Communications Group (TCG, now owned by AT&T). This system could advantageously provide a cordless-like, anywhere, anytime communication in any indoor, business and campus environment using subscriber's macrocellular/PCS mobile station (MS 101). In accordance with the invention, the WPS system includes an Intelligent Wireless Controller (IWC) system 902, its subtending Voice Access Ports (VAPs) 103 and the customer site ISDN capable PBX 901.
Additionally, the WPS also functions as an integrated wireline and wireless system without being connected to any public macro cellular system. Therefore, it does not support mobility management and roaming between WPS and the public macro cellular and PCS networks. In another embodiment, the WCS can connect the NSP 106 to a macrocellular SS7 network to support integrated mobility functions including terminal handoff and personal roaming features.
Further, the WPS provides location and mobility management for the WPS subscriber's mobile station (MS 101) inside the WPS serving area.
After a simple registration process, the WPS subscribers use their IS-136 digital TDMA cellular/PCS phone 101 as a cordless-like phone in the WPS service area without incurring air-time charges. The dual ring feature of the MS 101 allows the user to receive calls anywhere inside the WPS service area. As a result, whenever a user is called at his/her stationary phone 108 attached to the customer premises PBX 901, the WPS system simultaneously locates and alerts the user's IS-136 phone 101. If the user does not answer MS 101, the Voice Message System 109 associated with the customer premises PBX 901 will answer the call. In this embodiment, calls from the stationary phone 108 or the IS-136 phone 101 are directed to the customer site PBX and processed by the TCG PrimeXpress Services. Essentially, the PrimeXpress service is an outbound trunk to a switch 904, such as the Lucent 4ESS, that bypasses the local switch. In the exemplary WPS system, call features include, but are not limited to, Short Message Services (SMS) and/or paging (IS-136 feature); PBX interworking, including premises dialing plan, closed-user-group, and dual ringing of stationary and MS phones; wireline call features, such as three way calling, call forwarding, call transfer, caller ID, call waiting, messaging and voice mail services; support for voice privacy; and cordless-like service without air time charges.
In the embodiment of the invention illustrated in FIG. 9, there exists an ISDN PRI interface 7, an IS-136 air interface 3, and an ISDN BRI interface 2. The ISDN BRI 2 interconnects VAP 103 and the Intelligent Wireless Controller 902. Call processing messages for call setup, call teardown, feature applications and OAM&P messages are carried on the data D-channel in X.25 packets. In addition to carrying call processing messages, the D-channel also carries ISDN (Q.931) signaling for call setup and teardown of the voice connection on the bearer B-channel. The IS-136 air interface 3, provides communication between the VAP 103 and the MS 101. The ISDN PRI interface 7 interconnects the IWC 902 and the customer premise PBX 901 and utilizes Q.931 signaling. The wireless communications controller's call processing messages for call setup, call teardown, feature applications and OAM&P messages are carried in the D-channel to the NSP 106. The D-channel also carries the Q.931 messages for the voice connections on the B-channels between the VAP 103 and the IWC 902. In one embodiment of the Intelligent Wireless Controller (IWC), there exists an ISDN switch 903 and a controller circuit.
VIII. Wireless Voice and Data WCS
In yet another embodiment of the instant invention, there is a Wireless Communication Service Platform that offers an economical and high performance wireless access network, for satisfying the need for an in-building integrated voice and data system providing mobility. While the exemplary platforms previously disclosed are focused on providing voice capabilities, this embodiment discloses a platform for providing data support integrated with voice capability. There exist at least one Data Access Port (DAP) (e.g., DAP 1001A or DAP 1001B), which is a micro-cellular base station that uses the CelluLAN.TM. Common Air Interface (IEEE802.11) for high density and seamless in-door coverage providing 4 to 10 Mbps data rate for data applications.
The architecture of the DAP is similar to that previously disclosed for the VAP, and uses digital software radio technology which provides superior RF performance, along with RF based self configuration algorithms for "stacked spectrum" operation. A 10BaseT or 100BaseT Local Area Network (LAN) 1007 connects the DAPs, as well as other LAN devices such as servers, and or local printers, to the Integrated Wireless Communication Controller 1002 (e.g., Integrated Enterprise Wireless Communication (EWC) Controller). In one exemplary embodiment of the Integrated Wireless Communication Controller, the wireless voice and data services are integrated by bundling the PSTN/voice traffic on a trunk 7 to the LDS 104, e.g., 5ESS, and switching the data traffic to an ATM network 1005 for internet/intranet access (ISP 1006). The data and voice could be switched by any suitable means commonly known in the art such as packet switching or circuit switching. A laptop 1003A or 1003B with a PCMCIA card that supports CelluLAN.TM. CAI, can access the LAN 1007 anywhere inside the building. After the laptop 1003A or 1003B has registered with the LAN 1007, the user can access other PCs, laptops, and or other servers on the LAN, the intranet, and the internet. The user can access this LAN in his office, meeting rooms, the cafeteria, or any area of the building covered by DAPs. Once implemented, the instant invention would provide the advantage of eliminating the need to wire an individual office for data and/or voice connectivity. The wireless communication service platform would potentially improve overall productivity by giving the users access to their desktop anywhere, anytime. In other words, the instant invention would provide a "desktop to go" environment that would support "moment of value communications" at the time needed when information is most critical.
In accordance with the invention, there exists a Data Access Ports (DAPs) 1001A and 1001B interconnected to an Integrated Wireless Controller 1002, via interface 8. Interface 8 is a standard 10/100 BaseT Ethernet connection. This is advantageous in that it provides a flexible interface so that data can be routed via the ethernet interface to a wired LAN or through an ATM network interface 10 to an ATM network 1005 interconnected to an Internet Service Provider (ISP) 1006. The IEEE 802.11 air interface 9 provides a wireless access to the DAPs 1001A and 1001B. The Data Access Port has exemplary capabilities such as, a high speed LAN access from 4-10 Mbps data rate using the CelluLAN.TM. CAI; an IP address assignment during registration; seamless mobility management including roaming and intra/inter LAN handoffs; data privacy functions to support standard security algorithms; communication support between DAPs and VAPs for SMS, email, paging, and data; and SNMP for OA&M.
The exemplary Integrated Wireless Communications Controller 1002 is a single platform controller with Premises Interfaces providing ISDN BRI interfaces 2 and Ethernet interfaces 8 for the VAP and DAP, respectively, and Network Interfaces providing ISDN PRI 7 and ATM for PSTN and ATM network access 10, respectively. The exemplary ATM network interface 10 is data only, and the Ethernet interface can also be used to connect to a wired Local Area Network (LAN). In accordance with the invention, there exist an ISDN PRI interface 7, interconnecting the Integrated Wireless Communications Controller 1002 with a LDS 104. In accordance with the invention, the LDS 104 interconnects to a RDT 102, a NSP 106 and to trunks connected to networks such as the AT&T Local and Long Distance Network 110, the PSTN 125, and the SS7 network 111.
IX. Feature Activation/Deactivation
The present invention includes means for feature/function activation/deactivation which is controlled by user input. The NSP 106 contains a dynamic user profile database stored in a memory (see FIG. 12, memory 1240) used to, for example, determine whether a mobile station is authorized to use a particular WCS feature/function and whether the feature/function, if available, is active.
FIG. 11 illustrates a general signaling flow applicable for both feature activation and feature deactivation for the features/functions of the present invention that require activation/deactivation when MS 101 is idle (MS 101 camping on DCCH). Although FIG. 11 does not illustrate an RDT 102, it is understood that an RDT 102 may be included in one embodiment and located between the VAP 103 and the LDS 104. While an MS 101 registered with an NSP 106 is idle, the MS 101 user may dial the feature activation/deactivation code (e.g., *66, representing an activation code for an automatic callback feature/function) and press, for example, the "send" button on MS 101. In response, an IS-136 Origination [Feature Code] 1101 message (where the entered number feature activation/deactivation code is entered rather than a called party number) is sent to VAP 103 via the DCCH (over-R-DCCH). An IS-136 Serial Number message 1102 also is sent to VAP 103. After receiving the message, the VAP 103 sends an Origination Request [Dialed Digit] 1103 message to NSP 106 and starts the TO1 timer. Alternatively, feature activation can be achieved when the MS 101 is active. For example, during an active call the MS 101 user may merely enter the feature code and the feature will be activated.
After receiving the Origination Request [Dialed Digit] 1103 message, the NSP 106 analyzes the dialed digits using, for example, controller 1230 (see FIG. 12). If the dialed digits includes a feature activation code, the NSP 106 checks the Wireless Centrex System Database (WCSD) (for example a user mobile station service profile database stored in memory 1240 (see FIG. 12)), using the Mobile Station Identification (MSID) to determine if MS 101 is authorized for the particular feature requested. If the MS 101 is authorized for the feature requested, feature validation is successful and the NSP 106 activates the feature for the subscriber and stores any associated feature information into the user profile database. The NSP 106 then sends an Origination NACK [Cause, Display] 1104 message with the Cause equal to Feature Activation and the Display information indicating successful feature activation, back to the VAP 103 (e.g., Origination NACK [Feature Activation Successful, Call forwarded to FwdDN]).
On the other hand, if the dialed digits are a feature deactivation code, the NSP 106 checks the WCSD to see if that particular feature is active. If the feature is active, the NSP 106 deactivates the feature and removes any associated feature information from the WCSD. The NSP 106 then sends an Origination NACK [Cause, Display] 1104 message with the Cause equals to Feature Deactivation and the Display information indicating a successful feature deactivation, back to the VAP 103. The NSP 106 generates an Origination NACK message rather than an Origination ACK message because the feature activation request is provided to the NSP 106 in a message (Origination Request 1103) that is generally intended for use in originating a telephone call and when a feature activation/deactivation is requested when the MS 101 is idle, no call will be complete since no DN was entered, thus, the response by the NSP 106 with a none acknowledgement message, Origination NACK 1104. However, the Origination NACK 1104 message does contain information in its Cause and Display fields that is needed to inform the MS 101 user that a feature has been activated or deactivated correctly.
In either feature/function activation or feature/function deactivation, the VAP 106 then cancels the TO1 timer and issues an IS-136 Reorder/Intercept [Display] 1105 message with the Display information over the Paging Channel (PCH) to the MS 101. The IS-136 Reorder/Intercept [Display] 1105 message is similar to the Origination NACK 1104 message in that it is generally an indication message that a call origination request has been unsuccessful and is used in this case as a vehicle for providing the MS 101 user information regarding the status of their feature activation/deactivation. After receiving the message, MS 101 displays the text message from the Display information field on MS 101 (e.g., Call forwarded to FwdDN) and resumes the DCCH idle (camping) state. A more detailed description of the feature/function activation/deactivation processing that goes on in the NSP 106 and VAP 103 using the call forward feature/function as an example follows.
After the NSP 106 receives the Origination Request [Dialed Digit] 1103 message with the Dialed Digit equal to the Call Forward feature Activation/Deactivation code, the NSP 106 first performs an analysis of the dialed digits to determine if it is a valid feature activation/deactivation code. Next, the NSP checks the user service profile in the WCSD, using the MSID of the originating MS 101, to determine if the originating MS 101 is authorized for the requested Call Forward feature. The NSP 106 also verifies that the parameters for the feature code are valid. If this validation process is successful, the NSP 106 updates its memory pertaining to feature activation/deactivation for the particular MSID and sends an Origination NACK [Cause, Display] 1104 message to the VAP 103 with the Cause field equal to Call Forward Feature Activation/Deactivation Successful and the Display field information equal to Call forwarded to FwdDN (the forwarding DN dialed with feature code), indicating that feature activation/deactivation is successful.
The NSP 106 will take the following actions in response to the MS 101 user entering various codes and different phone numbers to forward a call. As a first alternative, when the feature/function Call Forwarding--Unconditional is entered on MS 101 by the WCS subscriber the NSP 106 checks to see if there is a Call Forwarding feature/function already active for the particular mobile station MS 101. If a Call Forwarding feature/function is already active then the NSP 106 will update the previous feature/function active code entry and update, for example, the information with a new call forwarding number. Otherwise the NSP 106 will simply create a new feature/function active code entry and the call forwarding number for the mobile station MS 101.
As a second alternative, if the mobile station MS 101 user enters the feature/function code for the Call Forwarding--Programmable Ring feature and the number of rings is specified, the NSP 106 will verify that the number is within a range of acceptable values (i.e., valid). If the number of rings is not a valid number, the NSP 106 will use a default value for the number of rings to use. Next, the NSP 106 will translate the number of rings into an associated number of seconds it will take to execute the desired number of rings and create or modify as necessary the feature entry for the mobile station MS 101 to provide the desired number of seconds for ringing. Thus, this entry will contain the MSID, call forwarding number and the number of seconds ringing is to continue.
As a third alternative, if the mobile station MS 101 user enters the feature/function code for the Call Forwarding--Time of Day feature/function, the NSP 106 will verify that the begin time and end time parameters are present and valid. If the time parameters are valid, the NSP 106 will create/modify the feature entry for the mobile station MS 101. The entry will contain MSID, call forwarding number, begin time and end time.
As a fourth alternative, if the mobile station MS 101 user enters the feature/function code for the Call Forwarding--Busy feature/function, the NSP 106 will modify or create the feature entry for the mobile station and store the call forwarding number to be used if an incoming call occurs when the mobile station MS 101 user is, for example, on another call. The entry will contain the MSID, the call forwarding number, and a flag indicating that the call is to be forwarded when the MS 101 line is busy.
Furthermore, the MS 101 user may activate a feature, such as call forward, for a particular DN without entering the DN. First, as previously noted, the MS 101 could enter the feature code while on an active call and the feature would be provisioned relative to the DN of the other party involved in the call. Second, feature activation provisioning may be achieved without entering a DN by entering the feature activation code immediately after a call has been disconnected.
However, if the mobile station MS 101 user enters the feature/function code for Call Forwarding Feature Deactivation, the NSP 106 will verify that the feature corresponding to the deactivation code is currently active for the mobile station MS 101. The NSP 106 will then deactivate the feature/function and delete the associated feature information from the subscriber profile.
In any case, the NSP 106 will subsequently send out the Origination NACK [Cause, Display] 1104 message to the VAP 103. The Cause field will containing information such as; Feature Activation Successful, Feature Activation Failed, Invalid MS, Out of Resource, Input Unknown, Feature Deactivation Successful, Feature Deactivation Failed. The Display field will contain information such as Call forwarded to FwdDN.
Some examples of possible feature activation and deactivation codes are provided in the tables below for various WCS feature/functions. The activation and deactivation codes 15 for the WCS features/functions, which need to be activated/deactivated when the MS is idle (MS 101 on DCCH), are tabulated below.
TABLE 1 Feature Application Activation Code Deactivation Code Automatic Callback *66 *660 or MS power down/de-registered Call Forwarding- *90#DN *900 Unconditional Call Forwarding- *91*x#DN, *91#DN *910 Programmable Ring Call Forwarding-Time *92*hhmm*hhmm#DN *920 of Day Call Forwarding-Busy *93#DN *930 Call Return *69 *690 Call Screen *60#DN or *60#n#DN *600#DN Distinctive Ringing *70#DN or *70#n#DN *700#DN
In the Table 1 above, the DN denotes a directory number (telephone number), the x denotes the number of rings and the hh denotes the hour of day in the format of 00 to 23, mm denotes the minute in the format of 00 to 59.
The feature codes of WCS features/functions, which can be initiated when the call is in progress (MS 101 on DTC), are tabulated below in Table 2.
TABLE 2 Feature Application Feature Code Call Transfer *77#TransferDN Three-way call *33#ThreeWayDN
One skilled in the art will recognize that the feature/function activation and deactivation codes provided above are purely exemplary and may be different without changing the basic concept of the present invention.
Furthermore, as examples of feature/function activation/deactivation, the NSP 106 will take the following actions for various different feature/function codes input by the MS 101. (1) Call Forwarding--Unconditional: If there is a Call Forwarding feature already active for the particular mobile, the NSP 106 will update the feature entry with the new call forwarding telephone number. Otherwise, the NSP 106 will create a new feature entry for the mobile. (2) Call Forwarding--Programmable Ring: If the number of rings is specified, the NSP 106 will verify that the number is within the range, or it will use the default value. The NSP 106 will translate the number of rings into number of seconds and create/modify the feature entry for the MS 101. The entry will contain the MSID, call forwarding number and the number of seconds. (3) Call Forwarding--Time of Day: The NSP 106 will verify that the begin time and end time parameters are present and valid. If the time parameters are valid, the NSP 106 will create/modify the feature entry for the MS 101. The entry will contain MSID, call forwarding number, begin time and end time. (4) Call Forwarding--Busy: The NSP 106 will modify/create the feature entry for the MS 101 and store the call forwarding number. (5) Speed Dialing: NSP 106 will verify the data that is sent by the MS 101 for provisioning. The unique code specified may be, for example, a valid number in the range 1-30, and the DN may be, for example, a number consisting of 1 to 17 digits (a single digit number can be the smallest number that a WCS subscriber can dial to make a successful call, e.g., dial 0 to reach the operator. Seventeen digits may be required to accommodate a call screen for international calls. To make an international call--dial 9 to get out, then 3 number code to make an international call, 2/3 number code for the country, 2/3 number code for the region/area and 7 digit phone number, makes a possible total of 17 digits). The NSP 106 then updates the speed-dialing code list for the MS 101 with the new data provided. In case an entry for the requested unique code already exists, then the current DN will overwrite the existing entry. (6) Call Screen: NSP 106 will verify the data that is sent by the MS 101 for provisioning. The CallScreenDN specified must be a valid number, e.g., it may consist of 4 to 10 digits, and the code signifying the type of treatment may be, for example, from 1 to 3. The NSP 106 then updates the CallScreenDN list for that MS 101 with the new data provided. (7) Distinctive Ringing: If the user sends *70#n#DN, where n is a number from 1 to 5 and DN is a phone number and presses the send button, NSP 106 will verify the data that is sent by the MS 101 for provisioning. The DistinctiveRingingDN specified may be, for example, a valid number consisting of 4 to 15 digits, and the code signifying the type of ring signal may be, for example, between 1 and 5. The NSP 106 then updates the DistinctiveRingingDN list for that MS 101 with the new data provided. (8) Feature Deactivations: The NSP 106 will verify that the feature corresponding to the deactivation code is currently active for the MS 101. It will then delete the associated feature information from the subscriber profile.
In any case, if the validation is unsuccessful because the feature code is invalid or the parameters are missing, a Cause value equal to the Feature Activation/Deactivation Failed and the appropriate Display information regarding the specifics of the failure will be included in the Origination NACK [Cause, Display] 1104 message.
When VAP 103 receives the Origination NACK [Cause, Display] 1104 message, the VAP 103 cancels the timer TO1, extracts the Display information from the message, and inserts the Display information into the Display field of IS-136 Reorder/Intercept [Display] 1105 message. Next, the VAP 103 send the IS-136 Reorder/Intercept [Display] 1105 message to MS 101 and instructs the MS 101 to return to the idle (camping) state. Similar feature/function activation/deactivation signal flows will be used in the various feature/functions for the WCS as described in more detail below.
Although the feature/function activation/deactivation signal flows have been explained using call origination signaling, the signaling and MS 101 user notification may also be achieved using Short Message Services (SMS) signaling with text messages or audio messages over a voice channel. The audio notification can be accomplished by establishing a voice channel between the VAP 103 and the MS 101 and playing a recorded or voice synthesized message, e.g., Call forwarded to FwdDN to the MS 101.
X. Call Hold [KAW--Completed Nov. 19, 1999]
Often, a telephone user, particularly a mobile phone user, is preoccupied when an incoming call is received or is interrupted with something of a higher priority during an active call. For example, a mobile telephone user may be in a meeting where the receipt of an incoming call would be a disruption. Thus, there is a need to allow a user to avoid disruption at particular times. However, the mobile telephone user may wish for the call to be temporarily on hold because they will be available in a short period of time.
In existing wireless telephone handsets, a user can preset her wireless phone so that an action is automatically taken when a call is received. For example, a user can preset a wireless telephone so that an incoming call is forwarded to voice mail. While such systems allow a user to avoid disruption, they do not allow a user that may be available in the immediate future, e.g., in a few seconds, to subsequently connect with the call that has been directed to voicemail, i.e., to delay receipt of the call until the user is available. In the alternative, existing wireless telephone systems allow a user to place a call on hold during an active call, for example, after answering an incoming call. However, answering the call immediately only to place the call on hold is also disruptive.
The call hold feature of the present invention enables existing wireless handsets to provide a user with the ability to interactively place an incoming call on hold in real time without first answering the call. A user, who does not wish to be interrupted or needs to carry on a private conversation off-line can either postpone answering an incoming call without first becoming involved in an active phone call conversation or by placing a presently active call on hold. According to one such embodiment, the calling party can be coupled to, for example, a voice processing unit (VPU) to receive a message that indicates the call is on hold and the called party (WCS subscriber) will be with them shortly. The WCS call hold feature allows the MS 101 user to reroute an incoming call to the VPU without answering the incoming call even though the incoming call is in the process of being automatically routed to the voice mail system (VMS). Thus, the WCS of the present invention provides a user with the ability to instantaneously place an incoming call on hold in real time or interrupt an incoming call routed to a VMS without first answering the call, have the caller automatically instructed that the call is on hold, and to pickup the call sometime in the near future. Therefore, the present invention allows a mobile phone subscriber to place an incoming call on hold without first having to answer the call as well as allowing a mobile phone user to place an active call on hold. A detail discussion of the WCS call hold feature/function follows.
FIG. 12 shows an illustrative communications system in which the call hold feature of the present invention can be implemented. A public switched telephone network (PSTN) 125 is connected to a plurality of communication networks, including one having a telephone 1215. The PSTN 125 can be coupled to a plurality of local digital switches, such as (LDS) 104. As previously noted, the LDS 104 may be a TR-08 and/or GR-303 compatible switch which employs distributed intelligence, process-oriented software, and coordinated autonomous computing elements to provide a flexible, modular, reliable and robust digital switching system. Exemplary, but not limiting, LDSs include the 5ESS manufactured by Lucent Technologies and the DMS-100/500 manufactured by Nortel. The LDS 104 can provide a single platform for advanced services including ISDN, Centrex, Custom Calling, and Advanced Intelligent Network (AIN) capabilities. The LDS 104 provides the switching fabric, administration, message switching and call switching functions.
The LDS 104 may be coupled to network server platform (NSP) 106 by an X.25 link 4 (packet switched data network link) and an SS7 link 5 (signaling system for call setup and database transactions). The X.25 link 4 carries call control messages on the D-channel between the NSP 106 and LDS 104 that are destined for VAPs 103A and 103B. The SS7 link 5 between the NSP 106 and LDS 104 carries the AIN (Advanced Intelligent Network) messages that directs the LDS 104 for proper routing of a call to a user who is a WCS subscriber.
NSP 106 may include, among other elements, a controller 1230, a voice processing unit (VPU) 1235, memory 1240, and communications bus (CB) 1238. The NSP 106 provides voice access ports (VAPs) 103A, 103B of the wireless centrex system with control and related operations, administration, maintenance, and provisioning (OAM&P) functions. Control functions include, but are not restricted to, mobile station and mobility management, call control, and feature applications. The NSP 106 is responsible for, among other functions, network intelligence for the VAP 103, validation, registration, and mobility management.
The LDS 104 may, for example, be connected to a RDT 102 by a Bellcore standard GR-303 interface 1. The GR-303 standard defines digital transmission facility interfaces such as DS1 and SONET, concentration options between the LDS 104/IDT 105 and the RDT 102, signaling options, and call processing and operations data links. The GR-303 interface 1 can be transported across metallic (e.g., T1, ISDN: PR2 or DS3) or fiber-optic (e.g., SONET OC3 or OC12) links. The GR-303 interface 1 carries the voice traffic and the signal traffic for the LDS 104 and the NSP 106.
The PSTN 125 may also be coupled to a mobile switching center (MSC) 1250. The MSC 1250 generally has functionality similar to the combination of LDS 104 and NSP 106, and operates to control a cellular telephone network. Mobile switching center architectures are known in the art, and it will be appreciated that any known MSC may be adapted for use with the present invention. Plural base stations are controlled by the MSC 1250, such as base station (BS) 1255. Mobile Stations (MS) can travel throughout the cellular network and within the WCS network. Depending on a number of factors, calls involving a mobile station are handled by a base station that provides coverage for the area in which the mobile station is located. Handoff of calls involving the mobile station from one base station to another is controlled by the MSC 1255 in a known manner. A mobile station (MS) 101 is wirelessly coupled to BS 1250 as shown.
On the other hand, when MS 101 enters the picocell area of a VAP in the WCS system, handsoff does not occur unless MS 101 has previous authorization to operate within the WCS system. In fact, if the WCS is constructed with security features/functions for restrictive access, the VAP 103 will deny registration and disconnect MS 101 from all macro and micro cell base stations.
A more detailed representation of the elements of an illustrative WCS are depicted in FIGS. 1A-1C, and include, among other elements, the VAPn 103A and 103B and two mobile communications units, e.g., IS-136 digital TDMA cellular/PCS phones, MS 101A and 101B. Also shown are plain old telephone service (POTS) 108 and integrated services digital network (ISDN) 109.
Illustrative implementations of the functions for the call hold/unhold feature of the present invention will now be described in connection with a wireless centrex system. However, it should be understood that the call hold/unhold feature service could also be supported in existing macro cellular systems including an MSC and BS, if properly designed. In such a system, the MSC 1250 and BS 1255 would be programmed to be the functional equivalent of the WCS system including NSP 106 LDS 104, RDT 102 and VAP. 103 combined. However, it is noteworthy that the macro cellular system can not support ISDN and POTS wireline telephones but the WCS system can because it is integrated into such existing systems.
FIG. 13 shows the call flow for setting up an incoming call (i.e., call termination) similar to the call flow for setting up an incoming call illustrated in FIG. 5. For purposes of this discussion, it will be assumed that a calling party (e.g., telephone 1215) coupled to the PSTN 125 (or connected to the same LDS) dials the phone number (DN) of the mobile unit 101 and MS 101 is geographically within the WCS transmission picocell area.
The call with the DN arrives at the LDS 104 from the PSTN 125. The LDS 104 receives the ISUP (integrated services digital network user part) IAM (initial address message) 508 message from the PSTN 125 (or a Q.931 setup message). The LDS 104 determines whether the DN is provisioned for AIN termination attempt trigger (TAT), i.e., whether the DN is associated with a WCS authorized MS. If so, the LDS 104 suspends delivery of the call and sends an AIN query message TCAP (AIN Termination_Attempt [DN]) 509 to the NSP 106. The NSP 106 determines whether the subscriber's mobile unit MS 101 is active and idle in its serving area. If so, the NSP 106 pages the mobile unit MS 101 by sending a Page Request [FDN, MSID] 510 message through the VAP 103 using IS-136 established paging procedures, and starts the TT6-paging response timer. As part of the Page Request 510 message, the NSP 106 sends the VAP's ISDN forward directory number (FDN) and mobile station identification number (MSID) that the VAP 103 uses to complete the incoming call setup procedure.
The mobile unit MS 101 responds to the page by sending an IS-136 Page Response 529 message to the VAP 103. The VAP 103 forwards the Page Response message using Page Response 511, to the NSP 106 and starts event timer TT5 to prevent permanent holding of RF and ISDN B-channel resources. When the NSP 106 receives the Page Response 511 message, it cancels the TT6 timer and knows that MS 101 is available to receive the incoming call and that the VAP 103 has the resources to support the incoming call. At the direction of the NSP 106, the LDS 104 forwards the call to the FDN of the VAP 103 (e.g., in a TCAP conversation package) serving the mobile unit MS 101. The NSP 106 also indicates its interest in the event (O_No_Answer for FDN) by sending next event list (NEL) information to LDS 104 in a request component that accompanies the routing component in a conversation package (i.e., TCAP (AIN Forward Call [FDN], NEL [O No Answer]) 512 message).
The LDS 104 starts a no answer timer (T(NoAnswer )531)) for the FDN and sends an ISDN Q.931 Setup [FDN] 513 message to the VAP 103. Upon receipt of the ISDN Q.931 Setup [FDN] 513 message, the VAP 103 cancels the TT5 timer, invokes B-channel call processing, initiates.an IS-136 digital traffic channel (DTC) designation to the mobile unit MS 101, starts the TT2 timer, and sends a ISDN Q.931 Call Proceeding 514 message to the LDS 104.
The mobile unit MS 101 tunes to the designated DTC and sends an indication message, MS on DTC 515, to the VAP 103. When the VAP 103 detects that the mobile unit MS 101 is on the requested traffic channel through a Digital Verification Color Code (DVCC; a layer 2 signal from the MS) status change, it cuts through the ISDN/B-channel and initiates the alerting procedures for each call leg, that is upstream to the LDS 104 and downstream to the mobile unit MS 101. In particular, the VAP 103 sends an IS-136 Alert-with-info 516 message to the mobile unit MS 101, starts the Alert timer (TT3), and sends an ISDN Q.931 Alerting 518 message to the LDS 104. When the mobile unit MS 101 receives the Alert-with-info 516 message, it notifies the user through, for example, ringing (or an audible noise, vibrating, indicator lights, or a visual message display) that there is an incoming call (i.e., someone is calling them). When the LDS 104 receives the ISDN Q.931 Alerting 518 message, it sends an ISUP ACM (address complete message) 519 message to indicate that the Mobile Station MS 101 is available and communicating with the VAP and switches in the PSTN 125, and generates a ringback tone 520 that is heard by the calling party.
The mobile unit MS 101 returns an alerting acknowledge, IS-136 Mobil ACK 517, message to the VAP 103 so that the VAP 103 knows that MS 101 is alerting the user that there is an incoming call. Responsive to the alerting acknowledge message, the VAP 103 cancels the TT3 timer, starts a TT4 timer, and enters the wait-for-answer call processing state. If the MS 101 user answers (accepts) the call by, for example, pushing a send (or talk) key on the mobile station, the mobile station MS 101 sends an IS-136 Connect 521 message on the FACCH to the VAP 103. In response, the VAP 103 cancels the TT4 timer and sends an ISDN Q.931 Connect 522 message to LDS 104. After receiving the Connect message, the LDS 104 cancels the T(NoAnswer) 531 timer, and sends ISUP ANM (answer message) 523 message to the switch in the PSTN 125 and cuts through the voice path. Next, the LDS 104 sends an ISDN Q.931 Connect ACK 524 acknowledge message to the VAP 103 and then sends a TCAP Completed 525 message to the NSP 106 (using TCAP response) to complete the TCAP transaction. After receiving the ISDN Q.931 connect ACK 524 acknowledge message, the VAP 103 sends a Termination Result [Success] 526 message (i.e., call connected) to the NSP 106 to indicate that the incoming call has been successfully connected to the mobile station MS 101 and to trigger billing (air interface usage) and other OAM&P activities. A voice path 527 is then established between the calling party and the mobile unit MS 101. Once the call has been connected and a voice path established the mobile station MS 101 user can place the active call on hold as described below.
If the MS 101 user does not answer the incoming call the T(NoAnswer) timer will expire and the incoming call will be handled according to the mobile station MS 101 user's preprogrammed default designation. For example, the call could be forwarded to the VMS 107, the call could be forwarded to the MS 101 associated desk top phone 108, or the incoming call may be allowed to continue alerting the mobile station (MS) indefinitely until the caller hangs up the telephone.
FIG. 14A shows the call flow for a first preferred embodiment illustrating implementation of the call hold/unhold feature performed on an active call. For purposes of this discussion, it will be assumed that there exists an active call between a mobile station MS 101 in a WCS and a calling party (e.g., using POTS telephone 1215) coupled to the PSTN 125 and the call has been established either by a caller using POTS 1215 initiating a call to MS 101 (i.e., as just described with reference to FIG. 13), or vice versa. In any case, an Active Call 1401 is in progress and the mobile station MA 101 user decides to place the active call on hold.
When the mobile user generates a hold command by, for example, pressing a hold button on their MS 101, an IS-136 call-hold request message 1402 is sent over the FACCH (fast associated control channel) from the MS 101 to the VAP 103 (with which the MS 101 is registered). The VAP 103 interprets the request message, stops processing voice traffic frames, and notifies the NSP 106 that there is a call on hold 1404. Also, in response to the request message, the VAP 103 sends an IS-136 Call-Hold Request Ack 1403 acknowledge message to the MS 101. The VAP 103 continues to monitor the FACCH and also informs the NSP 106 that the call is on hold (Call on hold 1404). In response the NSP 106 will send a Call on hold Ack 1405 message. If a personalized message has been pre-recorded by the MS 101 user, the Call on hold Ack 1405 message will contain the personalized message, i.e., the Call on hold Ack (personalized message) 1405 message will be provided from the NSP 106 to the VAP 103.
When the VAP 103 places the call on hold, it may direct, for example, its own DSP (digital signal processor) to send a message and/or white noise (comfort noise such as music) 1406 to the calling party and/or the MS 101. The message and or white noise can be used to let the parties know that the call is still active and on hold. During the period that white noise is sent to the MS 101, the MS 101 can continue to transmit traffic frames, but the VAP 103 will ignore the frames. Further, the VAP 103 may also ignore voice traffic transmitted from the calling party.
When the MS 101 user generates an unhold command by, for example, pressing the hold button again, the MS 101 transmits an IS-136 Call-Unhold Request 1407 message on the FACCH to VAP 103. Upon receipt of the request message, the VAP 103 performs several actions. The VAP 103 informs the NSP 106 that an active call has been resumed 1409 and also instructs its DSP to stop generating white noise, if provided. The VAP 103 again begins to process traffic frames (e.g., voice traffic) received from the MS 101 and sends the frames to the calling party and again process voice traffic 1408 from the calling party directed to the MS 101. The VAP 103 also transmits a IS-136 Call-Unhold Request Ack 1408 acknowledge message to the MS 101 to indicate that the call is resumed.
FIG. 14B shows the call flow for a second preferred embodiment illustrating implementation of the call hold/unhold feature performed on an active call. For simplicity, this signaling flow only discusses how the system reacts to the feature when there is only one call for the MS 101. For interactions with other features, e.g. Three-way Call, refer to that section for more information.
First, the call is in progress, Call in progress 1420, and the MS user presses, for example, the send button on MS 101. An IS-136 Flash With Info 1421 message is sent to the VAP 103. The VAP 103 sends an IS-136 Flash With Info ACK 1423 message to the MS 101 and sends a Feature Request [FlashWithInfo] 1422 message to the NSP 106 which indicates that the MS 101 user is initiating a call hold. When the NSP 106 receives the Feature Request [FlashWithInfo] 1422 message from the VAP 103, it analyses the message and confirms that the mobile is not involved in a 3-way call. If the current call reference indicates that this is a three-way call, the Flash-With-Info message received by the NSP will be examined with different set of rules similar to those described in the section herein related to conference calling. The NSP 106 then interprets the message as a request for Call Hold and validates that the MS 101 is authorized to the Call Hold feature. If the validation is successful, the NSP 106 sends a Feature request ACK [Call Hold] 1424 message to the VAP 103 , the action field being designated as Call Hold. If the MS 101 is not authorized to use Call Hold feature, the NSP 106 ignores the Feature Request [FlashWithInfo] 1422 message. Further, the NSP 106 may, but not need, send a Feature Request NACK message to the VAP 103 because the VAP 103 has no action to take upon such a message. It may play a voice prompt or send a short message to the user in such a case for future releases of the feature.
Next, the VAP 103 sends Q.932 Hold 1425 message to the LDS 104 and starts a THh timer. In response, the LDS 104 sends a Q.932 Hold ACK 1426 message to the VAP 103 and the VAP 103 stops the THh timer. The call is placed on hold with the LDS 104, Call held 1427. However, if the VAP 103 receives a Q.932 Hold NACK message from the LDS 104 it will send out a Call Held [Fail] message to the NSP 106. Further, if the timer THh expires, the VAP 103 will log an error and send out a Call Held [Fail] message to the NSP 106.
Next, the VAP 103 sends a Call Held [success] 1428 message to the NSP 106, and if provisioned, plays a voice prompt to inform the user that the call is on hold and/or music (VAP plays voice and/or music 1429), and starts TH1 timer. However, if the NSP 106 gets a Call Held [fail] message form the VAP 103, it will modify the call information record (if needed) and the call will remain in a `talk` state.
When the MS 101 user wants to retrieve the call it presses, for example, the send key or the hold key again on the MS 101 and IS-136 Flash with Info 1430 message is sent to the VAP 103. When the VAP 103 receives the IS-136 Flash with Info 1430 message, the VAP will look at the appropriate record to find that this message has come for a call which is currently on hold. The VAP 103 stops the TH1 timer and sends back an IS-136 Flash With Info Ack 1431 message to the MS 101. Since the VAP 103 has determined that this is a request to retrieve the held call, it sends a Q.932 Retrieve 1432 message to the LDS 104 and starts the TRr timer. However, if the TH1 timer expires, the VAP 103 shall play a voice prompt (optional) to the user informing him that the call is being disconnected. It shall then follow, for example, the VAP 103 OA&M Release procedure and release the call.
When the VAP 103 receives a Q.932 Retrieve ACK 1433 message from the LDS 104, it cancels the TRr timer and sends a proprietary Call Retrieve [success] 1434 message to the NSP 106. However, if the VAP 103 receives a Q.932 Retrieve NACK message from the LDS 104, it will send out a Call Retrieved [Fail] message to the NSP 106. Further, if the timer TRr expires, the VAP 103 will log an error, send out a Call Retrieved [Fail] message to the NSP 106 and initiate, for example, a VAP 103 OA&M Release procedure.
Then, the NSP 106 modifies the call record information to indicate that a call is in progress with MS 101. If the NSP 106 receives a Call Retrieved [fail] message from the VAP 103, it shall stop the TH2 timer and update its call information record. Further, if the timer TH2 expires, the NSP 106 will initiate, for example, an OA&M Release procedure. Finally, the call is retrieved and resumes as Call in progress 1435.
As indicated above, another embodiment of the call hold feature/function may include the use of a personalized message to be used prior to, or in place of, a system default voice prompt and comfort noise (e.g., music) when a call is placed on hold. The MS 101 user may use the VPU 1235 to record personalized messages for the call hold feature/function. If the MS 101 user enters a special feature access code, for example *70, to initiate recording a personalized message recording in the VPU 1235. The NSP 106 validates the MS 101 and assigns call resources to the MS 101. Then the VPU 1235 prompts the user to record their personalized greeting. Once the greeting is completed, the NSP 106 stores it in, for example memory 1240, for the MS 101 user in their subscriber profile. Next, the NSP 106 frees the call resources. If the user wishes to modify or delete their personalized greeting they may enter another feature code, for example *71.
When the user is on an active call and invokes the call hold feature/function, a message is sent by the VAP 103 to the NSP 106 indicating invocation of the feature. In response, the NSP 106 checks against the subscriber DB stored in, for example memory 1240, to determine if there is a personalized greeting available for the MS 101 user that may be used for a call hold. If there is a personalized greeting for the MS 101 user, the NSP 106 sends it to the VAP 103 and may be included as part of a call hold acknowledgement message. When the VAP 103 receives the call hold acknowledgement message, if there is a personalized greeting for MS 101, it will play that to the calling party of PSTN 125/1215. If there is no personalized greeting for the MS 101 user, the NSP 106 may send a call hold acknowledgement message without any personalized message and the VAP 103 will play some other default message, for example, a system default generic message indicating that the call has been placed on hold. In either case, the VAP 103 may subsequently play comfort noise, e.g. music to the calling party placed on hold. Alternatively, the VAP 103 may play the comfort noise to both parties without any prior message. Although this personalized greeting feature is described with respect to call hold, it may also be used in conjunction with call screen and distinctive ringing feature/functions as well.
FIG. 15 shows the call flow for an illustrative implementation of the call hold/unhold feature for an unanswered incoming call. As with FIG. 13, it will be assumed that a calling party (e.g., telephone 1215) coupled to the PSTN 125 (or at the same LDS) dials the phone number (DN) of the mobile unit MS 101 and MS 101 is within the transmission service picocell area of the WCS.
When the mobile unit MS 101 receives an incoming call, the mobile unit MS 101 can alert the user of the incoming call by, for example, ringing or other audible noise or alerting methods. Also, caller ID information can be provided that shows up on a display of the mobile unit MS 101. FIGS. 5 and 13, as discussed above, shows the call flow for delivery of and answering of an incoming call. However, rather than answer the incoming call the mobile station MS 101 user can decide to place the incoming call on hold before answering it (i.e., before pressing, for example, a send key (e.g., talk, on, yes, answer, etc.) on MS 101 and initiating a personal conversation with the caller). Rather than answer the call immediately, the mobile station MS 101 user can accept the call without answering it by first putting the incoming call on hold as described below.
Upon being alerted of the incoming call, a user 1520, not wishing to answer the call immediately, can generate a hold command by, for example, pressing a hold button on the mobile unit MS 101 or entering a feature code (e.g., *95). When the user inputs a hold command, the call is accepted (i.e., connected) and put on hold rather than being answered and a voice path being cut to the mobile station MS 101. However, when the call is accepted, resources including a traffic (e.g., voice) channel are allocated for the call and white noise or an announcement will be provided. Also, the call is connected in the same manner as described above and shown in FIGS. 5 and 14 illustrated as step 1506.
The VAP 103 receives a call hold request via an IS-136 Call-Hold Request 1505 message from the mobile unit MS 101 and sends, for example a personalized message or a default message, e.g., a generic system call on hold announcement to the calling party (Call on hold announcement to originating party on DTC 1508). The VAP 103 also sends an IS-136 Call Hold Request ACK 1507 acknowledge message to the mobile unit MS 101 and notifies the NSP 106 that the mobile unit MS 101 has put the call on hold (call on hold 1510). Thus, the call is placed on hold with the VAP 103 and the VAP notifies the NSP 106 using the Call on hold 1509 message.
A DSP in, for example, the VAP 103 may send a message or comfort noise (i.e., white noise such as music) to the user of the mobile unit MS 101 and to the calling party while the incoming call is on hold. In the alternative, the VPU 1235 may play a short message (announcement) sent to the VAP 103 via a call on hold Ack message indicating the call is on hold prior to the DSP sending a system default message or comfort noise. While the call is on hold, the mobile unit MS 101 can continue to transmit traffic frames, but the VAP 103 will ignore the frames. Further, the VAP 103 may ignore voice traffic transmitted from the calling party (e.g., mute).
When the user of the mobile unit MS 101 desires to retrieve the held call, the user can generate an unhold command by, for example, pressing the hold button (or feature code) again 1511 on the mobile unit MS 101. In response, to a call unhold command, the mobile unit MS 101 sends an IS-136 Call-Unhold Request 1512 message on the FACCH to the VAP 103. The VAP 103 interprets this message and directs the DSP to stop sending white noise, if provided. In response to message, the VAP 103 begins to process traffic frames received from the mobile unit MS 101 and sends the same to the calling party. The VAP 103 sends a notification to the NSP 106 that the call is no longer on hold and has become active (call resumed 1514). Also, the VAP 103 begins processing the voice traffic from the calling party transmitted to the mobile unit MS 101, thus establishing an Active Voice Call 1515.
According to another illustrative embodiment of the present invention, the call hold button can act similar to a call mute button when a call is placed on hold, by for example pressing the hold button twice quickly. In this implementation, the mobile unit MS 101 can receive voice traffic from the calling party, while the calling party is muted from any voice traffic generated by the called party. In this instance, the calling party may receive white comfort noise when on hold. This call muting type functionality creates one way voice traffic transmission. Such an implementation may be beneficial in allowing the calling party to communicate a brief message to the called party at any time after the call has been placed on hold. Thus, if a calling party has an emergency message or an important message that cannot wait, the called party may receive this message in real time.
In one embodiment a call hold announcement may be played to the called party or an alert is provided to the called party to remind them that the a call is on hold. During the announcement to the called party the one-way communication line can be temporarily shut off or optionally open for voice traffic. As previously noted, a call hold announcement may also be sent to the calling party. The call hold announcement may be repeated to the calling party and/or the called party at predefined intervals (e.g., every 30 seconds) subsequent to initiation of the call hold.
Furthermore, in another embodiment, the call hold feature may allow a calling party to interactively transfer to a voice mail system or send an alphanumeric message to the called party rather than simply wait on hold. For example, when a call is on hold the VPU 1235 can notify the calling party the they may leave a message in the called party voice mail by entering a particular set of key strokes (e.g., *34#) or enter any alphanumeric message using their telephone key pad. The NSP 106 will respond to the input by the calling party and instruct the LDS 104 to route the input accordingly to either the VMS 107 or the MS 101. A more detailed discussion of the announcement features and additional features related to user proactive call handling follows.
XI. User Proactive Call Handling
Another feature of the present invention provides user proactive call handling (UPCH) functionality. This feature allows a mobile telephone user to proactively handle a call in an intelligent wireless communications system. One aspect of this feature allows a user to process and terminate an incoming call in real time. Another aspect of the UPCH feature provides the ability to delay allocation of the voice channel to a called party until when, if at all, the incoming call to the called requires a voice channel.
According to an illustrative embodiment of the present invention, a subscriber is notified of an incoming call via a Short Message Service (SMS) message with caller ID or a user alert, such as a tone or ringing. Upon receipt of the alert, the subscriber may select from a series of options, how to process and terminate the incoming call. For example, if an incoming call is of high priority and requires immediate attention, the subscriber may decide to answer the call immediately. If the subscriber decides that the call does not require immediate attention, he may opt to provide a delayed answer. Such a delayed answer option can involve connecting the call to an announcement prior to answering the call. Still further, if neither of the prior options is suitable, then the subscriber may opt to send the call to a voice mail system, from which a recorded message can later be retrieved. Yet another option of terminating the call is to forward the call to another phone. In the event that the subscriber decides that the incoming call should not be answered, the subscriber may choose to reject the call. If the subscriber decides that none of the aforementioned options should be proactively taken, then a default option can be used to terminate the call. Such a default option may include, but is not limited to, forwarding the call, delaying the answer, sending the call to a voice mailbox, or rejecting the call. A detailed discussion of the systems and methods for implementing UPCH features/functions in a WCS follows.
The UPCH feature, like the call hold feature of the present invention, can be implemented using the illustrative communications system of FIG. 12. A public switched telephone network (PSTN) 125 is connected to plural communication networks, including one having a telephone 1215. The PSTN 125 can be coupled to a plurality of local digital switches, such as local digital switch (LDS) 104. The LDS 104 may be coupled to network server platform (NSP) 106 by an X.25 link 4 and an SS7 link 5. NSP 106 may include, among other elements, a controller 1230, a voice processing unit (VPU) 1235, memory 1240, and communications bus (CB) 1238. The NSP 106 provides voice access ports (VAPs) 103A, 103B of a wireless centrex system with control and related operations, administration, maintenance, and provisioning (OAM&P) functions. Control functions include, but are not restricted to, mobile station and mobility management, call control, and feature applications. The NSP 106 is responsible for, among other functions, network intelligence, validation, registration, mobility management, and serves as a message center.
The X.25 link 4 carries call control messages on the data channel (D-channel) between the NSP 106 and LDS 104 that are destined for the VAPs 103A and 103B. The SS7 link 5 between the NSP 106 and LDS 104 carries the AIN (Advanced Intelligent Network) messages that direct the LDS 104 for proper routing of call to a user who subscribes to wireless centrex system (WCS) services.
The LDS 104 may be connected to a remote digital terminal (RDT) 102 by a Bellcore standard GR-303 interface 1. The GR-303 standard defines digital transmission facility interface such as DSI and/or SONET, concentration options between the integrated digital terminal (switch) 105 and the RDT 102 signaling options, and call processing and operations data links. Thus, the GR-303 interface 1 can be transported across metallic (e.g., T1, ISDN:PR1 or DS3) or fiber-optic (e.g., SONET OC3 or OC12) links. The GR-303 interface carries the voice traffic and the signal traffic for the LDS 104 and the NSP 106.
The PSTN 125 is also coupled to a mobile switching center (MSC) 1250. The MSC 1250 has functionality similar to the combination of LDS 104 and NSP 106, and operates to control a cellular telephone network. MSC architectures are known in the art, and it will be appreciated that any MSC may be adapted for use with the present invention. Plural base stations (BS), for example like the one BS 1255, are controlled by the MSC 1250. Mobile stations MS 101 can travel throughout the cellular network and into the WCS network. Depending on a number of factors, calls involving a mobile station are handled by a base station BS 1255 that provides cellular coverage for the area in which the mobile station is located. Handoff of calls involving the mobile station MS 101 from one base station BS 1255 to another base station BS 1255 is controlled by the MSC 1250 in a known manner. A mobile station MS 101 may be wirelessly coupled to BS 1255 as shown or alternatively to a VAP 103 for communication connection to other telephones within the entire PSTN, cellular telephone, and WCS configuration. Thus, the WCS can connect to a macro cellular SS7 network to support integrated mobility functions including terminal handoff and personal roaming features.
On the other hand, as illustrated in FIG. 1, a WCS can operate as a wireless system without being connected to a public macro cellular system, and thus not support mobility functions associated with the macro cellular system.
An illustrative implementation of the UPCH service of the present invention will be described in connection with a wireless centrex system. However, it should be understood to those skilled in the art that the UPCH service can also be supported in existing macro cellular systems. In such a system, the MSC 1250 can provide similar functionality to the NSP 106 plus the LDS 104, and a BS 1255 is functionally similar to a VAP 103.
FIG. 16 provides an exemplary call flow diagram for activating the UPCH feature according to an illustrative embodiment of the present invention. To activate the UPCH service, a subscriber enters an Feature Activation Code (FAC) 1601 (e.g., *1) on his mobile station MS 101 and presses, for example, a SEND button or some other designated key stroke. An IS-136: Call Origination<FAC> 1602 message is sent to, for example, VAP 103A which forwards the message upstream through the RDT 102 and LDS 104 (not shown) to the controller 1230 of the NSP 106 as Call Origination <FAC> 1603 message. The controller 1230 updates information for the subscriber in memory 1240 that includes a database, and sets the UPCH service feature active for the subscriber at step 1604.
The controller 1230 of the NSP 106 then sends UPCH FAC ACK 1605 acknowledgment message back to the subscriber's mobile station MS 101A through the LDS 104, RDT 102 (not shown) and VAP 103A (UPCH FAC 1606). After the acknowledgement signal has been received a character on the mobile station MS 101A, for example on a display screen, may be illuminated to indicate that the UPCH service is active.
The database in memory 1240 may contain, among other things, a profile for each subscriber including services available to the subscriber and preferences of the subscribers which can be dynamically changed by a subscriber telephonically, over the Internet, or otherwise.
If a subscriber desires to deactivate the UPCH feature, the subscriber can enter a feature deactivation code FDC (e.g., the AFC code plus *3) and press, for example, the SEND button on his mobile station MS 101 as shown in step 1607. An IS-136 Call Origination <FAC*3> 1608 message having the feature deactivation code is then sent upstream to the controller 1230 of the NSP 106 by way of, for example, the VAP 103, RDT 102, (not shown) and LDS 104 (Call Origination <FAC> 1609). The controller 1230 of the NSP 106 updates the subscriber's profile in memory 1240 by setting a UPCH feature flag inactive. The controller 1230 of the NSP 106 may then send an acknowledgment message, UPCH FDC ACK 1611, back to the subscriber's mobile station MS 101A through, for example, the LDS 104, RDT 102 (not shown) and VAP 103A (UPCH FDC ACK 1612). After the acknowledgement signal has been received by the MS 101, an UPCH indicator on the mobile station MS 101A may be turned off to indicate that the UPCH service is inactive.
Another illustrative implementation of the UPCH service feature will now be described in connection with call flow diagram of FIG. 17. An incoming call 1701 to a mobile station MS 101A is delivered to the controller 1230 of the NSP 106. The incoming call 1701 can originate anywhere in the communications network including from a caller in a cellular system (e.g., MS 101), wireless centrex system (e.g., mobile station MS 101B), the PSTN 125 (e.g., landline phone 1215), or any local and long distance network.
The controller 1230 retrieves profile information 1702 associated with the called party from the memory 1240. If the UPCH active flag is set for the called party, the controller 1230 can send a short message (SM) <Reason, Caller ID> 1703 to the VAP 103A with which the called party mobile station MS 101A has registered. The SM transmitted to the called party indicates that an incoming call exists and may further include caller ID data such as the calling party's name and/or number.
The short message may be transmitted to the called party in a portion of the DCCH known as a short message service channel (SMSCH). An exemplary implementation of the short message is described in the IS-136 EIA/TIA Interim Standard. The SMSCH can carry signal information for set up and delivery of short alphanumeric messages from the NSP 106 to the mobile station 101A of the called party. The SMSCH is a logical sub-channel of the SMS point-to-point messaging, paging, and access response channel (SPACH), which is a logical channel of the DCCH. The DCCH operates on a set of frequencies separate from those used to support cellular conversations, which may be carried on the DTC.
After the SM 1703 is received by the VAP 103A at which the called party's mobile station MS 101A is registered, according to this illustrative embodiment, the VAP 103A follows the IS-136 specification by first sending a SPACH Notification 1704 message to the called party's mobile station MS 101A. The mobile station MS 101A sends a SPACH Confirmation 1705 acknowledgement message to VAP 103A and then the VAP 103A sends RDATA 1706 message including the short message SM to the mobile station. Thereafter, the mobile station MS 101A acknowledges receipt of RDATA by sending RDATA Accept 1707 message back to the VAP 103A.
When the short message is delivered to the called party, it is displayed on the called party's mobile station MS 101A. Thus, the called party knows that an incoming call exists and the identity of the caller through the caller ID information displayed on the called party's mobile station. The called party then can decide how to handle the incoming call. Options available to the subscriber may include: a) answer the call immediately; b) delay answering the call; c) immediately forward the call to voice mail; d) forward the call to another number; e) reject the call; f) send a short message to the calling party; and g) take no action. The calling party can select an option by, for example, pressing one or more keys on the mobile station keypad of pressing a touch screen. A discussion of the operation of some of the possible mobile station MS 101 user UPCH selections follows.
According to a first aspect of the UPCH feature implementation, when the called party desires to answer the incoming call immediately he depresses a button or key (e.g., TALK or SEND) at the mobile station MS 101A. A call origination message is then transmitted upstream in the DCCH to the VAP 103A and up to the LDS 104 and NSP 106. The NSP 106 immediately allocates a voice channel between the LDS 104 and the mobile station 101 A that connects with the voice path previously established between the calling party and LDS 104 when the calling party first initiated the call, to thus establish a point-to-point voice channel between the calling and called party. High priority may be given to the called party's request for a voice path e.g., a DTC channel may be quickly allocated.
According to a second aspect of the UPCH feature, a MS 101 user may chose to delay answer of a call and would enter a different function code, for example, pressing "*1, Send". This key stroke would forward the incoming call to an announcement stored in the voice processing unit (VPU) 1235 of the NSP 106. FIG. 18 shows an exemplary call flow diagram for the delay answer call option in accordance with an illustrative embodiment of this aspect of the present invention.
First, an incoming call is provided with a voice path 1801 between the calling party and LDS 106. The LDS 106 passes the incoming call 1701 including a route query to the controller 1230 of the NSP 106. The controller 1230 retrieves the profile of the called party from memory 1240. If the UPCH service is active for the called party, a short message SM <Reason, Caller ID> 1703 is sent to the mobile station MS 101. As described above and shown in FIG. 17, steps 1704-1707 follows and the user is provided an opportunity to determine in real time how to handle the incoming call.
The called party receives the message and decides that he wants to answer this call after some delay. So the called party enters a delay answer feature code such as "*1 SEND" 1808 and an IS-136: Call Origination 1809 message, with "*1 " as the keyed input, is sent upstream to the NSP 106 by way of VAP 103A (Call Origination 1810). The controller 1230 receives the message, updates the called party's database in memory 1240 with current status information, and instructs the LDS 104 using Reroute to VPU 1811 to connect the calling party's voice path to the VPU 1235. The VPU 1235 plays a brief message, such as "Please wait, [the called party name] will be with you shortly" in step 1812 and places the call on hold (with or without white noise generated by a DSP).
When the called party subsequently becomes available and desires to be connected with the on hold calling party, he enters a key feature code such as "*7 SEND" in step 1813. An IS-136: Call Origination <FC*7> 1814 message, with "*7" as the feature code, is sent to VAP 103A which forwards the Call Origination 1815 message to NSP 106. The controller 1230 of the NSP 106 receives the message, updates the status of the called party in memory 1240, and retrieves the active call information. If the calling party is still holding, the controller 1230 instructs the VAP 103A to barge into the voice path established between the calling party and VPU 1235 (or DSP), establishing a three-way connection. Then, the controller 1230 instructs the VPU 1235 (or DSP) to disconnect from the voice path using Call Disconnect 1818 message, leaving the called party and calling party on the voice path. If the calling party is not on hold, the NSP 106 can instruct the VAP 103A to dial the last incoming call in the called party's record in memory 1240.
According to another aspect of the UPCH feature, a mobile station user can in real time forward an unanswered incoming call to voice mail by entering a function code, for example by pressing "*2, SEND". In this instance, an origination message with "*2" is sent upstream in the DCCH to the LDS 104. The LDS 104 then routs the call to a VMS 107 coupled to the LDS 104, where the calling party can leave a voice message.
Similarly, according to a further aspect of the UPCH feature, a mobile station user can in real time forward an unanswered incoming call to another DN or extension by entering a function code, for example by pressing "*3, and [the number of the forwarding location], SEND". The id number of the forwarding location is transmitted upstream to the LDS 104 and NSP 106 which examines the id number to which the call is to be forwarded. If the id number matches a number in the system associated with LDS 104 or LDS 104A, etc., the call is processed accordingly. Otherwise, the call is routed through, for example, the PSTN 125 to the appropriate end DN to receive the call.
According to another aspect of the UPCH feature, a mobile station user can in real time reject an unanswered incoming call by entering a function code representing a rejection key sequence, for example, "*4 SEND". In response an origination message with "*4" is sent upstream to the LDS 104 and NSP 106 in the DCCH. A message indicating that the called party is not currently accepting calls may be issued by, for example, VPU 1235, to advise the calling party. Alternatively, a tone may be transmitted from the LDS 104 to the calling party when the LDS 104 and/or NSP 106 detect a call reject flag.
According to still another aspect of the UPCH feature, a mobile station user can in real time create a short message and send it to the calling party of an unanswered incoming call by the called party entering a function code along with a message, for example, "*6, [a brief alphanumeric or voice message], SEND". The short message travels upstream in the DCCH to the LDS 104 and NSP 106, where it is transmitted downstream to the calling party. Voice synthesis in the VPU 1235 or DSP in the VAP 103 may be used to convert the alphanumeric message to a voice message. This feature may be particularly advantageous when the called party is busy and simply wants to communicate a brief real time message such as "Call you back in ten minutes" or "Meet me at home at 6:00".
According to a further aspect of the UPCH feature, the called party can also chose to take no affirmative action so that a default action is implemented after a prescribed time period in the which the called party has failed to respond lapses. Default conditions may include, but are not limited to, forwarding the call to voice mail or letting the call go unanswered. The default condition for a particular subscriber is defined in the subscriber profile stored in memory 1240 of the NSP 106. Thus, if the NSP 106 fails to receive any response from a called party, the NSP 106 will automatically process and terminate the call according to the called party's profile.
The UPCH service of the present invention can be integrated with an automatic call handling service, where based on certain criteria, a call can be handled automatically, and based on other criteria, a call can handled by the UPCH service. For example, a user may want all calls forwarded to voice mail from 10:00PM to 8:00AM and from 8:00AM to 10:00PM desire to process and terminate calls proactively. Also, a user may want all calls originating from certain IDs to be handled automatically while the remainder of the calls can be processed and terminated proactively. Further, a called party may desire to process and terminate calls proactively based on the physical location of the called party (e.g., office v. home). All this information can be defined and programmed in the called party's profile in the memory 1240 so that the NSP 106 knows how to route an incoming call properly according to a user's predefined or system default preference settings.
According to another illustrative embodiment of the invention, the NSP 106 can transmit a user alert, such as a tone, over the control channel to the called party to apprise the called party of an incoming call. A user alert can be incorporated with or without the SM application of UPCH described above. In response to the user alert, the called party can process and terminate the incoming call in real time as described above. Different tones can be assigned in the called party's profile in the memory 1240 so as to uniquely or specifically identify the calling party.
Further, the UPCH feature provides the ability to delay allocation of the voice channel to a called party until when, if at all, the incoming call to the called party requires a voice channel. This is carried out by allowing a called party to receive notification of an incoming call over the control channel and to return the selection of the call handling options upstream over the control channel. Thus, a voice channel need not be allocated until the called party decides to answer the call. This can be beneficial in wireless environments to prevent the unnecessary allocation of voice channels. Once the called party needs a voice channel, the incoming call has priority for available voice channels.
XII. Call Transfers
From time to time a telephone user, particularly a mobile phone MS 101 user, has need to transfer an active call to another telephone DN. Such situation arise when the other party needs to talk with someone else or would like to access a voice mail message in, for example, a VMS. In such instances the mobile station MS 101 user needs a quick, user friendly means to transfer the active call to another DN, i.e., the transfer-to DN (TransferDN).
The call transfer feature/function allows the WCS MS 101 user to transfer an active call to another DN. The transfer-to DN can be either inside or outside the WCS network. The two exemplary embodiments provided below illustrate the call transfer feature/function where an active call is transferred from a WCS mobile station (e.g., MS 101A) to another mobile station (e.g., MS 101B) or to a PSTN telephone (e.g., PSTN 1215), respectively.
Referring to FIG. 19, a first preferred embodiment for the call transfer feature/function shows a call transferred by a mobile station MS 101 user from mobile station MS 101 to PSTN DN2 (1215b) outside the WCS. Initially, it is assumed that a call between MS 101 and PSTN DN1 is in progress and the LDS 104 and VAP 103 identify this existing call as call reference 1 (Call in progress, CR=1 1900 shown as dashed lines at the top of FIG. 19). The MS 101 user may transfer an active call by entering a feature/function code for call transfer and digits associated with the DN to which the call is to be transferred. For example, the MS 101 user may enter on the MS 101 keypad the digits in the format of, for example, *77#TransferDN (the transfer-to DN is denoted as the TransferDN) and the "send" button. Each time a digit is pressed on the MS 101 a IS-136 Send Burst DTMF message is sent to the VAP 103 which in total is represented by the IS-136 Send Burst DTMF [*77#TransferDN] 1901 message, corresponding to all of the digits pressed. Then, by the MS 101 user pressing the "send" button, the MS 101 sends an IS-136 Flash With Info message to the VAP 103 indicating that the previously sent IS-136 Send Burst DTMF messages are complete and represent the end of the transmission representing a call transfer request.
Upon receiving each DTMF message from MS 101, the VAP 103 sends an IS-136 Send Burst DTMF ACK 1902 message to the MS 101. After receiving the Flash With Info 1903 message from MS 101, VAP 103 sends a unique Feature Request message including the collected digits to the NSP 106, e.g., Feature Request [*77#TransferDN] 1904 message.
When the NSP 106 receives the Feature Request [*77#TransferDN] 1904 message it identifies that the digits *77# is the feature code for the Call Transfer feature. Then the NSP 106 analyzes the feature code digits and validates via the WCSD in, for example, memory 1240, whether MS 101 is authorized for the feature requested. If MS 101 is authorized to use the call transfer feature requested, the validation is successful and NSP 106 sends a Feature Request ACK [Play Voice Prompt (Transfer)] 1906 message to VAP 103 with the action as `Play Voice Prompt` instructing VAP 103 to play an announcement/tone to the MS 101 user (and/or the PSTN DN11215b) indicating that a call transfer has been authorized (Voice Prompt 1907). Similar to the Call Hold feature/function procedure, the MS 101 and the PSTN DN11215b may be provided comfort noise by a digital signal process (DSP) to maintain continuity. However, if the validation of the Call Transfer feature/function request at NSP 106 is unsuccessful, the NSP 106 sends a Feature Request NACK (Not Acknowledged) message to VAP 103 prompting it to play an appropriate announcement/tone to the MS 101 indicating that the call transfer feature/function is not available and the call will not be transferred to the requested transfer-to DN (e.g., a Feature Request NACK [Play Voice Prompt (Transfer Not Allowed)] message is sent to VAP 103).
Once the call transfer has been authorized and the NSP 106 has sent a Feature Request ACK message to VAP 103, the NSP 106 sends a unique Transfer message, Transfer [CR=1, TransferDN] 1908, to the VAP 103 including the MSID of the requesting mobile station MS 101, the VAP ID to which the message is directed, the call reference number (e.g., CR=1) and the transfer-to DN, TransferDN, to execute the call transfer procedure. The NSP 106 also starts the TCT2 timer to ensure that the active call will not stay on hold indefinitely if for some reason the call is not properly transferred to the transfer-to DN.
In response to the Transfer [CR=1, TransferDN] 1908 message, the VAP 103 sends an information message, Q.931 Info [CR=1, Transfer] 1909, to LDS 104 to request the call transfer for the current call (CR=1). In return, the LDS 104 sends a Q.932 Hold [CR=1] 1910 message to the VAP 103. Then VAP 103 places the call on hold and sends a Q.932 Hold ACK [CR=1] 1911 message back to the LDS 104. VAP 103 also sends a Q.931 Setup [CR=2, TransferDN] 1913 message having the call reference CR=2 and the transfer-to TransferDN to the LDS 104. The LDS 104 initiates the ISUP connection to the TransferDN (PSTN DN21215a in the figure), and VAP 103 waits with the call on hold for the Q.931 Connect [CR=2] 1920 message from LDS 104.
In establishing the call initiation with PSTN DN21215a, PSTN DN21215a (i.e., PSTN switch which services DN2) receives an ISUP IAM 1914 message from LDS 104 and VAP 103 receives a Q.931 Call Proceeding 1915 message from LDS 104. In response, PSTN DN21215a send an ISUP ACM 1916 message to LDS 104 and LDS 104 provides a Q.931 Alerting 1917 message to VAP 103. A Ringback Tone 1918 is provided to MS 101 so that the MS 101 user understand that the TransferDN is being alarmed as an incoming call. When PSTN DN21215a answers the call, an ISUP ANM 1919 message is sent to LDS 104. The LDS 104 recognizes that the incoming call has been answered by the PSTN DN2 and sends the Q.931 Connect [CR=2] 1920 message to VAP 103.
However, the MS 101 user can interrupt the call transfer before the called party at PSTN DN21212a answers (i.e., before the call is transferred), by for example pressing the send button on the MS 101 twice. In a situation when the MS 101 user is getting a busy signal or PSTN DN21215a is still ringing and the MS user presses the send button once, the message generated from the MS 101 will be ignored by the NSP 106. However, if the MS 101 user presses the send button twice within a short period of time (e.g., a one-second period) and the call has not yet been answered by the PSTN DN21215a (the ISUP ANM 1919 message and Q.931 Connect [CR=2] 1920 message have not been generated), the NSP 106 identifies that the MS 101 is requesting to retrieve the held call and terminate the call transfer. Thus, in response the system will retrieve the original call (CR=1) and release the second call (CR=2).
Assuming that the MS 101 user does not interrupt the call transfer and the PSTN DN21212a answers, the PSTN DN21215a sends the ISUP ANM 1919 message to LDS 104 and the LDS 104 sends the Q.931 Connect [CR=2] 1920 message to the VAP 103. When the VAP receives the Q.931 Connect [CR=2] 1920 message from the LDS 104, it acknowledges connection with the PSTN DN2 and sends a Q.931 Connect ACK 1921 message back to LDS 104 and sends a Transfer Result [TransferDN, Answered] 1922 message to NSP 106 informing the NSP 106 that the TransferDN has answered. The unique Transfer Result message includes the MSID, VAP ID, Call Reference Number (e.g., CR=2), and Cause (e.g., success/fail).
When the NSP 106 receives the unique Transfer Result [Transfer DN Answered] 1922 message from VAP 103 informing that the TransferDN has answered, the NSP 106 updates the call transfer status and cancels the TCT2 timer. If the timer TCT2 expires before receiving the Transfer Result 1922 message, the NSP 106 shall deactivate the Call Transfer feature by sending a Feature Request NACK message (not shown) in response to the Feature Request from VAP 103. Then the VAP 103 shall send a Q.932 Retrieve [CR=l] message (not shown) to the LDS 104, which retrieves the held call [CR=1] and sends a Q.932 Retrieve ACK back to the VAP 103.
In the case that the Transfer Result [Transfer DN Answered] 1922 message is received by NSP 106 with the Transfer DN Answered message, if the MS 101 user now presses, for example, the "send" button once, an IS-136 Flash with Info 1923 message is sent to the VAP 103 to initiate completion of the call transfer (connecting call CR=1 from the PSTN DN11215b to the LDS 104 to the call CR=2 from the LDS 104 to the PSTN DN21215a). In response, the VAP 103 sends a Feature Request [FlashWithInfo] 1924 message to NSP 106 to request completion of the call transfer and send an IS-136 Flash with Info Ack 1925 message to MS 101 to acknowledge the call transfer completion request by the MS 101 user. Then NSP 106 determines that this is a call transfer completion action request, and sends a Feature Request ACK[Transfer (CR=2)] 1926 acknowledgment message back to VAP 103 indicating that the Call Reference to be transferred equals to 2 (CR=2). VAP 103 then requests LDS .104 to complete the call transfer by sending a Q.931 Info [CR=2, Transfer] 1928 message to LDS 104, so that the LDS releases from the VAP 103 both call references (CR=1 and CR=2), the VAP 103 releases the RF to the MS, and the transferred call is left in progress between PSTN DN11215b and PSTN DN21215a (Transferred Call in progress 1937).
To release MS 101, VAP 103 sends an IS-136 Release 1927 message to MS 101. In response, MS 101 releases the voice channel air connection with VAP 103 and sends an IS-136 Mobile Ack 1930 acknowledgment message back to VAP 103 indicating that it has been released from the active call. To release VAP 103 from the active calls CR=1 and CR=2, LDS 104 sends a Q.931 Disconnect [CR=1] 1929 message and a Q.931 Disconnect [CR=2] 1933 message to VAP 103. VAP 103 responds by sending a Q.931 Release [CR=1] 1931 message and a Q.931 Release [CR=2] 1934 message to LDS 104. In return, LDS 104 sends a Q.931 Release Complete [CR=1] 1932 message and a Q.931 Release Complete [CR=2] 1935 message to VAP 103 to indicate that the LDS 104 has completed the call release process.
Once VAP 103 completes the Q.931 release procedures with LDS 104, it sends a Transfer Complete [Success] 1936 message to NSP 106 to indicate to the NSP 106 that the call is no longer active with mobile station MS 101 in the WCS. The Transfer Complete message includes the MSID, the VAP ID, the call reference numbers (CR=1, CR=2), and a cause (success/fail) field. At this point the call transfer process has been completed successfully and the active call has been transferred from PSTN DN11215b and MS 101 to PSTN DN11215b and PSTN DN21215a.
Referring to FIG. 20, a second preferred embodiment for the WCS call transfer feature/function shows a call transferred by a mobile station MS-1101a user from mobile station MS-1101a to another mobile station MS-2101b within the WCS. In this embodiment, many of the signal flows in the call transfer process are the same as those in the first preferred embodiment for the call transfer feature/function and thus have the same number designations. The primary difference is the call setup procedure for setting up an incoming call to the second mobile station MS-2101b and its related VAP, VAP2103b, as described below.
The signal flow to initiate call transfer of an active call in progress from one mobile station MS-1101a to another mobile station MS-2101b in the same WCS is the same as the signal flow to initiate call transfer from a mobile station MS 101 to a telephone, PSTN DN21215a outside the WCS. As such, from the point at which a mobile station (MS-1101a) user involved in an active call in progress (Call in progress, CR=1, 1900) enters the call transfer feature/function activation code by pressing the digits in the format of *77# with the desired transfer-to DN, TransferDN, followed by the "send" button (results in the MS-1101a sending an IS-136 Send Burst DTMF[77# TransferDN] 1901 message to VAP1103), up to the point when the active call is placed on hold (Call held, CR=1 1912) and the VAP1103a sends the Q.931 Setup [CR=2, TransferDN] 1913 message is sent to LDS 104, the signal flows (1901-1913) are the same. Thus, in the second embodiment of the call transfer WCS feature/function of the invention, the call transfer is initiated by the MS, authorized by the NSP, and the active call is placed on hold (with appropriate prompt) awaiting further disposition by the WCS, for example, completed transfer of the held call to a second mobile station MS-2101b as described below.
The Q.931 Setup [CR=2, TransferDN] 1913 message instructing LDS 104 to setup a second call with the transfer-to DN triggers an AIN query from LDS 104 to NSP 106 so that a TCAP (AIN Termination_Attempt [TransferDN]) 2001 message is provided to NSP 106. The NSP 106 verifies the location of the TransferDN within the WCS. Next, the MS-2101b is paged with IS-136 Page Request 2002 message and the VAP1103a waits for the Q.931 Connect [CR=2] 1920 message from LDS 104 (after the LDS 104 receives Q.931 Call Proceeding and Alerting messages). While VAP1103a waits a voice channel connection with MS-2 is established as follows.
After MS-2101b receives the IS-136 Page Request 2002 message, MS-2101b send an IS-136 Page Response 2003 message to VAP2103b and VAP2103b sends Page Response 2004 message to NSP 106. This triggers an AIN message, TCAP (AIN Forward_Call [VAP2-FDN], NEL [O_No-Answer]) 2005, sent by NSP 106 to LDS 104. As a result, the NSP 106 has provided routing instructions that direct LDS 104 to forward the active call on hold to the Forward Directory Number (FDN) of VAP2 (i.e., VAP2-FDN). NSP 106 has also indicated with this message its interest in event (O_No_Answer for VAP2-FDN) by sending next event list NEL [O_No_Answer]) information to LDS 104 in the Request component that accompanies the Routing component.
LDS 104 then starts a No Answer Timer (T(NoAnswer)) for VAP2-FDN (not shown) and sends an ISDN Q.931 Setup [CR=2, FDN] 2006 message to the VAP2103b. VAP2103b then sends a Digital Traffic Channel (DTC) Designation 2007 message to the MS-2101b designating the traffic channel to be used and an ISDN Q.931 Call Proceeding 2009 message to the LDS 104 that triggers the Q.931 Call Proceeding 2010 message sent to VAP1103a. MS-2101b then tunes to the traffic channel and responds to VAP2103b with an IS-136 Mobile on DTC 2008 message. VAP2103b detects that the MS 101 is on the 10 appropriate traffic channel. VAP2103b then alerts MS-2101b with an Alert-with-info 2011 message and MS-2101b acknowledges with an IS-136 Mobile ACK 2015 message. VAP2103b also sends an ISDN Q.931 Alerting 2012 message to LDS 104 which triggers a Q.931 Alerting 2013 message to VAP1103a. Meanwhile, the LDS 104 is sending a Ringback Tone 2014 to MS-1101auser.
When the MS-2101b answers (before T(NoAnswer) timer expires) the MS-2101b generates an IS-136 Connect 2016 message to the VAP2103b and the VAP2103b sends an ISDN Q.931 Connect message 2017 to the LDS 104 in response to the IS-136 Connect 2016 message from MS-2101b. At this point the call transfer procedure continues the same as in the previous embodiment so that the MS-1101a user can enter the appropriate key sequence to instruct the WCS to complete the call transfer process (steps 1920-1937). As a result, the active call in progress (CR=1) between PSTN 1215 and MS-1101a is transferred so that the active call in progress is between PSTN 1215 and MS-2101b.
It should be appreciated that transferring a call from a mobile station in one WCS to a mobile station in another WCS could also be achieved by the NSP 106 providing the LDS 104 with routing instructions including a FDN indicative of a VAP 103 and MS 101 in the other WCS. Such a case could be achieved using a procedure similar to the procedure illustrated in FIGS. 19 and 20.
XIII. Caller ID
The Caller ID feature of the present invention allows display on the MS 101 of the originating directory number for the calling party's desk top telephone (Calling Party Number, DN.sub.O) and identity (e.g., name) for an incoming and/or active call, even if the call originates from another MS 101. Further, the Caller ID information may include location information, e.g., building number, derived from the forward directory number (FDN) of the originating VAP 103 (VAP.sub.O). In addition, the Caller ID feature of the present invention may provide the location and identity of the called MS 101 to the calling party and displayed on the calling party's MS 101 during an active call. In either case, a Network Server Platform (NSP) 106 provides a MS 101 user's desk top phone directory number, DN.sub.O, as their telephone number for Caller ID rather than the forward directory number (FDN) associated with an originating VAP 103, VAP.sub.O 103, with which the MS 101 is currently associated.
The caller ID or the calling party identification is the number associated with the phone from which the call is originating. The WCS Caller ID feature allows the calling party's phone number, identify, and related information to be displayed on the WCS mobile handset, MS 101.
Caller ID for a call originating from a PSTN 125 to an MS 101 in a WCS will occur much the same way that caller ID occurs entirely within a PSTN 125. The WCS Caller ID feature will present to the MS 101 in the WCS environment all the information that the PSTN 125 passes to the VAP 103, e.g., calling party telephone number and calling party name. However, if the PSTN 125 does not pass this info to the VAP 103, (e.g., caller id blocking), the VAP 103 can not, and does not, present any calling party information to the MS 101.
Caller ID for a call originating from a WCS MS 101 is different than caller ID for a call originating from a PSTN 125 because the MS 101 is wireless and is associated with the forward directory number of a VAP 103, rather than the directory number (DN) of a stationary telephone. Due to the wireless nature of the MS 101 and its association with a VAP 103 (or a number of different VAPs) in a WCS, Caller ID for calls originating from an MS 101 in a WCS requires unique treatment in order to provide a calling party telephone number and name which is recognizable. In the case that the WCS user has both a desk top telephone and a MS 101, the problem may be solved by the NSP 106 providing the users desk top telephone DN for Caller ID purposes, regardless of what VAP 103 the MS 101 is associated with at any point in time. Alternatively, if the MS 101 user does not have a desk top telephone within the WCS the NSP 106 may be programmed to provide any telephone number, for example the MS 101 user's home number, the business main number, or the FDN of the VAP 103 to which the MS 101 is currently associated. Although the Caller ID feature/function of the present invention will be described with respect to a call between one MS 101 and another MS 101 having the same NSP 106, one skilled in the art will recognize that Caller ID for an MS 101 originating a call may similar be provided if the mobile stations 101 have different NSPs 106 which can communicate so as to pass the Caller ID information to one another.
The preferred embodiments of the WCS Caller ID feature/function provides calling party information to the called party (e.g., phone number, name, address, building number, etc.) for a call between two WCS users, e.g., an originating mobile station, MS.sub.O 101, and a terminating mobile station, MS.sub.T 101. This intelligence is managed by the NSP 106 and thus also enables called party information to be provided to the calling party, e.g., location of the called party. Three preferred embodiments are provided below: (1) the intelligence of the NSP 106 is used to correlate originating and terminating call legs of a call and sends the appropriate caller ID information; (2) an information element in the call control message, such as the Q.931 Calling Party Subaddress information element of the Setup message, is used to provide caller ID information; and (3) a signaling protocol that supports non-call associated temporary signaling for user to user data transfer, e.g., the Q.931 User Information message, is used to provide caller ID information. These embodiments are merely exemplary.
Providing the Caller ID features/functions for WCS to WCS calls can be simplified into two general tasks. First, the NSP 106 must be updated with the originating party information of every call that originates from a WCS MS 101. This can be done during the call origination and hence we categorize these tasks as being included in the call origination leg. To provide the terminating VAP, VAP.sub.T 103 with this information (the Caller ID information). These tasks can be categorized as the one that must be performed during the call termination leg.
A first preferred embodiment will now be described with reference to FIGS. 21A-21D. This embodiment depends on the intelligence of the NSP 106 to provide the correct Caller ID information. For a WCS (e.g., MS.sub.O 101) to WCS (e.g., MS.sub.T 101) call, the NSP 106 must perform the following two functions. First, the NSP 106 maintains originating party information of every originating call that terminates to a WCS user. Second, for every incoming call, the NSP 106 correlates the terminating leg of the call with the corresponding originating leg so as to retrieve the originating party information and pass this information to the terminating VAP.sub.T 103 to be provided to the terminating MS.sub.T 101. These functions require the NSP 106 to track the originating calls and match them to the correct terminating portion of the call.
As indicated above, providing caller ID information for this preferred embodiment splits the processing in two legs--the origination request (leg) and the termination request (leg). The information regarding the caller of each call originated is recorded at the NSP 106 and during the termination of any call (in this case within the WCS); the caller id related information is extracted based on the calling VAP's 103 FDN.
Referring now to FIG. 21A, a flowchart for caller ID information retrieval procedure is provided and shows the origination leg of the WCS Caller ID feature/function according to a first preferred embodiment. When a call originates from a WCS subscriber's originating MS.sub.O 101 to another WCS subscriber's terminating MS.sub.T 101 (for simplicity, both MS.sub.O 101 and MS.sub.T 101 are served by the same NSP 106), as a first step in the origination leg, step 2101, the MS.sub.O 101 originates a call to MS.sub.T 101. Next, at step 2102 the VAP 103 will send the WCS origination request, which will contain the FDN associated with the serving VAP 103 to the NSP 106, along with the originating MS.sub.O 101 id, i.e. MSID. Then, at step 2103, the NSP 106 uses the MSID to determine whether the WCS user (MS.sub.O 101) is registered within the WCS. If not, the NSP 106 rejects the MS origination at step 2104. If the MS.sub.O 101 is registered with the WCS the NSP at step 2105 determines if the MS.sub.O 101 has called (requested) a WCS number as the terminating number DN.sub.T. If not, the NSP 106 follows the normal call processing at step 2107 and sends an origination ack message. However, if the NSP 106 determines that the called termination number DN.sub.T is within the WCS, the NSP extracts the DN.sub.O, i.e. the DN of the desktop associated with the MSID of the originating MS.sub.O 101 and records the originating user information along with the DN.sub.T, at step 2106, in a Caller ID table. This mapping between the MSID and the corresponding DN can be found in the subscriber information in the WCS database (WCSD). Thus, the NSP 106 in step 2106 stores the DN.sub.O and the FDN information against the DN.sub.T, i.e. the DN of the phone where the call has to terminate, in a record and subsequently continues the normal call processing by, for example, sending an origination acknowledgement message in step 2107.
Referring now to FIG. 21B, when the call comes to the termination leg the LDS 104 at step 2108 sends, for example, an AIN TAT message to the NSP 106 which includes, for example, the DN.sub.T and the FDN of the originating VAP, VAP.sub.O 103, information in it. Next, in step 2109, the NSP 106 checks to determine that the Caller ID table in the WCSD has an entry for the DN.sub.T which matches the originating FDN. If there is a match of the DN.sub.T and the FDN, the NSP 106 retrieves the caller ID information, for example, the desktop telephone directory number DN.sub.O for the originating mobile station, MS.sub.O 101, and sends it to the termination VAP, VAP.sub.T 103, in, for example, a page request message, as shown at step 2110. Then, the caller ID information, for example, DN.sub.O, may be sent by the VAP.sub.T 103 to the MS.sub.T 101 in, for example, an IS-136 Alert with Info message. As a result, the MS.sub.T 101 will display the caller ID information, for example the DN.sub.O, on the MS.sub.T 101.
On the other hand, if at step 2109, the NSP 106 does not find a caller ID match for the DN.sub.T with the originating FDN or there is no specified DN.sub.O within the database for MS.sub.O 101, the NSP 106 sends, for example, a page request message to the terminating VAP.sub.T 103 without a DN.sub.O. Then, at step 2113, the VAP.sub.T 103 sends the calling party number contained in, for example, a Q.931 Setup message, which may be the FDN of the originating VAP. It should be noted that the DN.sub.O related information can be stored at the NSP 106, and can be used for the other features like call return, call screen etc for this call.
Clearing of the calling party number related information records from the NSP 106 may be handled as follows. The caller id related records are created during the call origination and may be cleared off during call termination. Certain information may be required to be updated at the NSP 106 before the caller id related record is cleared. For instance, the "last calling party number" is needed for call return feature; hence a field holding this value shall be updated. The caller id record for a call may be cleared from the NSP 106, if any of the following occur: (1) when NSP 106 has paged the MS 101 with the DN.sub.O information, (2) when a call fails during the origination attempt, (3) when the call is delivered to the desktop phone, and (4) when the call is treated as the waiting call in case of the call-waiting feature (that is, when NSP 106 notifies VAP 103 of call waiting. Furthermore, all the records may include a time stamp of the time when they are created, and the WCS may include periodic checking for the time stamps which are older than a certain amount of time, which if found, such records would be automatically and periodically cleared.
Referring to FIGS. 21C and 21D, exemplary signal flow diagrams are provided for a call origination and termination within the WCS for the first preferred embodiment of the Caller ID feature/function. As indicated by the flowcharts in FIGS. 21A and 21B, implementation of the Caller ID feature/function in this embodiment requires some additional things be done beyond the normal signal messages exchanges between VAP 103, NSP 106 and LDS 104.
An exemplary signal flow for the call origination leg of the first preferred embodiment for the Caller ID feature/function is illustrated in FIG. 21C. During call origination the originating WCS MS, MS.sub.O 101, requests for the call origination by sending an IS-136 Origination 2114 message including an MSID to the VAP.sub.O 103 followed by optionally an IS-136 Serial Number message 2115 which includes the electronic serial number (ESN) of the MS.sub.O 101. Then VAP.sub.O 103 sends an Origination Request 2116 message to the NSP 106. The Origination Request 2116 message contains the Called party id i.e., DN.sub.T, the FDN of the originating VAP.sub.O 103, and the identification of the originating MS.sub.O 101 MSID and/or the ESN. The NSP 106 validates the originating MS.sub.O 101 and checks whether the termination directory number, DN.sub.T is a WCS subscriber. If it is, then NSP 106 searches the WCSD for a DN.sub.O of the MS.sub.O 101 associated with the MSID and, if one exists, extracts and records the DN.sub.O of the MSID as being correlated to the destination (termination) DN, DN.sub.T, as indicated in step 2117. In other words, the NSP 106 retrieves the DN associated with the originating MSID, e.g., the DN.sub.O, and records the FDN and the DN.sub.O against the called party DN, e.g., DN.sub.T. Next, the NSP 106 sends the Origination Ack 2118 message. Subsequently, signaling 2119-2127, illustrate normal Call processing to completion of a voice path between the MS.sub.O and the MS.sub.T (2128). Thus, the signal flow for signaling 2119-2127 is similar to the usual origination call flow as described in the call processing section above (see, for example, FIG. 4 and its related description).
Referring now to FIG. 21D, an exemplary signal flow for the call termination leg of the first preferred embodiment for the Caller ID feature/function is illustrated. First, since in this case the incoming call is from another MS, MS.sub.O 101, within the WCS, a Q.931 setup message (triggered by, for example, Q.931 setup 2119 message) is received by the LDS 104 (not shown in figures). Alternatively, if the incoming call is from PSTN 125 an ISUP IAM message will be received by the LDS 104. In either case, the LDS 104 recognizes the incoming call as being directed to an MS 101 and thus sends an AIN TAT message, TCAP (AIN Termination Attempt [DN.sub.T, FDN]) 2129, to the NSP 106 so that the NSP 106 can provide information to the LDS 104 regarding the present location of the MS 101 associated with the termination directory number, DN.sub.T, so as to properly route the call. As illustrated, the AIN TAT message will contain the DN.sub.T, i.e., the called party ID, and the calling party number, which is the FDN of the originating VAP.sub.O 104 in the case where the call originates within the WCS.
Next, the NSP 106 attempts to match the originating terminal id, in this case the FDN of the originating VAP.sub.O 103 for this AIN TAT message, against the FDN, DN.sub.T pairs stored within its records (during the call origination leg). If there is a record with a matching FDN for the designated DN.sub.T, the NSP 106 will extract the previously stored caller ID information, for example DN.sub.O, from the WCSD and send it to the termination VAP, VAP.sub.T 103, in a Page Request [MSID, DN.sub.O ] 2131 message. If no match is found, then DN.sub.O shall not be populated and the VAP.sub.T 103 shall receive the calling party number provided in the Q.931 setup message (e.g., a PSTN 125 DN or a VAP 103 FDN). In essence, if there are no records with matching FDN, then there is no special information sent to the VAP.sub.T 103 in the Page Request 2131 message and VAP.sub.T 103 will present the calling party number information it gets from the Q.931 messages to the MS.sub.T 101. In any case, the usual call processing procedures follows at steps 2131-2141.
Then at step 2141, the VAP.sub.T 103 sends the caller ID information to the MS.sub.T 101 to, for example, display the caller ID information to the MS.sub.T 101 user. In the case there is a match, the VAP.sub.T 103 sends an IS-136 Alert with Info [DN.sub.O ] 2141 message to the MS.sub.T with, for example, the DN.sub.O information and/or other caller ID information (from Page Request 2131 message or the Q.931 setup message) to provide the MS.sub.T 101 user with the caller ID information, which in the case is the caller ID information for the originating MS.sub.O 101 user (e.g., the DN.sub.O of the MS.sub.O 101 user's desk top telephone). If there is no match, the VAP.sub.T 103 sends an IS-136 Alert-with-Info 2141 message to the MS.sub.T 101 with the calling party number value from the Q.931 Setup 2137 message. Subsequently, at steps 2142-2150, the call processing for the Caller ID termination leg for this embodiment is similar or the same as those mentioned for a general call termination in the call processing section above (see, for example, FIGS. 5-7 and their related description).
A second preferred embodiment for the Caller ID feature/function will now be described with reference to FIGS. 21E-21H. This embodiment does not depend on the intelligence of the NSP 106 to provide the correct Caller ID information. Once again, this embodiment also splits the processing in two legs-the origination request (leg) and the termination request (leg). In this case the WCS relies on existing signaling protocol to forward the caller ID information without storing and subsequently matching the data in the WCSD for the originating VAP.sub.O 103 FDN and the termination MS.sub.T 101.
In this preferred embodiment, the caller ID information regarding the caller of each call originated (e.g., the DN.sub.O associated with the originating MS.sub.O 101) is sent by the NSP 106 to the originating VAP.sub.O 103 in, for example, the Origination Ack. The NSP 106 does not set up a record in the WCSD but merely extracts the caller ID information, for example the DN.sub.O, from the WCSD and sends it to the originating VAP.sub.O 103. The VAP.sub.O 103 then sends the calling party caller ID information (e.g., DN.sub.O) in an available field of an existing message sent to the LDS 104, for example, the subaddress IE of its Q.931 Setup message sent to the LDS 104. Subsequently, during the termination leg, the LDS 104 preserves and forwards this caller ID information to the terminating VAP.sub.T 103 in an existing call setup message, for example, in the subaddress IE of a Q.931 setup message that the LDS 104 sends to the terminating VAP.sub.T 103. This information can now be presented by the terminating VAP.sub.T 103 to the terminating MS.sub.T 101 through an existing call setup message, for example, an Alert with Info message. This general method of the second preferred embodiment is described in more detail below.
Thus, this approach is dependent on the ability of using an information element field of a call control message passed from the originating VAP.sub.O 103 to the destination VAP.sub.T 103. An example of this is the Q.931 Calling Party Subaddress field of the Q.931 Setup message. This field can be use to carry caller ID information regarding the calling party, such as the DN of the desktop phone associated with the originating MS, caller's name, caller's address, caller's location, etc.
Referring to the flowchart in FIG. 21E, the process for the origination leg of the second preferred embodiment of the Caller ID feature/function is illustrated and will now be described. Once again, the embodiment illustrates a scenario for a call originating from a WCS subscriber's MS, the originating MS.sub.O 101, to another WCS subscriber, termination MS.sub.T 101. First, at step 2151, the user of an MS 101 originates a call. Then, at step 2152, the VAP 103 sends a message to the NSP 106, for example, a WCS origination request message, which may contain the originating phone's ID, i.e. MSID, and the called party number, e.g., DN.sub.T. Next, at step 2153, the NSP 106 determines whether the MS 101 user is registered with the WCS. If the MS 101 is registered and valid, in step 2155 the NSP 106 retrieves the caller ID information, e.g., DN.sub.O (the DN of the desktop associated with the MSID) by accessing the mapping between the MSID and the corresponding DN which may be stored in, for example, the subscriber information in WCSD. The NSP 106 also forwards the caller ID information (e.g., DN.sub.O) to the VAP 103 in a typical call setup message, for example, an origination ack message. Then in step 2156, the originating VAP.sub.O 103 sends the caller ID information (e.g., DN.sub.O) to the LDS 104 in an available field of another typical call setup message, for example, the subaddress IE field of a Q.931 Setup message. However, if the MS.sub.O 101 is not a registered user, the NSP 106 will reject the origination message at step 2154.
Referring now to the flowchart in FIG. 21F, the process for the termination leg of the second preferred embodiment of the Caller ID feature/function is illustrated and will now be described. First, in step 2157 the LDS 104 sends a typical call setup message, for example an AIN TAT message, to the NSP 106 so as to terminate the call at the DN.sub.T originated by the DN.sub.O. At step 2158 the NSP 106 responds by sending a typical call setup message to the VAP.sub.T 103 to which the termination MS.sub.T 101 is presently associated, for example a Page Request message. The VAP.sub.T 103 responds by sending a typical call setup message indicating that the desired MS.sub.T 101 is available via a Page Response message The NSP 106 instructs the LDS 104 to forward the incoming call to VAP.sub.T 103 using, for example, an AIN Forward_Call message. At step 2159, the LDS 104 sends a typical call setup message to the terminating VAP.sub.T 103, for example a Q.931 Setup message. Since the originating VAP.sub.O 103 put the caller ID related info (e.g., DN.sub.O) in the subaddress IE of the Q.931 SETUP message, this info will be contained in, for example, the subaddress IE of the Q.931 SETUP sent from the LDS 104 to the terminating VAP.sub.T 103. As indicated at step 2160, if the subaddress IE field is populated with caller ID information, for example DN.sub.O for the calling MS 101, the VAP.sub.T 103 will receive the information and provide it to the MS.sub.T 101 via a typical call setup message, for example an IS-136 "Alert with Info" message. Otherwise, the VAP.sub.T 103 shall use the Calling party number information, e.g., the VAP.sub.O 103 FDN or the PSTN 125 DN from the Q.931 SETUP message.
Referring now to FIG. 21G a detailed signal flow diagram for an origination leg of the second preferred embodiment of the Caller ID feature/function will now be described. First, an originating WCS MS, MS.sub.O 101, requests for call origination by sending an IS-136 Origination 2161 message and an optional IS-136 Serial Number 2162 message containing the ESN to the originating VAP.sub.O 103. Then, the originating VAP.sub.O 103 sends an Origination Request [MSID, DN.sub.T ] 2163 message to the NSP 106. The Origination Request message contains the Called party ID, DN.sub.T, FDN of VAP.sub.O and the identification of the originating MS.sub.O 101, MSID and/or the ESN. Next, the NSP 106 validates the MS.sub.O, and retrieves the caller ID information, for example a DN.sub.O, associated with the MSID. The NSP 106 sends the caller ID information, e.g., DN.sub.O, to VAP.sub.O 103 in an available field of the Origination Ack [DN.sub.O ] 2165 message.
Then the VAP.sub.O 103 sends the caller ID information, e.g., DN.sub.O, that it received from the NSP 106 in the Calling Party Subaddress IE of the Q.931 Setup [Subaddress IE=DN.sub.O info] 2166 message that it sends to the LDS 104. The LDS 104 will setup the call to DN.sub.T (this will trigger an AIN message in the terminating leg signal flow (see FIG. 21H)). Subsequently, signaling 2167-2174, illustrate normal call processing to completion of a voice path between the MS.sub.O and the MS.sub.T (2175). Thus, the signal flow for signaling 2167-2174 is similar to the usual origination call flow as described in the call processing section above (see, for example, FIG. 4 and its related description).
Referring now to FIG. 21H, the signal flow for the terminating portion of an exemplary second preferred embodiment for a WCS MS to WCS MS call will be described. As indicated above, the originating MS.sub.O 101 user calls another WCS MS 101 subscriber's DN, the terminating DN.sub.T, and as a result the LDS 104 receives a Q.931 Setup [subaddress IE=DN.sub.O info] 2166 message. The LDS 104 finds that the DN.sub.T is provisioned for AIN Termination Attempt Trigger (TAT). As a result, the LDS 104 suspends the delivery of the call and sends an AIN query message, TCAP (AIN Termination Attempt [DN.sub.T, FDN]) 2176, to the NSP 106 for appropriate routing instruction based on the last known location of MS.sub.T 101. NSP 106 finds that the subscriber's MS 101 (MS.sub.T) associated with DN.sub.T is active and idle in its serving area, associated with VAP.sub.T 103. NSP 106 pages the MS.sub.T 101 through VAP.sub.T 103 with IS-136 established paging procedures, e.g., Page Request [MSID] 2178 and IS-136 Page 2179, and starts TT6 timer. As a part of the Page Request 2178 message, the NSP 106 shall send the Mobile's MSID. MS.sub.T 101 sends an IS-136 Page Response 2180 message followed optionally by IS-136 Serial Number 2181 message. When MS.sub.T 101 responds to the page, VAP.sub.T 103 selects a FDN for the call, and forwards it in a Page Response [FDN] 2182 message to the NSP 106, and starts event timer TT10. Upon reception of Page Response [FDN] 2182, the NSP 106 will cancel TT6 timer and knows that the current VAP.sub.T 103 has the resources to serve the incoming call.
Next, the NSP 106 directs the LDS 104 to forward the call to the FDN (in a TCAP Conversation package) by sending the LDS 104 a TCAP (AIN Forward_Call [FDN], NEL [O_No_Answer]) 2183 message. The NSP 106 indicates its interest in event (O_No_Answer for FDN) by sending next event list (NEL) information to the LDS 104 in a Request component, which accompanies the routing component, in the conversation package. The LDS 104 will start No Answer Timer (T(NoAnswer)) for FDN and send a Q.931 Setup [FDN, Subaddress IE=DN.sub.O ] 2184 message to VAP.sub.T 103. When VAP.sub.T 103 receives the Q.931 Setup [FDN, Subaddress IE=DN.sub.O ] 2184 message, it will cancel the TT5 timer, initiate an IS-136 DTC Designation 2185 message to MS.sub.T 101, start the TT2 timer, and send a Q.931 Call Proceeding 2186 message to the LDS 104. VAP.sub.T 103 will retrieve the calling party information first from Q.931 Calling Party Subaddress IE indicating that this call is from a WCS MS (refer to the Q.931 Setup [FDN, Subaddress IE=DN.sub.O ] 2166 message in the originating call leg signal flow shown in FIG. 21G). If the subaddress is not populated then VAP.sub.T 103 will attempt to retrieve the calling party information from the Q.931 Calling Party IE indicating that this call is from the PSTN 125 or a VAP 103 FDN. If neither fields are populated, the calling party information can not be retrieved and therefore can not be presented to the called party.
Next, the VAP.sub.T 103 sends a DTC Designation 2185 message to the MS.sub.T 101 and the MS.sub.T 101 tunes to the traffic channel, MS on DTC 2187. When VAP.sub.T 103 detects that MS.sub.T is on the traffic channel via DVCC status change, it will initiate the Alerting procedures to both call legs (i.e., the LDS and MS directions). Then VAP.sub.T 103 sends an IS-136 Alert-with-info message to MS.sub.T 101 along with the retrieved calling party caller ID information (if any) for example IS-136 Alert-with-info [DN.sub.O ] 2188 message, and start the Alert timer (TT3). When MS.sub.T 101 receives the Alert-with-info message, it may notify the user with an alert, e.g., via ringing. MS.sub.T 101 then sends an IS-136 Mobile ACK 2189 message to the VAP.sub.T 103. When VAP.sub.T 103 receives the Mobile ACK 2189 from MS.sub.T 101, it will cancel TT3 timer and start TT4 timer, and enters the wait-for-answer call processing state. Subsequently, at steps 2190-2197, the call processing for the Caller ID termination leg for this embodiment is similar or the same as those mentioned for a general call termination in the call processing section above (see, for example, FIGS. 5-7 and their related description).
A third preferred embodiment for the WCS Caller ID feature/function is similar to the second preferred embodiment and uses existing signaling messages to coordinate the caller ID information. This preferred embodiment is dependent on a signaling protocol that permits exchange of user to user data. For example, in addition to the normal call setup procedure described above, the originating VAP.sub.O 103 uses the Q.931 non-call associated signaling procedure to send the calling party information to the destination (termination) VAP.sub.T 103 before the destination VAP.sub.T 103 sends the IS-136 Alert-with-Info message. Thus, in this embodiment it is not necessary to use the Calling Address Subaddress IE field.
The WCS Caller ID feature/function invention may provide caller ID information whether the call is from one MS 101 to another MS 101 associated with the same NSP 106 or different NSPs. In the case of different NSPs, the process must include a means of transferring or sharing of the caller ID information, e.g., DN.sub.O between the various NSPs. Further, the WCS MS 101 caller ID information may also be provided to a call to a PSTN 125 user as long as a means is provided for entering the caller ID information related to the MS 101 DN.sub.O into the signaling between the PSTN 125 and the WCS.
Further, the WCS Caller ID feature/function of the present invention may provide for the calling party to be initially coupled with a voice path to, for example, a voice processing unit (VPU) including voice recognition capabilities, which is located in, for example, the VAP 103. As such, the calling party can provide their name or other information which will be provided to the called party, by for example, display on the MS of the called party. The Caller ID feature/function may also allow display on the MS 101 or audio presentation of additional information about the calling or called party, for example their address, building number, company affiliation, etc. for an incoming or active call. Thus, the WCS of the present invention provides a MS 101 user with the ability to know the identity of the calling persons before answering a call and the desk top telephone number, identity, location, etc. of a calling party or a party they are speaking with on an active call, even in the case when the calling party is calling from a WCS MS.
XIV. Screening Calls
The advent of any time and any place communications provided by the present invention brings with it certain conveniences and certain inconveniences or annoyances. Ideally, the invention should minimize the inconveniences or annoyances. One inconvenience is that anyone, for example a solicitor, can call a mobile station at anytime, for example in the middle of an important meeting. Therefore, there is a need to provide the mobile station user in a WCS the ability to block out incoming calls from particular phone numbers, for example, directory numbers.
The call screening feature/function of the instant invention provides just such a means for screening calls in a Wireless Centrex Services (WCS) System. More specifically, the invention allows a mobile station user to specify a list of phone numbers (call screen list) from which incoming calls can be blocked when received. When any one of the phone numbers in the list is calling the MS 101, based on the MS 101 user's previous instructions the WCS system will block the call and either send the call to a message answering service (e.g., a VMS 107), send the call to intelligent peripheral (IP) device (e.g., a VPU 1235 or a DSP) which will provide a pre-recorded announcement message, or just simply drop the call without providing the calling party any announcement or recourse.
The call screen list of phone numbers can be added to or modified using a number of different methods. In one exemplary embodiment, a MS user enters the phone number manually from the MS 101 by keying in each digit of the phone number to be blocked. The MS 101 user dials a feature activation code, for example, *60#, followed by the phone number that is to receive the call screening treatment, followed by the send button (e.g., *60#5551212). In response, the WCS system adds the phone number (e.g., 5551212) to the Call Screen list and activates the call screen feature for the phone number entered. This confirms the feature activation.
In another exemplary embodiment of the call screen feature/function of the invention, the call screen list can be added to or modified by pressing a particular key on the MS 101 or by entering the feature code without a phone number, after an active call is disconnected (e.g., after an unwanted incoming call is received). In this case, as an example, the user can key in the feature code, e.g., *60#, on the MS 101 and press the send button after a call is hung up. The WCS will retrieve the last active call's related phone number from its database and add it to the call screen list for the MS.
In either of the previous embodiments, a MS user can remove a particular phone number from the Call Screen list or turn off the call screen feature by, for example, pressing a button on the MS 101 or keying into the MS 101 a particular feature code, with or without a phone number to be removed from the Call Screen list. For example, a MS user may key into the MS 100 a Call Screen feature deactivation code, for example *600#, and the phone number and press the send button. As a result an incoming call to that particular phone number will no longer receive call screen treatment. Alternatively, if the MS 101 user enters a Call Screen feature deactivation code, for example *600#, without entering along with it a phone number, all call screen treatment will be deactivated for all phone numbers on the Call Screen list.
In yet another embodiment for the call screen feature/function of the invention, the Call Screen list can be added/modified via the internet (World Wide Web) or by calling the WCS CSC representative. A more detailed discussion of the call screen feature/function of the present invention follows.
Referring to FIG. 22, a signal flow for provisioning (activating) the call screen feature/function will now be discussed using the embodiment wherein the MS 101 user enters a feature code and phone number via the MS 101 to activate call screening to block an incoming call. In general, the signal flow for provisioning the call screen feature may follow the methods discussed previously for feature activation. First, the MS 101 user enters the feature activation code and number on the keypad of an MS 101, such as, *60# CallScreenDN, where CallScreenDN is the desired directory number (i.e., phone number) to be screened out (i.e., the MS 101 user will not know about the call at the time the incoming call occurs). As a result an IS-136 Origination [*60# CallScreenDN] 2201 message is sent from the MS 101 to the VAP 103 over the Reverse Digital Control Channel (RDCCH) wherein the called party number field is set to CallScreenDN. The VAP 104 receives the IS-136 Origination [*60# CallScreenDN] 2201 message and sends an Origination Request [*60# CallScreenDN] 2202 message to the NSP 106 and starts the origination complete timer TO1. The Origination Request [*60# CallScreenDN] 2202 is unique in that the Dialed Digit IE (field) which normally contains a DN the MS 101 user wishes to connect to, now contains the feature code *60# and the incoming DN to be screened, CallScreenDN.
The NSP 106 receives the Origination Request [*60# CallScreenDN] 2202 message, performs an analysis of the dialed digits and determines that it is actually a feature request, i.e., a Call Screen request, rather than a telephone call. Next the NSP 106 proceeds to check against the service profile in the WCSD (stored in, for example, the memory 1240) via the MIN of the MS 101 to determine whether the MS 101 is authorized for the Call Screen feature. If the validation is successful the NSP 106 updates the feature activation table for the particular MIN and sends a call origination not acknowledged message, Origination NACK [Cause, Display] 2203 to the VAP 103 which includes proper text information pertaining to the feature, e.g., Call Screen active and the number of the DN that is programmed to be screened. Alternatively, the information contained in this message could be provided via a short message format such as an SMDPP message (similar to an IS-41 message). Next, the VAP 103 sends an IS-136 Reorder/Intercept [Display] 2204 message to the MS 101. This message contains status information regarding the MS 101 user's request to block a call with the call screen feature/function. For example, the Display information may contain the statement "Call Screen active for CallScreenDN. Similar to the Origination NACK message, the IS-136 Reorder/Intercept message is generated as a result of a telephone call setup is rejected because the numbers dialed by the MS 101 user to activate the call screen were not a recognizable DN for which a telephone call could be established. Thus, the Display field of this message is modified to carry the information to indicate to the MS 101 user the status of their call screen request.
On the other hand, if the NSP 106 determines that the MS 101 is not authorized to use the Call. Screen feature, it will send a message Origination NACK [Cause, Display] 2203 message with proper reject information in the cause (e.g., text) field (Call Screen Not Available) to the MS 101. After receiving the Origination Request message 2203 from the VAP 103 to the NSP 106, an Origination NACK message will be sent to the VAP 103 and the VAP 103 will then cancel the timer TO1, release the MS 101, and clear the origination request record.
As previously indicated, if the MS 101 user does not enter a CallScreenDN at the time of initiating the call screen feature, then the WCS will determine the DN for the last active call to which the MS 101 was a party, and activate a call screen for that particular DN. In the case when the DN is not specified and the last active call was an incoming call, the NSP 106 will use the last incoming Caller ID to activate call screening. If the last caller ID is available, the NSP 106 updates the feature activation table for the particular MIN and sends a n Origination NACK [Cause, CallScreenDN] 2203 message with proper text and the CallScreenDN information to inform the MS that calls from the identified CallScreenDn will be screened. Otherwise, if a Caller ID for the previous active call can not be determined the NSP 106 will notify the VAP and MS 101 that the call screen feature has not been activated.
The call screen feature/function also includes a feature that allows the MS 101 user to determine the disposition of an incoming call which is blocked because the incoming call DN is included in the Call Screen phone number list. The MS 101 user can pre-program the WCS by entering a feature programming code associated with a particular manner for the WCS to handle an incoming call after it is blocked by a call screen designation (i.e., call screen treatment). For example, the MS 101 user can provision the DNs that he would like to screen and the manner in which the call coming from a CallScreenDN may be treated by manually entering particular feature/function codes on the MS 101. The provisioning can also be done through the WCS web site or by calling a Customer Service Center (CSC) representative. Below are illustrations of methods by which the MS 101 user can pre-program the CallScreenDN list by himself/herself using the MS 101. The exemplary provisioning mechanism are as follows.
To provision the Call Screening list, the MS 101 user may dial for example *60#n#DN, where n is a number between 1 and 3 and signifies the call screen treatment, and DN is the CallScreenDN telephone number, then press the "send" button (e.g. *60#1#5551212). The correspondence between three possible call screen treatment codes and the treatment to be executed is provided in the table below.
TABLE 3 Code Treatment description 1 Disconnect the call 2 Forward the call to the specified resource (e.g., VMS) or DN 3 Play voice announcement that "called party unavailable"
Alternatively a desired CallScreenDN can be dynamically added to the list of CallScreenDNs after an unwanted call is received. The MS 101 user can press *60#n and the "send" button during or immediately after an active call is released. In response, the WCS will retrieve the calling party number and add it to the call screen list for the MS 101. If no number is specified to indicate the type of call screen treatment desired (e.g., 1, 2, or 3) while provisioning (e.g., *60##DN) a default will be set, for example, the type 1 call screen treatment will be provided for calls coming from the entered CallScreenDN (DN input with the feature code *60). Further, to remove a particular phone number from the list, the MS 101 user may dial for example *600#DN, where DN is the CallScreenDN telephone number, and press the "send" button. To remove all the entries from the table, the user may press, for example, *600# *.
Thus, the user of MS 101 can enter a feature programming code, for example, *601# with a phone number being screened, CallScreenDN, and press, for example, the send button to program the incoming call to be dropped without any announcement to the calling party. This feature programming code would be stored in the WCSD and be associated with the CallScreenDN to which it relates. The signal flow for this added feature programming would be similar to the signal flow for Call Screen feature activation illustrated in FIG. 22. If the MS 101 completes such Call Screen feature programming by entering *601#, when an incoming call originates from the CallScreenDN phone number, the WCS will drop the blocked call without playing any announcement.
Different feature programming codes, for example, *602#, *603#, etc., could be used to program the WCS to dispose of a call screen blocked call by sending it to a VMS 107 or playing an announcement to the calling party indicating that the call is being blocked, etc. Further, the WCS can be programmed so that any one of these call screen treatments (as well as any other not mentioned herein) is used as the default Call Screen blocked call disposition. A detailed discussion of the signal flow for some of the possible disposition of incoming calls blocked by the Call Screen feature follows.
In accordance with one preferred embodiment of the invention, FIG. 23 illustrates an exemplary call screen treatment wherein an incoming call originating from a CallScreenDN is terminated without any announcement to the calling party. Although, this embodiment shows an incoming call originating from a DN in the PSTN 125, a similar signal flow would occur for a call originating from a DN in a WCS.
When, for example, a PSTN 125 user dials a WCS subscriber's DN from a telephone outside the WCS, the LDS receives an ISUP LAM [DN] 2301 message from the PSTN 125 to alert the LDS 104 of an incoming call originating from a particular DN. The LDS 104 determines that the called DN is provisioned for an advanced intelligent network termination attempt (AIN TAT), suspends the delivery of the call, and sends an AIN query, TCAP (AIN Termination_Attempt [DN]) 2302 message, to the NSP 106 for an appropriate routing instruction for contacting the called DN. When the NSP 106 receives the AIN TAT it checks the MS 101 user's service profile feature settings in the WCSD to determine whether the originating telephone number (calling party DN) is a screened telephone number and if so what, if any, Call Screen treatment has been specified by the MS 101 user. In this case, the MS 101 has activated the Call Screen feature/function for the originating DN and programmed the call screen treatment so that the incoming call should be dropped without playing any announcement to the calling party. Therefore, the NSP 106 then determines that the attempted DN is directed to a MS 101, and that the MS 101 has provisioned the calling party's telephone number as a CallScreenDN with a call screen treatment of dropping the call without an announcement.
In response, the NSP 106 sends a TCAP (AIN Disconnect) 2303 message to the LDS 104. In response the LDS 104 sends the PSTN 125 an ISUP REL 2304 message to release the PSTN 125 without any announcement. Then the LDS 104 sends the TCAP (AIN Close) 2305 message to close the TCAP transaction. Finally, the LDS 104 sends the PSTN 125 a ISUP RLC 2306 message to indicate a release has been completed.
In accordance with a further embodiment of the invention, FIG. 24 illustrates an exemplary call screen call treatment scenario in which an incoming blocked call is sent to a resource, such as an answering service, for example VMS 107. In this case, the signal flow is similar to the case where the call screen treatment is set to drop the incoming call without providing the calling party an announcement. However, in this case the LDS 104 is instructed to forward the call from the CallScreenDN (calling party number that is provisioned to be screened) to a resource (e.g., VMS 107) for a proper announcement directed to the calling party.
Once again when, for example, the PSTN 125 user dials the WCS subscriber's DN, the LDS 104 receives an ISUP IAM [DN] 2301 message from the PSTN 125. The LDS 104 finds that the DN is provisioned for AIN TAT, suspends the delivery of the call, and sends an AIN query message, TCAP (AIN Termination_Attempt [DN]) 2302 to the NSP 106 for an appropriate routing instruction. Then, the NSP 106 checks the WCSD database to determine whether the calling party telephone number (DN) has been designated by the MS 101 user as a screened number and whether the MS 101 user has set a call screen treatment. In this case, the NSP 106 determines that for the called DN (MS 101) the incoming calling party's telephone number is a CallScreenDN and the call treatment requires the call be sent to a resource. So the NSP 106 instruct the LDS 104 that the incoming call is to be sent to a resource, such as the VMS 107 which will allow the calling party to leave a voice message. Thus, the NSP 106 sends a TCAP (AIN SendToResource) 2401 message to the LDS 104. The LDS 104 sends a TCAP (AIN Close) 2402 message to the NSP 106 to close the TCAP transaction. Finally, the LDS 104 and VMS 107 (Intelligent Peripheral) assume the call processing (Call processing by LDS and VMS 2403) enabling the calling party to leave a message for the MS 101 user.
In accordance with another preferred embodiment of the invention, FIG. 25 illustrates a call screen treatment scenario in which a screened call is forwarded to a VAP 103 for playing an announcement to the incoming call indicating, for example, that the call has been screened and will be dropped or that the MS 101 user is not interested in the service or product being offered by the calling party. The NSP 106 designates which VAP 103 within the WCS will provide the announcement to the calling party based on, for example, VAP 103 availability. Therefore, the VAP 103 designated to play the announcement is not necessarily the VAP 103 with which the MS 101 is presently resident.
When, for example, the PSTN 125 user dials the WCS subscriber's DN, the LDS 104 receives an ISUP IAM [DN] 2501 message from the PSTN 125. The LDS 104 recognizes that the called DN is set up for an AIN TAT trigger and sends the NSP 106 an AIN TAT query message, TCAP(AIN Termination_Attempt [DN]) 2502, to get routing information for the incoming call. The NSP 106 checks the WCSD database to determine whether the calling party's telephone number is a CallScreenDN for the MS 101 being called and whether the MS 101 user has set a particular call screen treatment. Assuming that the NSP 106 determines that the calling party's DN is designated as a CallScreenDN for the MS 101 being called and the MS 101 user has set a call screen treatment for playing an announcement to the calling party, the NSP 106 sends a Play Announcement Request [Call Screen, FDN] 2503 message to one of the available VAPs, specifies the type of announcement to be played (i.e., Call Screen: Do not call again!) and starts the TPA1 timer. The message will contain the FDN and the announcement option, Call Screen in this case, along with the MIN, VAP ID, and call reference number (e.g., CR=1). However, if the NSP 106 does not find any VAP 103 to connect to the calling party incoming call or the TPA1 timer expires before receiving the Play Announcement Result 2519 message from the VAP 103, it will send a TCAP (AIN Disconnect) message to the LDS 104 and the incoming call will be disconnected without any announcement.
Next, the NSP 106 sends a TCAP (AIN Forward_Call [FDN]) 2504 message to the LDS 103 directing the LDS 104 to establish a connection between the incoming call from the calling party and the chosen VAP 103 by forwarding the incoming call to the chosen VAP 103. The LDS 104 then performs a call setup between the selected VAP 103 and the incoming call. First, the LDS 104 sends the VAP 103 a Q.931 Setup [FDN] 2505 message. In response the VAP 103 sends a Q.931 Call Proceeding 2506 message, a Q.931 Alerting 2507 message, and a Q.931 Connect 2509 message to the LDS 104. In the meantime, the LDS 104 sends an ISUP ACM 2508 message and an ISUP ANM 2510 message to the PSTN 125. When the incoming call has been properly connected with the selected VAP 103, the LDS sends a Q.931 Connect ACK 2511 acknowledgement message to the VAP 103 and a TCAP (AIN Close) 2512 message to the NSP 106.
Once the incoming call is connected with the VAP 103, the VAP 103 plays the announcement (for example, a default announcement, a user defined announcement using voice synthesis, or a user defined announcement that is a recorded message created by the MS 101 user) at step 2513. The VAP 103 uses, for example, a DSP to provide the announcement or may utilize the VPU 1235 in the NSP 106 to generate the announcement. After the announcement has been played, the VAP 103 initiates a disconnect process with the LDS 104 and the LDS 104 initiates a release process with the PSTN 125, releasing the VAP 103 and PSTN 125 from the active voice traffic channel. This process is initiated by the VAP 103 sending the LDS 104 a Q.931 Disconnect 2514 message instructing the LDS 104 to disconnect the active call between the VAP 103 and the PSTN 125. The LDS 104 releases the active call connection with the VAP 103 by sending a Q.931 Release 2517 message and releases the active call connection with the PSTN 125 by sending a ISUP REL 2516 message. The PSTN 125 notifies the LDS 104 that the call has been disconnected by sending an ISUP RLC Complete 2518 message to the LDS 104. The VAP 103 notifies the LDS 104 that the call has been disconnected by sending a Q.931 Release Complete 2517 message to the LDS 104. Finally, the VAP 103 sends a Play Announcement Result [Success] 2519 message to the NSP 106, indicating that the announcement was played successfully for the incoming call, and cancels timer TPA1. The Play Announcement Result message includes a VAP ID, FDN, Call Reference Number, Result, and Cause fields. As previously indicated, if the TPA1 timer expires before receiving Play Announcement Result 2519 message is received from the VAP 103, it will send a TCAP (AIN Disconnect) message to the LDS 104 if not sent already, and the call will be disconnected without any announcement.
XV. Call Forwarding
A. Unconditional Call Forwarding
A user of the MS 101 may not always have the MS 101 with him or her. It may be useful in such a situation to allow for incoming calls to the MS 101 to be forwarded to another predetermined DN or DNs. This DN to which calls are forwarded is referred to herein as the FwdDN. Various types of call forwarding are available in the WCS 140. For example, calls may be forwarded unconditionally, such that a call to a DN that would otherwise be destined for the MS 101 associated with the DN would be forwarded instead to a predetermined FwdDN. This unconditional call forwarding feature may alert both the MS 101 and the communication device at the FwdDN, or only the communication device at the FwdDN such that the MS 101 is not alerted at all.
To activate this "unconditional call forwarding" feature, the MS 101 user may dial a feature activation code such as *90#[FwdDN], followed by the SEND button on the MS 101. In this example, "*90" indicates the unconditional call forwarding feature. The phrase FwdDN in the brackets "[ ]" represents the intended DN to which a call should be forwarded (the brackets themselves are not actually dialed in this example). To deactivate the unconditional call forwarding feature, the MS 101 user may enter a sequence such as *900 (or other appropriate sequence) followed by the send button.
FIG. 26 is an exemplary flow chart of how the unconditional call forwarding feature may work. A call may be made directed to the MS 101 subscriber's DN (step 2601). A determination is made whether the unconditional call forwarding feature has been activated for the MS 101 (step 2602). If so, then FwdDN is determined (step 2603) and the call is automatically forwarded to FwdDN (step 2604). If the unconditional call forwarding feature has not been activated for the MS 101, then the call is routed to the MS 101 and/or further processing is performed on the call.
An exemplary embodiment of how the above steps for unconditional call forwarding may be performed is now described with reference to FIG. 27. Once the unconditional call forwarding feature has been activated for an MS 101, a PSTN 125 or WCS 140 user may dial the called WCS 140 subscriber's DN. Responsive to the LDS 104 receiving the incoming call for the WCS 140 subscriber at DN (the call is assumed in this example to be initiated from the PSTN 125) (step 2701), a TCAP AIN TAT message may be sent from the LDS 104 to the NSP 106 (step 2703). Upon receipt of the TCAP AIN TAT message, the NSP 106 may check the feature activation table for the MS 101 and may determine that the MS 101 has activated the unconditional call forwarding feature. The NSP 106 may further check the subscriber profile and find that the unconditional call forwarding feature is active for the called MS 101. If the unconditional call forwarding feature is active, the NSP 106 may retrieve the call forwarding number (FwdDN). The NSP 106 may immediately use the FwdDN as the forwarding number and may send a TCAP (AIN Forward_Call) message to the LDS 104 (step 2705). The LDS 104 may then assume the call processing and forward the call to FwdDN (step 2707).
B. Programmable Ring Call Forwarding
Call forwarding may alternatively or additionally be configured to forward a call in response to a selected number of rings occurring at the called MS 101 and/or the passage of a certain amount of time. For example, a call may be forwarded to FwdDN after three seconds have passed (e.g., after three seconds of alerting time at the MS 101). As another example, the call may be forwarded after eight seconds have passed.
To activate this "programmable ring call forwarding" feature, the MS 101 user may dial a feature activation code such as *91*4#[FwdDN], followed by the SEND button on the MS 101. Such a command may indicate that calls should be forwarded to FwdDN after four seconds. In this example, "*91" indicates the programmable ring call forwarding feature, and the "4" after the star sign indicates either the number of seconds or the number of rings after which a call should be forwarded, depending upon how the WCS 140 is configured. This number may be in the range of, e.g., 0 to 30 seconds, or 0 to 10 rings, changeable through the WCS 140 OA&M interface. To deactivate the programmable ring call forwarding feature, the MS 101 user may enter a sequence such as *910 followed by the send button. If no amount of time is specified by the user (e.g., by dialing *91#[FwdDN]) or the amount of time entered is out of range, then a default amount of time, such as four seconds, may be used.
FIG. 32 is an exemplary flow chart of how the programmable ring call forwarding feature may work. Referring to the same call as in FIGS. 26, 28, and 30, and if the call has not yet been forwarded to FwdDN, a determination is made whether the programmable ring call forwarding feature has been activated for the MS 101 (step 3201). If this feature has not been activated, then the MS 101 is alerted to the call (e.g. by ringing the MS 101) and the call routed to the MS 101 upon answering (step 3202) and/or further processing is performed on the call. If the programmable ring call forwarding feature has been activated for the MS 101, then a time-out period is determined (step 3203). The time-out period may either be predetermined by the subscriber or set to a default value. The MS 101 is also alerted to the existence of the call, and a timer for timing the time-out period is started (step 3204). It is determined whether the call has been answered at the MS 101 before the timer has finished (step 3205), and if so, then the call is routed to the MS (step 3206). If the call has not been answered within the allotted time, then FwdDN is determined (3207) and the call is forwarded to FwdDN (step 3208).
An exemplary embodiment of how the above steps for programmable ring call forwarding may be performed is now described with reference to FIG. 33. Once the programmable ring call forwarding feature has been activated for the MS 101, an incoming call to the subscriber's DN is automatically forwarded to the FwdDN after the selected amount of time or number of rings. A PSTN 125 or WCS 140 user may dial the WCS 140 subscriber's DN (i.e., the subscriber who has activated the programmable ring call forwarding feature). The LDS 104 may receive the ISUP IAM message associated with the call (the call is assumed in this example to be initiated from the PSTN 125) (step 3301). In the present embodiment, the LDS 104 may determine that the dialed DN is provisioned for AIN Termination Attempt Trigger (TAT). Responsive to such a determination, the LDS 104 may suspend delivery of the call and may send an AIN query message to the NSP 106 (step 3303) for an appropriate routing instruction.
When the NSP 106 receives the AIN TAT message, the NSP 106 may find that the subscriber's MS 101 is active and idle in its serving area. The NSP 106 may then page the MS 101 through the VAP 103 (steps 3305, 3307) using IS-136 paging procedures, and may also start a TT6 timer 3308. As part of the page request message in step 3305, the NSP 106 may send the MSD that the VAP 103 will use to complete the incoming call setup procedure. When the MS 101 responds to the page (steps 3309, 3311), the VAP 103 may forward the page response in the form of a Page Response message, which includes the Forward Directory Number (FDN), to the NSP 106 (step 3313). The VAP 103 may also start an event timer TT53314 at this time to prevent permanent holding of RF and ISDN B-channel resources.
If the TT6 timer 3308 expires and the NSP 106 has not received the Page Response message in step 3313, the NSP 106 may authorize call termination to the DN. On the other hand, if the NSP 106 receives the Page Response message before the TT6 timer 3308 expires, the NSP 106 may cancel the TT6 timer 3308 and determine that the current VAP 103 has the resources to serve the incoming call. The NSP 106 may also check whether the programmable ring call forwarding feature is active for the particular MS 101. The NSP 106 gets the TFPR value, which signifies the time period for which the MS 101 should ring before the call should be forwarded, from the subscriber profile. At this point, the NSP 106 may direct (using a TCAP Conversation package) the LDS 104 to forward the call to the FDN of the VAP 103 serving the MS 101 (step 3315). The TCAP Conversation package may include the T(NoAnswer) timer value in the TCAP AIN message to indicate the length of the ringing after which the call shall be forwarded. The message may be in the form of TCAP (AIN Forward_Call[FDN], NEL[O_No_Answer], T(NoAnswer)), where T(NoAnswer) is set to be the time after which the call should be forwarded. For example, where the user activated the programmable ring call forwarding feature as *91*5#[FwdDN], then T(NoAnswer) would be set to five seconds.
The LDS 104 may start the T(NoAnswer) timer 3318 for the FDN and send a Q.931 Setup message to the VAP 103 (step 3317). Upon receipt of the Q.931 Setup message, the VAP 103 may cancel the TT5 timer 3314, initiate DTC designation to the MS 101 (step 3319), start a TT2 timer 3320, and send a Q.931 Call Proceeding message to the LDS 104 (step 3321).
At this point, the MS 101 may tune to the traffic channel. When the VAP 103 detects that the MS 101 is on the traffic channel via a DVCC status change (step 3323), the MS 101 may cut through the ISDN/B-Channel and initiate the Alerting procedures to both the call legs (i.e., in both the LDS 104 and MS 101 directions). The VAP 103 may send an IS-136 Alert-With-Info message to the MS 101 (step 3325) and wait for an IS-136 Mobile ACK message from the MS 101 (step 3351). When the VAP 103 receives the Mobile ACK message, the VAP 103 may start a TT4 timer 3326 and send a Q.931 Alerting message to the LDS 104 (step 3327). Upon receipt of the Q.931 Alerting message, the LDS 104 may send an ISUP ACM message to the switch in the PSTN 125 (step 3329) and generate a ring-back tone towards the calling party (step 3331).
When the T(NoAnswer) timer 3318 expires on the LDS 104, the LDS 104 may send an event notification to the NSP 106 (step 3333) in the form of an AIN O_No_Answer trigger. Upon receipt of the AIN O_No_Answer trigger, the NSP 106 may check if the programmable ring call forwarding feature is active for the MS 101. If the feature is active, the NSP 106 may get the call forwarding number from the subscriber profile and direct the LDS 104 to forward the call to the call forwarding number (FwdDN) (step 3335) using a TCAP (AIN Forward_Call[FwdDN]) message. The LDS 104 may then release the ISDN-B channel setup by sending a Q.931 Disconnect message to the VAP 103 (step 3337).
In response to the Q.931 Disconnect Message, the VAP 103 may send a Q.931 Release message to the LDS 104 (step 3339). In response, the LDS 104 may send a Q.931 Release Complete message to the VAP 103 (step 3341). The VAP 103 may release the RF resources by sending an IS-136 Release message to the MS 101 (step 3343), and may send a Termination Result [fail] message to the NSP 106 (step 3345). The MS 101 may send an IS-136 Mobile ACK message to the VAP 103 (step 3347). At this point, call processing may be assumed by the LDS 104 and the call will be forwarded to FwdDN (step 3349).
If the call is answered at the MS 101 before the T(NoAnswer) timer 3318 expires, or if the programmable ring call forwarding feature is not activated for the MS 101, then the call will be processed normally without the call being forwarded (unless another call forwarding feature as described herein is activated for the MS 101).
C. Busy Call Forwarding
Call forwarding may alternatively or additionally be configured to forward a call depending upon whether the subscriber's MS 101 is busy (i.e., currently handling a call). For example, incoming calls to the subscriber's DN may be routed to the subscriber's MS 101 when it is not busy, and forwarded to FwdDN when the MS 101 is busy.
To activate this "busy call forwarding" feature, the MS 101 user may dial a feature activation code such as *93#[FwdDN], followed by the SEND button on the MS 101. In this example, "*93" indicates the busy call forwarding feature. To deactivate the busy call forwarding feature, the MS 101 user may dial, e.g., *930 and then the SEND button.
FIG. 28 is an exemplary flow chart of how the busy call forwarding feature may work. Referring to the same call as in FIG. 26, and if the call has not yet been forwarded to FwdDN, a determination is made whether the busy call forwarding feature has been activated for the MS 101 (step 2801). If so, it is then determined whether the MS 101 is busy (step 2802). If the busy call forwarding feature is active and the MS 101 is busy, then FwdDN is determined (step 2803) and the call is automatically forwarded to FwdDN (step 2804). If the busy call forwarding feature has not been activated for the MS 101 and/or the MS is not busy, then the call is routed to the MS 101 and/or further processing is performed on the call.
An exemplary embodiment of how the above steps for busy call forwarding may be performed is now described with reference to FIG. 29. Once the busy call forwarding feature has been activated for the MS 101, an incoming call will be automatically forwarded to FwdDN if the MS 101 is busy. When the LDS 104 receives an incoming call for the WCS 140 user (DN) (step 2901), the LDS 104 may send a TCAP AIN TAT message to the NSP 106 (step 2903). Upon receipt of the TCAP AIN TAT message, the NSP 106 may check the feature activation table for the MS 101 and determine whether the MS 101 has activated the busy call forwarding feature. The NSP 106 may also determine whether the MS 101 is currently busy. If the MS 101 is currently busy (e.g., busy due to call 2901) and the busy call forwarding feature is activated for the MS 101, the NSP 106 may use the FwdDN as the forwarding number and send a TCAP (AIN Forward_Call) message to the LDS 104 (step 2905). The LDS 104 may then assume call processing and forward the call to FwdDN (step 2907). If the MS 101 is not currently busy, or if the busy call forwarding feature is not activated for the MS 101, then the call will be processed normally without being forwarded (unless another call forwarding feature as described herein is activated for the MS 101).
D. Time-of-Day Call Forwarding
Call forwarding may alternatively or additionally be configured to forward a call depending upon the time of day, day of week, and/or date. For example, a call may be forwarded to FwdDN on weekends but not on weekdays. As another example, incoming calls to a particular subscriber's DN may be forwarded to a first FwdDN between begin time 9:00 a.m. and end time 6:00 p.m., to a second different FwdDN between begin time 6:00 p.m. and end time 8:00 p.m., and not forwarded at all other times (i.e., routed to subscriber's normal MS 101 at all other times).
To activate this "time-of-day call forwarding" feature, the MS 101 user may dial a feature activation code such as *92*[BeginTime]*[EndTime]#[FwdDN], followed by the SEND button on the MS 101. In this example, "*92" indicates the time of day call forwarding feature. "[BeginTime]" indicates the selected begin time, and "[EndTime]" indicates the selected end time. The begin and end times may be entered in any format. For example, the format may be a 24-hour military time format, such that if the chosen begin time is 8:30 a.m., and the chosen end time is 6:00 p.m., then BeginTime would be entered by the subscriber as 0830 and EndTime would be entered as 1800. To deactivate the time-of-day call forwarding feature, the MS 101 user may dial, e.g., *920 and then the SEND button.
FIG. 30 is an exemplary flow chart of how the time-of-day call forwarding feature may work. Referring to the same call as in FIGS. 26 and 28, and if the call has not yet been forwarded to FwdDN, a determination is made whether the time-of-day call forwarding feature has been activated for the MS 101 (step 3001). If so, it is then determined whether the current time is between predetermined begin and end times (step 3002). If the time-of-day call forwarding feature is active and the current time is between the begin and end times, then FwdDN is determined (step 3003) and the call is automatically forwarded to FwdDN (step 3004). If the time-of-day call forwarding feature has not been activated for the MS 101 and/or the current time is not between the begin and end times, then the call is routed to the MS 101 and/or further processing is performed on the call.
An exemplary embodiment of how the above steps for time-of-day call forwarding may be performed is now described with reference to FIG. 31. Once the time-of-day call forwarding feature has been activated for the MS 101, an incoming call to the subscriber's DN is automatically forwarded to FwdDN depending upon the time, data and/or day. When the LDS 104 receives an incoming call for the WCS 140 user (DN) (step 3101), the LDS 104 may send a TCAP AIN TAT message to the NSP 106 (step 3103). Upon receipt of the TCAP AIN TAT message, the NSP 106 may check the feature activation table for the MS 101 and determine that the MS 101 has activated the time-of-day call forwarding feature. The NSP 106 may check a clock (such as the internal clock of the NSP 106) and compare the clock with the user-programmed time period(s). For example, the NSP 106 may check whether the current time as indicated by the clock is between the begin time and the end time of each user-programmed time period.
If the clock is within one of the user-programmed time periods, the NSP 106 may use FwdDN as the forwarding number and send a TCAP (AIN Forward_Call) message to the LDS 104 (step 3105). The LDS 104 may then assume call processing and the call is forwarded to FwdDN (step 3107). If the current time as indicated by the clock is not within one of the user-programmed time periods, or if the time-of-day feature is not activated for the MS 101, then the NSP 106 may treat the incoming call as a normal incoming call, such that the incoming call will not be forwarded (unless another call forwarding feature as described herein is activated for the MS 101).
Any or all of the above-described features may be activated, deactivated, and/or otherwise configured in any combination or subcombination desired for a particular MS 101. For example, call forwarding for a particular MS 101 may be configured so as to unconditionally forward calls on weekends, and to forward calls only after six seconds on weekdays. Such activation, deactivation, and/or other configuration of the features may be controlled by the user via the MS 101, via a telephone call to the service provider (e.g., a customer service representative), via the Internet, and/or via an intranet or other private or public network coupled to the WCS 140. Alternatively, the WCS 140 may be configured such that only one call forwarding feature at a time may be activated for a particular MS 101. In such an embodiment, if a call forwarding feature is activated while an existing call forwarding feature is already activated for the MS 101, the new call forwarding feature may replace the existing call forwarding feature.
FIG. 34 illustrates a display of an exemplary interactive Internet web page 3400 for activating, deactivating, and/or configuring features described herein. The web page 3400 may allow a user to define one or more FwdDNs to which calls should be forwarded depending upon one or more conditions. An advantage to using an Internet web page to activate, deactivate, and/or configure features is that the user may see the entire configuration on one display. This may be important if the user has selected a particularly complex feature configuration. When the Internet is used to configure call forwarding features or other features, a server that runs the web page 3400 may be coupled to the WCS 140.
The web page 3400 shown in FIG. 34 includes one or more forwarded number text boxes 3401 within which a user can enter selected FwdDNs, check boxes 3402 for selecting whether a call should be unconditionally forwarded to a particular FwdDN, text boxes 3403 for selecting how many rings should occur at the MS 101 (and/or how much time to wait) before forwarding a call for a particular FwdDN, check boxes 3404 for selecting whether a call should be forwarded to a particular FwdDN when the MS 101 is busy, and text boxes 3405 for selecting time ranges within which a call should be forwarded to a particular FwdDN. Of course, the web page 3400 may include any type of text box, check box, pull-down menu, scroll box, etc., any of which may be used interchangeably as desired with any of the text boxes and/or check boxes 3401-3405. What is important is that the web page 3400 allows the user to configure the call forwarding features and/or other calling features for his/her MS 101.
For example, as shown in FIG. 34, call forwarding for an MS 101 having a DN 123-123-4567 may be configured on the web page 3400 to unconditionally forward all incoming calls, but only on weekends, to FwdDN 123-456-7890. Call forwarding for the same MS 101 may further be configured to forward incoming calls after three rings at the MS 101, but only on Mondays between 8:00 a.m. and 6:00 p.m., to FwdDN 234-567-8901. Call forwarding for the same MS 101 may further be configured to forward incoming calls after two rings at the MS 101 or when the MS 101 is busy, but only on Oct. 26, 1999, to FwdDN 345-678-9012. Thus, a particular MS 101 may have multiple call forwarding and/or other features simultaneously configured. If there is a conflict in features (e.g., unconditional call forwarding at all times in combination with call forwarding only when busy at all times), then the web page 3400 may indicate to the user that such a conflict exists and that the features should be re-configured accordingly.
XVI. Call Waiting
FIG. 35 provides an exemplary call flow diagram for implementing the call waiting feature according to an illustrative embodiment of the present invention.
For purposes of this discussion, it will be assumed that there exists an active call 3502 between a mobile station MS 101A and a party coupled to the PSTN 125. The call 3502 in progress is referred to by the VAP 103A and the NSP 106 as having a call reference value, CR=1, and a B Channel ID (Ch ID=B1). When a second call originating from within the PSTN 125 is made to a DN of a party in a WCS system, such as a party using MS 101A, an ISUP IAM [DN] message 3504 is received by the LDS 104. The LDS 104 processes the ISUP IAM message 3504 and discovers that the called party's DN is provisioned for AIN call treatment. Then, the LDS 104 sends an AIN query message, TCAP (AIN Termination Attempt [DN]) message 3506, to the NSP 106 for an appropriate routing instruction. Responsive to the AIN query message and knowing that the MS 101A is involved in an active call 3502, the NSP 106 determines if the MS 101A subscribes to the call waiting feature by checking the WCSD (Wireless Centrex System Database) and determines if the call waiting feature is currently available and has been activated by the subscriber.
If the MS 101A does not subscribe to the call waiting feature or the feature is not presently available such as by being deactivated, the NSP 106 sends a TCAP message (not shown) to the LDS 104 with Authorize Term (authorize termination) message to the original DN. The call waiting feature may not be available due to manual or automatic deactivation. According to one embodiment of the invention, the user may manually deactivate the call waiting feature when they do not want to be interrupted by, for example, pressing a special key code on their handset prior to making a call. Also, the call waiting feature may be automatically deactivated in a number of instances, such as: 1) when the MS is already engaged in a conference call; 2) when the MS is already engaged in another call waiting; 3) when the MS has received an automatic callback call with another call on hold; and 4) as predetermined by the subscriber including based on the physical location of the MS, the time of day, or the other party on the original call. When the LDS 104 receives the Authorize Term message, the incoming call may be connected to the DN (desktop phone) or coupled to the VMS 107 for further handling.
If the MS 101A subscribes to the call waiting feature and it is presently available or active, then the NSP 106 sends an AIN Forward Call message in a TCAP conversation package 3508.to the LDS 104. The TCAP conversation package 3508 directs the LDS 104 to forward the call to the FDN (forward directory number). The FDN is the DN in the VAP 103A that is used to deliver the call to the MS 101A. The LDS 104 then sends a Q.931 Setup message 3510 including the FDN, a call reference value (CR=2) and a second B Channel ID (Ch ID=B2) to the VAP 103A and starts a No Answer Timer (T(NoAnswer)). The VAP 103A responds to the Q.931 Setup message 3510 by sending a Q.931 Call Proceeding message 3512.
Next, the VAP 103A sends the NSP 106 a Call Waiting Proceeding message 3520 including the MSID and FDN and starts the TCW1 timer (first call waiting timer). In response, the NSP 106 sends a Play Voice Prompt message 3522 including a call waiting tone to the VAP 103A and starts the TCW2 timer (second call waiting timer). Upon receipt of the Play Voice Prompt message 3522, the VAP 103A cancels the TCW1 timer and generates and plays the call waiting (CW) tone 3524 to the user of MS 101A. The tone may be generated and played at a preset interval for a preset duration, such as every five seconds for one minute.
While the CW tone 3524 is being generated, the VAP 103A sends a Q.931 alerting message 3514 to the LDS 104. The LDS 104 responsive to the Q.931 alerting message 3514 sends an ISUP ACM message 3516 to the switch in PSTN 125. In the meantime, the LDS 104 sends a ring back tone 3518 to the PSTN 125 caller.
The user of MS 101A may choose to answer the incoming call by sending a message to the VAP 103A before T(NoAnswer) expires. According to an illustrative embodiment of the invention, the user can answer the incoming call and place the existing call on hold by pressing the "send" button, which in turn sends an IS-136 Flash with Info message 3526 to the VAP 103A. In response, the VAP 103A sends a Feature Request [Flash with Info] message 3528 to the NSP 106 and starts the TCW3 (third call waiting timer). Also, the VAP 103A sends an IS-136 Flash with Info ACK message 3530 to the MS 101A acknowledging receipt of the Flash with Info message 3526. When the NSP 106 receives the Feature Request [Flash with Info] message 3528, it cancels the TCW2 timer and sends a Feature Request ACK [Hold and Answer Call Waiting] message 3532 to the VAP 103A and starts the TCW4 timer (fourth call waiting timer). Next, the VAP 103A cancels the TCW3 timer and initiates the Q.932 call hold procedure for the existing call (CR=1) by sending a Q.932 Hold [CR=1] message 3534 to the LDS 104. The LDS then responds by sending a Q.932 Hold ACK [CR=1] message 3536 to the VAP 103A to acknowledge that the current call is held, Call Held (CR=1) 3538.
The VAP 103A sends a Q.931 Connect [CR=2] message 3540 to LDS 104 to cause initiate connection of the incoming call (CR=2). The LDS 104 then cancels the T(NoAnswer) timer and sends an ISUP ANM message 3542 to PSTN 125 switch to cut through the voice path 3548. After the LDS 104 sends an ISDN Q.931 Connect ACK message 3544 to the VAP 103A for the incoming call, it sends a TCAP (AIN Close) message 3550 to the NSP 106. Meanwhile, the VAP 103A sends a Hold & Answer Call Waiting Result [success] message 3546 to the NSP 106 indicating that the call waiting process has been successful. Then, the NSP 106 cancels the TCW4 timer and the voice path 3548 is established for the incoming call while the original call (CR=1)is placed on hold. The voice path 3548 has a call reference value of CR=2 and a B Channel ID, Ch ID=B2.
It should be understood that the MS user could proactively handle the second call as described in other portions of this application in conjunction with the call waiting feature. Also, the user may switch back and forth between the second call (CR=2) and the original call (CR=1) in a number of ways. For example, the user may press the "send" button and reinitiate the process described in FIG. 35 beginning with sending IS-136 Flash with Info message 3526 as set forth above.
FIG. 36 provides an illustrative flow diagram for implementation of the call waiting feature according another embodiment to the present invention in which much of the intelligence is distributed to the VAP 103A rather than in the NSP 106.
In step S361, an existing call (CR=1) between a PSTN user and MS 101A is in progress and a new call arrives for the MS 101 A. Next, in step S362, the NSP 106 determines whether the call waiting feature is available for the MS 101A. If the NSP 106 determines that call waiting is not available, then the NSP 106 informs the LDS 104 that the MS 101A is busy in step S363 and a busy signal can be returned to the PSTN user, or another call routing procedure may be implemented such as routing the call for further handling as described elsewhere in the application, such as to the desktop phone associated with the MS 101A or the VMS 107. Alternatively, if the NSP 106 validates that call waiting is available, then, in step S364, the NSP 106 instructs the VAP 103A to initiate the call waiting procedure and the LDS 104 to forward the call to the VAP 103A.
In step S365, it is determined whether the call (CR=2) has been established successfully to the VAP 103A and the MS 101A. If the call has not been established successfully in step S365, then, in step S366, the VAP 103A cancels the call waiting procedure and informs the NSP 106 of the cancellation, which causes the NSP 106 to initiate the call release procedure. If the call has been established successfully, the LDS generates a ringback tone to the calling party and the VAP 103A sends a call waiting signal to the MS 101A and waits for a response thereto in step S367.
The VAP 103A waits a predetermined period of time for a response from the MS 101A user in step S368. If the VAP 103A timer expires in step S368, the VAP 103A informs the NSP 106 to release the call (CR=2) in step S369 similarly to step S366. However, if the MS 101A responds within the time period, the VAP 103A initiates the call hold procedure in which the LDS 104 places the original call (CR=1) on hold and the incoming call (CR=2) is established between the PSTN user and the MS 101A in step S370. Also, in step S360, the VAP 103A informs the NSP 106 of the successful call waiting result. In step S371, the MS 101A user may toggle back and forth between the new call (CR=2) and the original call (CR=1) putting one on hold while communicating in the other.
XVII. Distinctive Ringing
The distinctive ringing feature allows a subscriber to be alerted by a distinctive indication, e.g., a ring, of an incoming call originated from a communications unit assigned a specific directory number (DN). A subscriber can provision one or more DNs that cause a distinctive ring to occur when a communications unit assigned a provisioned DN initiates a call to the subscriber.
There are several ways a subscriber can provision the distinctive ringing DN list. For example, the user may access the Internet or a web-based interface such as a WCS web site and input and update the DN list. Also, the subscriber may contact a customer care center representative by phone and verbally communicate the numbers through any type of communications unit (e.g., cell phone, landline phone, wireless palm top computer phone, etc.). Alternatively, a user may be directed through an automated phone menu to input the numbers by use of a communications unit keypad or voice recognition system.
According to one embodiment, the user may provision the distinctive ringing services through the WCS system. In this regard, the subscriber may activate the feature by entering a feature activation code followed by a DN (e.g., *70#5555151) into the keypad of MS 101A and then pressing the "send" button. Actuation of the "send" button sends the feature activation message to the WCS system (e.g., NSP 106). The WCS system then may acknowledge activation of the feature and phone number by, for example, returning a short message to the MS 101A. In addition, a message indicating that a call origination request has been rejected may contain feature activation/deactivation status information to be displayed to the user.
In a further modification, a subscriber can select a specific distinctive ring for each DN from a plurality of available rings (e.g., 5 ring tones). For example, a subscriber may identify personal calls by one distinctive ring type (e.g., ring type 1), business calls by another distinctive ring type (ring type 2), and a very important call by yet another ring type (ring type 3). Also, the subscriber may define a distinctive ring for all calls originating from parties who have blocked their number pursuant to call blocking. Thus, the subscriber might send the feature activation code followed by the ring type and the DN (e.g., *70#2#5555151) to the WCS system. When the subscriber fails to enter a ring type, a default distinctive ring (e.g., ring type 1) can be assigned to the DN.
To remove a phone number from the DN list, the subscriber, in addition to the methods note above, may enter a feature deactivation code followed by the DN (e.g., *700#DN) and press the "send" button. Also, the subscriber may deactivate the distinctive ringing for all numbers by entering a feature deactivation code (e.g., *700#*) and the "send" button on the MS 101A. A more detailed discussion of feature activation and deactivation is provided at other places in the instant description, for example at section IX.
According to an illustrative embodiment of the invention, the DN list may be stored in a memory in the NSP 106 or a memory location accessible to the NSP 106. The DN list may include any amount of numbers depending on the capacity of the memory employed. In one embodiment, up to thirty numbers may be preset for distinctive ringing. In this embodiment, if a subscriber attempts to provision a thirty-first number, the system may reject the provision or alternatively overwrite the first number provisioned (a first-in-first-out (FIFO) scheme). Also, the size of the phone number in the list can be set according to the capacity of the memory. In an illustrative embodiment, the size of the numbers in the list may range from four to fifteen digits. Also, it should be understood that a DN of a calling party outside or inside the WCS environment may be defined to have a distinctive ring.
FIG. 37 provides an exemplary call flow diagram for implementing the distinctive ringing feature according to an illustrative embodiment of the present invention. While the IS-136 standard is used to illustrate one implementation of the present invention, it should be understood that the present invention is applicable to other cellular or PCS systems.
When a user of the PSTN 125 dials the DN of a WCS subscriber, the LDS 104 receives an ISUP IAM message 3702 from the PSTN 125. If the dialed DN is provisioned for AIN Termination Attempt Trigger (TAT), the LDS 104 suspends the delivery of the call and sends an AIN query message 3704 (i.e., TCAP (AIN Termination_Attempt [DN])) to the NSP 106 for an appropriate routing instruction.
The NSP 106 upon receipt of the AIN query message 3704 determines if the DN of the calling party is a number for which distinctive ringing is desired (i.e., a DR_DN). For example, the NSP compares the DN of the calling party with each DR_DN in the distinctive ringing list for the MS 101A (e.g., in the wireless centrex system database (WCSD) entry for the MIN of MS 101A). If the DN of the calling party matches a DR_DN in the distinctive ringing list, the NSP 106 retrieves the information regarding the distinctive ring from its storage location and specifies in the "signal" portion of a page request message 3706 that a distinctive ring should be provided for the MS 101A. Also, if multiple distinctive ring tones are available, the NSP 106 indicates the specific distinctive ring tone for reception by the MS 101A in the "signal" portion of the page request message 3706. Assuming the subscriber's MS 101A is active in the service area of the NSP 106, the NSP 106 sends the page request message 3706 (i.e., Page Request [MSID, signal]) to the VAP 103A serving MS 101A.
When the NSP sends the page request message 3706 to the VAP 103A, a timer TDRI starts. Responsive to the page request message 3706, the VAP 103A sends an IS-136 Page message 3708 to the MS 101A. If the MS 101A does not respond to the IS-136 page message 3708 before timer TDRI expires, then the call is terminated in another manner by transfer to the VMS, user's desktop phone or otherwise as described herein. Otherwise, the MS 101A responds to the IS-136 page message 3708 via an IS-136 page response message 3710 sent to the VAP 103A. In turn, the VAP 103A sends a page response message 3712 (i.e., Page Response [FDN] to the NSP 106.
After receiving the page response message 3712, the NSP 106 directs LDS 104 to forward the call to the Forward Directory Number (FDN) of the VAP 103A serving the MS 101A in a TCAP conversation package 3714, TCAP (AIN Forward_Call [FDN], NEL [O_No_Answer]). The NSP 106 also indicates its interest in event (O_No_Answer for FDN) by sending next event list NEL [O_No_Answer]) information to the LDS 104 in a request component that accompanies the routing component in the TCAP conversation package 3714. The LDS 104 then starts a No Answer Timer TT10 for the FDN. Also, LDS 104 sends a Q.931 setup [FDN] message 3716 to the VAP 103A.
The VAP 103A then sends an IS-136 digital traffic channel (DTC) designation message 3718 to the MS 101A. Also, VAP 103A sends a Q.931 call proceeding message 3720 to the LDS 104. The MS 101A then tunes to the digital traffic channel and responds to the VAP 103A with MS on DTC message 3722. The VAP 103A detects the MS 101A on the appropriate traffic channel. Next, the VAP 103A alerts MS 101A with an alert-with-info [signal] message 3724. The alert-with-info message 3724 includes the appropriate distinctive ringing tone, if any, for play to the subscriber of the MS 101A. The VAP 103A then sends a Q.931 alerting message 3726 to LDS 104. The MS 101A acknowledges receipt of the alert-with-info message 3724 by sending the VAP 103A an IS-136 mobile acknowledge (Mobile ACK) message 3728. Upon receiving the Q.931 alerting message 3726, the LDS 104 sends an ISUP ACM message 3730 to the switch in PSTN 125. Meanwhile, the LDS 104 sends a ringback tone 3732 to the calling party from the PSTN 125.
When the MS 101A answers (before TT10 expires), it sends an IS-136 connect message 3734 to the VAP 103A. The VAP 103A then sends Q.931 connect message 3736 to the LDS 104 in response to the IS-136 connect message 3734 from MS 101A. The LDS 104 then cancels timer TT10 and sends ISUP ANM message 3738 to the PSTN 125 switch and cuts through the voice path 3746. After the LDS 104 sends a Q.931 connect ACK message 3740 to the VAP 103A, it then sends TCAP (Completed) message 3742 to the NSP 106 to complete the TCAP transaction. Responsive to Q.931 connect ACK message 3740, the VAP 103A sends termination result [Success] message 3744 to the NSP 106 for billing and other OAM&P purposes. At this point, voice path 3746 has been established and the call proceeds between the calling party from the PSTN 125 and the MS 101A subscriber.
XVIII. Returning Calls
Technologies that facilitate wireless communication are emerging at an ever-faster rate. Such technologies are employed in end-user devices such as pagers, communication systems, and mail systems such as voice mail and email systems. In wireless communication systems, a need exists to provide a new service in the wireless environment that is analogous to the call return feature provided on wired telephone handsets. A user may be unable to answer his wireless handset when a call is received. For example, the user may be in a meeting where the call would be perceived as a disruption, may be waiting for another call, may be busy on another call, or may not wish to interrupt whatever he is doing when he receives the incoming call.
In existing wireless handsets, a user may preset his wireless phone to avoid disruption of his activity when the incoming call arrives, but no provision has been made to allow the user to automatically return the call at a later, more convenient time. Thus, a user who is interrupted or busy cannot avoid answering the incoming call without one of: either missing the call entirely or having to manually redial a number saved on the terminal or on a system that indicates the phone number of the caller. Clearly, there is a need for a system, wireless apparatus and method for allowing a user the flexibility of automatically dialing back an incoming call in a wireless communication system.
The present invention provides a system, wireless apparatus and method for allowing a user the flexibility of automatically dialing back an incoming call in a wireless communication system at a time convenient to the user that received the call, a functionality that is analogous to the call return feature provided on wired telephone handsets. For example, a wireless phone may implement the present invention.
In the example below, implementation of the present invention is accomplished using a wireless phone in a Wireless Centrex System 140 (WCS). The WCS 140 provides a private wireless access system that is unconnected to any public macro-cellular system and provides Centrex-type services. FIG. 1B shows a block diagram of an illustrative architecture of a WCS platform wherein the present invention may be utilized. The WCS platform includes a local digital switch 104 (LDS), a remote digital terminal 102 (RDT, e.g., SLC-2000), a network server platform 106 (NSP), voice access ports 103A, 103B (VAP) and a plurality of associated IS-136 digital time division multiple access (TDMA) cellular or personal communications service (PCS) mobile stations 101A, 101B which implement the present invention. The LDS 104 is a TR-08 and GR-303 compatible local digital switch that employs distributed intelligence, process-oriented software, and coordinated autonomous computing elements to provide a flexible, modular, reliable and robust digital switching system. The LDS 104 provides a single platform for advanced services, including Integrated Services Digital Network (ISDN), Centrex, Custom Local Area Signaling Services (CLASS), custom calling, and Advanced Intelligent Network (AIN) capabilities. The LDS 104 also supports X.25 packet switched data communication and circuit switched data, and provides a gateway to local and long distance networks. The switching fabric, administration, message switching, and call switching functions are provided by the LDS 104.
The AIN capabilities of the LDS 104 provide AIN switch software that enables the network provider to create, deploy, and change services to meet user's requests. The AIN software allows the LDS 104 to act as an AIN service switching point to communicate with service control points and intelligent peripherals. For example, the LDS 104 may be a 5ESS manufactured by Lucent Technologies or a DMS-100 manufactured by Nortel. In the WCS configuration illustrated in FIG. 1A, the NSP 106 acts a service control point, directing call processing on the LDS 104.
The RDT 104 is a digital loop carrier terminal that supports the plain old telephone system (POTS), ISDN, high-speed transport, and special services such as private lines and private branch exchange (PBX) services. For example, the RDT 102 may be implemented by a SLC2000 manufactured by Lucent Technologies or an Access Node manufactured by Nortel. The RDT 102 interfaces, typically at a central office, with the LDS 104. The RDT 102 provides the distribution of service interfaces between the LDS 104 and the user's premises, extending the digital access network.
The NSP 106 provides VAP 103A, 103B control, including mobile station and mobility management, call control, and feature applications. VAPs 103A, 103B are micro-cellular base stations or radio ports that support the IS-136 air interface with IS-136 mobile stations such as digital TDMA cellular/PCS (personal communications services) units 101A, 101B. The VAPs 103A, 103B support plug-and-play operations by connecting to the RDT 102 via standard open interfaces such as the ISDN basic rate interface (BRI) lines, typically using 2B+1D signaling protocol as is known in the art.
The IS-136 air interface standard is the EIA/TIA Interim Standard, also known as the North American or U.S. TDMA standard, that addresses digital cellular and PCS systems employing time division multiple access (TDMA). The IS-136 standard was developed to provide very flexible technical, service and investment options for subscribers and operators. IS-136 specifies a DCCH (Digital Control Channel) to support new features controlled by a digital signaling and control channel between a cell site (e.g., radio base station) and terminal equipment (e.g., mobile station). The IS-136 air interface between the VAPs 103A, 103B and the mobile stations 101A, 101B can support voice and messaging applications. The mobile stations 101A, 101B may be, but are not limited to, a terminal or a typical wireless phone having a keypad, display screen, and an alarm generator for generating a ringing or tone sound.
The present invention is implemented in the above system by cellular or personal communications service (PCS) mobile stations 101A, 101B.
FIG. 1B also includes POTS 108 and ISDN 109, which may be utilized as described above. The WCS offers a wireless access system with Centrex to provide voice access and may either supplement existing wired Centrex service with wireless access or provide wireless-only stand-alone telecommunications services. WCS can connect the NSP 106 to a macro-cellular network to support integrated mobility functions including terminal handoff and personal roaming features. The WCS provides location and mobility management for a WCS's subscriber mobile station 101A, 101B inside the WCS service area. Cordless communication may be provided anywhere, anytime in the WCS service area.
FIG. 38 is a signal flow chart showing signaling flow steps for an illustrative embodiment implementing a call return in accordance with the present invention. FIG. 38 shows the call flow when the user just requests to return the last incoming call. To facilitate understanding, the steps are partitioned into two general areas: a and b. Section (a) of FIG. 38 shows how to display the called number to the user. The user dials a predetermined feature access code, e.g., *69, and presses the "send" button. An origination message, and optionally a serial number message, is sent by a mobile station MS 101A, 101B on a R-DCCH to a VAP 103A, 103B in accordance with the IS-136 standard. The VAP receives the origination message and sends an origination request, for example, where the dialed digit is *69, to the NSP (point 1) and starts a first timer TO1. The NSP receives the origination request message, identifies that the message is a feature request and utilizes the ID of the MS 101A, 101B to check whether the MS 101A, 101B is a valid, registered subscriber for the call return feature request. If the MS 101A, 101B is authorized for the call return feature, the NSP retrieves the digits of the last calling party number or directory number for returning the call (CallReturnDN) for the MS 101A, 101B and sends an origination ACK message (point 2.fwdarw.point 3) with the display parameter that includes the CallReturnDN to the VAP and starts the timer TCR1. The. TCR1 timer is set to a predetermined time that permits Q.931 call processing, i.e., if this time was exceeded, the call would be terminated.
The VAP 103A, 103B stops the TO1 timer and sends a Q.931 call setup signal to the LDS 104. The LDS 104 sends an ISUP IAM signal to the PSTN/POTS 108 and may display the number on the MS's screen in accordance with the display function set forth in the IS-136 standard. However, if the VAP 103A, 103B has not received the origination ACK from the NSP 106(point 3) before the expiration of the predetermined time that will allow pre-processing of the feature request, the VAP 103A, 103B will stop the TO1 timer and clear the origination request record.
Next, as shown in (b), the VAP 103A, 103B sends a Q.931 Setup signal to the LDS 104. Then the originating switch, the LDS 104, sends an ISDN User Part Initial Address Message (ISUP IAM) to the destination switch of the public switched telephone network (PSTN/POTS 108) to reserve an idle trunk circuit from the originating switch to the destination switch. Then, the LDS 104 sends a Q.931 Call Proceeding signal to the VAP 103A, 103B. The VAP 103A, 103B sends an IS-136 digital traffic control (DTC) designation to the MS 101A, 101B. After the VAP 103A, 103B receives a DTC signal from the MS 101A, 101B, the destination switch of the PSTN/POTS 108 sends an ISDN user part 5 Address Complete Message (ISDN ACM) to the originating switch, the LDS 104, to indicate that the remote end of the trunk circuit has been reserved. Next, the LDS 104 sends a Q.931 alerting signal to the VAP 103A, 103B. The ringback tone is initiated by the PSTN/POTS 108 over the trunk to the originating switch, the LDS 104. Then the PSTN/POTS 108 sends a ISDN User Part Answer Message (ISUP ANM) to the originating switch, the LDS 104, which then sends a Q.931 connect signal to the VAP 103A, 103B. The VAP 103A, 103B then sends a Q.931 connect acknowledgement signal to the LDS 104 and a signal indicating success via an origination result message to the NSP 106. The NSP 106 stops timer TCR1 ,and a voice path is established.
Clearly the phone number for the incoming call must be known, e.g., not security-protected for the feature of the present invention to function. Thus, when the phone number of the incoming call is unknown or security-protected, the present invention may indicate that the phone number is unable to be displayed by a screen display, providing a voice prompt, providing a predetermined tone, or the like.
ISDN User Part (ISUP) call signaling is utilized in the call pre-processing for implementing the feature of the present invention. ISUP defines the protocol and procedures that are used to set-up, manage, and release trunk circuits carrying data and voice calls over the public switched telephone network, PSTN. ISUP is used for ISDN and non-ISDN calls, but calls that originate and terminate at a same switch do not use ISUP signaling. The ISUP message format includes information carried in the Signaling Information Field (SIF) which contains a routing label, a circuit identification code, and message type field. The ISUP Initial Address Message is sent in a "forward" direction by each switch needed to complete the circuit between the LDS and the destination switch of the PSTN until the circuit connects to the destination switch. The ISUP Address Complete Message is sent in the "backward" direction to indicate that the remote end of the truck circuit has been reserved. The originating switch then connects the MS 101A, 101B to the trunk to complete the voice circuit. The destination switch generates a ringing tone. The MS 101A, 101B user hears the ringing tone on the voice trunk. When the called party answers, the destination switch terminates the ringing tone and sends the ISUP Answer Message to the originating switch. The ISUP message format depends on whether the ANSI standard or the ITU-T standard is being implemented.
FIG. 39 illustrates one embodiment of steps for implementing a method for automatically returning an incoming call in a wireless communication system in accordance with the present invention. The steps include: receiving 3902 the incoming call by a wireless apparatus and automatically saving, where permitted, a phone number for the incoming call; and initiating 3904, upon one of: a predetermined button/buttons being pressed or a predetermined verbal call return command being issued, automatic dialing of the phone number for the incoming call by the wireless apparatus. Where desired, the method may further include, between the steps of receiving the incoming call and initiating dialing the phone number for the incoming call, automatically displaying 3906 the phone number of the incoming call on a display. Also, where selected, where the phone number for the incoming call is unknown or security-protected, the method may include indicating 3908 that the phone number for the incoming call is unable to be displayed. Indicating that the phone number for the incoming call is unknown or unavailable, for example, due to security protection, may be implemented by any known method such as, for example, using a display, a voice prompt, or a predetermined tone. Where, after the step of receiving the incoming call, at least one more incoming call is received, the method may include automatically saving 3910 a phone number for each incoming call. Where selected, the method may also implement a step of automatically displaying 3912 the phone number of a most recent incoming call, and/or allowing the user, at his convenience, to display the phone number of a most recent incoming call by manually pressing a predetermined button or buttons 3914 or using a verbal command, thus conserving power expenditure for the display. Where selected, before initiating dialing the phone number of the most recently received call, the user may dispose 3916 of a first displayed phone number by moving at least one first displayed phone number to an end of a list of phone numbers of incoming calls received and/or may also transpose the first displayed phone number with a next phone number of the incoming calls received. Each of these two steps may be repeated as many times as desired.
As shown in FIG. 40, a wireless apparatus 4010 may be utilized for implementing the method of the present invention in a wireless communication system. Typically, the wireless apparatus 4010 is a wireless phone or another handheld wireless communications device such as, for example, a wireless digital assistant. The wireless apparatus includes a memory 4002, for automatically saving, where permitted, a phone number for the incoming call received; and a wireless call return processor 4004, coupled to the memory, for initiating, upon one of: a predetermined button/buttons 4006 being pressed or a predetermined verbal call return command being issued, automatic dialing of the phone number for the incoming call using the wireless apparatus. Where selected, the memory may store other predetermined information. For example, a user profile may be downloaded to the memory to permit authentication of the MS 101A, 101B at the VAP. Also, where a listing of usage or billing record is downloaded from the NSP for updating at the billing office, to avoid error, the billing record may be marked as "in use" by the NSP until the updated billing record has been sent to the NSP. Alternatively, the time for the current usage may be accumulated in the memory for a predetermined period and then forwarded to the NSP for incorporation into the user's billing record. The wireless apparatus may further include a display 4008, coupled to the memory and the wireless call return processor, for automatically displaying, where permitted, the phone number of the incoming call on a display when the incoming call is received. The display 4008 operates as described above.
As shown in FIG. 38, a wireless communication system may include a wireless apparatus for automatically returning an incoming call. The wireless communication system includes a switched communications network (for example, the PSTN 108), a NSP 106, a LDS 104, a VAP 103A, 103B, and at least one MS 101A, 101B. Each of the elements is arranged to communicate as described above.
Alternatively, as shown in FIG. 41, the method of the present invention may be described as utilizing the steps of: configuring 4102 a wireless communication system to automatically return a previously received call; and returning 4104, automatically, the previously received call. The configuration of the wireless communication system and the automatic return of the previously received call are accomplished as described for FIG. 38.
FIG. 42 is a block diagram of one embodiment of a wireless communication platform for providing automatic wireless call return in accordance with the present invention. The platform includes: at least one mobile station 4202 and a micro-cellular base station controller 4204. A micro-cellular base station means a base station in which components have been miniaturized to a degree such that the base station is mountable on a pole, shelf, or a wall. The micro-cellular base station controller 4204 is arranged to communicate wirelessly with the at least one mobile station 4202 and to receive an incoming call directed to the at least one mobile station, for, when the at least one mobile station 4202 is processing another call, automatically returning the incoming call in accordance with a predetermined scheme to provide automatic call return for the at least one mobile station. The predetermined scheme is the method described above. Where selected, the platform may further include a switching and database processor 4206 and a memory 4208. The switching and database processor 4206 is coupled to the micro-cellular base station controller 4204 and a memory 4208 and is used for switching the incoming call according to the predetermined scheme to provide an automatic call return for the at least one mobile station, upon one of: a predetermined button/buttons being pressed or a predetermined verbal call return command being issued, by automatically dialing a phone number for the incoming call, wherein the phone number is stored in a database of the memory 4208. The memory 4208 is coupled to the micro-cellular base station controller 4204 and the switching and database processor 4206. Typically, the memory 4208 has a database stored thereon and is used for storing at least the phone number of the incoming call. Where desired, the memory 4208 may further store further information such as authentication information for the at least one mobile station or billing information for the at least one mobile station.
Although the present invention has been described in relation to particular preferred embodiments thereof, many variations, equivalents, modifications and other uses will become apparent to those skilled in the art. It is preferred, therefore, that the present invention be limited not by the specific disclosure herein, but only by the appended claims.
XIX. Automatic Callback
Technologies that facilitate wireless communication are emerging at an ever-faster rate. Such technologies are employed in end-user devices such as pagers, communication systems, and mail systems such as voice mail and email systems. In wireless communication systems, a need exists to provide a new service in the wireless environment for automatically calling back a phone number which is unavailable when the wireless user initiates a first call. A phone may be busy when the wireless user first calls, and busy again when the wireless user redials the number. It is clear that the wireless user's efficiency would be increased if the wireless user may be freed from having to redial the same busy number repeatedly in order to complete a call.
Present wireless handsets do not provide for automatic callback to free the user from having to redial, perhaps repeatedly, a number in order to complete a call. Clearly, there is a need for a system, wireless apparatus and method for providing automatic callback for a user in a wireless communication system when a called number is unavailable.
The present invention provides a system, wireless apparatus and method that provide an automatic callback functionality for wireless communication systems. The invention enables a wireless user to choose from a variety of modes for completing a call when the dialed number is busy. Rather than simply redialing the phone number an indeterminate number of times until the connection is made on his wireless device, the caller may press a button or give a verbal command to initiate an automatic callback feature.
An example is set forth below for implementing the present invention in a Wireless Centrex System (WCS). The WCS mobile station MS is not required to redial the same number repeatedly when he receives a busy signal. The dialing and checking procedure is performed by the WCS network, thus freeing the wireless user to perform other tasks. Typically, upon the called number becoming available, the WCS system informs the MS using a distinctive ringing and/or tone or a Short Message Service (SMS) message. Where the called number is available, but the MS already has an active call, the WCS system generates a voice prompt or special tone on the active call to notify the MS that the callback call is available. The MS may proceed as described below.
In one embodiment, the wireless user may activate the automatic callback feature by pressing a feature code, e.g., such as *66, and pressing "send" when a busy signal is received. Alternatively, after receiving the busy signal, the user can disconnect the call and then activate the callback feature. The WCS system sends a feature activation confirmation message to the MS, disconnecting the MS. A default timer is set to a predetermined time that determines the length of time that the feature is activated. Typically, the default is set to 30 minutes. The WCS system will automatically redial the number continuously (e.g., every 30 seconds) until a connection is made and notify the MS that the call is connected. If the redetermined default timer has expired (e.g., 30 minutes), then the WCS deactivates the feature and notifies the MS that the feature is deactivated. There may also be other scenarios wherein the WCS system will automatically be deactivated (e.g., when the mobile powers down). Where the dialed number remains busy after the predetermined time set on the default timer, the WCS system cancels the feature and sends a message to the MS notifying the wireless user that the call was unable to be completed.
Where desired, the wireless user may enter a predetermined deactivation code, e.g., *660, and push "send" to deactivate the feature.
In the example below, implementation of the present invention is accomplished using a wireless phone in a Wireless Centrex System 140(WCS). The WCS 140 provides a private wireless access system that is unconnected to any public macro-cellular system and provides Centrex services. FIG. 1B shows a block diagram of an illustrative architecture of a WCS platform wherein the present invention may be utilized. The WCS platform includes a local digital switch 104 (LDS), a remote digital terminal 102 (RDT, e.g., Lucent Technologies SLC-2000), a network server platform 106 (NSP), voice access ports 103A, 103B (VAP) and a plurality of associated IS-136 digital time division multiple access (TDMA) cellular or personal communications service (PCS) mobile stations 101A, 101B which implement the present invention. The LDS 104 is a TR-08 and GR-303 compatible local digital switch that employs distributed intelligence, process-oriented software, and coordinated autonomous computing elements to provide a flexible, modular, reliable and robust digital switching system. The LDS 104 provides a single platform for advanced services, including Integrated Services Digital Network (ISDN), Centrex, Custom Local Area Signaling Services (CLASS), custom calling, and Advanced Intelligent Network (AIN) capabilities. The LDS 104 also supports X.25 packet switched data communication and circuit switched data, and provides a gateway to local and long distance networks. The switching fabric, administration, message switching, and call switching functions are provided by the LDS 104.
The AIN capabilities of the LDS 104 provide AIN switch software that enables the network provider to create, deploy, and change services to meet user's requests. The AIN software allows the LDS 104 to act as an AIN service switching point to communicate with service control points and intelligent peripherals. For example, the LDS 104 may be a SESS manufactured by Lucent Technologies or a DMS-100 manufactured by Nortel. In the WCS configuration illustrated in FIG. 1A, the NSP 106 acts a service control point, directing call processing on the LDS 104.
The NSP 106 provides VAP 103A, 103B control, including mobile station and mobility management, call control, and feature applications. VAPs 103A, 103B are micro-cellular base stations or radio ports that support the IS-136 air interface with IS-136 mobile stations such as digital TDMA cellular/PCS (personal communications services) units 103A, 103B. The VAPs 103A, 103B support plug-and-play operations by connecting to the RDT 102 via standard open interfaces such as the ISDN basic rate interface (BRI) lines, typically using 2B+D signaling protocol as is known in the art.
The IS-136 air interface standard is the EIA/TIA Interim Standard, also known as the North American or U.S. TDMA standard, that addresses digital cellular and PCS systems employing time division multiple access (TDMA). The IS-136 standard was developed to provide very flexible technical, service and investment options for subscribers and operators. IS-136 specifies a DCCH (Digital Control Channel) to support new features controlled by a signaling and control channel between a cell site (e.g., radio base station) and terminal equipment (e.g., mobile station). The IS-136 air interface between the VAPs 103A, 103B and the mobile stations 110 can support voice and messaging applications. The mobile stations 101A, 101B may be, but are not limited to, a terminal or a typical wireless phone having a keypad, display screen, and an alarm generator for generating a ringing or tone sound and translation between text and speech.
The automatic callback functionality of the present invention is implemented in the above system by cellular or personal communications service (PCS) mobile stations 101A, 101B.
FIG. 1B also includes POTS 108 and ISDN 109 interfaces for connecting analog and ISDN phones, respectively. The WCS offers a wireless access system with Centrex to provide voice access and may either supplement existing wired Centrex service with wireless access or provide wireless-only stand-alone telecommunications services. WCS can connect the NSP 106 to a macro-cellular network to support integrated mobility functions including terminal handoff and personal roaming features. The WCS provides location and mobility management for a WCS's subscriber mobile station 101A, 101B inside the WCS service area. Cordless communication may be provided anywhere, anytime in the WCS service area.
Though not shown in FIG. 43, the WCS system determines whether the user may validly request the automatic callback feature functionality. Upon receiving the origination request message, the NSP 106 analyzes the dialed digits and identifies that the automatic callback feature has been requested. The NSP 106 also checks the Wireless Centrex System Directory (WCSD) via the Mobile Identification Number (MIN) to determine if the MS 101 is authorized for the automatic callback feature requested. If the validation is successful, the NSP 106 uses the MSID to last dialed DN mapping to retrieve the DN that was dialed by the MS 101 previously, sends an origination NACK with the last dialed DN message to the VAP 103.
The VAP 103 sends an IS-136 Reorder/Intercept message to the MS 101 informing the user that the automatic callback feature is activated for the last dialed DN. If the validation is not successful or the last dialed DN is not known, the NSP 106 sends an originating NACK message with reject information to the MS 101. The VAP 103 sends an IS-136 Reorder/Intercept message to the MS 101 informing the user that the automatic callback feature was not activated. Feature Activation/Deactivation is described more fully in Section IX herein.
FIG. 43 shows a preferred embodiment for signaling flow in accordance with the automatic callback functionality of the present invention. As shown in (a), the NSP 106 sets the feature activation timer for a predetermined length of time (e.g., 30 minutes) when the feature is activated. The NSP will continuously initiate calling the Last Dialed DN for every predetermined time (e.g., 30 seconds) by sending a StartAutoCallBack message including the Mobile Station IDentification code (MSID) and the Last Dialed Directory Number (LastDialedDN) to the VAP 103 and starts the TAC1 timer. The VAP 103 initiates the call origination process by sending a Q.931 setup message to the LDS 104 utilizing the LastDialedDN.
As described below, ISDN User Part (ISUP) call signaling is utilized in the call pre-processing for implementing the feature of the present invention. ISUP defines the protocol and procedures that are used to set-up, manage, and release trunk circuits carrying data and voice calls over the public switched telephone network, PSTN. ISUP is used for ISDN and non-ISDN calls, but calls that originate and terminate at a same switch do not use ISUP signaling. The ISUP message format includes information carried in the Signaling Information Field (SIF) which contains a routing label, a circuit identification code, and message type field. The ISUP Initial Address Message is sent in a "forward" direction by each switch needed to complete the circuit between the LDS and the destination switch of the PSTN until the circuit connects to the destination switch. The ISUP Address Complete Message is sent in the "backward" direction to indicate that the remote end of the trunk circuit has been reserved. The originating switch then connects the MS to the trunk to complete the voice circuit. The destination switch generates a ringing tone. The MS user hears the ringing tone on the voice trunk. When the called party answers, the destination switch terminates the ringing tone and sends the ISUP Answer Message to the originating switch. The ISUP message format depends on whether the ANSI standard or the ITU-T standard is being implemented.
Thus, as shown in FIG. 43, portion (a), upon initiation of the automatic callback feature, the originating switch, the LDS 104, sends an ISDN User Part Initial Address Message (ISUP IAM) to the destination switch of the public switched telephone network (PSTN) 125 to reserve an idle trunk circuit from the originating switch to the destination switch. Then, the LDS 104 sends a Q.931 call proceeding signal to the VAP 103. The destination switch of the PSTN 125 then sends an ISDN user part Address Complete Message (ISDN ACM) to the originating switch, the LDS 104, to indicate that the remote end of the trunk circuit has been reserved. Next, the LDS 104 sends a Q.931 alerting signal to the VAP 103, and the VAP 103 sends a StartAutoCallback Proceeding message to the NSP 106 to notify the NSP 106 that an alerting message have been received from the LDS 104 indicating that the dialed DN is now alerted and waiting for an answer. If the destination user is still busy when the call is attempted, the destination switch 125 returns an ISUP REL (release) message to LDS 104, indicating that the called user is busy. The LDS 104 initiates Q931 call clearing to the VAP. The VAP notifies the NSP of the failure. The NSP resets its timer and waits for a predetermined time (e.g., 30 seconds) before initiating the callback procedure again.
Continuing the description of FIG. 43, in portion (b), upon receiving the StartAutoCallBack Proceeding message from the VAP 103, the NSP 106 cancels timer TAC1 and sends a Page Request message (MSID, Signal) to the VAP 103. The VAP will then send an IS-136 Page to the MS 101. The MS 101 sends an IS-136 Page Response to the VAP 103. Then, the VAP 103 sends the page response to the NSP 106. The NSP 106 sets timer TAC2 to wait for completion of the call. The VAP 103 also sends an IS-136 Digital Traffic Channel (DTC) designation to the MS 101. The MS 101 then tunes to the designated DTC. The VAP 103 sends an IS-136 Alert with information (Signal) to the MS 101. Note the signal can be a special tone indicating to the MS user that the call is their automatic callback call. The MS 101 sends an IS-136 Mobile ACK, then an IS-136 Connect signal, to the VAP 101. The ringback tone is initiated by the PSTN 125 over the trunk to the MS 101. Then the PSTN 125 sends a ISDN User Part Answer Message (ISUP ANM) to the originating switch, the LDS 104, which then sends a Q.931 connect signal to the VAP 103. The VAP 103 then sends a Q.931 connect acknowledgement signal to the LDS 104 and a signal indicating success via an origination result message (Auto Callback Result (Successful)) to the NSP 106. The NSP 106 stops timer TAC2, and a voice path is established.
A predetermined time is set on timer TAC1 and timer TAC2 such that Q.931 and IS-136 call processing may take place. If the predetermined time is exceeded, the NSP 106 will initiate procedures to clear the call. Where the predetermined time set on the timer TAC1 or TAC2 has expired, or the StartCallBack Result signal indicates failure, the NSP 106 sends a Cancel AutoCallBack message to the VAP 103 and deactivates the automatic callback feature for the MS 101. In addition, the NSP 106 can send a short message to the MS 101 to indicate that the automatic callback feature has been cancelled or the time for the automatic callback has expired. Where desired, the MS 101 may re-request that the automatic callback feature be activated either by redialing the feature code or by a voice command.
FIG. 44 is a signal flow chart showing a preferred embodiment of signaling flow when the MS moves from an original serving VAP.sub.O to a new VAPn before a call is connected. The MS 101 activates the Automatic Callback feature and moves from the original VAPo 103A to another VAPn 103B. The VAPn 103B sends a Handoff Result message to the NSP 106 to indicate that handoff has occurred. The NSP 106 sends Cancel AutoCallBack message containing the MSID and the LastDialedDN to the VAPo 103A and starts a TACBC1 timer. If the VAPo has already initiated a Q.931 call setup process to Last Dialed DN, then the VAPo initiates a Q.931 call release procedure to clear the call attempt. The VAPo 103A sends a Cancel AutoCallBack Ack message to the NSP 106. The NSP 106 stops the TACBC1 timer and assumes Automatic Callback procedures and signaling exchange with VAPn. If the NSP 106 timer TACBC1 expires before receiving the Cancel AutoCallBack Result message from the VAPo or the cause for cancellation is not indicated as successful, the NSP 106 continues the new Automatic Callback feature with the VAPn 103B.
The WCS may be configured to offer service within a local access environment. While the IS-136 standard is used to illustrate the best mode for carrying out the invention, the invention is not limited to use in the IS-136 standard. The invention is also applicable to other cellular and/or PCS systems.
FIG. 45 is a flow chart showing one embodiment of steps of a method in accordance with a preferred embodiment of the present invention. The method provides for, where a number called by a wireless user is busy, automatically redialing the call in a wireless communication system, and includes the steps of: A) placing 4502 an outgoing call by a wireless apparatus and automatically saving, where permitted, a called phone number for the outgoing call; and B) initiating 4504, upon one of: a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, automatic redialing of the phone number for the outgoing call by the wireless apparatus. Where desired, the method may further include, upon being connected after redialing, automatically displaying 4506 the phone number for the outgoing call on a display.
Where selected, the method may further include, after placing a plurality of outgoing calls and saving the called phone numbers, where the called phone numbers are displayed, disposing 4508 of a first displayed phone number. A displayed phone number may be disposed of by one of: moving 4510 at least a first displayed phone number to an end of a list of phone numbers of outgoing calls or transposing 4512 the first displayed phone number with a next phone number of the outgoing calls.
Where an automatic callback call is received 4514, the method may include one of: pressing a button/giving a verbal command 4516 to speak immediately with the individual returning the call; pushing a button/giving a verbal command 4518 to place a call in progress on hold and speak immediately with the individual returning the call; and pushing a button/giving a verbal command 4520 to implement a functionality of placing the incoming call on hold and playing a prerecorded message that explains that the call is being put on hold for a short period of time. The callback call may be terminated when the wireless user does not answer within a predetermined time.
FIG. 46 is a block diagram of a preferred embodiment of a wireless apparatus that may be utilized for implementing the method of the present invention in a wireless communication system. The wireless apparatus 4610 may include: a memory 4602, for automatically saving a phone number that was busy when called and, if selected, phone numbers of incoming calls; and a wireless automatic callback processor 4604, coupled to the memory, for initiating a wireless callback communication, upon one of: a predetermined button/buttons 4606 being pressed or a predetermined verbal callback command being issued, by automatically redialing the phone number for the call. The wireless apparatus may also include a display 4608, coupled to the memory 4602 and the wireless automatic callback processor 4604, for automatically displaying the phone number of the redialed call, and/or a phone number of an incoming call, where permitted, on a display when the incoming call is received. Where the phone number for the incoming call is one of: unknown or security-protected, the display may indicate that the phone number for the incoming call is unable to be displayed. Alternatively, a voice prompt or predetermined tone may indicate that the phone number for the incoming call is unable to be displayed.
Where selected, the memory may automatically save a phone number, where permitted, for a plurality of incoming calls and the display may provide for automatic display, where permitted, of a phone number of a most recent incoming call. Alternatively, the wireless automatic callback processor may dispose of a first displayed phone number by moving at least one first displayed phone number to an end of a list of phone numbers of incoming calls received or transposing the first displayed phone number with a next phone number of the incoming calls received. The two preceding procedures may be repeated as desired.
Typically, the wireless apparatus is a wireless phone or another handheld wireless communications device such as, for example, a personal digital assistant.
A wireless communication system may include a wireless apparatus described above for automatically redialing a call where a phone number for the call is busy when the wireless user places the call. The system may operate as described above or in an equivalent fashion. For example, the system may include: a switched communications network, coupled to at least a first remote digital terminal RDT 102; at least a first network server platform NSP 106, coupled to at least a first local digital switch LDS 104; the at least first LDS 104, coupled to the at least first RDT 102 and the at least first NSP 106, and, where selected, to a voice message system VMS 107; the at least first RDT 102, coupled to the at least first LDS 104, at least a first voice access port VAP 103A, 103B; the at least first VAP 103A, 103B, coupled to the at least first RDT 102 and arranged to communicate with at least a first mobile station MS 101A, 101B; the at least first mobile station MS 101A, 101B, arranged to communicate with the at least first VAP 103A, 103B, wherein the at least first MS 101A, 101B includes the wireless apparatus for automatically redialing the number, and wherein the switched communications network, the at least first NSP 106, the at least first LDS 104, the at least first RDT 102, the at least first VAP 103A, 103B and the at least first MS 101A, 101B utilize a predetermined scheme to provide automatic callback for the wireless apparatus.
FIGS. 47A-47C represent a flow chart showing another embodiment of steps for implementing the automatic callback feature of the present invention wherein the intelligence of the automatic callback feature is in the VAP rather than in the NSP as previously shown in FIG. 43. FIG. 43 illustrates network centric intelligence (i.e., NSP) whereas FIGS. 47A-47C illustrate a distributed intelligence embodiment. FIG. 47A illustrates steps during call establishment/activation; FIG. 47B illustrates steps for the NSP procedure. FIG. 47C illustrates steps for the VAP procedure. The automatic callback (ACB) feature frees the user from re-dialing the same busy number repeatedly. The wireless user is typically alerted by a special ringing tone when the called party becomes available when the NSP 106 stores 4702 a last dialed digit for an automatic callback subscriber, the NSP 106 determines 4704 whether the automatic callback feature can be activated by the wireless user. When the automatic callback feature cannot be activated and validated, the NSP 106 rejects 4706 the automatic callback request and informs the user. Where the automatic callback feature can be activated and validated, the NSP 106 does so and starts a timer (in one embodiment the timer is set for 30 minutes) and informs the VAP 103A, 103B to start the automatic callback process. Then, the VAP 103A, 103B start 4710 the automatic callback process, and the NSP 106 starts 4712 the automatic callback process. While the VAP 103A, 103B is processing the automatic callback procedure, the following can occur: 1. The MS moves to another VAP (either via handoff or location registration), and the NSP informs the former VAP to cancel the automatic callback and the new VAP to start automatic callback. 2. The MS powers down, and power down registration is sent to the NSP. The NSP cancels the automatic callback for the VAP and for itself. 3. The MS becomes busy while the VAP is completing the call to the MS and the wireless user does not answer the call. The VAP releases the call, cancels the automatic callback and informs the NSP. The NSP determines that the procedure failed because the MS is busy and informs the VAP to restart the automatic callback procedure.
The above scenarios are valid only during the time period when the NSP has instructed the serving VAP to initiate the automatic callback procedure and the VAP fails when it attempts to page the MS.
There are typically two controlling timers. Clearly, more timers may be utilized, and various times for the timers may be predetermined by the user. In the embodiment shown, a 30 minute (T1) timer is used in the NSP and a 30 second (T2) timer is used on the VAP side. FIG. 47B illustrates steps for one embodiment implementing the NSP 4712 procedure. T1 is the master timer. The NSP determines 4718 whether T1 has expired. When the master timer has expired 4720, the NSP informs the VAP to cancel the ACB and cancels ACB on the NSP side. Where T1 has not expired, the NSP determines 4722 whether it has received a result message (msg) from the VAP. Where no result message has been received, the NSP returns to checking whether T1 has expired 4718. Where a result message has been received, the NSP determines 4724 whether the cause for receiving the result message is a successful call. Where the automatic callback has been successful, the NSP cancels the timer (TI) 4726. Where the automatic callback has been unsuccessful, the NSP informs 4728 the serving VAP to start the automatic callback procedure.
FIG. 47C illustrates one embodiment of steps for the VAP 4710 procedure. T2 on the VAP side will only control the call establishment time for the VAP. The VAP will try every 30 seconds to establish a call with the remote user until the call is successfully connected or the procedure is cancelled. Typically, for example, the VAP may notify the NSP that the VAP plans to utilize the B channel for call establishment by sending a BchnlStatus message. The VAP will start T2 (the 30 second timer) 4732. The VAP determines 4734 whether 30 seconds has expired. If 30 seconds has not yet expired, the VAP continues to check whether the 30 seconds has expired 4734. If the 30 seconds has expired, the VAP determines whether the NSP has notified the VAP to stop/cancel 4736 the automatic callback procedure. If the NSP has notified the VAP to stop or cancel the automatic callback procedure, the VAP cancels/stops 4738 the automatic callback procedure. If the NSP has not notified the VAP to stop or cancel the automatic callback procedure, the VAP determines 4740 whether there are resources available to complete the call. If resources are not available, the VAP returns to the step of starting T24732. If resources are available, the VAP initiates 4742 the call to the destination user. In the diagram and similarly for FIGS. 47A and 47B, a circle 4744 simply serves to show the connection between the top portion of FIG. 47C with the bottom portion of FIG. 47C. The call setup procedure will indicate to the VAP whether the PSTN user is still busy. If the PSTN user is still busy, the VAP releases 4748 the call, which in this example, releases the B channel and the VAP resets the T2 timer 4732. If the PSTN user is no longer busy, the VAP pages 4750 the MS. Then, the VAP determines 4752 whether the MS has responded. If the MS has not responded, the VAP releases the call, sends notification to the NSP and cancels 4764 the automatic callback procedure. If the MS has responded, the VAP connects 4754 the call to the MS. Then, the VAP determines 4756 whether the call is connected. If the call is connected, the VAP cancels 4762 the automatic callback procedure and informs the NSP. If the call is not connected, the VAP releases 4758 the call, which in this example, releases 4760 the B channel and the VAP resets the T2 timer 4732.
Thus, when the T2 timer expires, the VAP first checks whether the MS is idle and then retries to establish the call. If the remote user is busy, VAP will reset the timer. If the remote user is idle VAP will attempt to terminate the call to the MS. If the VAP fails to establish a call with the MS (i.e., the MS is busy, powered down, moved out of coverage area) VAP will immediately cancel ACB on the VAP and inform NSP. The NSP then determines the status of the ACB procedure (explained in detail above).
FIG. 48 is a flow chart showing another embodiment of steps in accordance with the method of the present invention. The method includes the steps of: configuring 4802 a wireless communication system to automatically redial a phone number of a call when the phone number called by a wireless user is busy; and redialing 4804, automatically, the phone number when the phone number called by the wireless user is busy.
FIG. 49 is a block diagram of one embodiment of a wireless communication platform for providing wireless automatic callback in accordance with the present invention. The wireless communication platform includes at least one mobile station 4902 and a micro-cellular base station controller 4904 for wireless automatic callback that is arranged to communicate wirelessly with the at least one mobile station. When a number called by the at least one mobile station 4902 is busy, the micro-cellular base station controller 4904 for wireless automatic callback automatically redials the number to provide automatic callback for the at least one mobile station. The wireless communication platform may further include a switching and database automatic callback processor 4906 for wireless automatic callback that is coupled to the micro-cellular base station controller 4904 for wireless automatic callback and a memory 4908. The switching and database automatic callback processor 4906 provides processing for wireless automatic callback for the at least one mobile station upon one of: a predetermined button/buttons being pressed or a predetermined verbal callback command being issued, by automatically redialing the number. The memory 4908 is coupled to the micro-cellular base station controller 4904 for wireless automatic callback and to the switching and database automatic callback processor 4906. The memory 4908 has a database for storing at least the number redialed. Where selected, the memory 4908 may further store information for authentication and/or billing information for the at least one mobile station.
XX. Speed Calling
The speed calling feature allows a subscriber to compile a list of phone numbers in which each phone number is associated with a unique speed calling code. A subscriber can provision a unique speed calling code for one or more telephone numbers. When an MS user enters a valid speed calling code, the WCS system will complete the call using the telephone number in the speed calling list corresponding to the speed calling code entered.
There are several ways a subscriber can provision a telephone number for speed calling. For example, the user may access the Internet or a web-based interface such as a WCS web site and input and update a list of phone numbers having speed calling. Also, the subscriber may contact a customer care center representative by phone and verbally communicate the numbers through any type of communications unit (e.g., cell phone, landline phone, wireless palm top computer phone, etc.). Alternatively, a user may be directed through an automated phone menu to input the numbers by use of a communications unit keypad or voice recognition system.
According to one embodiment, the user may provision the speed calling telephone numbers through the WCS system. In this regard, the subscriber may activate the feature by entering a feature activation code, a speed calling code (e.g., 1-30) followed by a phone number (e.g., *75*1#5555151) into the keypad of MS 101A and then pressing the "send" button. Actuation of the "send" button sends the feature activation message to the WCS system (e.g., NSP 106). The WCS system then may acknowledge activation of the feature, by returning a short message to the MS 101 A, or alternatively an aural communication, including identity of the feature activated, the speed calling code and phone number, for example. In addition, a message indication that a call origination request has been rejected can be used to provide feature activation/deactivation status information.
In a further modification, the speed calling code may be automatically assigned such as with the first available speed calling code. Thus, the subscriber might send the feature activation code followed by the telephone number (e.g., *75*#5555151) to the WCS system. In this instance, when the subscriber fails to enter a speed calling code, a speed calling code may be automatically assigned to the telephone number. Illustratively, if thirty codes are available (code numbers 1-30) and code numbers 1, 2, 4 and 7 have been assigned, the system can assign the next available code, which would be code number 3 to the telephone number input by the subscriber. If all available speed calling codes are assigned, the system can send a short message or aural message indicating the same, or can send status information with a message indicating that a call origination request has been rejected. Also, the subscriber may enter a code requesting the system to identify the telephone number associated with a speed calling code.
To delete a phone number from the speed call list, the subscriber may overwrite the existing phone number assigned to a speed call code with another number. Alternatively, the subscriber may enter a feature deactivation code followed by the telephone number and press the "send" button. Also, the subscriber may deactivate the speed calling codes for all numbers by entering a global feature deactivation code and the "send" button on the MS 101A. A more detailed discussion of feature activation and deactivation is provided at other places in the instant description, for example at section IX, above.
To implement the speed call feature, the subscriber dials the speed calling code (e.g., *1) for the desired telephone number and presses the "send" button on MS 101A. If the speed call code entered is unassigned, an error message will be returned to the subscriber by a short message or otherwise.
According to an illustrative embodiment of the invention, the speed call list may be stored in a memory in the NSP 106 or a memory location accessible to the NSP 106. The list may include any amount of numbers depending on the capacity of the memory employed. In one embodiment, up to thirty numbers may be defined to have a unique speed call code and the size of the telephone numbers can range from 1-17 digits.
FIG. 50 provides an exemplary call flow diagram for implementing the speed call feature according to an illustrative embodiment of the present invention. While the IS-136 standard is used to illustrate one implementation of the present invention, it should be understood that the present invention is applicable to other cellular or PCS systems.
When a WCS subscriber wants to place a call utilizing speed calling, the subscriber inputs the speed calling code *n, where n is the code and actuates the "send" button. In response, MS 101A sends an IS-136 origination [DN=*n] message 5002 to a VAP 103A at which the MS 101A is registered. Also, the MS 101A sends an IS-136 serial number message 5004 to the VAP 103A. In response, the VAP 103A sends a proprietary origination request message (Origination Request [dialed digit=*N]) 5006 to the NSP 106 and starts timer TO1. The NSP 106 receives the origination request message 5006 and identifies that a speed call attempt is being made.
The NSP 106 then determines whether MS 101A subscribes to the speed call feature by comparing the MIN of MS 101A with an authorized subscriber list maintained in the WCSD. If the MS 101A is not authorized for the speed call feature, then the NSP 106 sends the VAP 103A an origination non-acknowledgment (NACK) message (not shown) and indicates that the MS 101A does not subscribe to the speed call feature. The timer TO1 is canceled and the VAP 103A then notifies the MS 101A subscriber through a short message or aural message that it does not subscribe to the speed call feature.
If the MS 101A is authorized for the speed call feature, then the NSP 106 determines whether the speed call code input by the subscriber corresponds to a telephone number. If no number corresponds to the entered speed call code, a NACK message is sent to the VAP 103A including a DN unavailable message and the timer TO1 is canceled. The DN unavailable message is then delivered by the VAP 103A to the MS 101A.
If the MS 101A is authorized fro the speed call feature and a phone number corresponds to the speed call code entered, the NSP retrieves the telephone number associated with the speed dialing code from the speed dial list. Then, the NSP 106 sends an origination acknowledgement message 5008 (origination ACK (SpeedDial DN)) including the telephone number to the VAP 103A and starts the timer TSC1. Responsive to the origination acknowledgement message 5008, the VAP 103A cancels timer TO1 and initiates a Q.931 call set up procedure using the telephone number corresponding to the speed dial code, i.e., speed dial DN. If the TO1 timer expires before the VAP 103A receives the origination acknowledgement message 5008, the VAP 103A sends an IS-136 reorder/intercept message (not shown) to MS 101A including information about what went wrong similar to when the VAP 103A receives an origination NACK message.
The call set up procedure is similar to call set up procedure described elsewhere in this application, but will be described here for completeness. To set up the call, the VAP 103A reserves an RF DTC channel and sends a Q.931 setup [speed dial DN] message 5010 to the LDS 104. The LDS 104 then examines the speed dial DN in the Q.931 setup message 5010 and sends an ISUP IAM message 5012 to a far end switch in the PSTN 125 for end-to-end connectivity. Also, the LDS 104 sends a Q.931 call proceeding message 5014 to the VAP 103A. The VAP 103A then sends an IS-136 Digital Traffic Channel (DTC) Designation 5016 message to the MS 101A so that MS 101A may tune to the designated traffic channel. MS 101A informs VAP 103A that it is using the designated DTC by responding with an MS on DTC message 5018. The VAP 103A then detects that the MS 101A is tuned to designated traffic channel, and cuts through the voice path 5034 between the RF DTC channel and an ISDN B channel.
The destination switch in the PSTN 125 sends an ISUP ACM message 5020 to the LDS 104. In response, the LDS 104 sends a Q.931 alerting message 5022 to VAP 103A. Next, a ringback tone 5024 is delivered to the MS 101A from the destination switch. Also, the PSTN 125 sends an ISUP ANM message 5026 to the LDS 104. Following receipt of the ISUP ANM message 5026, the LDS 104 sends a Q.931 connect message 5028 to the VAP 103A, removes the ringback tone 5024, and cuts through the voice path 5034. The VAP 103A then sends a Q.931 connect ACK message 5030 back to the LDS 104 to acknowledge the connection. Responsive to the Q.931 connect ACK message 5030, the VAP 103A sends origination result [success] message 5032 to the NSP 106 for billing and other OAM&P purposes. At this point, voice path 5034 has been established and the call proceeds between the MS 101A and the party called using the speed call code.
While the above description relates to an example of speed calling for a party coupled to a PSTN, it should be understood that a speed calling code may be set up for any party which a subscriber may call including, but not limited to, a WCS subscriber, a landline subscriber, and a cellular subscriber. Also, multiple phone numbers can be assigned to a single unique speed calling code such that entry of the speed calling code will initiate a call involving parties at each of the multiple phone numbers in a conference call. Reference is made herein to the description of conference calling in Section XXI below, which can be modified to provide for a speed call code to originate a three-way call, for example.
XXI. Conference Calling
A. Adding a Party to an Existing Call
The conference call feature/function allows a MS 101 user to talk with two or more parties at the same time. Once the MS 101 user is on a first active call, he can enter a feature code, for example by keying in *33# on the MS 101 keypad followed by a third party's DN (conference with DN) and then pressing a transmit key, for example, the "send" button, to initiate a conference call. Once validated by the WCS network determining that the MS-101 user is authorized to use the conference calling feature/function, an announcement is provided, for example, a voice prompt or a special tone will be heard by the MS 101 user (and optionally to the second party to an active call) indicating that a conference call connection (e.g., Three-Way Calling) has been requested. After the third party answers, the MS 101 user may then enter another code, for example by pressing the "send" button on the MS 101, to begin the multi-party conference call conversation.
The following detailed description of the conference call feature/function is described in terms of a three way call for ease of explanation and because one typical local digital switch has three way switches for each wireline. However, one skilled in the art will recognize that a switch having greater than three possible line connections (i.e., more than a three-way switch) may be provided in the local digital switch, e.g., a six way switch. Therefore, the conference call feature/function, although described in specific embodiments below illustrating three-way calling, is also applicable to conference calls having more than three parties by repeating portions of the conference call initiation and setup procedures.
Further, the signal flows used for Three-Way calls in this document are directed to comply with the Lucent 5ESS local digital switches and may apply to other local digital switches, such is the Nortel DMS-100 local digital switches, with or without modifications. Since the interface between LDS 104 and the VAP 103 is based on standard Q.931 messages it is supported by all LDSs. So, with minimum changes (if needed), the exemplary call flow described with reference to the Lucent 5ESS would work with other LDSs such as the Nortel DMS-100.
The conference call feature/function provides an MS 101 user with a convenient and user friendly method of creating a multi-party call. Once the MS 101 user has established an active call, for example a two-way call, with one or more other parties the MS 101 user is free to initiate adding a person for a conference call. First, while on an active call, the MS 101 user may indicate to the other party that a Three-Way call will be requested. After entering the conference call feature code, e.g., pressing the *33#, followed by the third party's DN, the MS 101 user will transmit this information to the WCS by, for example, pressing the "send" button. The existing second party is then put on hold and the MS 101 user initiating the conference call feature/function will be provided an announcement, for example, a voice prompt or a special tone on the MS 101 indicating the Three-Way call activation is now proceeding. The voice prompt or special tone may also be provided to the other party, or alternatively other audible sounds may be provided to the other party such as music.
If the MS 101 user initiates the conference call feature/function during an already active three-way call they initiated, and the LDS 104 is equipped with a switch that is capable of handling connection of another party (i.e., more than a three-way switch), the request for another conference call initiation will be honored and a similar connection procedure will ensue. However, if the LDS 104 is equipped with only a three-way switch, the request for another conference call initiation to add an additional party will be rejected and an appropriate notification (e.g., an announcement) of the limitation to a three-way call will be provided to the MS 101 user. Furthermore, if the MS 101 user transmits an empty message by, for example, pressing the "send" button before the original call is put on hold, the NSP 106 will ignore it.
When the call goes through to the third party, the MS 101 user who initiated the conference call will hear the ringing tone. If the third party answers, the MS 101 user can press a key on the MS 101, for example, the "send" button, (within a certain time period) to retrieve the held call(s) and complete the conference call (e.g., Three-Way) connection. In one alternative embodiment, the MS 101 cannot disconnect a third party who answers without first establishing a three-way connection. If the third party answers and the initiator presses a transmit key, for example, the "send" button once, to set up a three-way call but the original two-way call could not be retrieved for some reason (e.g., the party to the original two-way call on hold has hung up), the two-way call with the second called party will continue. An indicator, for example a voice prompt, indicating that the party on hold can not be connected may be provided to the MS 101 user who initiated the conference call feature/function.
If the third party answers and disconnects before the MS 101 user can establish a conference call (e.g., a three-way call), the MS 101 user can again transmit a message, by for example pressing a the "send" button once, and retrieve the original call. Further, if the connection to third party fails as a result of the switch being unable to connect to the third party (rather than the third party is busy or is not answering the phone), the MS 101 user can enter a code message, for example, press the "send" button once, to retrieve the original call placed on hold. On the other hand, if the third party's line is busy or the third party does not answer the phone, the MS 101 can enter another code message, for example the MS 101 can press the "send" button twice, to disconnect the second leg of the call and retrieve the 10 original call on hold. Once again, if the original called party has already disconnected, an indication that the original called party is disconnected may be provided, e.g., an announcement such as a voice prompt may be played to the MS 101 user.
Furthermore, if the third party's voice mail answers, the three-way call is assumed to be complete. The MS 101 user may enter a code message, for example they can press the "send" button once, within a certain amount of time and establish a three-way conference. In one alternative embodiment the initiator can disconnect from the third party voice mail and end the conference call by pressing the "send" button twice only after the three-way call has been established. Thus, in this embodiment the MS 101 conference call initiator must establish the conference call connection by retrieving the original call in order to disconnect from the third party's voice mail.
At any time during an established conference call, the MS 101 user can enter a feature code message, for example by pressing the "send" button twice quickly (within a certain amount of time, e.g., within a few seconds) and disconnect the last added call. To end all calls the MS 101 user can enter another code, for example the initiator may just press the "End" button.
Referring now to FIGS. 51 and 52, a discussion of various scenarios for a preferred embodiment having a three-way conference call is illustrated using a process flow chart. In a first instance, an MS 101 user calls another party, either another MS 101 user or a PSTN user, and establishes an active two-way call in progress at step 5101. During the active two-way call the MS 101 initiates a three-way conference call by entering a feature code and a conference to directory number (DN) of the party to be added (e.g., third party), and then press a process initiation key by pressing, for example, the "send" key on the MS 101 as shown in step 5102. In the next step, feature validation decision step 5103, the NSP 106 determines whether the MS 101 user is authorized to use the conference call feature/function (i.e., the MS 101 user subscribes for the feature), and if so, notifies the VAP 103 to go forward with the conference call set up. However, if the MS 101 user is not authorized to use the conference call feature/function, the NSP 106 will return the MS 101 user to the two-way call in progress state at step 5101. Upon returning to step 5101 an announcement may be played to MS 101 user indicating that the conference call feature/function is not available and information on how to subscribe for the service.
After the VAP 103 is instructed by the NSP 106 to proceed with the conference call setup, the VAP 103 initiates, for example, a three-way call by first instituting a second call reference (CR=2) at step 5104 and places the first call, first call reference (CR=1), on hold. Next, at decision step 5105, the VAP 103 determines if the third party is being alerted. If so, the VAP 103 then waits to see if the third party answers. If not, VAP 103 disconnects/releases call reference 2 in step 5209 (See FIG. 52) and awaits the MS 101 user input, by pressing for example the "send" key, to determine if the original call is retrieved (steps 5203 and 5205) or if the original call is also dropped (step 5204). If the MS 101 user presses the process initiation key again between initiating the three-way call at step 5104 and providing the third party an alert at step 5105, the input is ignored.
At decision step 5106 the VAP 103 determines if the third party has been connected to the MS 101 user and has answered. If so, the MS 101 and the third party are connected by the LDS 104 with a voice path for the second call reference (CR=2) at step 5107. If not, the VAP 103 disconnects/releases the third party (CR=2) at step 5209 and awaits MS 101 user input by, for example the MS 101 user pressing the "send" button, to attempt to retrieve the second party from hold to re-establish the original two-way call at step 5205 (See FIG. 52) or release all resources at step 5204. If possible, the VAP 103 reconnects the MS 101 user with the second party that was placed on hold and thus re-establishes the two-way call in progress at step 5205. If the VAP can not retrieve the second party it releases all resources at step 5204.
If the MS 101 user presses the conference call initiation key, for example the "send" key, twice between steps 5105 and 5106 before the third party answers, the VAP 104 will disconnect the third party, attempt to retrieve the second party, and re-establish a two-way call in progress, as indicated at steps 5201-5205. However, if the MS 101 user presses the conference call initiation key, for example the "send" key, once between step 5105 and 5106 the input will be ignored.
Once the MS 101 user is connected in a two-way voice path with the third party the MS 101 user may enter a code message, by pressing at any time, for example the "send" button to enter the process initiate button, as indicated at step 5108. This will retrieve the second party and connect them to the existing voice path between the MS 101 and the third party so that a three-way call is in progress as indicated at steps 5109 and 5110. If the MS 101 user does not enter a code message by, for example, pressing the "send" button or the second party can not be retrieved, the LDS 104 will leave the MS 101 user connected with the third party at step 5107. Further, if the MS 101 user enters a code message by pressing, for example, the "send" button again before the three-way call is established, the input will be ignored. On the other hand, if the MS 101 user enters a different code message by, for example, pressing the conference call initiation key, e.g., the "send" key twice after the three-way call has been established, as indicated at step 5206, the NSP 106 will instruct the VAP 103 to drop the third party as indicated in step 5207. Next, the VAP 103 will retain the MS 101 user and the second party in a two-way call as indicated in step 5208. If the MS 101 user enters a code message by pressing, e.g., the conference call initiation key, for example the "send" key, only once after the three-way call has been established, it will be ignored.
An embodiment of the conference call feature/function of the present invention illustrating an exemplary three-way call signal flow is shown in FIG. 53. A successful conference call setup procedure has in general four basic steps. These general steps are: (1) establishing a first active call between an MS 101 user and a second party (or parties); (2) placing the active call between the MS 101 user and the second party (or parties) on hold; (3) establishing a second active call between the MS 101 user and a party to be added, e.g., a third party; and (4) re-connecting the second party on hold to the second active call. A detailed discussion of the signal flow for achieving each of these steps and more specific steps of a successful conference call process follows for an exemplary embodiment using a three party conference call as an example.
First, the MS 101 user is a party to an active call with a party having a PSTN DN1125a indicated as Call in progress (CR=1) 5301. When the MS 101 user wants to set up a three-way conference call with another PSTN user, PSTN DN2125b (whose DN is herein referred to as ThreeWayDN), the MS 101 user enters the conference call feature code, for example "*33#" and the party to be added DN digits in the format of *33#ThreeWayDN and presses, for example, the "send" button on MS 101. The MS 101 sends to VAP 103 an IS-136 Send Burst DTMF message for each digit pressed. In the conference call procedure, the VAP 103 is responsible for receiving and buffering the digits, i.e. *33#ThreeWayDN, generated by the MS 101 in the form of IS-136 Send Burst DTMF messages. By pressing the "send" button, the MS 101 generates an IS-136 Flash With Info message which initiates packing of the previously depressed digits, so that the VAP 103 construes as one message the string of digits sequentially input earlier, i.e., the IS-136 Send Burst DTMF [*33#ThreeWayDN] 5302 message. Upon receiving each IS-136 Send Burst DTMF message from the MS 101, the VAP 103 sends an IS-136 Send Burst DTMF ACK 5303 message to the MS 101.
The IS-136 Send Burst DTMF 5302 messages include data fields such as: Protocol Discriminator, Message Type, Request number (DN), and Digit. The IS-136 Send Burst DTMF ACK 5303 message includes data fields such as Protocol Discriminator, Message Type, Request number (DN), Remaining Length, and Last Decoded Parameter.
The MS 101 user initiates a conference call feature/function by entering a command, for example, by pressing the "send" key on the MS 101, which results in a IS-136 Flash with Info 5304 message being sent from the MS 101 to the VAP 103. After receiving the Flash With Info 5304 message, the VAP 103 acknowledges receipt by sending Flash With Info Ack 5306 message to the MS 101 and requests initiation of a conference call feature/function setup procedure by sending a novel Feature Request [*33#ThreeWayDN] 5305 message including the buffered digits *33#ThreeWayDN, to the NSP 106.
Upon receiving the Feature Request message from the VAP 103, the NSP 106 searches the WCSD in, for example memory 1240, and verifies that the MS 101 user has subscribed to the conference call feature, that the three-way call feature (assuming an LDS 104 has a three-way switch), and that the MS 101 user is not active on another three-way call initiated by him. The NSP 106 then sends a unique Feature Request ACK message, Feature Request ACK [3-Way, ThreeWayDN] 5307 message, containing the 3-Way as the action and the ThreeWayDN as the CalledDN. It also starts the T31 timer that will wait for the 3-Way Proceeding [success] 5324 message. In the situation where the MS 101 is authorized for the conference call capability and the LDS 104 has sufficient switch capacity to add another party to the conference call, the VAP 103 will play an announcement (or tone) to the MS 101 informing the MS 101 user (and optionally all parties to the conference call) that the conference call setup has been initiated, for example, Voice Prompt (3-way call initiated) 5308. On the other hand, if the MS 101 user who initiates the conference call is not authorized to make a three-way call, the NSP 106 sends a Feature Request ACK message with the action as Invalid 3-Way, so as to trigger an indication to the MS 101 user that the conference call feature/function is not available to them and the normal 2-way call will remain in progress. In either case, the VAP 103 may play the appropriate taped or voice synthesis generated announcement using, for example, the VPU 1235, or alternatively generates a tone to the MS 101 user and optionally to the PSTN DN1125a or the MS 101 may display a text message, as the indication of status.
Then the VAP 103 sends a Q.931 Info [CR=1,FA=Conf] 5309 message with the Feature Activation set to conference call to the LDS 104 to initiate a three-way conference call, updates a record to identify that this is a three-way call, and starts the T32 timer awaiting a response from the LDS 104. The LDS 104 acknowledges by sending a Q.931 Info [CR=1,FI=Conf,Active] 5310 message with the Feature Indication set to an active conference call and the VAP 103 cancels the T32 time.
At this point, the WCS begins a procedure to place the first call between the MS 101 user and the 2nd party at PSTN DN1125a on hold to allow connection between the MS 101 user and a 3rd party on another line. Once the VAP 104 gets a Q.931 Info message from the LDS 104 it cancels the T32 timer, sends a Q.932 Hold [CR=1] 5311 message to the LDS 104 instructing the LDS 104 to place the existing call with PSTN DN1125a on hold, and starts a THh timer. However, if the T32 expires, the VAP 103 will log an error and send a 3-Way Proceeding message as fail to the NSP 106 with the cause value indicating that 3-way call could not be initiated. The NSP 106 and VAP 103 will update the call record information to indicate that the normal 2-way call is now in progress.
If the T32 time does not expire, the LDS 104 puts the first leg of the call on hold, i.e., proceeds to place the voice path with PSTN DN1125a on hold, and sends a Q.931 Hold Ack [CR=1] 5312 message to the VAP 103 indicating that the first active call has been placed on hold. The VAP 103 cancels timer THh and sends a Q.931 Setup [CR=2, ThreeWayDN] 5313 message to the LDS 104, including the second call reference number (CR=2) and the ThreeWayDN, to setup the conference call to the third party [CR=2] on the same B-channel. However, if the timer THh expires, the VAP 103 will log an error and send a 3-Way Proceeding 5316 message as fail to the NSP 106 with the cause value indicating that 3-way call could not be held. The VAP 103 and NSP 106 will update the call record information to indicate that the normal 2-way call is now in progress.
If timer THh does not expire, the VAP 103 updates the information about this call in the appropriate record to identify that a 3-Way call is being established and starts the T303 timer awaiting a Q.931 Call Proceeding 5316 message from the LDS 104. Thus, the first referenced call (CR=1) is now held by the LDS 104 awaiting the connection of MS 101 with other parties (Call Held by LDS (CR=1) 5315. The NSP 106 updates the information about this call in the appropriate record in the WCSD of, for example, in the memory 1240.
When the first call between the MS 101 user and the second party, PSTN DN1125a has been put on hold the WCS then continues with the conference call setup procedure by performing a call setup between the MS 101 and a party to be added to the conference call, for example, a third party at PSTN DN2125b. First, the LDS 104 processes the Q.931 Setup [CR=2, ThreeWayDN] 5313 message and sends a Q.931 Call Proceeding 5316 message to the VAP 103 indicating to the VAP 103 that the call to PSTN DN1125b is being initiated. Once the VAP 103 receives a Q.931 Call Proceeding 5316 message from the LDS 104, it cancels the T303 timer and starts T310 timer waiting for Q.931 Alerting 5319 message from the LDS 104. The VAP 103 does not have to do anything on the RF side because the MS 101 is already on the DTC. However, if the timer T303 expires, the VAP 103 will send a novel 3-Way Proceeding 5324 message as "fail" to the NSP 106 with a proper cause value. It will also send a Q.931 Release Complete [CR=2] 5330 message to the LDS 104. After this the VAP 103 will start a timer T34 waiting for a Flash with Info message from the MS 101 (this would indicate that the mobile wants to retrieve the original call).
Next, the LDS 104 sends an initial address message, ISUP LAM 5317, to the ThreeWayDN, in this example another PSTN LDS, PSTN DN2125b. In response, the PSTN DN2125b sends an address complete message, ISUP ACM 5318, to indicate that a communication link has been made with PSTN DN2125b. Next, the LDS 104 sends a Q.931 Alerting 5319 message to the VAP 103 so that the VAP 103 and LDS 104 can provide MS 101 Ringback Tone 5320 indicating that PSTN DN2125b is being alerted of an incoming call. When the VAP 103 receives a Q.931 Alerting 5319 message from the LDS 104, it cancels the timer T310 and starts T301 timer waiting for Q.931 Connect 5322 message from the LDS 104. However, if the timer T310 expires, the VAP 103 will follow disconnect procedure by sending Q.931 Disconnect (CR=2) message to the LDS 104. The LDS 104 will respond with Release (CR=2) 5329 message. The VAP 103 will continue to follow the same procedure as above; the VAP 103 will also send a Q.931 Release Complete [CR=2] 5330 message to the LDS 104. After this the VAP 103 will start a timer T34 waiting for a Flash with Info message from the MS 101 (this would indicate that the mobile wants to retrieve the original call).
When the third party at PSTN DN2125b answers the call an answer message, ISUP ANM 5321, is sent from PSTN DN2125b to LDS 104. In response, the LDS 104 sends a Q.931 Connect 5322 message to the VAP 103. When the VAP 103 gets the Q.931 Connect 5322 message from the LDS 104, it recognizes that this message corresponds to a three-way call and cancels the T301 timer. If the timer T310 expires, the VAP 103 will follow disconnect procedure by sending Q.931 Disconnect (CR=2) message to the LDS 104. The LDS 104 will respond with Release (CR=2) 5329 message. The VAP 103 will continue to follow the same procedure as above; the VAP 103 will also send a Q.931 Release Complete [CR=2] 5330 message to the LDS 104. After this the VAP 103 will start a timer T34 waiting for a Flash with Info message from the MS 101. Otherwise, the VAP 103 then sends a Q.931 Connect ACK 5323 message to the LDS 104 acknowledging the second call connection has been made between the MS 101 and PSTN DN2125b and starts a T34 timer. (The voice path of the second call is illustrated in FIG. 53 as dashed arrow lines labeled Call in progress (CR=2) 5414 from the PSTN DN2125b to MS 101.) Once the voice path has been established the VAP 103 sends a novel 3-Way Proceeding [success] 5324 message to the NSP 106 indicating that the third party has been successfully added to the conference call by completing the second call between MS 101 and PSTN DN2125b. This message includes the MSID, the Call Reference Number (CR=2), and the Cause (Success/Fail) fields. (The cause field in the 3-Way Proceeding message may contain the comments, for example: 3rd party answered (success), 3-way call hold fail, 3-way call initiate fail, or 3rd party did not answer.) At this point, establishing a second call between the party to be added, in this case a third party, has been completed and thus the MS 101 for the conference call setup procedure is complete with the exception of a few administrative details to be performed by the NSP 106.
When the NSP 106 gets a 3-Way Proceeding [success] 5324 message it updates the information about this call in the appropriate record in the WCSD to, among other things, capture the call usage time for the new leg of the call. The NSP 106 cancels the T31 timer, updates the call record information and starts the T36 timer that waits for the 3-way Result [success] 5433 message from the VAP 103 indicating that the conference call setup has been completed successfully. However, if the second call to the third party is not connected for whatever reason, for example, the T31 timer expires and/or the NSP 106 receives 3rd Party Answered message as a "fail", the NSP 106 will send a 3-Way Disconnect message to the VAP 103 to disconnect the attempted connection with the third party, retrieve the original call with PSTN DN1 which was placed on hold (as discussed in more detail below), and update the call information record to indicate that a normal 2-way call is now in progress.
If the MS 101 user had requested to set up a conference call by adding another MS 101 rather than the PSTN DN2125b, the call setup procedure would have followed the sequence described in other areas of the invention for call setup from one MS 101 to another MS 101 in the WCS.
Next, the conference call setup procedure connects the original call with the second party at PSTN DN1125a on hold with the active call between MS 101 and the third party at PSTN DN2125b. If the MS 101 user once again inputs the initiation code, for example by pressing the "send" button once, an IS-136 Flash with Info 5325 message is sent to the VAP 103 requesting that the second party on hold be added to the two-way call between the MS 101 user and the third party. The VAP 103 cancels the T34 timer, sends a Q.932 Retrieve [CR=1] 5326 message to the LDS 104 indicating that the MS 101 user has requested that the call on hold be retrieve so that it and the active call be combined to form, in this case, a three way conference call, starts the TRr timer, and sends an IS-136 Flash with Info Ack 5327 message to the MS 101. However, if the timer T34 expires, the VAP 103 will follow the Release procedure to release CR=1 and send 3-Way Result as fail to the NSP 106. A 2-Way call with third party would continue.
When the LDS 104 receives the Q.932 Retrieve [CR=1] 5326 message from the VAP 103 (after the third party has answered), it verifies that the original called party, in this case the second party, is still present on hold, and sends a Retrieve Ack 5328 message to the VAP 103 indicating that the original call on hold has been retrieved. The LDS 104 then mergers the calls, CR=2 with CR=1. When the VAP 103 receives Q.932 Retrieve Ack [CR=1] message from the LDS 106, it will stop the TRr timer and start T35 timer. However, if the timer TRr expires as a result of the VAP 103 not receiving the Q.932 Retrieve Ack 5327 message because, for example, the second party hangs up or is some way disconnected, the VAP 103 will log an error and send a 3-way Result message as fail to the NSP 106 and the 2-way call [CR=2] with the third party will continue. In the case of such a failure to retrieve the first call placed on hold, the VAP 103 may also play a voice prompt to the MS 101 user indicating that the 3-way call could not be completed.
After merging the two legs of the call, CR=1 and CR=2, the LDS 104 sends a Q.931 Release [CR=2] 5329 message to the VAP 103 to release the second call reference (CR=2) while retaining the three (or more) parties on the conference call. Then VAP 103 cancels timer T35 and releases (clears) the second call reference CR=2 and sends a Q.931 Release Complete [CR=2] 5330 to the LDS 104. However, if the timer T35 expires, the VAP 103 will log an error. The 3-way call is in progress so the VAP 103 will send a Q.931 Release [CR=2] 5329 message to the LDS 104 to release the second call reference. Once the VAP 103 gets a Q.931 Release Complete [CR=2] 5330 message from the LDS, it will send a 3-way Result [success] 5331 message to the NSP 106.
In any case, the VAP 103 sends a novel 3-Way Result [success] 5331 message to the NSP 106 indicating that the release of CR=2 is successful. The 3-Way Result message includes MSID, Call Reference Number, and Cause fields. Then the NSP 106 cancels the timer T36 and updates the call record information to indicate successful setup of a conference call, in this case a three-way call, and that the conference call is now in progress (indicated as the dashed arrows labeled (3-Way Call In-Progress (CR=1) 5332).
However, if the NSP 106 receives a 3-Way Result message from the VAP 103 indicating a "fail", the NSP 106 will cancel the T36 timer and update the call record information to indicate that the normal 2-way call [CR=2] is in progress. If the T36 timer expires, the NSP 106 will initiate a Release procedure on CR=2. In either case, the NSP 106 may send a Play Voice Prompt message to the VAP 103 to inform the user that the conference call could not be completed and a two-way call will continue. Further, if any party disconnects during the establishment of a three-way call, the NSP 106 will get a WCS specific Release message. Then the NSP 106 will update its call record information and resource table accordingly.
In some circumstances, although the third party may answer, the equipment may fail to be able to connect the third party to the original call. In such a case, the WCS will need to notify the MS 101 user and the MS 101 user may wish to retrieve the original call. FIG. 54 below gives the signal flow for one exemplary embodiment when the third party could not be connected.
The signal flow in the case where the third party could not be connected to the conference call is essentially the same as described for FIG. 53 up to the point where the VAP 103 sends 3-Way Proceeding [success] 5324 message. In general, the original call, call reference 1, is placed on hold by the LDS, Call Held by LDS(CR=1) 5315 message. Subsequently, the third party line PSTN DN2125b sends an ISUP ACM 5318 message to the LDS 104. In response the LDS provides a Q.931 Alerting 5319 message to the VAP 103 and a Ringback Tone 5320 to the MS 101. However, in the case where the third party could not be connected to the conference call, the 3-Way Proceeding message from the VAP 103 results in a "fail" message being sent to the NSP 106, i.e., 3-Way Proceeding [fail] 5452.
After sending 3-Way Proceeding [fail] 5452 message, the VAP will start a timer T34 waiting for Flash with Info message from the mobile and provide an indication to the MS 101 user that the third party can not be connected. For example, the MS 101 use may receive a Voice Prompt: Can not connect 3rd Party 5453 or a similar text message, which prompts the MS 101 user to respond accordingly. If the MS 101 user enters the initiation code, for example, by pressing the "send" key, the VAP 103 will be sent a IS-136 Flash with Info 5454 message from the MS 101. The VAP 103 will cancel timer T34, send a Q.931 Retrieve [CR=1] 5455 message to the LDS 104 to re-connect with the original call, send and IS-136 Flash with Info Ack [CR=1] 5456 message to the MS 101, and start timer TRr. However, if the timer T34 expires, the VAP 103 will follow a disconnect procedure and send a WCS Release message to the NSP 106 so that all calls are disconnected and all resources released. If the time T34 does not expire, the LDS responds with Q.931 Retrieve ACK [CR=1] 5457 message and the VAP 103 will cancel the TRr timer and update its call record to reflect that the original call has been received and the conference call latest attempt to add a party has been cancelled. The WCS will establish the original call, for example, 2-Way Call in Progress(CR=l) 5458. On the other hand, if the timer TRr expires, the VAP 103 will release RF resources, clear the call reference on its side, send a Q.931 Release [CR=1] message to the LDS 104. Once the VAP 103 receives Q.931 Release Complete message from the LDS 104, it will send a WCS Release message to the NSP 106 with a proper cause value.
In some instances the MS 101 user may wish to retrieve the original call with the 2nd party before a conference call, e.g., a three way call, is established. FIG. 55 depicts the signal flow for the scenario when the MS 101 user wants to retrieve the original call with the second party before the third party answers. To do so, the MS 101 user can enter the feature. initiation code twice, for example, he may press the "send" button twice in certain scenarios. In particular, if the original call with the second party is on hold and the third party has not yet answered the incoming call, the conference call setup procedure can be easily cancelled by, for example, the MS 101 user entering the feature initiation code twice within a short period of time, e.g., pressing the "send" button twice within for example, approximately one--two seconds. Upon canceling the conference call the ongoing connection to the party to be added, e.g., the third party, will be disconnected and the party(ies) of the original call, e.g., the second party, will be retrieved. A detailed discussion of the signal flow for retrieving an original call on hold before a conference call is established follows, using a three-way conference call as an example.
Assuming that the conference call has been initiated and the third party is being alerted, in essence, the conference call setup procedure has progressed successfully in the normal manner to the point where the original call to the second party is on hold (signals Call Held by LDS (CR=1) 5315, and Q.931 Call Proceeding 5316 already complete) and the party to be added to the conference call is being alerted of an incoming call (ISUP IAM 5317 already complete), if the MS 101 user enters a feature initiation code twice within a short period of time, e.g., within a 1 to 2 seconds, e.g., presses the "send" button twice, the MS 101 will send the VAP 103 two IS-136 Flash With Info 5502 and 5504 messages sequentially. In response, VAP 103 send two IS-136 Flash with Info ACK 5503 and 5505 messages sequentially to the MS 101.
When the VAP 103 gets the first IS-136 Flash with Info 5502 message from the mobile, the VAP 103 checks the call information record to determines that this is a three-way call, that the third party has not answered, that the original call with the second party is in a held state, and starts the T37 timer, awaiting another IS-136 Flash with Info message, IS-136 Flash with Info 5504 message. If the timer T37 expires, the VAP 103 will ignore the first Flash with Info message. Otherwise, the VAP 103 gets the second IS-136 Flash with Info message, IS-136 Flash with Info 5504 message from the MS 101, cancels the T37 timer, and sends an IS-136 Flash with Info Ack 5505 message to the MS 101. The VAP 103 also determines that this is a request to disconnect the ongoing conference call connection and retrieve the original call. So the VAP 103 then sends a Q.931 Disconnect [CR=2] 5506 message to the LDS 104 and starts a T305 timer.
The VAP 103 sends a Q.931 Disconnect [CR=2] 5506 message to the LDS 104 instructing it to disconnect the call setup to the party to be added, e.g., the third party. The LDS 104 then sends release messages, ISUP REL 5507 message to PSTN DN2125b and Q.931 Release [CR=2] 5508 message to the VAP 103, to terminate the call setup in midprocess. PSTN DN2125b responds by releasing the call setup and sending a confirmation to the LDS 104, the ISUP RLC 5509 message. Once the VAP 103 gets a Q.931 Release [CR=2] 5508 message from the LDS 104, it cancels the T305 timer, sends a Q.931 Release Complete[CR=2] 5510 message to the LDS 104 followed by Q.932 Retrieve [CR=1] 5511 message to the LDS 104 and waits for Q.932 Retrieve Ack 5513 message from the LDS 104. However, if the T305 timer expires, the VAP 103 logs an error, releases CR=2 at its end, sends a Q.931 Release Complete 5510 message to the LDS 104 and continues.
When the call to the party to be added is released, the VAP 103 proceeds to retrieve the original call to the second party from hold and reconnect the call between the MS 101 user and the second party on the PSTN DN1125a . To do so, the VAP 103 sends the Q.932 Retrieve [CR=1] 5511 message to the LDS 104 so that the LDS will retrieve the call on hold and starts the TRr timer. The LDS 104 responds to the VAP 103 with a Q.932 Retrieve Ack 5513 message and re-establishes the original call between the original parties to the conference call, e.g., the second party and the MS 101 user as illustrated by the dotted line with arrows labeled 2-Way Call in Progress(CR=1) 5512. However, if the timer TRr expires and the VAP 103 does not get Q.932 Retrieve Ack 5513 message from the LDS 104, it will release all the resources. The VAP 103 will also clear the call reference (CR=1) on its side and send a Q.931 Release message to the LDS 104. Once the VAP 103 gets Q.931 Release ACK message from LDS 104, it will then send a WCS Release message to the NSP 106 with a proper cause value (2.sup.nd party could not be retrieved) and the air interface usage for the call.
When the VAP 103 gets the Q.931 Retrieve Ack 5513 message from the LDS 104, it sends a novel 3-Way Release [3rd Party not Answered] 5514 message to the NSP 106. This novel WCS 3-Way Release message includes fields for MSID, Call Reference Number, and Cause (3rd Party not Answered/3rd party dropped). When the NSP 106 receives 3-Way Release [3.sup.rd party not answered] 5514 message from the VAP 103, it updates it call record information in the WCSD to say that only 2-way call is now in progress. If the NSP 106 receives a WCS Release message from the VAP 103, the NSP 106 will update its call record to capture call usage information.
B. Deleting a Party From an Existing Call
The WCS provides the feature/function to allow an MS 101 user to delete (drop) a party from an active conference call. Once a conference call has been established, an MS 101 user may enter delete a party feature/function code in the MS 101 which will trigger a party to be dropped from the conference call.
For ease of explanation and convenience, an exemplary embodiment is provided below for a situation in which an MS 101 user drops the last added party from a three way conference call between an MS 101 user and two parties using PSTN telephones. However, one skilled in the art would recognize that the present invention also similarly covers scenarios where the conference call includes more than three people and the MS 101 user desires to delete (drop) a party other than the last added party. In such a case the delete a party feature/function message may also include, for example, a deactivation code and a directory number indicating the party to be deleted.
Referring now to FIG. 56, a preferred embodiment is illustrated having signal flow for a situation when an MS 101 user drops the last added party from a three party conference call initiated by the MS 101 user, i.e., deleting (dropping) the third party during and active three-way call. In this case, the MS user enters a delete last party message, for example entering a conference call feature/function message by pressing the "send" button twice, to thereby drop the last added call during a three-way call.
While a three-way call is in progress, 3-Way Call In-Progress (CR=1) 5601, the MS 101 user decides to delete (drop) the last party added, PSTN DN2125b, from the active conference call. To achieve this, the MS 101 user may, for example, enter the conference call feature/function message by pressing the "send" button twice within a certain period of time (e.g., a few seconds). This sequence will indicate to the VAP 103 that the MS 101 user wishes to delete (drop) a party from a conference call, e.g., PSTN DN2125b.
In one example, the VAP 103 receives the first of two feature/function initiation codes, IS-136 Flash with Info 5602 message, from the MS 101. The VAP 103 checks the call information record to determine that a three-way active conference call is in progress. The VAP 103 starts a T37 timer awaiting another IS-136 Flash With Info message and sends an IS-136 Flash With Info Ack 5603 message back to the MS 101, indicating receipt of the earlier sent IS-136 Flash With Info 5602 message. If the VAP 103 gets another IS-136 Flash With Info message before the T37 timer times out (e.g., within a few seconds), IS-136 Flash With Info 5604 message from the MS 101, the VAP 103 determines that this is a request to drop the last added party. In another embodiment the Flash With Info Message could be proceeded by the conference call feature function deactivation code and the DN to be dropped. This process would include a query of the NSP 106 for instructions as to which line to drop. In any case, if the timer T37 expires, the VAP will ignore the first Flash with Info message.
Assuming the MS 101 has entered two Flash With Info messages before the T37 timer times out, the VAP 103 determines that a three-way call is in progress and that this is a request to drop the last added party. Thus, the VAP 103 sends a Q.931 Info [CR=1, Drop] 5606 message to the LDS 104 requesting it to disconnect, for example, the last added party of the three-way call (CR=1).
The LDS 104 then initiates the Release process with PSTN DN2125b by sending an ISUP REL 5607 message to the PSTN DN2125b. After sending a Q.931 Info [CR=1, Drop] message to the LDS 104, the VAP 103 sends a 3-Way Release [3rd party dropped] 5610 message with cause value as 3.sup.rd party dropped to the NSP 106. The LDS 104 may send back a Q.931 Info [CR=1, Conf. Display Info] 5609 message to the VAP 103 informing the VAP 103 that the last added call has been dropped. However, the VAP 103 does not have to wait for the Q.931 Info [CR=1, Conf Display Info] 5609 message and will ignore it when it gets this message if the VAP 103 has already sent the 3-Way Release [3rd party dropped] 5610 message. In any case, the VAP 103 will send a 3-Way Release [3rd party dropped] 5610 message to the NSP 106 and releases the last added party to the conference call. When the NSP 106 receives 3-Way Release message from the VAP 103, it will update the call record information to say that 2-Way call is now in progress, 2-Way Call In Progress 5611, between PSTN DN1125a and MS 101.
In another embodiment the VAP 103 may play an announcement to one or more party (ies) of the conference call indicating that a party is being dropped from the active conference call.
Although particular embodiments of the present invention have been shown and described, it will be understood that it is not intended to limit the invention to the preferred embodiments and it will be obvious to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the present invention. Thus, the invention is intended to cover alternatives, modifications, and equivalents, which may be included within the spirit and scope of the invention as defined by the claims.
For example, while the IS-136 standard is used to illustrate the invention in various embodiments described herein, the invention is not limited to use in the IS-136 standard. The invention is also applicable to other cellular and/or PCS systems. Furthermore, while the access methodology employed by the various embodiments of the instant invention involves the use of a Time Division Multiplexing Access (TDMA) scheme, the general concepts disclosed herein are not limited to the TDMA IS-136 standard. The concepts are applicable to other access methodologies such as, Frequency Division Multiple Access (FDMA), Code Division Multiple Access (CDMA), or other multiple access techniques. As a result, the use of TDMA IS-136 standard is used to enable the invention and is in no way intended to be a limitation of the invention.
The following applications are hereby incorporated by reference for all purposes: 1. U.S. patent application Ser. No. 09/223,316 by Chow et al. filed on Dec. 30, 1998 entitled Neighborhood Cordless Service Call Handoff; 2. U.S. patent application Ser. No. 09/223,321 by Chow et al. filed on Dec. 30, 1998 entitled Automatic Service Selection Feature for Neighborhood Cordless Service; 3. U.S. patent application Ser. No. 09/223,317 by Chow et al. filed on Dec. 30, 1998 entitled Method and Apparatus for Billing a Neighborhood Cordless Service; 4. U.S. patent application Ser. No. 09/223,318 by Chow et al. filed on Dec. 30, 1998 entitled Method and Apparatus for Over-the-Air Activation of Neighborhood Cordless Service;
The following applications, which have each been filed on the same day as the present application, are incorporated by reference as to their entire contents for all purposes: 1. U.S. patent application Ser. No. 09/460,456, filed Dec. 13, 1999, entitled "Wireless Centrex Conference Call Adding A Party," invented by Chow et al. 2. U.S. patent application Ser. No. 09/460,385, filed Dec. 13, 1999, entitled "Wireless Centrex Conference Call Deleting A Party," invented by Chow et al. 3. U.S. patent application Ser. No. 09/458,831, filed Dec. 13, 1999, entitled "Unconditional Call.Forwarding In A Wireless Centrex Services System," invented by Chow et al. 4. U.S. patent application Ser. No. 09/458,842, filed Dec. 13, 1999, entitled "Programmable Ring-Call Forwarding In A Wireless Centrex Services System," invented by Chow et al. 5. U.S. patent application Ser. No. 09/460,246, filed Dec. 13, 1999, entitled "Time-of-Day Call Forwarding In A Wireless Centrex Services System," invented by Chow et al. 6. U.S. patent application Ser. No. 09/458,706, filed Dec. 13, 1999, entitled "Wireless Centrex Call Return," invented by Chow et al. 7. U.S. patent application Ser. No. 09/460,383, filed Dec. 13, 1999, entitled "Wireless Centrex Call Screen," invented by Chow et al. 8. U.S. patent application Ser. No. 09/459,470, filed Dec. 13, 1999, entitled "Wireless Centrex Call Transfer," invented by Chow et al. 9. U.S. patent application Ser. No. 09/458,823, filed Dec. 13, 1999, entitled "Call Waiting In A Wireless Centrex System," invented by Chow et al. 10. U.S. patent application Ser. No. 09/458,840, filed Dec. 13, 1999, entitled "Wireless Centrex Caller ID," invented by Chow et al. 11. U.S. patent application Ser. No. 09/460,386, filed Dec. 13, 1999, entitled "Distinctive Ringing In A Wireless Centrex System," invented by Chow et al. 12. U.S. patent application Ser. No. 09/458,737, filed Dec. 13, 1999, entitled "Speed Calling In A Wireless Centrex System," invented by Chow et al. 13. U.S. patent application Ser. No. 09/459,541, filed Dec. 13, 1999, entitled "Busy Call Forwarding In A Wireless Centrex Services System," invented by Chow et al. 14. U.S. patent application Ser. No. 09/460,151, filed Dec. 13, 1999, entitled "Wireless Centrex Call Hold," invented by Chow et al. 15. U.S. patent application Ser. No. 09/460,392, filed Dec. 13, 1999, entitled "Wireless Centrex Feature Activation/Deactivation," invented by Chow et al. 16. U.S. patent application Ser. No. 09/460,391, filed Dec. 13, 1999, entitled "User Proactive Call Handling," invented by Brachman et al. 17. U.S. patent application Ser. No. 09/459,324, filed Dec. 13, 1999, entitled "Wireless Centrex Services," invented by Chow et al.
|
cc/2019-30/en_middle_0014.json.gz/line365
|
__label__cc
| 0.696328
| 0.303672
|
On Thursday François Trahan of Cornerstone Macro was in town for a CFA Montreal luncheon featuring a few panelists presenting their outlook 2017 (click on image):
Along with François were Stéfane Marion, Chief Economist and Strategist at the National Bank of Canada and Ari Van Assche, professor of business from HEC Montréal. Clément Gignac, Senior Vice-President and Chief Economist at Industrial Alliance Financial Group was the moderator and he did an excellent job.
Please note some of the presentations are available on the CFA Montreal website here. In particular, you can download Stéfane Marion's presentation here and Ari Van Assche's presentation here.
Unfortunately, François Trahan's presentation is not on the CFA Montreal website. I contacted François this morning by email to get it but he told me his compliance department said it's a no-go (why are compliance people so fussy on such trivial matters?!?).
Anyways, I'm a good internet researcher and can find pretty much anything online so we'll work around this annoying compliance issue. You should all go back a year to see François Trahan's 2016 outlook which can be found here.
A year ago, François was bullish, stating structural headwinds were going to collide with cyclical stimulus. But his views have changed "bigly" (to borrow one of Trump's favorite adjectives) and he's now on record being bearish for 2017.
Before I get into the luncheon, let me thank Andrea Wong of National, a public relations firm in based in Montreal. She and her team once again did a wonderful job, just like the last event when the prince of Bridgewater was in town.
When I got to the conference center, it was jam-packed and I didn't know where to sit. I saw Andrea at the door and she directed me toward the back of the room where there was a chair in between two tables and I sat listening to all those dreadfully boring presentations.
Just kidding! I love François, Stéfane and Clément, know them well. François is a BCA Research alumnus like me and worked there before moving on to bigger and better gigs at Ned Davis, Brown Brother, ISI Group and now Cornerstone Macro. He's now a top Wall Street strategist and enjoys living in New York with his wife and kids but they still come to their farm outside Montreal from time to time.
Clément Gignac was my boss at the National Bank of Canada when he was the chief economist and strategist back in the bear market of 2000-2. Great guy, he is very nice and always knew how to butter me up when he wanted something, like writing a market comment for him: "Léo, t'as une bonne plume!" ("Leo, you write so well"). [Note: You can read Clément's current economic views at Industrial Alliance here.]
Stéfane Marion was my colleague back then. Great economist, really knows his stuff on the US, Canadian and global economy and is genuinely one of the nicest people I've met in the industry. I learned a lot working with him, Clément and Vincent Lépine who is now Vice-President, Global Economic Strategy, Global Asset Allocation and Currency Management at CIBC Asset Management.
Who else did I learn from back then? Martin Roberge who was then the chief quantitative strategist at the National Bank and is now Portfolio Strategist and Quantitative Analyst at Canaccord Genuity. I used to go into Martin's office and we would talk stocks, bonds and markets and just look at a bunch of charts.
Good times back then even if it was a long and painful bear market. The stock prop traders on the fifth floor who were partying it up like no tomorrow in 1999, living the high life on St-Laurent street, ended up hurting when the bear market hit and eventually they all lost their jobs.
Very few people remember the bear market of 2000-2002. It wasn't as bad as the one in 1973-1975 (so I was told by the seniors) but it was brutal, just brutal, especially for stock traders and investors.
I remember Clément rounded us up back then in his office and told us we needed to kick it into fifth gear because "in a bear market, clients love economists." And along with Martin Roberge, we were pulling in most of the soft dollars from clients and we all worked very hard producing great economic and market research and presented our ideas to clients on many road shows.
Why am I sharing all this with you? Because I believe we're headed back into another major bear market unlike anything we've experienced before but before it strikes in a "bigly" way, we might have some more irrational exuberance and Trumptimism to contend with.
Now, let's finally get into the CFA luncheon which ended up being a clash between Stéfane Marion, the cautious bull, and François Trahan, the somewhat uncomfortable bear.
Again, I like both these guys, know their strengths and weaknesses very well, so I refuse to take sides even if in my own Outlook 2017 on the reflation chimera, I referred to François's bearish call and pretty much outlined why I think we're headed into big trouble in the second half of the year.
Please take the time to go over Stéfane Marion's presentation here. Stéfane was kind enough to share his main points with me earlier today via email (click on image):
The key point is the global economy is showing its best economic surprises in seven years and inflation is picking up everywhere including the US, which is why he believes the yield on the 10-year Treasury note could hit 3%. He also states even though Trump is unlikely to deliver massive fiscal stimulus, his moves to deregulate the economy could extend the expansion going on now.
However, he admitted that P/E expansion is very hard at this mature phase of the expansion but thinks P/E contraction will eventually come, but only after the curve flattens.
He prefers equities over bonds and thinks the biggest risk now s geopolitical. He states: "This cycle is most unusual for the U.S. as fiscal stimulus is being deployed with the unemployment rate below 5%. The last time this was attempted was in the 1960 (Kennedy-Johnson). The mature phase of the expansion was extended to 84 months back then (slide 28). Fiscal policy (including deregulation) will play a crucial role in this cycle."
François Trahan was the opposite of what he was last year, shifting from raging bull to a raging bear. He admitted that economic surprises, especially in lagging or coincident indicators like inflation and employment can continue to surprise on the upside in the near term, but he said this sets up the bearish scenario of the Fed tightening as the global economy begins decelerating.
Here, I agree with François and have been voicing my concerns of a 2017 US dollar crisis where the greenback continues to surge higher bringing about the next financial crisis. More on this below.
François wasn't particularly impressed with Trump's massive fiscal stimulus and referred to a New York Times chart showing that if you look at historical episodes of massive fiscal stimulus, the effects on the economy were muted.
He made me laugh when he referred to his wife as a "North Eastern liberal" who credits President Obama with saving the US economy and basically stated it doesn't matter who is in the White House, the economy moves to its own rhythm (Amen! I get into email spats with my buddies out in California who are geniuses and yet they're "petrified" of Trump and think Obama was the best president ever...whatever!!).
Given his bearish stance, François favors bonds over stocks and he said he wouldn't be surprised if stocks slip 15-20% from these levels by year-end and if the yield on the 10-year Treasury note declines below 1.3%. That's about as bearish as I've ever heard Mr. Trahan.
He had an interesting discussion on the behavior of P/Es saying they are acting more cyclically lately. "If the P/E was more correlated to inflation, we might change our scenario, but that just isn't the case."
In his presentation, Ari Van Assche discussed demographic changes in China and discussed structural changes going on there and what might happen in the future as growth slows and policies change. I must admit I didn't pay enough attention to Ari's presentation as I was chit chatting with my buddy at this point (my bad).
During the Q&A, François stated that sell-side economists and strategists are perennially optimistic, part of their occupational hazard. Stéfane responded by saying he is the chief economist but also sits on the bank's pension committee so he wears a sell-side and buy-side hat.
Anyways, enough of that, sparks didn't fly at the CFA luncheon but there was a civil disagreement. As you all know, I'm a deflationista, have NOT changed my mind as to where the global economy is headed and think too many smart people are making way too big a deal of a pickup in inflation in Germany, the US and elsewhere and they're reading way too much into it, erroneously believing it's the beginning of the end for US bonds.
Where did I go wrong last year? I correctly ignored Soros's warning of another 2008 crisis and correctly predicted the bloodbath in stocks was ending in mid January, but I completely missed the reflation trade going in cyclicals like industrials and energy. I remember at one point I was trading and noticed the Metals and Mining (XME) ETF hit an intraday low of where it was back in the crisis of 2008 and I said to myself "hold your nose and just pounce!". I didn't and partially regretted it but my deflationary views remained in place and are still strong, so I don't care if I missed that rally.
What surprised me yesterday is there wasn't a more serious discussion on the likelihood of a 2017 US dollar crisis where the greenback continues to surge higher and emerging markets get clobbered. This is my worst case scenario and I'm sticking with it and think there will be real fireworks in the fourth quarter of the year.
Stéfane did mention that commodity prices keep creeping up despite the stronger dollar, which has eased pressure on commodity exporting emerging markets but this won't likely last and when correlations get back to normal, a surging greenback will clobber Chinese (FXI), emerging markets (EEM), energy (XLE), Metals and Mining (XME), Oil & Gas Exploration (XOP) and all commodities (GSG) in general.
I'm bearish like François but where I disagree with him is on the timing of his call. Remember what Keynes once said: "markets can stay irrational longer than you can stay solvent." There is a lot of money out there chasing risk assets higher, hedge funds leveraging up like crazy, animal spirits fueling excessive optimism, so this silliness can last a little longer.
Lastly, as Stéfane was leaving, I told him that Trump has signed more executive orders this week than Obama, Clinton and George "W" Bush did in their first month of office combined. I may be off a bit but President Trump isn't fooling around, working like a dog, perhaps fearful of the downturn that lies ahead.
As always, please remember to kindly donate or subscribe to this blog on the top right hand side under my picture using PayPal options. Every time I write a long comment like this one, I remind myself that I don't get paid for this and it's a lot of work which is grossly under-appreciated. Please show your financial support and kindly donate or subscribe to the blog.
Below, François Trahan defends his case for turning bearish. Listen carefully to his arguments and trust me, even though his timing is a bit early, I would definitely heed his warning.
I'll leave you with another thought. Soros lost a billion dollars last year following Trump's victory. Soros won't lose a billion dollars two years in a row.
And Steve Cohen just had his worst year since the financial crisis, up a mere 1% in 2016. That too is an anomaly. My money is that Soros and Cohen will kill their competition this year, including the quant hedge fund beast that helped elect Trump and killed it in terms of performance last year (more on top 2016 hedge fund performers in a subsequent comment).
|
cc/2019-30/en_middle_0014.json.gz/line369
|
__label__cc
| 0.702815
| 0.297185
|
Dark Souls » Characters » Artorias, the Abysswalker
Knight Artorias, also known as the 'Abysswalker', was one of the four knights of Gwyn.
There is a possibility that he was present during the fall of New Londo as he traveled there when the Four Kings fell to the dark and hunted the Darkwraiths. To do this, he made a covenant with the beasts of the Abyss (possibly Kaathe or Frampt) that allowed him to traverse it.
When Oolacile fell to the dark, he was awarded the Silver Pendant for facing the Abyss, an ancient treasure of Anor Londo that "deflects the Dark of the Abyss, especially in its magic forms". He traveled to Oolacile but was defeated by Manus. Artorias sacrificed himself to protect his wolf companion, Sif, using his greatshield to raise a barrier around the pup. He fled from Manus, but his exposure to the abyss overcame him and he fell to its corruption. By the time the the Chosen Undead arrives, it is too late; Artorias is by then completely overtaken by the corruption of the Abyss and attacks the player.
His grave, marked with his greatsword, is placed at the Oolacile Sanctuary area (later known as the Darkroot Garden) and is guarded by Sif, Alvina's clan of Forest Hunters, and possibly also Lord's Blade Ciaran.
The Pact with the Beasts of the Abyss
The "beasts of the abyss" are generally accepted to be the primordial serpents.
It is clear that Artorias gained the ability to traverse the abyss without being completely consumed. More specifically, it was either Frampt or Kaathe that Artorias made the pact with.
Kaathe was thought to be responsible for convincing the people of Oolacile to dig up Manus, as he generally wants to see Humanity propagate by any means.
Artorias may have been deceived into being corrupted. Or, it may have been Frampt to mess up Kaathe's plans, which is more in line with the legend of Artorias going to Oolacile to fight Manus.
+ Expand Dialogue
- Collapse Dialogue
Whatever thou art, stay away.
Soon, I will be consumed.
By "Them", by the Dark.
UAAAGH.
Thou are strong, human
Surely thine kind are more than pure dark
I beg of thee, the spread of the abyss, must be stopped.
Ah, Sif, there you are…
All of you, forgive me
For I have availed you nothing
HURR UAGHH DUURR DOOORP HUAAAAGHH
Soul of Artorias
Soul of Lord Gwyn's Knight Artorias, who was consumed by the Abyss.
The legend that Artorias repelled the Abyss only told half the story.
It seems that he was defeated, and his honor preserved, by some unsung hero, who is the true victor of the Abyss.
Covenant of Artorias
This ring symbolizes Knight Artorias's covenant with the beasts of the Abyss.
It's wearer, like Artorias himself, can traverse the Abyss.
Crest of Artorias
This crest opens a door in the Darkroot Garden sealed by ancient magic.
This door leads to the grave of Sir Artorias the Abysswalker.
Many adventurers have left for the grave, but none have returned for they make easy prey for local bandits,
With such dangers, the crest can do more harm than good in the hands of the uninitiated.
Greatsword of Artorias
Sword born from the soul of the great grey wolf Sif, guardian of the grave of the Abysswalker Knight Artorias.
The sword can damage ghosts, as it was cursed when Artorias joined a covenant with the creatures of the Abyss
Greatsword of Artorias (Cursed)
Sir Artorias hunted the Darkwraiths, and his sword strikes harder against dark servants.
Abyss Greatsword
This greatsword belonged to Lord Gwyn's Knight Artorias, who fell to the abyss.
Swallowed by the Dark with its master, this sword is tainted by the abyss, and now its strength reflects its wielder's humanity.
Helm of Artorias
Helm of Artorias the Abysswalker, one of Gwyn's four knights.
The death of the helm's owner can be surmised from the corrosive Dark of the Abyss,
and the musty azure-blue tassel, once a symbol of pride and glory.
Armor of Artorias
Armor of Artorias the Abysswalker, one of Gwyn's four knights.
The death of the armor's owner can be surmised from the corrosive Dark of the Abyss,
and the tattered azure-blue cape, once a symbol of pride and glory.
One of the ancient treasures of Anor Londo.
Presented to Artorias for facing the Abyss.
Effectively deflects the Dark of the Abyss, especially in its magic forms.
Cleansing Greatshield
The steel greatshield used by Knight Artorias, who succumbed to the Abyss.
Artorias, deeply scarred by the Abyss, used this to form a barrier to protect his compatriot Sif.
Although this drained the shield, its magic defense remains high.
NEXT: Asylum Demon
boss_dialogue_sources
|
cc/2019-30/en_middle_0014.json.gz/line376
|
__label__wiki
| 0.942951
| 0.942951
|
Eberle, Bailey help Islanders beat Penguins 3-1 in Game 2
(AP Photo/Julio Cortez)
By VIN A. CHERWOO
UNIONDALE, N.Y. (AP) After falling behind in the second period, the New York Islanders didn't get discouraged. They maintained their focus, tied it minutes later and then pulled away in the third period.
Jordan Eberle and Josh Bailey scored less than four minutes apart in the final period and the Islanders beat the Pittsburgh Penguins 3-1 Friday night for a 2-0 lead in their first-round playoff series.
"You can't get too emotional, get too down and get frustrated," New York captain Anders Lee said. "We were playing a good game at the time (Pittsburgh scored), but there was plenty of time left."
Anthony Beauvillier had the tying goal midway through the second and Robin Lehner stopped 32 shots to help New York open a postseason series with two wins for the first time since sweeping Edmonton in the 1983 Stanley Cup Final for the Islanders' fourth straight championship.
Mathew Barzal had two assists in a chippy, physical game that featured a lot of hard hits and some skirmishes, especially in the first two periods - and also after the final buzzer.
"We stayed with it all night," New York coach Barry Trotz said. "Both teams were knocking heads for a while there. ... We got opportunities and we capitalized on them, and we got a big save when we needed it."
Erik Gudbranson scored and Matt Murray finished with 31 saves for the Penguins, who have lost the first two games of a postseason series for the first time since the 2013 Eastern Conference finals against Boston.
Game 3 is Sunday at Pittsburgh.
"We've got to go back to our building and worry about one game," Murray said. "That's it."
The Islanders took the lead after a turnover by the Penguins near their own blue line. Barzal sent the puck up to Eberle on the right side and he skated across the front and sent a backhand in at 7:54 of the third to put New York up 2-1.
Bailey, who had the overtime winner in Game 1 on Wednesday night, then gave the Islanders a two-goal lead with a power-play score with 8:22 remaining on New York's sixth man-advantage of the night. Devon Toews fired a shot that hit Lee, and the puck came to Bailey, who put it in from the right side.
The Islanders struggled on the power play all season, going 3 for 50 over the final 22 games to finish 29th in the NHL at 14.5 percent. They had one goal on their first seven chances of this series before Bailey's score.
"We kind of talked earlier in the week, just our power play not killing momentum," Lee said. "We might not score every time, but to have a good showing, get some shots, create some buzz around us and start feeling the puck. We had a good showing with that. Guys just stuck with it."
The Penguins pulled Murray for an extra skater with 2:44 remaining, but couldn't take advantage. Lehner made a nice glove save on Phil Kessel from the right circle, drawing chants of "Leh-ner! Leh-ner!" from the raucous home crowd.
"He was stellar, he made some huge saves," Eberle said. "A couple that seemed they had an `A' chance at. He's been huge all year."
The Islanders had a 5-on-3 advantage for about a minute in the second period, but couldn't beat Murray. The Penguins goalie then had a diving stop on Matt Martin in front about 7:44 in, and a stick save on a slap shot by Ryan Pulock 10 seconds later.
Brian Dumoulin hit a goalpost for Pittsburgh at about the 9-minute mark.
Gudbranson then gave the Penguins their first lead of the series when he took a pass from Evgeni Malkin and fired a one-timer that beat Lehner's blocker side and went in off the post with 9:24 remaining in the second. It was Gudbranson's first career playoff point.
It lasted less than three minutes.
Beauvillier tied it with 6:35 left in the period with his first career playoff goal as he knocked in the loose puck in front after Murray was out of position following a save on Barzal's initial try on a 3-on-2 break
While some of the Islanders began celebrating the goal, fights broke out to Murray's left. Barzal was given a double-minor for roughing, while Pittsburgh's Marcus Pettersson received a 2-minute penalty.
The Islanders outshot the Penguins 11-7 in the scoreless first period.
NOTES: Murray has lost consecutive playoff games for the fourth time. He also did it in Games 3 and 4 of 2017 Stanley Cup Final against Nashville, and Games 2-3 and 5-6 against Washington in second round last year. ... Penguins F Jared McCann sat out due to an upper-body injury. He was replaced in the lineup by F Teddy Blueger, making his playoff debut. D Jack Johnson was back in the lineup after sitting out Game 1. He had played in all 82 games during the regular season. D Olli Maatta sat out to make room. ... New York was 38-2-2 in regular season when scoring at least 3 goals, and is now 2-0 in playoffs.
The series shifts Pittsburgh for Game 3 on Sunday and Game 4 on Tuesday night.
Follow Vin Cherwoo at www.twitter.com/VinCherwooAP
More AP NHL: www.apnews.com/NHL and www.twitter.com/AP-Sports
|
cc/2019-30/en_middle_0014.json.gz/line378
|
__label__wiki
| 0.699483
| 0.699483
|
Hebrew » התפתחויות חדשות
אטלס ירושלים
התפתחויות חדשות
מצגות מפות פרסומים
Palestinian Security Forces (not really) allowed in East Jerusalem
In recent weeks, there have been a number of press reports whereby Israel has consented to a renewed presence of Palestinian Authority security personnel in East Jerusalem (YNet: Palestinian police deployed in East Jerusalem after Israel ban; Times of Israel: Palestinian police return to Jerusalem suburbs).
Such reports are no more accurate than the recent articles celebrating the “approval of Palestinian construction in East Jerusalem” or “a suspension of Absentee Property Law.” In each of these cases, hasbara and sensationalist headlines are trumping the facts.
What has in fact occurred is that Israel has permitted armed Palestinian police to return to Abu Dis, Azariyeh, a-Ram and Biddou – Palestinian neighborhoods located adjacent to East Jerusalem, under Palestinian civilian control but full Israeli security control. This is the first time in more than 15 years that Israel has permitted armed Palestinian security to maintain a regular presence in these areas. The decision to end the ban on Palestinian security operations in these areas appears to be a reflection of the thriving crime in these neighborhoods – crime that Israeli security forces have little interest in working directly to control, but which nonetheless has security implications for Israel.
As with the recent Israeli decision to grant permits for Palestinian medical personnel to drive their cars to their places of work in Jerusalem, so too does this new policy vis-à-vis Palestinian security forces underscore how little many Israeli policies regarding the Palestinians have to do with genuine Israeli security concerns, and how much more they are grounded in political goals, like limiting the presence and effectiveness of Palestinian governance in certain areas. It is a decision that may benefit some Palestinians, but it is one grounded in Israeli self-interest.
|
cc/2019-30/en_middle_0014.json.gz/line384
|
__label__cc
| 0.612515
| 0.387485
|
Home Open Access Tracking Project (OATP) peter.suber's bookmarks Scholarly Communication and Open Access in Psychology: Current Considerations for Researchers
Scholarly Communication and Open Access in Psychology: Current Considerations for Researchers
Abstract: Scholarly communication and open access practices in psychological science are rapidly evolving. However, most published works that focus on scholarly communication issues do not target the specific discipline, and instead take a more “one size fits all” approach. When it comes to scholarly communication, practices and traditions vary greatly across the disciplines. It is important to look at issues such as open access (of all types), reproducibility, research data management, citation metrics, the emergence of preprint options, the evolution of new peer review models, coauthorship conventions, and use of scholarly networking sites such as ResearchGate and Academia.edu from a disciplinary perspective. Important issues in scholarly publishing for psychology include uptake of authors’ use of open access megajournals, how open science is represented in psychology journals, challenges of interdisciplinarity, and how authors avail themselves of green and gold open access strategies. This overview presents a discipline-focused treatment of selected scholarly communication topics that will allow psychology researchers and others to get up to speed on this expansive topic. Further study into researcher behavior in terms of scholarly communication in psychology would create more understanding of existing culture as well as provide early career researchers with a more effective roadmap to the current landscape. As no other single work provides a study of scholarly communication and open access in psychology, this work aims to partially fill that niche.
https://assert.pub/papers/2d7um
oa.new oa.scholcomm oa.psychology oa.ssh oa.data oa.rdm oa.reproducibility oa.metrics oa.preprints oa.peer_review oa.open_science oa.megajournals oa.green oa.gold oa.repositories oa.versions oa.journals
|
cc/2019-30/en_middle_0014.json.gz/line385
|
__label__wiki
| 0.955821
| 0.955821
|
Apple Cancels “Hi, I’m a Mac” Commercials
By Allie Townsend @Allie_TownsendMay 21, 2010
It looks like Apple has finally shuttered its Get a Mac campaign once and for all, pulling it from its site today.
(More on Techland: Apple Now Accepts Cash For iPads)
Even the gallery of the Get a Mac ads, featuring personified versions of Mac (Justin Long) and PC (John Hodgman), were removed and instead, the site redirects to a Why You’ll Love a Mac page. The award-winning campaign started in 2006 rolled out its last installment of commericals in October of 2009, and though Long revealed that the ad series was to be no more last month, this is definitely the confirmation we’ve been waiting for. Still, judging by the Get a Mac success, it seems likely that Apple will continue its TV presence, though no announcements have been made.
So long Mac & PC guys, it’s been a great run.
[via MacRumors]
|
cc/2019-30/en_middle_0014.json.gz/line391
|
__label__wiki
| 0.504217
| 0.504217
|
Home Rock Climbing Climbing Bolts: What are Them and How to Identify Bad Bolts
Climbing Bolts: What are Them and How to Identify Bad Bolts
Fixed protection and anchors, semi-permanent bolts and pitons that are already in place, are found on almost every climbing route. Sport climbing routes are protected by preplaced bolts that were hammered into holes drilled in the rock by the first ascent party, while other traditional-style routes have bolts and pitons that were placed by either the first ascent party or by subsequent climbers.
Never Trust Fixed Gear!
When you are climbing, it’s a good idea to always follow this simple rule: Never trust fixed gear. Unless you know the history of the fixed gear, meaning that you placed it yourself or witnessed another climber placing it, you know nothing about it. Every piton and bolt you encounter on a route should be treated with suspicion and used prudently since fixed anchors can fail, causing serious injury or death to a climber.
Bolts Give False Sense of Security
The boom in sport climbing, with routes primarily protected by fixed bolt anchors since the mid-1980s, has led to a general complacency and a false sense of security, especially among new and inexperienced climbers. Many climbers going to popular sport climbing areas like Shelf Road in Colorado, the New River Gorge in West Virginia, and Smith Rock in Oregon figure that the bolts must be fine since lots of climbers go there and clip into them. That, however, is an illusion since bolts can break, may be improperly placed, can be placed in bad rock, or may have hidden weaknesses like rust, especially in wet environments and seaside climbing areas.
Bolts are Metal Shafts of Different Sizes and Shapes
Bolts are simply pieces of metal of various alloys, sizes, and shapes that are either hammered or glued into a predrilled hole in a rock surface; a bolt hanger, simply a piece of metal with a hole large enough to attach a carabiner and another hole that fits over the bolt shaft, is attached to the bolt itself, allowing a climber to clip himself into it for safety.
3 Main Bolt Types Used for Climbing
Several types of bolts are used for rock climbing protection-wedge bolts, sleeve bolts, and eyebolts. Wedge and sleeve bolts, mechanical bolts that are usually used in building construction, rely on friction between the bolt shaft and the rock sidewalls of a hole to hold the bolt in place when it is tightened. An expanding cone inside the bolt helps wedge the shaft in the hole. Eyebolts, simply a metal shaft with an eye for clipping a carabiner, are placed in a drilled hole filled with industrial-strength epoxy, which bonds the metal to the rock surface. Some eyebolts are specifically made for climbing purposes, while others are used for construction. Forged and stainless steel eyebolts are stronger than cheaper cast eyebolts.
2 Types of Bolt Strengths
Bolts have two types of strengths-pullout strength and shear strength. Pullout strength refers to the amount of force that is required to pull the bolt out of the hole. The pullout strength on most bolts used for climbing is usually very strong. A bolt that is at least three- or four-inches long almost never pulls out under a load, especially if the load is perpendicular to the bolt shaft. Climbers are more concerned with the shear strength of a bolt, which refers to the strength of the shaft itself. Logically, thicker bolt shafts have higher shear strength than thinner shafts. Climbers that place bolts try to use the thickest bolt whenever possible.
Thicker Bolts are Stronger than Thin Bolts
Most bolts used for climbing anchors have either a 3/8-inch or ½-inch-thick shaft, rather than a ¼-inch or 5/16-inch shaft, which are considerably weaker. Old bolts used on climbing routes, usually bolts placed in the 1960s and 1970s in holes drilled by hand, are ¼-inch in diameter. Accidents and fatalities have occurred when these old bolts, usually rusted and weak, break or are sheared off by the extreme forces generated by a fall. Bolts are strongest when they are loaded by a fall or other weight load that is perpendicular or at a 90-degree angle to their shaft.
|
cc/2019-30/en_middle_0014.json.gz/line393
|
__label__cc
| 0.701821
| 0.298179
|
Jan McCafferty’s Fairy Characters
Meet the delightful Nuxi, one of a range of charming new characters created by Jan McCafferty, called The Oak Tree Fairies. Jan McCafferty is represented by Arena
Tags: butterflies, children's book, fairies, illustration, illustrator, illustrators, squirrel
Bright News!
‘It’s been an exciting start to the year for Bright artists with a lot to follow in 2013. Take a look below at all the latest news from Bright Group International:
We are extremely excited and proud to announce that Ada Grey, one of Bright’s newest stars has been chosen by Bloomsbury for their new royal baby book ‘Shh don’t wake the royal baby!’ Due for release to coincide with the birth of the royal baby. Ada has also been signed up to a two book deal with Little Tiger Press - we are very excited to see Ada’s progression with us this year, stay tuned!
Nicola O’Byrne’s debut picture book, ‘Open Very Carefully’ has been published this month by Nosy Crow and is available to buy on Amazon Now! This funny tale for young children is about a very grumpy crocodile trapped in entirely the wrong story – a must read for your kids!
We’re sending big congratulations over the pond to our US agent Kirsten Hall and to our UK based artist Shelagh McNicholas for their book, ‘Tea Time with Sophia Grace and Rosie’ making its debut on the Ellen Show! The book, published by Scholastic was quickly put together by those involved to feature Ellen’s favourite guests, Sophia Grace and Rosie.
And finally our wonderful Ben Mantle has won the 2013 Bishop’s Stortford Picture Book Award! Competing against 50 other picture books, ‘Callum’s Incredible Construction Kit’ published by Egmont won the votes and affections of over 1300 school children.
Tags: children's books, fairy, illustration, kids, picture books, princess, publishing
Introducing our new ‘Startworks’ artists! – Stacey Knights and Sami Al-Adawy.
The Artworks are delighted to introduce our new Startworks artists Stacey Knights (1st below) and Sami Al-Adawy (2nd below). Both artists graduated with first class honours in 2012. Sami graduated from the University of the West of England. His work comes from a love of intricacy and design, fused together with a delicate interlacing of bold colours and shapes. Stacey graduated from Norwich University College of the Arts and specialises in paper collages. She creates hand painted paper bespoke to the project or image she’s working on, making every piece of illustration truly unique.
Tags: bords, design, graduates, illustraors, illustration, owl, paper collage
Lindsey Spinks Lindt Big Egg Hunt 2013
Lindsey Spinks has been asked to take part as one of the artists involved in this years ‘Lindt Big Egg Hunt’. It’s a brilliant initiative in aid of Action for Children, ‘set to be the largest, interactive public art exhibition the country has ever seen. Last year the hunt raised over £1million pound for charity’. Lindsey has managed to take her amazingly detailed illustrations and apply them to the huge egg due to be unveiled in Covent Garden this February. Keep an eye out for more information coming soon… Lindsey Spinks is represented by The Artworks
Tags: charity, cityscapes, covent garden, easter, easter eggs, egg hunt, illustration, illustrator, london, people
|
cc/2019-30/en_middle_0014.json.gz/line396
|
__label__cc
| 0.741628
| 0.258372
|
Magickal Visualization Training/Work Shop
"Poke" Ruyon
Basic Meditation Techniques
The Cyber Spellbook: Magick In the Virtual World
From creating virtual sacred space, to using your microwave and cellular phone for spellcasting this book is the ultimate hands-on companion for technowitches everywhere. Shows how to effectively marry all the magickal potential and powers of modern mechanical gadgetry with traditional metaphysical using humor, wisdom, and old-fashioned creativity. Designed specifically to bring yesterday's insights and modern wonders back into balance. Within these pages technology does not mean the loss of spirituality or a magickal focus. Rather, it becomes the focus! The book includes: cyber spells by theme (love, health, joy), user-friendly techno-focals, cyber dedications, virtual visualizations, proactive computer conjurings, directions on how to make an online Book of Shadows, and much, much more.
Files/Best%20Known%20Authors/Damon-Brand/Wealth-Magick-The-Secrets-of-Extreme-Prosperity.pdf
A Brief Handbook of Exorcism
The Greater Key of Solomon Part 3
Concerning the proper behavior of the Mage and his assistants, and the tools and materials of the magickal art.
The Key of Solomon, save for a cultailed and incomplete copy published in France in the seventeeth century, has never yet been printed, but has for centuries remained in Manuscript form inaccessible to all but the few fortunate scholars to whom the innermost recesses of the great libraries were open. The fountain-head and storehouse of Qabalistic Magic, and the origin of much of the ceremonial magic of Midieval times, the "Key" has been valued by Occult writers as a work of the highest authority.
Taken from the 1960 reprint of AN ENCYCLOPEDIA OF OCCULTISM by Lewis Spence, University Books, Hyde Park, New York. First published in 1920, it is considered to be one of the best sources on the subject.
The Satanic Bible - Anton LaVey
A founder of the Church of Satan explains its philosophies of indulgence and freedom, and discusses Satanic rituals. The Satanic Bible claims the heritage of a horde of evil deities--Bile', Dagon, Moloch, and Yao Tzin to name a few--but these ancient gods have no coherent connection between each other or to Satanism, except that all have been categorized by Christianity as "evil." Calling on these ancient names like a magician shouting, "Abracadabra," LaVey attempts to shatter the classical depiction of Satanism as a cult of black mass and child sacrifice. As the smoke clears, he leads us through a surprisingly logical argument in favor of a life focused on self-indulgence. The Satanic Bible is less bible and more philosophy (with a few rituals thrown in to keep us entertained), but this philosophy is the backbone of a religion that, until LaVey entered the scene, was merely a myth of the Christian church. It took LaVey, and The Satanic Bible, to turn this myth into a legitimate public religion
The Book of Pleasure: The Psychology of Ecstasy
The Book of Pleasure: The Psychology of Ecstasy is a book written by Austin Osman Spare. The book could be regarded the central text among his writings. It covers both mystical and magical aspects of Spare's ideas; and the modern ideas on sigils (as now have become popular in chaos magic) and Spare's special theory on incarnation are for the first time introduced in this book.
Files/Best%20Known%20Authors/Damon-Brand/Adventures-In-Sex-Magick-Control-Your-Life-With-The-Power-of-Lust.pdf
[ recommended ] Jason Miller - The Sorcerer's Secrets: Strategies in Practical Magick
This book is about real magick, effecting real change, in a real world.
There are some books on magick that teach it purely as spiritual advancement. Others teach it as a form of psychological self-help that effects only inner change. While magick can and should be both of these, it is also something more. The Sorcerer's Secrets is about success in practical magick; it is a book that aims at changing both the outer and inner worlds.
Beyond a mere spell book or training course, The Sorcerer's Secrets is a field manual on successful sorcery written by a professional sorcerer. The first part of the book lays out the qualities, concepts, and exercises necessary to attempt practical magick. The second part presents clear strategies for tackling almost any type of issue with sorcery.
*Attack problems from multiple angles, not just by casting a spell.
*Blend mundane and magickal action to ensure success.
*Figure out whether what you are doing is working, and fix it if it isn't.
*Go beyond readings, into magickal intelligence-gathering.
*Influence the minds of other people.
*Work most effectively on behalf of others.
The Sorcerer's Secrets will help rescue the art of Magick from those who have ignored, downplayed, or just outright denied the existence of practical sorcery in favor of arcane titles, intangible results, and fantasy attainments.
Candle Magick by Emer
Introduction into candle magick.
Demons of the Flesh: The Complete Guide to Left-Hand Path of Sex Magic by Nikolas & Zeena Schreck
Demons of the Flesh is a comprehensive and unflinching overview of the erotic initiation and sexual sorcery essential to the mysterious magical tradition known as the "Left-Hand Path." Part exploration of this taboo area, part manual detailing the actual mechanics of sex magic, the book draws on the pioneering studies of Aleister Crowley and Jack Parsons to penetrate the veil of secrecy surrounding the ecstasies and dangers of these practices.
The sexual and magical activities described in this book are intended exclusively for application by adults who have reached the age of majority, and should only be performed on a consensual basis by individuals possessing sound physical and mental health. Recommendations suggesting that the reader undertake proper training in physical activities that might prove injurious are intended seriously.
Amazing You Spells: Unleash Your Magick Powers
Discover the bewitching you by tapping into your inner magic. Try out spells for beauty, love, confidence, friendship, and success. Use your magic powers to make life better, and you?ll be amazed at the results. Lively and fun?and with gorgeous glittery covers?Amazing You is a new series of Mind, Body, Spirit books just for girls. Discover fantastic things about you, your friends, and your future just by trying out the tips and exercises in each book. Read on?and see for yourself how amazing you can be!
[ recommended ] Joseph Lisewski - Ceremonial Magic & The Power of Evocation: A System of Personal Power
For centuries, the ceremonial evocation of spiritual beings has been Magic's darkest corner. Reputed to fulfill the Magician's material desires, evocation has been the topic of the most famous Grimoires---the Grammars of Magic. From the Sworn Book of Honorius the Magician, to the Greater Key of Solomon and the Goetia; from the Grand Grimoire, to the complete treatise of the Lemegeton, all give direct, yet difficult, directions to the individual desiring to have the 'good life'; in the here-and-now. But the simplest of Grimoires, the Heptameron of Peter de Abano, has escaped the attention of modern Ceremonialists. Its simplicity and power in summoning the Aerial Spirits is second to none. Ceremonial Magic lays bare the operation of the Heptameron. Its Magical Axioms, extensive Commentaries, copious notes, and personal instructions to the reader---all gained from Dr. Lisiewski's forty-years of study and practice in Ceremonial Magic---make this a resource that no serious student of Magic can afford to be without. It is all here, as in no other Grimoire. Use its instructions and the world of evocation and personal gratification are well within your grasp!
Sasha Fierce - Wiccan Spells
Wiccan Spellbook used mainly for coven work, but could also be adapted to individual spellwork as well.
The Universal Master Key by Franz Bardon
The Magician's path is one of self-mastery and inner transformation. This new text by Franz Bardon not only contains the master keys to spiritual development, but also the universal keys to every element and to every positive attribute with which you can learn to control and overcome your negative attributes.
In this text Franz Bardon lists each virtue a Hermetic adept should cultivate and the powers that each attribute opens within the practitioner. As the tentative student transforms his vices into virtues and cultivates harmony and balance throughout his entire being, he discovers that all aspects of his path are interdependent. As he masters his concentration and meditation exercises he gains greater control over himself. As he masters his short comings his ability to meditate and focus increases. As he masters the elements of Earth, Air, Water and Fire within himself his powers over the external forces increase in dramatic proportion. In truth, the master of the magical arts is he who has truly mastered himself.>rb<:revoc kcab eht morF>rb<>rb
Summoning Spirits: The Art of Magical Evocation by Konstantinos
Learn to safely evoke powerful spirits to aid you with any task.Create sigils charged with the energy of spirits to magnify the effects of your evocations. Make an etheric egregore, a manufactured spirit that will perform the task of your choice. Perform easy exercises to train your magical abilities and to develop clairvoyance and clairaudience. Construct, prepare, and use special magical tools to aid your evocations. Summoning Spirits is a complete manual for evoking entities to effect positive changes in your life. Learn how the spirits that dwell on the other planes can be evoked to the astral and physical planes to help you obtain mystical abilities, locate hidden "treasure," and even command a spirit "army" to protect your home while you're away.
The Vampire Bible
The Vampiric Philosophy, Rituals and Texts. This book includes the essentials to practice the Vampire religion
Files/Best%20Known%20Authors/Damon-Brand/Magickal-Protection-Defend-Against-Curses-Gossip-Bullies-Thieves-Demonic-Forces-Violence-Threats-and-Psychic-Attack.pdf
Files/Best%20Known%20Authors/Damon-Brand/Magickal-Seduction-Attract-Love-Sex-and-Passion-With-Ancient-Secrets-and-Words-of-Power.pdf
|
cc/2019-30/en_middle_0014.json.gz/line397
|
__label__wiki
| 0.548912
| 0.548912
|
Comment of the Day: The Great Northern Divide
Conroe, Quicklink, The Woodlands
COMMENT OF THE DAY: THE GREAT NORTHERN DIVIDE “So what’s the deal with the ‘Conroe’ vs. ‘The Woodlands’ location name ambiguity? Seems to me that a lot of people living up that way have a Conroe mailing address but claim the name “The Woodlands” when saying where they live. The address of this listing is 0 Darby Loop Conroe, TX 77385, and in the first sentence of the listing description, the realtor claims it is ‘…in The Woodlands!’ (emphasis unaltered). Recently I tried to mail something to my uncle who lives in the ‘The Woodlands,’ but I had his mailing address listed as ‘Conroe.’ So I called him to verify, and he gave me a really long explanation that explained nothing and only confused me more. In the end, he instructed me to write ‘The Woodlands’ on the envelope, even though he mentioned that the name ‘Conroe’ is actually on the sign at his local Post Office.” [Superdave, commenting on Houston Home Listing Photo of the Day: House Chopper]
Comments, Conroe, Montgomery County, The Woodlands
Former Downtown Sheraton-Lincoln Hotel Disappearing from Above
59 Borders: The End
Hellsing March 21, 2011 at 3:25 pm
I’m still trying to figure out when Montrose became *snicker* THE MONTROSE!!!
LandedGent March 21, 2011 at 3:32 pm
There may be a USPS-related rationalization, however, I assure you the the reason for this distinction is that Conroe is a redneck cess pool and The Woodlands is merely a suburban cess pool.
Cody March 21, 2011 at 3:39 pm
Just write “BFE” on it to cover both.
tanith27 March 21, 2011 at 3:49 pm
Same reason anything north of Buffalo Bayou is called ‘The Heights’
eiioi March 21, 2011 at 4:06 pm
The Woodlands doesn’t exist – as far as USPS is concerned. The oldest zip codes 77380 and 77381 were always “Spring” even though they are in the middle of The Woodlands.
However, the listing you mentioned at 0 Darby Loop is neither in Conroe nor The Woodlands, nor is it a “loop” (http://tinyurl.com/4tj8h5q), nor is the address at ZERO. Discuss amongst yourselves, (I’m getting a little verklempt).
movocelot March 21, 2011 at 4:33 pm
This may be more info than anyone needs but wtf –
According to the USDA Soil Conservation and Forest Services, this acreage consists of Sorter Silt Loam: “level, poorly drained and high in silt content… saturated with water for long periods each year. These soils are used mainly for timber.”
This explains why the property was solid forest until this place was built: it had to be clear-cut in order to increase it’s elevation (‘razed to be raised.’)
Personman March 21, 2011 at 5:59 pm
Hellsing: “I’m still trying to figure out when Montrose became *snicker* THE MONTROSE!!!”
It’s been that way since I was a teen and I’m pushing 40.
ricemilitaryboy March 21, 2011 at 6:12 pm
I guess the snobs that live in “The Woodlands” don’t want to be thought of as being country bunpkins from Conroe.
cm March 21, 2011 at 6:47 pm
Woodlands people are worse or at least on par with the Snobbery to be found in West U, the average 3 story stucco monstrosities to be found in Rice Military area/and even some of the more upscale parts of the heights. I grew up there, and one it’s now a Woodlands address, formerly spring. And all schools in the Woodlands are CISD (Conroe). Of course some very wealthy people live around lake Conroe too. I personally can’t stand the woodlands, it’s homogenous, boring, and anyone College years or younger is either selling or using drugs. But mom and and dad are convinced their *hit doesn’t stink, and are oft completely oblivious to the fact it’s a very druggy culture. Conroe is to some degree a bastion for white trash, but then again the woodlands also has several HUD owned apartments, so any so called snobbery is just absurd, they’re cut from the same cloth. Aside from tennis lessons, and great places to skate in the late 80’s all my memories of the Woodlands are pretty lousy.
EMME March 21, 2011 at 9:10 pm
Montrose became The Montrose somewhere around the 80s. I don’t know why, but I think it was around the time “Neartown” became an issue. Anybody remember the “Neartown” controversy?
PYEWACKET2 March 21, 2011 at 10:10 pm
When I lived off Montrose and Westheimer in the late sixties, we just said we lived “off Westheimer”. There was no mention of Montrose. Folks then knew what we meant.
People lived in that area as well as Heights because rent was cheap back then.
miss_msry March 22, 2011 at 2:35 am
Dear Personman,
I’m nearing 60 and all we called Montrose back in the early 60s was Grandmothers house.
Hellsing March 22, 2011 at 8:23 am
Soon to be 50 here and lived in Montrose full-time until I was 18. I’m imagining the reaction if somebody at, say, Cabaret Voltaire had said “The Montrose” and it ain’t pretty.
KevPat March 22, 2011 at 9:35 am
I am a Houston native, grew up around Montrose and still do. We always called it “home.” Interestingly the area seems to have expanded along with its popularity and decreased stigma, seems as though it now extends from Allen Pkwy to SW Frwy and Smith to Shepherd. Similarly the Menil area was quick to become chic due to its prestige and you see that area overlapping Montrose.
Just stick with your hood, wherever it may be and like all fashion, it will come back into vogue.
cm=corey March 22, 2011 at 10:10 am
That montrose is in Paris.. :) I like Cabaret Voltaire too, but they’ve never been to houston..
finness March 22, 2011 at 11:06 am
When I moved here in 81, it was simply Montrose. Have no idea when the The got added. The Heights was marketed as Houston Heights from its very beginnings, as it was a planned community; a suburb of Houston. I would guess the Houston was seldom used since it was sorta redundant.
Back in 81, I chose a rental in The Heights because north of The Katy was cheaper than Montrose.
The Michael March 28, 2011 at 10:35 am
The Woodlands is more of a township than an actual town. Half of The Woodlands has a Spring address while the other half has a Conroe address. The Woodlands will actually become it’s own town in 2014. This has something to do with the annexation of Kingwood to the City of Houston some years ago and they didn’t want that fiasco to happen again in The Woodlands.
Comment of the Day: Current Houston Air Smell Ratings, Minus the Coffee Perfume
Comment of the Day: A Big Blow to Bayou Biking
|
cc/2019-30/en_middle_0014.json.gz/line403
|
__label__cc
| 0.736361
| 0.263639
|
“Sucker Punch”: More Than Just Bullets and Genre Bending
So it was that yesterday, (Sunday if you happen to be reading this on say, not a Monday), myself, the charming KL Kenzie, the good Rev. Cpt. Sam Flint and the lovely Lady Lisa all went to view what we were sure was the new fan-boy wank fest “Sucker Punch“.
Flint, already having read reviews from people who have the time to see movies on opening day, promised us that though the film would be very very pretty to look at it – it would also be completely bereft of anything involving either plot or substance. Having watched the trailer a good 14,028,215 times I came to the conclusion that this was okay – and that we had to see it Sunday so we could have an article up on Steampunk Chicago by Monday.
So to begin, I’m going to start by saying, yes, I know this movie is “dieselpunk” not “steampunk” according to a number of people who have the time to take barely established counter cultures and differentiate them into further sub-genres. That aside, if you’re looking for a film that evokes the kind of timeless visual imagery of such works as City of Lost Children, Dark City or even Fight Club, this movie is for you. This brings me to my first laud to Mr. Snyder.
Snyder has deftly taken the style of post World War 2 America for the film, but cleverly and smoothly throws in a number of anachronistic hints that make classifying the movie to any specific time period impossible. This is hands down, one of the greatest stylistic strengths of the film, and adds an immediate dream-like feeling to its world.
An interesting promo image for the film.
As for the plot, I’m going to come forward and say that I think all the ill talk of it is un-founded. I found the plot to be engaging. I can imagine the biggest issue the casual viewer might have being that it is anything but traditional in the western world sense of plotting, where one starts at point A and goes from point to point until it neatly ends. Yet plenty of succesful films have avoided that for the better. Where Sucker Punch is different is that it also defies the more post-modern conceit of the beginning being the end, the “it was all a dream” or even the “it was all in her head” motif. It’s never made clear just where the movie is really taking place, and it uses this to its own strength.
Without giving too much away, the film is essentially a story within a story within a story, and though – at first – where they begin and end seems evident, after watching the movie in its entirety you’re left not being so sure. While I enjoyed this aspect, I can see it intensely alienating a majority of viewers. I think Sucker Punch is a significantly more clever, and intelligent film than one might expect.
Perhaps that is really the “sucker punch” here (yes, pun intended). The chain gun toting samurai robot-demons and the steampunk Nazi clockwork robot zombies and the bomb train guarded by androids going for the super city are all really really really awesome, but a movie together, they do not make. Where the film really lies is the plot of five women trying to escape from… well, it’s not clear. One might say this is a problem, but I don’t think it is here. This is a film that’s as much about a Buddhist-esque escape from the self as it is about escape from some kind of physical prison, and the nebulous quality of precisely what the prison is really is the center of the story. It lends itself up to intense speculation and interpretation, and in a culture where we’re increasingly told what to think or how things are, it’s refreshing to not be told what was right, how it was done, or where it came from.
Is Sucker Punch perfect? No. Is it entertaining? Yes. It’s also intensely disturbing and extremely dark. The fantasy scenes, of which virtually all the hype is being given, are not so much essential to any key plot points, but are essential to your not losing your own mind at how absolutely destitute the lives of the protagonists increasingly become. So perhaps that’s what we’re left with. A sucker punch; we come expecting only extraordinary eye candy and yet leave with our minds in a knot.
Tagged: Airships, Good Films, Militaria, Movie, Sci-fi, Sucker Punch
Topics: Airships, Movies, Outings, Steampunk
« Steampunk Inception in 60 Seconds This Week in Steampunk, April 4 »
1 Aaron Aug 23, 2011 at 10:40 pm
Well written review and decidedly even-handed. I particularly appreciate your early division of the audience into those with time and those without time “to take barely established counter cultures and differentiate them into further sub-genres”. ;-)
I’d pretty much written Sucker Punch off, owing largely to the fact that twins at home means I’m no longer possessed of the time to see movies on opening door, or much at all really. But this review gives me a reason to look for the DVD now.
erm, *day. Need sleep obviously.
3 Joe Mason Jul 14, 2012 at 8:33 am
Good lord, this film was awful on every level.
Time limit is exhausted. Please reload the CAPTCHA. seven + 8 =
|
cc/2019-30/en_middle_0014.json.gz/line405
|
__label__wiki
| 0.839082
| 0.839082
|
"As long as human rights are violated, there can be no foundation for peace. How can peace grow where speaking the truth is itself a crime?"
Paul McCartney's Dalai dalliance
MyParkMag - Birkenhead, England
Sir Paul McCartney is seeking advice from the Dalai Lama.
The Beatles legend, who has received death threats over his plans to
perform in Israel for the country's 60th birthday celebrations tomorrow
(25.09.08), received a book from the Buddhist leader which gave him
courage and hope.
Paul, who has been warned by Islamic extremist Omar Bakri "if he values
his life" he should stay away, said: "I am reading a book - 'The
Universe in a Single Atom' - that I have been sent by the Dalai Lama,
which is comparing some Buddhist philosophy to modern quantum physics.
"Its quite striking that modern science has many things in common with
some of the ancient religions. I think we are at a very interesting
stage in human development and I just hope for the best and I am
optimistic about it.
"I always think of myself as spiritual rather than religious. But I do
feel that the world is a magnificent place and that we are blessed to be
on it."
The 66-year-old musician, who has found love with US millionairess Nancy
Shevell since his bitter divorce from Heather Mills, has been invited to
perform in Israel more than 40 years after the country banned The
Beatles fearing they would corrupt its young people.
The band was scheduled to appear in 1965, but after claiming their music
might corrupt the country's morals, the government refused to grant them
permits.
Following the Dalai Lama's advice, Paul is now confident the concert
will be successful and peaceful because he has faith in people.
Paul added: "Any high-profile event brings some worries but I have a
very good team of people. I think most people understand that my message
is a global and peaceful one.
"My mission, if I have one, is humanitarian, and concerns all people,
not just a few."
|
cc/2019-30/en_middle_0014.json.gz/line419
|
__label__wiki
| 0.966448
| 0.966448
|
China Adds to Security Forces in Tibet Amid Calls for a Boycott
By EDWARD WONG
BEIJING — Chinese officials have significantly increased security forces
across Tibet in the face of a grass-roots movement to boycott
festivities during the coming Tibetan New Year, according to residents
of the region and recent visitors. The movement aims to use the holiday
period to mourn Tibetans who were killed during the government crackdown
last March and express concern for those arrested or tortured.
The increased forces have been seen in at least four crucial areas of
the vast Tibetan region: Lhasa, the capital; Xiahe, a town in Gansu
Province that is home to a large and restive monastery; Tongren, a
monastery town in Qinghai Province; and Lithang, a town in Sichuan
Province that has been locked down this week.
The problems in Lithang stemmed from a single person’s protest on
Sunday, according to residents and the Free Tibet Campaign, an advocacy
group in London. A monk, Lobsang Lhundup, 37, shouted slogans from a
street corner supporting the Dalai Lama and calling for a New Year’s
boycott, the group said. The next day, hundreds of Tibetans took to the
streets to demand the monk’s release; riot police officers broke up the
protest and arrested about 20 people.
On Tuesday, the government ordered shops and hotels to shut down for
three days, several residents said by telephone. A young woman, who
asked not to be named for her safety, said, “Shops have all closed, and
people do not dare to go out.”
Local security officers declined to comment when asked about the episode
over the telephone.
The campaign for the boycott of Losar, the Tibetan New Year, has spread
via text and e-mail messages and fliers. The holiday begins next Wednesday.
Last March, Tibetans angry over China’s policies in Tibet and the
suppression of peaceful protests rioted in Lhasa, leading to widespread
damage and the deaths of at least 18 civilians and one police officer,
according to the official Xinhua news agency. Protests flared up in
other regions, and exile groups said hundreds of Tibetans were killed in
the ensuing crackdown.
The call for a boycott began several months ago and has gained traction
among younger Tibetans as well as intellectuals and dissidents. It has
been endorsed by overseas Tibetans, including the government in exile in
Dharamsala, India.
“It’s deeply connected with Tibetan culture, the idea that after such a
horrible year filled with death, how can we celebrate?” Woeser, a
popular Tibetan blogger, said in an interview. “Instead, it should be a
memorial.”
The Chinese government is also fearful of unrest in the region next
month, on the 50th anniversary of the Dalai Lama’s flight to exile in
India after a failed rebellion against Chinese control, a date of great
moment to Tibetans. The Dalai Lama, revered by many Tibetans, advocates
greater autonomy for Tibet. But the Chinese government vilifies him as a
“splittist,” and says he ruled over a feudal slave-holding society. In a
move that antagonized many Tibetans this winter, the government declared
March 28 to be Serf Emancipation Day.
The issue of Tibet is already emerging as a delicate one between the
Obama administration and Beijing. Secretary of State Hillary Rodham
Clinton, who is scheduled to visit China this week, said in a speech
before the trip that Beijing should ensure religious freedom for Tibetans.
Foreign reporters are not allowed to visit Lhasa and central Tibet
unless invited by the Chinese government.
A Chinese Foreign Ministry spokeswoman said last week that “the
situation in Tibet is stable.” But a monk from Lhasa, reached by phone,
said, “There are a lot of soldiers and People’s Armed Police in the
streets,” referring to China’s main paramilitary force. Like almost all
the people interviewed for this article, the monk agreed to speak only
on the condition of anonymity for fear of government reprisals.
The monk said he, like thousands of other monks, had not been allowed to
return to his monastery after being imprisoned for several months last
year after the March uprising. Many of the main monasteries are being
emptied out, he said. There are only about 400 monks now in the Drepung
Monastery in Lhasa, he said, a small fraction of the number before the
uprising.
The monks are still being forced to take “patriotic education” classes
that have been going on in many monasteries since the March protests, he
added. As a result, the monks study Chinese law rather than Buddhist
scriptures and are told to denounce the Dalai Lama.
Monks no longer in the monasteries are barred from wearing their robes
in public, the monk said, and the police check on the monks at home, at
times hauling some off to prison. The monk said Tibetan policemen came
to his home three times a month.
“They ask, ‘Where have you been?’ ” he said. “ ‘Have you been out? What
are Tibetans talking about in the society? Have you met with friends who
are in prison?’ ”
The monk said many Tibetans in Lhasa were talking of joining the
boycott. But he said that Chinese officials were urging the Tibetans to
carry on with festivities and were even offering them money to do so.
Farther east, in Gansu Province, the authorities have declared the town
of Xiahe, the site of the Labrang Monastery, off limits to foreigners.
Labrang is considered one of the greatest centers of learning in the
Tibetan world, and it was a locus of protests last year.
A local tourism official said the area around Labrang was closed to
foreigners until late March. Two French television journalists who
secretly stayed in the town two nights in early February said they had
to sneak past two checkpoints. They said they saw soldiers, police
officers and paramilitary troops everywhere.
“There was an open plaza, and it was full of People’s Armed Police with
black uniforms, helmets and shields,” said one, Charlotte Cailliez. “On
the main street, there were police cars going back and forth.”
To the west, in the town of Tongren, known to Tibetans as Rebkong,
police and paramilitary forces were scarce during the day but came out
in force at night, said a local Tibetan man.
There, the call for a boycott on festivities not only pertains to Losar,
but also included the recent Chinese New Year, which many Tibetans in
Rebkong celebrated in past years. Normally, the town would convulse in
singing, dancing and pyrotechnics during the two-week holiday. But this
year, few Tibetans participated.
Local officials handed out hundreds of dollars to people to buy
fireworks, the man said.
But the Tibetans practiced restraint. In the main temple compound, he
said, worshipers lighted yak butter lamps, and “the mood was very, very
quiet and solemn.”
Michael Wines and Jonathan Ansfield contributed reporting.
|
cc/2019-30/en_middle_0014.json.gz/line420
|
__label__wiki
| 0.660904
| 0.660904
|
A touch of humanity
Moazzam Sheikh February 4, 2018 Leave a comment
Mudassir Bashir’s stories, concerned with human conscience and folly, are recommended for readers of Punjabi fiction
Mudassir Bashir’s latest offering KaaN Wahgay Barder is a delightful little book with 12 stories of varied length and range, both emotional and intellectual. A writer is a mapper of a society’s emotional and political mood, just as he is a measurer of time’s kindness and cruelty towards the most vulnerable. Bashir’s main concerns in the book under review are primarily human conscience and folly. His diction is modern but controlled, which grounds a majority of his subjects and what matters to them. But those who have followed Bashir’s work closely know his passion for history, especially of Lahore and thus by extension Punjab.
Underneath his fiction the reader senses a concern not just for the people but the place they inhabit, which offers its kindness equally to humans and animals. It pains Bashir to note that his fellow Lahoris are not kind to animals. A humanist at heart, he views his characters, weak and fickle, pitted against a system that is stubborn and uncaring.
The endings of several of his stories reveal Bashir’s faith in humanity rising to the occasion, if not to solve the problem, then to console the aching heart, relieving momentarily the fear of loneliness.
This tendency, I feel, sometimes weakens his stories a bit and distracts from the magic he is so good at casting, the believability of the characters, their world, the drama and the tension he creates, be it in the form of a conversation as in the opening story of ‘Dipty Commissioner’ which brings two old acquaintances together after several decades; or be it in the form of a reluctant amorous rendezvous between a well-known singer and an infatuated young woman in the fairly gripping ‘Circuit Shot’. Or even his very endearing ‘Langra Samaj’ and ‘Moonh Parnay’.
‘Dipty Commissioner’, though a little weaker than the others I mentioned above because of its straightforward narrative technique, sucks you in nevertheless as the two men begin talking to each other, dropping their guard, letting the human in each reach the other. And in doing so, the author, without being judgmental towards the Deputy Commissioner for his privileged position, which ironically happened because of the man he is talking to, the owner of a shop that repairs punctured tyres. The twist the reader learns, though verging on cliché, doesn’t make the story limp because of the pace and humour of the narrative as they sit recounting their school days. When the Commissioner departs, his promise to stay in touch, “hun milde ravaan ge”, does not ring true and seems forced. But the reader is willing to let it slide because the story does not end on a moralising or judgmental note. Instead, it draws our attention to the Commissioner’s shadow which melts into the shadow of the night.
The other stories, stronger and more complex, end up conflating the author’s desire to leave a moralising note with that of the narrator.
In ‘Circuit Shot’, the amorous rendezvous does not go smoothly and as the story reaches its climax, Bashir shows the constraints modern Pakistani city culture imposes on its young men and women, and when utter panic takes hold of the main character, he and his friend manage to escape, leaving the girl and her mother on their own in the amusement park. His friend is as taken aback as well as the reader, even disappointed perhaps, when the protagonist brings his friend into the mosque to offer prayer. When the friend, baffled, wonders why suddenly the namaz tilt, pat comes the answer: “Be quiet. Move on. If not now, then when else would you pray?” This urge to leave an iron, teasing remark should be resisted. It seems to come not from the character’s mouth.
‘Moonh Parnay’ suffers a similar fate. For the most part it is a refreshing portrait of a rather simple man who enjoys female company and is not too worried about social or religious morality. So far, he’s been able to sleep with all the women his wife employs for household help, except one. He eventually wins because he’s learned that money can soften the pride of the poor. The stronger part of the story is how he’s built the character of that woman, who knows how to negotiate her sexuality, her place on the margins of society and her agency. So he succeeds in bedding her, but is disturbed by the fact that the woman has not kissed him on the mouth. He confronts her and she tells him the money wasn’t for kissing. Sometimes, it is wise to leave certain things unsaid or else you risk destroying a well-crafted, delicate story.
The story where his craft is at its peak is ‘Pichchay Murkay na Vaykheen’. It shows, without a sermon, a struggle between one’s sense of duty to family and work ethic, which is lacking in the main character, a low-level police official. Bored and uninspired by his job, he needs to make some extra cash tonight before he heads home. Not a lot, just a little cash. He’s met with one comic disappointment after another. The story never for a moment allows the reader to feel contempt for the pathetic policeman, as it oscillates between humour and empathy. It conveys the sense that even when people commit misdeeds, there remains in most of them a touch of humanity.
It is this touch of humanity which connects the reader with Bashir’s characters. I also feel that because of his diction and his tremendous love for the world from which his characters come, he doesn’t allow his stories to enter dangerous and dark spaces which might challenge his language and the plotlines a bit more. But you can’t force a writer. He writes about what excites him and we should be happy and content with that.
I highly recommend this book to those who would like to read Punjabi fiction but are either reluctant or ashamed. Bashir’s language is humorous, crisp, modern and it should resonate with those who like a good story.
Kaan Wahgay Barder
Author: Mudassir Bashir
Publisher: Saanjh
Mudassir Bashir Urdu literature Moazzam Sheikh 2018-02-04
Moazzam Sheikh
The writer is a librarian and lecturer in San Francisco. His most recent work is Cafe Le Whore and Other Stories. He blogs at moazzamsheikh.blogspot.com
A Seraiki in love with Urdu
A memorable endeavour
|
cc/2019-30/en_middle_0014.json.gz/line426
|
__label__wiki
| 0.613752
| 0.613752
|
Ribbon-cutting Ceremony to Open the Linde Center for Music and Learning, Tanglewood, Lenox, Massachusetts, June 28, 2019.
"I Love A Piano." Show 46.
Berkshire Food Co-op Grand Opening, Great Barrington, June 19, 2019.
Berkshire Lyric presents "Masterworks: Schubert, 'Mass in G,' and Morten Lauridsen, 'Lux Aeterna,'" June 8, 2019, at Seiji Ozawa Hall, Tanglewood, Lenox, Massachusetts.
Sheffield Memorial Day Parade, May 27, 2019.
In The Slammer. 46.
"An Interview with Jack Brown, Artistic Director of the Berkshire Lyric Chorus."
"The Life and Times of Mrs. Thomas Andrews, wife of the designer of R.M.S. Titanic." Special Episode, "Dressing the Edwardian Gentleman," Part 1.
"2019 Lee Library Quilt Show," sponsored by The Lee Library and Pumpkin Patch Quilts.
"Building Your Own Personal Computer, Part 1."
"The Life and Times of Mrs. Thomas Andrews, wife of the designer of R.M.S. Titanic." Episode 12, "Dawn of a New Year, plus Outtake."
Solutions Rising: "Saving Our Community TV Stations."
Getting To Know You. "Jane Green."
"Wanda Houston." Lenox Concerts in the Park, Lilac Park on Main Street, Lenox, Massachusetts.
"Home Grown: West Stockbridge Farmers Market."
Getting To Know You. Claudia M. Gold, M.D., Author, "The Silenced Child."
'''Gardening to Save the Planet,' Connor Stedman, Berkshire Co-op Market Annual Meeting, November 7, 2015. Co-sponsored by the Great Barrington Agricultural Commission."
"Sunday Strummers Ukulele Ensemble, at Lee Farmers Market."
Poetry Slash Music. A Salon with Michael Houlihan. Episode the Sixteenth. 'Eric-Reinhardt, Musician.'
Spiritual Talks by Harold Klemp, Leader of Eckankar. 'God's Love is a Wonderful Thing.'
Civitan of Pittsfield presents "Know Your Berkshires." "Berkshire Children and Families."
See the entire schedule
PUBLIST Search
Community Television for the Southern Berkshires
The Community Television of the Southern Berkshires PUBLIC Channel can be seen by Spectrum Cable Subscribers on Channel 1301. Many of our locally produced shows are searchable here and available on-demand.
Browse our other channels
Channel 1302
Email Us: info@ctsbtv.org
|
cc/2019-30/en_middle_0014.json.gz/line428
|
__label__cc
| 0.72714
| 0.27286
|
Повышенная контрастность
Добро пожаловать на официальный туристический инфосайт Провинции Пьяченца
Услуги и выставки
Туристический портал региона Эмилия Романья
Фестивали, инициативы
Выставки, экспозиции
Конгрессы, съезды, конференции, семинары
Сельские праздники
Цирк, уличные представления
Спорт, игры
Рынки, выставки-ярмарки
Смешанные мероприятия
Премии, конкурсы
Курсы, мастер-классы, лаборатории
Ремесленное производство, шоппинг
Домашняя Мероприятия Фестивали, инициативы Выставки
THE XI'AN WARRIORS - MILLENIAL CHINA
S.Pietro in Cerro
Castello di San Pietro in Cerro
Mysterious Chinese warriors defend the foundations of an ancient Italian castle, one of the Castles in the circuit of the Duchy of Parma and Piacenza. From the east, here comes the idea of the entrepreneur and art patron Franco Spaggiari, owner of the Castle of San Pietro in Cerro, in Piacenza province, who acquired 45 Xi'An terracotta warriors (perfect copies of the original statues, authorised and approved by the Chinese Government) and transformed the in a permanent installation in the dungeons of the 15th century castle. The warriors are open to the public once the Castle reopens for the season, throughout the year, every Sunday and on festive days, from February to the end of October 2017 and on any other day upon booking for groups.
The warriors are still, but they seem to move. They stand tall, but walk on a line. They listen to whatever you say. They are life-size warriors. The proverb says 'What you see below, the same is above': the half-light damp atmosphere of the dungeons communicates a 'sepulchral' picture, an endless waiting and the patience of time, a sublimation of eternity. It was not by chance that the warriors were originally situated near the tomb of the first Chinese emperor Qin Shi Huang as guards. From the dungeons to the courtyard, up on the stairs of the Castle of San Pietro to the attic to meet contemporary art - presented on a revolving schedule - at mim: Museum in Motion .
A leap into the past from an Oriental suggestion to the multifaceted character of the western culture, selected by the collector Spaggiari: everything is mediated by the Castle as 'container', a cultural workshop, a living castle like all 23 Castles of the Duchy, each with its own typical features.
Guided tours at 11 am - 3 - 4- 5 - 6 pm
Сайт мероприятия
http://www.castellodisanpietro.it/
Adults: 8 Euros; Groups: 7 Euros; from 6 to 12 years old: 6 Euros; from 13 to 18 years old Euro 7,00
free for children up to 5 years old
Понедельник, 25 Февраля 2019
Информация подготовлена Службой информации и туризма муниципалитетов Боббьо, Боргоново В.Т., Кастелль-Аркуато, Пьяченцы и Вигольцоне.
Предыдущий элемент
Следующий элемент
В разработке сайта участвовали
Copyright © 2010 Провинция Пьяченца. Все права защищены
|
cc/2019-30/en_middle_0014.json.gz/line431
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.