text
stringlengths 166
589k
| __index_level_0__
int64 1
312k
|
|---|---|
The autumn, no very great season in the selling of motor cars, had become lively with the sale of trailers in which those citizens of Sachem Falls who had retired from the economic struggle, because they had too much money or too little, planned to go to Florida or California for winter. The Duplex had been booming all summer, but in September, Fred’s treacherous rivals, the Conqueror Motor Company, dealt the Duplex a nasty blow with its announcement of the Allover Caravan.
The Allover was not a trailer, but built like a bus, with the motor contained in the body. It burst on Sachem with full-page newspaper advertisements which asserted convincingly that the Allover was easier to drive, easier to park, and much easier to handle in passing other cars. As a minor virtue, in this war of transportation with its almost theological disputation, the Allover’s furnishings could readily be removed, turning it into a truck.
A sound commercial warrior like Fred would have hated any opposition at all which took money away from him, but in this particular attack, he persuaded himself, there was something malign, for Putnam Staybridge, putative father to Annabel, was known to be part owner of the Conqueror company. And, Fred complained, hadn’t he gone and made a fool of himself and thought the Cornplows and the Staybridges were getting on to better terms? For the good Putnam had invited Howard and Annabel for a week at his Adirondack cabin, and Sara for a week-end . . . Everybody except the persons concerned seemed to feel that Fred and Hazel had already had as much vacation as was good for them.
The day after the Allover advertisements appeared, Staybridge invited Fred to call upon him, at the general offices of the Liberty Bell Clock Company. ‘Hell with him; let him come here and call on me; I won’t go a step,’ growled Fred, as he reached for his hat.
Staybridge’s office, with its large mahogany table for the directors and the small polished desk for the president, looked like a Colonial dining-room. You could almost smell boiled codfish.
Staybridge was cautiously cordial in his ‘How do’.
‘Hear you all had a fine time at the cottage, Brother Staybridge.’
‘Oh yes. Very agreeable. Your son — uh, Howard, uh — is an excellent swimmer. Really! So sorry we didn’t have room to invite Mrs. Cornplow and yourself.’
‘Oh, we had our vacation . . . I suppose you might say. And what can I do for you?’
Staybridge looked as though he thought Fred was being rude. Fred was sorry, but he felt rude; in the damp cold air that Staybridge perpetually exuded, he always felt rude. But the gentlemanly assassin of Duplexes was saying graciously:
‘No doubt you will have noted the advertisements of the Allover Caravans — the Conqueror company.’
‘Good ads! Fine!’
‘Kind of you to say so. It just happens that I have some small interest in the Conqueror company.’
‘And I have thought of suggesting to them that they come to some agreement with you, possibly even joint advertising. Since your Duplex is a trailer, and the Allover not, they need not exactly be in competition, and I was thinking that if we — or rather, I should say, they — combined, you might in a way dominate the field together — freeze out the others, I believe it is called.’
‘Yes. It’s called that. It’s also called stifling competition, and ganging up on the other racketeers.’
‘Oh? What I was really thinking was that since the Duplex is not made by the Triumph company, you might conceivably try to arrange with the makers to dispose of it to us. Particularly since I understand from your son — uh, from Howard — that you are giving some thought to retiring in four or five years.’
Staybridge’s persistent objection to remembering Howard’s name would have been enough to irritate Fred handsomely; it wanted only the pinch-nosed patronage with which Staybridge was going on:
‘Of course I don’t know what you plan to do, if you retire. I shouldn’t have thought you were cursed with hobbies, as I am. But no doubt you’ll find something with which to busy yourself, more or less. But the point is, if you feel like retiring, just possibly you might not care to face the rather sharp opposition that, I’m afraid, the Conqueror company, with its large resources, is planning to give you. I’m sure you’d be wise to take it easy.’
This to Fred Cornplow, who had never in his life evaded a fight — except with Sara. He exploded up from his chair, but he managed to be fairly calm as he croaked:
‘Me? Retire? Where d’you suppose Howard (that’s my son) ever got such a foolish idea? Not me! I like a scrap too well. But thanks for the tip. Morning!’
Opposite the large Conqueror agency, Fred hired a vacant lot, and within three days he had installed there a Duplex Trailer display in open air. He had one side ripped off a Duplex, so that its hidden domesticities were revealed. He engaged two men and two young women of a stranded night-club troupe, with a couple of children, and this theatrical family was displayed living the life of Riley in the trailer. They prepared and smackingly devoured large meals; on the roof they drank tea and afterward danced to a radio; they modestly retired, in the several chambers provided when the roof was hoisted; and all one night they remained abed in the Duplex, before a tremendous crowd which stayed up till two a.m. to behold human beings engaged in so very odd a practice as sleeping.
Duplex sales doubled, and Fred’s spy in the Conqueror agency reported that salesmen who attempted to demonstrate Allover Caravans were answered with jeers. A week after the opening of Fred’s circus, Staybridge telephoned him again, but Fred found himself too busy to call. The next day Annabel came in, and Annabel was near to giggling.
‘My father asked me to tell you he thinks your Duplex cabaret is vulgar.’
‘Do you think so?’
‘Oh, I like vulgarity. All the interesting things in life are so vulgar, Father Cornplow: birth and death and battles. Have I done my job?’
‘Have I complained properly about the vulgarity?’
Next night a curious thing happened. A man named Tom McKuffee, a truck farmer who lived nine miles south-east of Sachem, and who had bought an Allover Caravan that afternoon, had an unfortunate accident at or near midnight. In front of the Duplex show lot he tried to park his Allover, but the brakes failed, the Allover dashed in to the lot and was wrecked against a pile of rocks which no one seemed previously to have noticed there. McKuffee, though he could not stop the caravan, had time to jump.
Now he was no hit-and-run driver, even if the object of his solicitude was merely a pile of rocks. He walked to the police station, admitted the accident, and explained that the brakes had failed; explained it so eloquently that a green reporter noted the fact in his story. The detail got past the copyreaders, and in the paper next morning there was an almost libellous statement about the brakes of an Allover.
It was only an item, but the scene of one caravan wrecked, while hard by, in another, night-club ladies were dancing and sipping ginger ale from highball glasses, was too much for the art editor of the evening paper. By this time, the struggle between Duplex and Allover was so familiar to all Sachem motorists that there was no need of a legend to explain what were the makes of the caravans in the newspaper photograph.
All the day after, persons who looked as though they might have trailer money in their pockets stood and admired the cabaret, snickered at the wreck. McKuffee happened, by a coincidence, to be there, and he seemed glad to explain how the accident had occurred, and to point out how flimsy were the smashed and exposed furnishings of the Allover. By another coincidence, Fred Cornplow knew McKuffee, who had once been the Triumph foreman.
‘You ARE rubbing it in. Old Putnam will never speak to any of us again,’ Sara reproached her father, yet in her he detected admiration.
In another day there were double-page advertisements of the Allover in the papers, but people in limousines, in shops, on street corners laughed at them. The Allover wreck remained there for a week. Then came the chief of police to Fred and offered to cart it away.
‘No, you needn’t. Glad to accommodate the fellow that owns the thing — what’s his name? — McGurrey? — till he raises the money to get it overhauled.’
‘There was something funny about this accident,’ said the chief darkly and returned to his bezique, after a telephone call.
For a week, not one Allover Caravan was sold. This fact Fred conveyed to Hazel, who protested:
‘Why, you absolute pirate! I thought you’d reformed!’
‘Look here! I tried to reform. I tried to go off on a pilgrimage and become a better and tenderer man, and my two brats objected. Can I help it?’
Mr. Putnam Staybridge telephoned to Mr. Frederick Cornplow:
‘Uh, I thought you might just possibly be interested to know that the Conqueror agency, or so I am informed, intend to reduce their advertising for Allover Caravans to, uh, to approximately the same space used for Duplexes.’
‘Thanks,’ said Fred. He removed the show trailer, and McKuffee’s wreck vanished. But he learned later, all his kindness could not stir up a proper sale of Allovers.
Hazel sighed, ‘Well, now you’ve had another big success, I suppose you’ve got your teeth in it so firm that you and I’ll never be running off together again.’
‘You mean it? You’d like to?’
‘I THINK so.’
Last updated Tuesday, August 25, 2015 at 14:11
| 218,401
|
This course takes you from 0 knowledge of Swift to a complete understanding of programming in Swift. After this course you will be able to explore Swift on your own and begin to write your own apps.
In this course we will start by writing the most basic code as we explain each concept. No stone unturned.
Each idea will be related to some knowledge that you already posses. We assume nothing.
This course is a full fledged version of our "Swift for Absolute Beginners" course on YouTube. Due to the success of those videos and the demand for more, we created this course.
We will start by opening a text editor and typing our first code in Swift. From there we will take you through the different programming ideas while we make little programs that perform little tasks.
Through the 55 videos you will learn:
This course will guide you through all the very important concepts of programming and describe those concepts using metaphors and ideas that you are already familiar with in the real world so that you will have deepest understanding of Swift.
This course is structured into three sections.
The first section goes gets you started with the most primitive concepts of programming, like storing variables.
The second section goes through the basics of programming like arrays, dictionaries, looping and more.
The third section will go into the core of object oriented programming with classes, inheritance and protocols.
Through each section you will be taught each idea in it's entirety. We go over each idea multiple times in multiple different ways to make sure the concept sticks and you are left with the knowhow.
Even though the later sections are technically more "advanced" you will see the natural progression towards those more advanced topics. In the end the more advanced stuff won't feel advanced at all.
This course in it's entirety is 3 hours in 55 videos. Each video packs a punch of information so it's best to take it slow.
In this video we learn how to store things that can't be changed.
In this video we learn about the different types of things we can store in our box.
In this video we talk about a couple of other types of things we can store and go into more detail.
In this video we make our first app. The choo choo train. We don't have all the tools available so we'll have to work with what we've got.
In this video we talk about the different operators our choo choo app used.
In this video we introduce our first container: the array.
In this video we learn how to add to our array.
In this video we learn how to remove from our array.
In this video you will learn how to grab items out of the middle of an array.
In this video you will learn how to loop through arrays.
Let's learn about a new type of container. The dictionary.
In this video we introduce optionals, something special to Swift.
In this video we talk about running code conditionally.
In this video we talk about running code conditionally again, this time with one more option.
In this video we learn about conditionals and what happens when the "if" does not run.
In this video we combine all of our knowledge into one giant boolean.
In this video we return to optionals and we unwrap them in the safest way we know how.
In this video we talk about function parameters.
In this video we talk about scope and what it is.
In this video we introduce classes.
In this video we talk about the properties of classes.
In this video we talk about the do'ers of classes. The methods.
In this video we combine some previous knowledge and run methods inside of loops.
In this video we learn how to initialize our class and what happens when we do.
In this video we learn how to provide default values to our initialized parameters.
In this video we learn that functions can return values. You can then take those values and do stuff with it.
We can create functions with what's called "internal" and "external" parameters.
We learn about functions that can take unlimited number of parameters.
We learn about functions that have parameters that are not constants.
We learn about functions that can take your value and alter it.
We make the prettiest functionz everz.
We clean up our variadic parameter'd function and make it a one liner.
We learn about how classes can inherit from one another.
We learn more about class inheritance.
We learn even MORE about class inheritance.
We take our class inheritance and make marriage.
We further our marriage experiment.
| 10,207
|
|Disease||Recommendation||When to see a doctor|
|Typhoid||*Vaccination sometimes recommended||2 weeks before travel|
|Hepatitis A||*Vaccination sometimes recommended||2 weeks before travel|
|Tuberculosis||*Vaccination sometimes recommended||3 months before travel|
|Hepatitis B||*Vaccination sometimes recommended||2 months before travel|
|Rabies||*Vaccination sometimes recommended||1 month before travel|
|Meningococcal meningitis||Not required|
|Cholera||*Vaccination sometimes recommended||2 weeks before travel|
|Yellow fever||Certificate of vaccination required if arriving from an area with a risk of yellow fever transmission||10 days before travel|
|Japanese B encephalitis||Not required|
|Tick-borne encephalitis||Not required|
* Recommendations that are marked "Vaccination sometimes recommended" should be considered as "Vaccination strongly recommended" if a person is travelling frequently or spending extended time in that country, or if a person's occupation or planned activities could put them at higher risk. It is important to get expert advice.
All travellers are advised to ensure that their diphtheria, tetanus and polio vaccinations are kept up to date. A booster dose is needed if it is longer than ten years since you last had a vaccine against these diseases.
Recommendations do change from time to time and it is important to discuss your personal requirements with your doctor.
- There is a significant risk of malaria in most parts of Africa south of the Sahara and appropriate preventive medicines are essential for visitors to this area. Adequate measures to avoid mosquito bites, such as nets and creams, are also essential.
| 241,324
|
FISHER Charles married Margaret ANESBURY 1887
Groom: Charles Templer FISHER.
Age: 27 years.
Father: Charles Templer FISHER.
Bride: Margaret ANESBURY.
Age: 26 years.
Father: Andrew ANESBURY.
Date married: 16 March 1887.
Place: Residence of Mrs. Fisher, Yanyarrie, South Australia.
Charles died 25 November 1929 near Carrieton, South Australia.
Age: 70 years.
Charles was born 23 September 1859 in Templers, South Australia.
Parents named as Charles FISHER and Eliza RIVETT.
Margaret died 13 December 1939 in Carrieton, South Australia.
Age: 79 years.
Deceased husband named as Charles Templer FISHER.
Margaret was born circa 1861.
Birth not located at time of posting.
Parents were Andrew ANESBURY and Margaret Ann BENNETT.
Four children located South Australian records for Charles and Margaret.
Note spelling variations of ANESBURY as given in the births.
Harold Vincent FISHER.
Born: 29 July 1888, Uroonda, South Australia.
Died: 22 July 1961, Carrieton, South Australia.
Age: 72 years.
Married: Olive Lizette RAGLESS.
Date: 17 June 1925.
Place: Clayton Church, Kensington, South Australia.
Olive was born 24 March 1897 in Callana, South Australia.
Parents named as Thomas James RAGLESS and Sarah Elizabeth RAKE.
Herbert Andrew FISHER.
Born: 24 August 1889, Uroonda, South Australia.
Mother recorded as Margaret ANSESBURY.
Died: 01 April 1967, Gladstone, South Australia.
Age: 77 years.
Residence: Montana Station, South Australia.
Married: Leila Annie SWEET.
Date: 01 October 1919.
Place: School Building, Arkaba, South Australia.
Leila died 24 August 1956 in Carrieton, South Australia.
Age: 59 years.
Husband named as Herbert Andrew FISHER.
Residence: Montana, South Australia.
Leila was born 25 June 1897 in Hawker, South Australia.
Parents named as William James SWEET and Sarah Martha BONE.
Reuben Bennet FISHER.
Born: 04 November 1896, Yanyarrie, South Australia.
Mother recorded as Margaret ANSBURY.
Died: 15 March 1897, Uroonda, South Australia.
Death recorded as Reuben Bennett FISHER.
Age: 04 months.
Raymond Robert FISHER.
Born: 20 September 1900, Uroonda, South Australia.
Registry of Births, Deaths and Marriages, South Australia
on 2013-11-29 03:06:16
TONKIN lives in Victoria, Australia.
Journals are intended to assist new researchers locate family lines in Australia and should only be used as a guide for follow up research and record searches as intended. Due to spelling and informant errors appearing in the records, typo errors and my misreading of the records mistakes must be expected. Errors will be corrected when detected.
| 61,388
|
Consistency is key. To what? A great coffee, of course!
The consistency of milk temperature actually plays a huge part in how coffee tastes. Not only can it burn your tongue, but temperature also affects mouthfeel (how the coffee tastes and feels in your mouth as you drink it) as well as our ability to perceive sweetness and the unique flavour characteristics of each coffee.
With that in mind, our goal today is to find the most reliable way to get a consistent milk temperature.
What we tested
We were tasked with finding the most accurate and consistent way to heat the milk to a set temperature of 65°C, as we have found through tests of our own that 65°C is ideal for steamed milk. We used the UNI-T UT325, a digital thermometer, with a factory calibrated type-K thermocouple to accurately measure milk temperature during the tests. This was used as the benchmark of temperature accuracy. We had two baristas test each method multiple times each. The selected methods of heating were:
- Barista’s Hand
Test 1: Baristas Hands
The go to method when it comes to measuring milk temperature for baristas. The barista uses their experience and feel to determine the right moment to stop heating the milk.
When measuring by hand, Barista A managed to achieve an average temperature of 62°C. Barista B, scored an average of 65.4°C. Whilst Barista B heated the milk more accurately to the desired temperature of 65°C, Barista A was more consistent when heating with hands.
On average, between the two of the baristas, they were able to heat milk to within 3°C of the target temperature 95% of the time. This is important for later!
Did we expect to find results similar to this? Well, yes and no. One of the reasons for deciding to focus on milk temperature, is that we wanted to know just how consistent and accurate Baristas are when using their hands. As we note here, Barista A was more consistent in achieving when using their hands, however, not as accurate as Barista B at hitting the desired target of 65°C.
We would also add that we didn’t observe any significant ‘bias’ (or ‘hysteresis’ for all the scientists out there) over the multiple runs. In other words, we didn’t find that the baristas sense of feel made the results ‘creep up’ or ‘down’ over the course of the test. That said, we only did 7 tests back to back – our baristas hands are a precious thing…
Test 2: Temptags
Temperature stickers contain heat-sensitive liquid crystals which change colour when the milk reaches a certain temperature, in this case 65°C. We tested the Temptag brand to see how well these stickers work.
Using the stickers, Barista A achieved an average milk temperature of 66.3°C. Barista B achieved an average milk temperature of 64.2°C. Neither barista had any previous experience with the Temptags, and were both very surprised at just how accurate they are.
Test 3: Milk Jug Coffee Thermometer
Next up, was a good old-fashioned milk jug coffee thermometer.
Barista A managed an average temperature of 67.3°C. Barista B achieved an average temperature of 67.5°. These temperatures were hit with an error of about 1.5°C. So, thermometers are a reliable and consistent source of gauging milk temperature. However, they do need to be calibrated frequently, as was evident from tasting it against our digital thermometer!
Test 4: The UberMilk
We’ve already written a full review of the Ubermilk, you can read it here. For those who haven’t come across it yet, the Ubermilk is an automated milk steaming machine. Yes, you press a button and out comes silky smooth steamed milk, ready to pour.
We initially tested the Ubermilk for seven runs, and found the first 5 runs to be inaccurate, as the heating element was heating up. So we went back to do a further 25 runs of the Ubermilk and got just what we were after. We found that, at steady state, the Ubermilk had an average temperature of 62.5°C, as shown below. The 95% confidence interval on these tests was about 1.5°C from the average – so no more than 65°C and no less than 61°C, 95% of the time.
Now, from this information, we found ourselves asking, is 1-3°C that much of a difference that it would drastically alter the taste of your coffee?
Let’s find out, shall we?
What is the ideal milk temperature for coffee?
We asked 5 people to taste 6 cups of coffee at 55°C, 57°C, 60°C, 62°C, 65°C and 67°C.
We found that a desirable drinking temperature for 4 out of 5 people was between 60°C to 65°C. 5 out of 5 people preferred coffee served between 62°C and 65°C (as shown in our graph below). Interestingly, our tasters did notice that the ‘coffee’ taste was also most prominent between 60°C and 65°C.
These indicate that, in an Australian setting, people will accept coffees within 3°C of 63°C. This is great, as ‘by hand’, baristas are able to hit this margin of error 95% of the time. That said, it means that 5 in every 100 coffees, your typical barista will heat the milk too hot or too cold. Assuming a standard distribution, this would mean a coffee is cold about 3 times in every 100.
This doesn’t mean the other methods are without fault. Other methods of milk temperature control will result in about 3 coffees in every 200 being too cold.
Interestingly for the Ubermilk, though – as the average temperature is below the standard ‘target’ – we expect a temperature of 61°C to be considered ‘too cold’ for some consumers. And it will be this cold more frequently than if a barista was serving a coffee (targeting 65°C) under their standard variability. Perhaps the workaround, then, is to set the Ubermilk unit up a couple of degrees higher to compensate for this.
When it comes to reproducibility and accuracy, it is clear that the Uber Milk comes out on top. It is the most consistent when it comes to texturing milk and heating to a desirable milk temperature. The machine wins this round.
The Temptags did very well. They were easy to use, easy to understand, and neat and tidy on the jug. Reproducibility for the Temptags comes down to the barista keeping an eye on the tags. There were a few issues we found with this: 1) if baristas need to keep an eye on the tags for the right temperature, what would that mean for customer service? 2) It is still up to the barista to turn off the steam to reach the desired temperature.
When it came to baristas using their hands to measure accuracy and consistency, Barista A managed an average temperature of 62°C, with a standard deviation of 1.73°C, where as Barista B managed an average of 65.4°C, with a standard deviation of 2.51°C. When using the Temp Tags, Barista A managed an average temperature of 66.3°C, with a standard deviation of 2.29°C, Barista B got an average of 64.2°C, and a standard deviation of 3.14°C. Using the milk thermometers, Barista A’s average temperature was 67°C, with a standard deviation of 1.64°C. Barista B averaged 67.5°C, with a standard deviation of 0.76°C.
Overall, it was quite clear that the most efficient method of heating and texturising milk consistently and accurately was using The Ubermilk, which also happened to be my favourite way too, as it freed up more time for the baristas. The Temptags too were surprising and enjoyable to work with.
All methods were shown to be good in terms of heating to a temperature consistently. Moreover, whichever method you choose to use should result in a coffee of eminently drinkable temperature most of the time.
| 32,955
|
Red Curry Paste ( Thai Cooking )
by Tarla Dalal
Added to 679 cookbooks
This recipe has been viewed 81327 times
A fiery paste of red chillies, spices and fresh herbs, the Red Curry Paste is used frequently in Thai cooking. Follow this authentic recipe to make some Red Curry Paste, and store it in the refrigerator for using as the base in various soups, curries and rice dishes.
- Combine all the ingredients in a mixer and blend it into a smooth paste using ¼ cup of water.
- Use as required or store refrigerated.
REGISTER NOW If you are a new user.
Or Sign In here, if you are an existing member.
If your Gmail or Facebook email id is registered with Tarladalal.com, the accounts will be merged. If the respective id is not registered, a new Tarladalal.com account will be created.
Click OK to sign out from tarladalal.
For security reasons (specially on shared computers), proceed to Google and sign out from your Google account.
| 41,869
|
California’s high speed rail system has been moving at a low speed since voters approved a bond issue to launch it in 2008. That ballot measure authorized a bullet train from San Francisco to Los Angeles and eventually Anaheim, at speeds of 220 miles per hour and stops in Central Valley cities like Fresno and Bakersfield. The total trip time would be no more than 2 hours and 40 minutes between the two big cities, at fares less than airplane travel.
The rationale for the system is that it will provide a cheaper way to move a growing population around the state than expanding airports and highways. It will connect the relatively weak economies of the Central Valley with the prosperous coastal cities, providing an economic boost, all while enabling low-carbon transportation and promoting car-free lifestyles for communities connected to the system.
But since 2008, legal and political battles have slowed the system’s progress, as everyone from farmers in the Central Valley, wealthy homeowners in the San Francisco peninsula, and even equestrians in the hills above Burbank have fought to push the route away from their land. It’s local NIMBY politics on a statewide scale.
These legal and political challenges have in turn created funding headaches for the system. The original price tag of $40 billion ballooned to a projected $118 billion, before a revised business plan reduced it to an estimated $62 billion, as described in the 2016 business plan. Of that amount, the 2008 bond issues provides almost $10 billion, federal funds provide another $3.3 billion, and cap-and-trade funds may provide another few billion. System backers hope the rest come from private sources, but so far none have stepped up.
With strong support from the governor, the state was able to dedicate 25% of cap-and-trade auction proceeds to high speed rail construction. But the auction faces legal uncertainty going forward, due to a pending court case brought by the California Chamber of Commerce. An adverse verdict could mean that the money will halt either immediately or post 2020.
Meanwhile, the federal government has been unusually stingy with this infrastructure project. After Republicans took over Congress in the 2010 midterms, the federal dollars dried up, leaving the state to fund the project on its own. Only the 2009 stimulus provided some federal money for the train, but nowhere close to a match for the state contribution. By comparison, the federal government typically contributes 50% of the money for urban rail systems and between 90 and 100% for highways.
The funding picture has now affected the route design. The initial connections were going to be from the Central Valley to somewhere north of Los Angeles, hooking into the commuter Metrolink train to deliver passengers to Union Station in downtown Los Angeles. Now there’s not enough money to get the train through the Tehachapi mountains that separate Southern California from the Central Valley. So the initial connection will now go to San Jose from the Central Valley, with a link to the commuter Caltrain to get passengers to San Francisco. High speed rail bond money will then pay for upgrades to Caltrain and Metrolink, to prepare those systems for eventual high speed rail connections.
So with all the controversy and politics for this important project, I look forward to interviewing California High Speed Rail Authority chair Dan Richard tonight on City Visions, on NPR affiliate 91.7 FM KALW radio in San Francisco, from 7-8pm. For those out of the area, you can stream it or listen to the archived broadcast after the show here. I’ll ask Dan for more information on the funding, politics, and current construction status. And listeners are free to call in or email with questions. Hope you can tune in and ask your questions about the system’s future!
| 155,394
|
Copyright © University of Cambridge. All rights reserved.
Each of the following shapes has a value
What is the total value of the following two shapes when you put them together?
|How about these?|
|Tell us about this|
Use a combination of shapes to show the following values. Can you find more than one way to show the values?
20, 27, 35, 36, 50, 66 and 100
Can you find some numbers between 5 and 50 that cannot be made using these shapes?
| 249,415
|
Student Day Study Guide
Click here to download the Student Day Study Guide containing helpful information for your classroom.
People and Portraits
The Private Life of Henry VIII by Lajos Biro
The Medieval Village by G.G. Coulton
Bruegel by Jacques Dopange
Great Harry by Carolyn Erickson
A Complete Guide to Heraldry by A.C. Fox-Davies
Life in the Renaissance by Marzieh Gail
Royal Gambit by Hermann Gressieker
The Rose and the Thorn: The Lives of Mary and Margaret Tudor by Nancy Lenz Harvey
Anne Boleyn by E.W. Ives
Katherine of Aragon by Jean Plaidy
The Six of Henry VIII by Paul Rival
King Henry VII's Mary Rose by Alexander McKee
Music and Song
The Music of Thomas Ravenscroft, from Greg Lindahl.
Playford's The Dancing Master Or, plain and easie Rules for the Dancing of Country Dances, with the Tune to each Dance. The HTML version by Jeff Lee.
A Guide to Medieval and Renaissance Instruments at Iowa State University
The Schoole of Musicke by Thomas Robinson, 1603. An HTML version by Jeff Lee.
The First Book of English Madrigals by John Wilbye (1598). Also from Jeff Lee.
Films & Videos
A Man for All Seasons (rated G)
A Matter of Conscience: Henry VIII and Sir Thomas Moore
Anne of the Thousand Days (rated PG)
Henry VIII (BBC Production - rated G)
Biography - Elizabeth I (A&E Production - rated G)
Young Bess (rated G)
Fire Over England (rated G)
Mary of Scotland (rated G)
The Virgin Queen (rated G)
Elizabeth (rated R for nudity and extreme violence)
Shakespeare in Love (rated R for nudity)
Jane Grey (rated PG-13 for brief nudity)
| 281,954
|
The standard ssh for etch is all you need.
man ssh-keygen will show you how to create a public key
You should probably look through the documentation in
On 28/02/07, Francesco Pietra <firstname.lastname@example.org> wrote:
Is anyone aware of a friendly openssh (including
server) that installs on Debian etch and allows
interactive connections secured by pubkeys?
I installed ssh and openssh-server from debian. OK
using password, though I met problems in configuring
for pubkeys (ssd_config comes with "UsePAM yes"
"PermitRootLogin yes" #AuthorizedKeysFile %h/
.ssh/authorized_keys" (does %h refer to every user?).
Tired with trial-and-error I hope to find an easir
Not anyone is a professional administrator, though
many of us have to get the OS running. A bit more
comments of the config file would help.
Be a PS3 game guru.
Get your game face on with the latest PS3 news and previews at Yahoo! Games.
To UNSUBSCRIBE, email to email@example.com
with a subject of "unsubscribe". Trouble? Contact firstname.lastname@example.org
- From: Francesco Pietra <email@example.com>
| 8,605
|
New Distributional Standards
Changes to the Distributional Standards, effective 2013-2014, Agnes Scott College
Beginning with the 2013-2014 academic year, the general education distributional requirements will change. The general education specific requirements are unchanged: First Year Seminar, English 110, intermediate level of a foreign language, and two courses in physical education.
Click here for a table comparing the old and new distributional requirements, along with the rationale for all general education requirements.
Please note: students completing degree requirements in May 2013 or August 2013 will not be affected by these changes.
| 122,115
|
Robert Louis Stevenson State Park
|Robert Louis Stevenson State Park|
One of the peaks of Mount Saint Helena
|Location||Sonoma and Napa counties, California|
|Nearest city||Calistoga, California|
|Governing body||State of California|
Robert Louis Stevenson State Park is a California state park, located in Sonoma, Lake and Napa counties United States. The park offers a 5-mile (8 km) hike to the summit of Mount Saint Helena from which much of the Bay Area can be seen. On clear days it is possible to see the peak of Mount Shasta, 192 miles (310 km) distant.
The park is named after Robert Louis Stevenson, the author of Treasure Island and Kidnapped. In 1880, Stevenson and his new wife Fanny Vandegrift Osbourne spent their honeymoon living in a cabin at a played-out mine on the mountain along with Fanny's son Lloyd Osbourne. Although nothing remains of the cabin, the site is identified on the trail to the summit. Stevenson's book Silverado Squatters contains stories he wrote about his experiences during his visit to the area.
- "Robert Louis Stevenson State Park". Office of Historic Preservation, California State Parks. Retrieved 2012-10-10.
|Wikimedia Commons has media related to Robert Louis Stevenson State Park.|
|This Napa County, California-related article is a stub. You can help Wikipedia by expanding it.|
| 262,093
|
Class Woodwind Instruments
I. Course Prefix/Number: MUS 131
Course Name: Class Woodwind Instruments
Credits: 2 (1 lecture; 2 lab)
III. Course (Catalog) Description
Course designed for the student who has no experience playing a woodwind instrument or who intends to be a music educator and needs playing knowledge of all the various instruments.
IV. Learning Objectives
- To demonstrate ensemble skills of listening, balancing, tuning, and expressing musical ideas.
- To describe the literature, history and acoustical considerations of woodwind ensembles.
- To perform in concert.
- To compose original music for woodwind ensemble.
V. Academic Integrity and Student Conduct
• plagiarism (turning in work not written by you, or lacking proper citation),
• falsification and fabrication (lying or distorting the truth),
• helping others to cheat,
• unauthorized changes on official documents,
• pretending to be someone else or having someone else pretend to be you,
• making or accepting bribes, special favors, or threats, and
• any other behavior that violates academic integrity.
There are serious consequences to violations of the academic integrity policy. Oakton's policies and procedures provide students a fair hearing if a complaint is made against you. If you are found to have violated the policy, the minimum penalty is failure on the assignment and, a disciplinary record will be established and kept on file in the office of the Vice President for Student Affairs for a period of 3 years.
Please review the Code of Academic Conduct and the Code of Student Conduct, both located online at
VI. Sequence of Topics
Representative topics such as:
- Basics of woodwind playing with attention to individual skills.
- Styles of woodwind music.
- Ensemble skills.
- Composing, conducting and arranging.
VII. Methods of Instruction
Course may be taught as face-to-face, hybrid or online course.
VIII. Course Practices Required
- Practice to learn music and skills required for ensemble rehearsals and concert performance.
- Listening to examples of music which in many instances will be performed by woodwind ensemble members at concert time.
- Public performance.
IX. Instructional Materials
- Repertoire from Woodwind Library
- Recorded listening material
X. Methods of Evaluating Student Progress
- Stage presence
XI. Other Course Information
Playing advanced woodwind ensemble music is interesting and fun, and is therefore motivating.
For the serious student, it provides a good foundation to transfer to an institution with the qualifications to do further study toward a bachelor's degree.
Individual instructors will determine course policies regarding such matters as attendance, grading and other matters.
If you have a documented learning, psychological, or physical disability you may be entitled to reasonable academic accommodations or services. To request accommodations or services, contact the Access and Disability Resource Center at the Des Plaines or Skokie campus. All students are expected to fulfill essential course requirements. The College will not waive any essential skill or requirement of a course or degree program.
Oakton Community College is committed to maintaining a campus environment emphasizing the dignity and worth of all members of the community, and complies with all federal and state Title IX requirements.
Resources and support for
- pregnancy-related and parenting accommodations; and
- victims of sexual misconduct
Resources and support for LGBTQ+ students can be found at www.oakton.edu/lgbtq.
| 54,189
|
Community property laws consider husband and wife to be one in the eyes of the law and thus to own equally all the property earned by one or the other. This means that all income earned during marriage automatically belongs equally to both husband and wife. Only property acquired before marriage or received by gift or inheritance is outside of community property. The English law did not develop community property rules, and states based on English law do not provide for community property among husband and wife.
Community property is the law in southwestern and western states where there was an historic Spanish (Catholic) influence, including: Arizona, California, Idaho, Louisiana, Nevada, New Mexico, Texas, and Washington. The territory of Puerto Rico also developed community property laws. Wisconsin has recently adopted the community property laws unrelated to Spanish influence.
For most of the history of the United States, married couples in "community property" states enjoyed a federal tax benefit by being able to split their income 50/50 despite one spouse (usually the husband) earning most or all of the income. In 1946, the Republican Congress passed a nationwide federal tax benefit for the joint filing of tax returns, which allowed all married couples to attain the same tax benefit, including those married couples living in states that do not have community property laws.
| 21,281
|
HGF pledges its support for Child Action’s Doorstep School project, with hopes for a new school on wheels.
In February 2018 Anita and Avnish Goyal visited Mumbai, where they were offered the chance to visit and spend a day with the School on Wheels: the flagship project being run by Doorstep Schools in their aim to address illiteracy and education needs in the poorest parts of society.
Following the insightful and emotional visit, the Hemraj Goyal Foundation decided to partner with Doorstep Schools, with the aim of raising enough funds for a new school on wheels to be running by early 2019.
The total cost to buy and refit a mobile school on wheels is £23,000, with a further £15,000 annual running cost per bus.
HGF is delighted to be partnering with Child Action for this mission, with Child Action contributing £5,000 per annum towards the running costs. At the Ensemble fashion event in March 2018, HGF presented the project with the first £5,000, and proceeded to raise a further £1887 during the event.
The video below offers a short insight into the incredible work of these schools on wheels, which provide children living on old railway lines with education and access to reading materials on their doorstep.
With more fundraising activities planned over the coming months, we are confident that we can raise enough funds to extend this vital education to more underprivileged children across Mumbai.
You can help us reach our target of buying a new school on wheels by joining us at the inter-university dance contest ‘Just Bollywood’ in December 2018. Further details of tickets will be released very soon – simply sign up to our email list to be the first to hear about all our upcoming events and projects.
| 224,790
|
The Who is one of the best-known and most influential of the second wave of the British rock and roll “invasion” of the 1960s. Early in the band’s career, The Who made a name for themselves by playing loud music, using feedback, and destroying guitars and other instruments at the end of live performances. If The Who had done nothing else, they would have secured a place in rock and roll history for using high volume and for smashing guitars and drums. But The Who moved beyond the early emphasis on volume and guitar-smashing, becoming a successful “singles” band and then in the late 1960s transitioned into crafting long-playing albums, including the famous rock opera Tommy and their own double-album self-history Quadrophenia. Along the way, The Who also produced staples of “classic rock” such as “Baba O’Riley,” “Won’t Get Fooled Again,” and “Who Are You” (all featured also on the CSI television shows). The Who’s music and touring achieved greatest success from the late 1960s through the early 1980s, in the process becoming a cultural and emotional touchstone for a generation of fans across North America, Europe, and elsewhere. The songwriting genius of Pete Townshend (author of the recent Who I Am: A Memoir [2013, Harper]) will live on for years to come. The Who is certainly one of the greatest and most important bands in the history of rock and roll.
Send comments and questions to H-Net
Webstaff. H-Net reproduces announcements that have been submitted to us as a
free service to the academic community. If you are interested in an announcement
listed here, please contact the organizers or patrons directly. Though we strive
to provide accurate information, H-Net cannot accept responsibility for the text of
announcements appearing in this service. (Administration)
| 146,110
|
The House is expected to approve major food safety legislation today. Though many on Capitol Hill pronounced the bill dead last week, the measure bounced back to life over the weekend when the Senate unanimously–and quite unexpectedly– advanced the beleaguered bill late Sunday night.
The FDA Food Safety Modernization Act, which would, for the first time in several decades, update the U.S. Food and Drug Administration’s oversight over the food supply, has been in legislative limbo for over a year. As dean of the House, Rep. John Dingell, D-MI, who has worked on the food safety law for many years, put it: “This legislation has seen more procedural fits and starts than any other.”
The legislation survived a near-fatal constitutional snafu, filibuster threats, fierce debate over controversial amendments, and managed to gain ground amidst a jam-packed legislative agenda in one of the most productive Congresses in recent history.
Consumer advocates, industry groups, and public health experts–who have all followed the ups and downs of the bill with bated breath–responded enthusiastically as the bill sailed through the Senate, again. But, as NPR’s April Fulton noted on Sunday: “No one’s exactly popping champagne corks yet. There’s always the potential for another oops.”
“There shouldn’t be any obstacles but this is one bill where it is not over until it is over,” said Jean Halloran, food safety director at Consumers Union, which publishes Consumer Reports, in an email response to Food Safety News. “However, we are optimistic.”
Sandra Eskin, director of the food safety campaign at the Pew Charitable Trusts, echoed the same cautious optimism in an email: “We hope that the bill will pass the House sometime [Tuesday.] We understand from House Leadership that they are doing everything they can to speed this vote through.”
The bill is not expected to have trouble clearing the House. A stronger version of the legislation cleared the lower chamber in July 2009, with a bipartisan 283-142 vote. Earlier this month, the House approved an identical version, which was attached to a large all-encompassing continuing resolution to keep the government funded through September, 212-206, with 35 Democrats joining Republicans to vote against it. The bill must be re-approved by the House because it’s no longer riding the spending bill–the CR died in the Senate.
It is not clear how leadership in the Senate came to a deal to advance the food safety legislation as a stand-alone bill. For months, leadership had to circumvent Sen. Tom Coburn’s, R-OK, vehement opposition to the measure in order to advance the bill. Coburn threatened to filibuster the bill over the cost–approximately $1.4 billion over five years–though the Congressional Budget Office says the provision is deficit-neutral.
Less than 48 hours before the bill passed the Senate unanimously, Coburn’s office told Food Safety News that the senator would oppose the “so-called food safety bill” if it were attached to a continuing resolution. After the Senate cleared the bill via unanimous consent Sunday, Sen. Coburn’s office did not return a request for comment.
Slate’s David Weigel reported Sunday that he talked to several staff members of senators who had voted against the bill the last time around–before the constitutional error was realized.
“Nobody knew why their bosses had let it sail through,” said Weigel. “The best theory I’ve heard is that key Republicans, having seen the bill pass with supermajority support (73-25), and having become satisfied that there were no back-door nanny provisions in the bill, decided that it wasn’t worth keeping the Senate in session past Christmas to debate it. It’s a Christmas miracle, if the key characteristics of Christmas are self-interest and fatigue.”
President Obama is expected to sign the bill before Christmas.© Food Safety News
| 106,752
|
The Plot: Five year old Jack lives with Ma in Room. His entire life, all he knows, is within these four walls. Rug, with the spot on it from when he was born. Bed, where he wakes up with Ma in the morning. Wardrobe, where he goes to sleep because that is when Old Nick opens the locked door, takes away the trash, bring supplies.
Jack tells his story, starting with the known World, then finding out that a world existed Outside, and finally trying to navigate a world full of people and things and smells and sounds. A story of safety and freedom, of known and unknown, and, through it all, the fierce bond he shares with Ma.
The Good: When I first heard about Room, I knew one thing. I didn’t want to read it. A woman kidnapped, raped, kept in a shed. A child born of that rape, raised in isolation. It was just too horrible to hear about, to think about. Why spend over 300 pages with the heartbreak of a woman who loses over seven years to a monster? When I read adult fiction, it tends to be mysteries or romance or historical fiction. The crime fiction I read tends to be told from the safe perspective of the police officer, the detective, the federal agent, not the victims. Even though I knew from reviews that halfway through Jack and Ma escape, I just didn’t think I could bring myself to read a story about broken people.
My friend Carlie Webber said she’d read Room and liked it, and since I respect her opinion, I borrowed her copy.
WOW. I loved, loved, loved Room. Jack, five years old, is the perfect narrator. Donoghue manages to convey not only Jack’s world view and a perspective limited by age and experience but also to give enough information for the adult reader to know more than Jack knows. We know the squeaks and gasps of Old Nick’s nightly visits is the nightly rape of Ma. We know that Jack’s self-centered desire to hold onto the familiarity of Room and his belongings from that time inflicts unbelievable pain on Ma who wants full freedom from Old Nick and Room. Having gained physical escape, Ma wants that time left in her past but to Jack, Room was never a prison. It was only a place that was safe and home — “safe” and “home” because of Ma’s strength.
Ma was kidnapped at nineteen, gave birth to Jack two years later. Instead of viewing her child as a punishment, as a part of Old Nick, as a monster’s child, Ma wanted Jack. The reader realizes that Jack saves Ma because in it gives her someone to love and care for. Ma carves out some type of normalcy for her son, and that keeps Ma from going mad. While isolated in a garden shed for years, Jack keeps Ma connected to the world. Jack doesn’t realize this, so cannot tell us, but the reader figures it out from the stories Ma tells Jack and from the daily routine she has created for her son.
Kidnapped people who escape: that is Room. Despite the “ripped from the headlines” plot, this is not a “ripped from the headlines” book. Yes, there is an escape, half way through the book, but most of the book is about the details of the life Ma and Jack share before and after. Jack’s voice and language mask the horror of the captivity, so there is never terror, there is no real sense of violence, beyond Jack’s hiding in the Wardrobe during Old Nick’s visits. Ma doesn’t scream or shout or beg. Jack never comments on it, doesn’t realize what is or is not happening, but the reader knows this is just another example of what Ma is doing to fully protect her child. So, too, does it protect the reader. There are no “true crime” details of kidnapping and torture and rape here.
Room is also about the bonds between parent and child and how love can both save and smother. Ma and Jack spend every hour of every day together. Jack is Ma’s whole life. What child wouldn’t want to be the center of his parent’s existence? This love saved Ma and saves Jack, but what happens to it Outside in a world where people don’t share one small room 24/7? Jack, like any child, has to learn to be his own person, not an extension of his mother.
In Room, Ma was a great mother because she had to be. She was focused: keep Jack safe, figure out a way to escape. Once escape happens and with that, the obligation and responsibility of being The Only One in Jack’s life ends, Ma is left with — what? Who is she now and what is her role? She was Jack’s parent, friend, and teacher because she had to be and it is all Jack knows. Is it really selfish if, once out, Ma doesn’t want all three roles? Remember, none of Ma’s struggles are told by Ma. They are told by Jack, who just knows things have changed.
I’m hoping this makes the Alex Awards, the Award from YALSA for adult books with teen appeal. Stories about women kidnapped and held captive, some bearing children in captivity, are in the news. YA books include ones about teens who are kidnapped. How does one survive, mentally and physically, for years and years and years? Room answers this question, using fiction to tell a story true — people are resilient. They survive, battered but not permanently broken.
Because this is a story about surviving, no matter what; because it is a story of the sacrifices one can and cannot make; because it is about love, both generous and self-centered, giving and demanding, Room is a Favorite Book Read in 2010.
| 11,390
|
SpaceX cargo flight overcomes engine mishap
BY STEPHEN CLARK
Posted: October 8, 2012
One of the Falcon 9 rocket's nine Merlin first stage engines suddenly lost pressure and shut down during Sunday's launch of a commercial resupply craft to the International Space Station, but the engine did not explode and the launcher successfully placed its Dragon payload in the correct orbit, SpaceX said in a statement Monday.
The Falcon 9 rocket lifted off at 8:35 p.m. EDT Sunday (0035 GMT Monday) from Cape Canaveral Air Force Station, Fla., and reached orbit about 10 minutes later, deploying the privately-built Dragon spacecraft to begin a 59-hour chase of the space station.
Although NASA and SpaceX commentators did not acknowledge the mishap in live coverage of the launch, an engine on the Falcon 9's first stage unexpectedly shut down seconds before the rocket passed through Max Q, engineering shorthand for the moment of peak mechanical stress on the vehicle.
"Approximately one minute and 19 seconds into last night's launch, the Falcon 9 rocket detected an anomaly on one first stage engine," SpaceX said in a statement issued Monday. "Initial data suggests that one of the rocket's nine Merlin engines, Engine 1, lost pressure suddenly and an engine shutdown command was issued immediately."
Views from optical tracking cameras around Cape Canaveral showed a noticeable change in color and shape of the exhaust plume from the Falcon 9 first stage. Footage showed what appeared to be debris falling away in the wake of the rocket.
But SpaceX says telemetry data indicate the engine remained intact.
"We know the engine did not explode, because we continued to receive data from it," SpaceX said in a statement. "Our review indicates that the fairing that protects the engine from aerodynamic loads ruptured due to the engine pressure release, and that none of Falcon 9's other eight engines were impacted by this event."
SpaceX has long touted the Falcon 9 rocket's ability to lose a first stage engine and still achieve a successful mission.
Sunday's launch was the fourth flight of a Falcon 9 rocket. All have been successful.
The Merlin 1C engine burns kerosene and liquid oxygen propellants. The nine first stage engines were designed to burn for three minutes on Sunday's launch, but the stage's eight remaining engines fired nearly 30 seconds longer than planned to compensate for the lost engine.
The Falcon 9's second stage, powered by a single Merlin engine optimized for performance in vacuum, accelerated into orbit and deployed the Dragon spacecraft 10 minutes and 24 seconds after liftoff, about 38 seconds later than planned.
"As designed, the flight computer then recomputed a new ascent profile in real time to ensure Dragon's entry into orbit for subsequent rendezvous and berthing with the ISS," the statement said. "This was achieved, and there was no effect on Dragon or the cargo resupply mission."
Two launches of the Saturn 5 rocket lost engines during ascent and still reached orbit, including Apollo 13, which was later struck by an unrelated problem requiring the mission's famous aborted moon landing and risky return to Earth.
One space shuttle flight in 1985 experienced a premature engine shutdown during launch, and it safely reached orbit and accomplished its mission.
"We will continue to review all flight data in order to understand the cause of the anomaly, and will devote the resources necessary to identify the problem and apply those lessons to future flights," SpaceX's statement said. "We will provide additional information as it becomes available."
The Dragon spacecraft is on course to reach the space station Wednesday, with grapple by the robot arm expected at 7:22 a.m. EDT (1122 GMT).
INDEX | PLUS | NEWS ARCHIVE | LAUNCH SCHEDULE
ASTRONOMY NOW | STORE
© 2014 Spaceflight Now Inc.
| 116,923
|
640 South State StreetDover, Delaware 19901
21 West Clarke AvenueMilford, Delaware 19963
401 North Carter RoadSmyrna, DE 19977
640 S. State StreetDover DE 1990121 West Clarke AvenueMilford DE 19963
301 Jefferson AveMilford, DE 19963
1275 S. State StreetDover, Delaware 19901
LA, Lupus Anticoagulant Panel, Lupus Inhibitor, LA Sensitive PTT, PTT-LA, Dilute Russell Viper Venom Test, DRVVT, Modified Russell Viper Venom Test, MRVVT
This is a special blood test to find out if your body is making certain antibodies or proteins that cause you to have a blood-clotting disorder. It does not mean you have lupus, specific type of autoimmune disorder.
Antibodies are proteins in the blood that help you fight off foreign invaders such as viruses and bacteria. Lupus antibodies are one of two types of antiphospholipid antibodies that are sometimes found in blood. Antiphospholipid antibodies are proteins that react to the phospholipids, or fat molecules, normally found in the membranes of blood cells. Antiphospholipids can interfere with the work of your blood cells. They can cause blood vessels to narrow and clots to form. Clots can lead to heart attacks, strokes, pulmonary embolisms, and deep vein thromboses. These occur when blood clots form in the deep veins of the body.
These antibodies are called lupus antibodies because they were first discovered to be related to lupus. But not everyone who has lupus has these antibodies. And people who don't have lupus can start making them. The reason is unknown.
You might have this test if you get blood clots that can't be explained. You may also have this test if you have repeated miscarriages, or you have other blood tests that show your blood takes a long time to clot. You might be asked to take this test again if the lupus anticoagulant is found in your blood. Taking the test again will help your healthcare provider find out if the condition is temporary or persistent.
If your test results are positive, your healthcare provider is likely to order other special blood-clotting tests. They might include:
Repeating the test
Activated partial thromboplastin time
Modified Russell viper venom time, or MRVVT
Platelet neutralization procedure, or PNP
Kaolin clotting time, or KCT
Coagulation factor assays
Complete blood cell count, or CBC
A result for a lab test may be affected by many things, including the method the laboratory uses to do the test. If your test results are different from the normal value, you may not have a problem. To learn what the results mean for you, talk with your health care provider.
The test results will show whether lupus anticoagulant antibodies are present in the blood. If your test shows they are, it should be repeated in several weeks to confirm.
Normal values range from 20 to 39 GPL or MPL units.
The test requires a blood sample, which is drawn through a needle from a vein in your arm.
Taking a blood sample with a needle carries risks that include bleeding, infection, bruising, and a sense of lightheadedness. When the needle pricks your arm, you may feel a slight stinging sensation or pain. Afterward, the site may be slightly sore.
Your blood sample should be collected before you begin taking anticoagulation medicines, because they can skew the results.
Tell your healthcare provider if you are taking any other medicines because they might interfere with your test results. If you have an infection or cancer, it can affect your test results.
If the lab where the LA test is done is inexperienced with the test, it could result in false positives.
You do not need to prepare for this test.
Bayhealth is Southern Delaware’s healthcare leader with hospitals in Dover and in Milford. Bayhealth provides a wide range of medical services, including cardiovascular, cancer, orthopaedics and rehabilitation, pediatrics, respiratory care, sleep care, surgical weight loss and women’s services.
| 8,068
|
All aboard for the ghost train to North Korea
(The emptiness of the ghost station. Photo: Malcolm Moore)
On the border between North and South Korea, just outside the Demilitarised Zone, sits Dorasan train station, the last stop on the line.
Outside there's a board etched with the names of thousands of South Koreans who donated money to build what they hoped would be a train line that linked the two countries before running into China and then joining the European rail network. Dorasan train station itself was designed to look like two hands shaking each other in peace.
"We hoped that this line would run all the way to England, that we could board a train for London one day," said one man wistfully, as he visited the station yesterday.
In 2002, George W Bush visited the station and scrawled a signature onto a concrete siding which is still displayed inside the building. He wrote that he hoped the line would bring together Korean families and gave a speech in which he saw a peninsula that was "united in commerce and cooperation, instead of divided by barbed wire".
But when the train started running, it carried barely any goods – only 340 tons in the first year. On 150 out of 163 return trips so far, it was a ghost train, carrying nothing at all.
Today, the tracks still run into the DMZ and onto Kaesong, an industrial complex inside North Korea, but no trains are scheduled anymore. The station is empty of passengers and just another stop on the tourist trail.
One platform has a sign for Pyongyang, but the glass doors are shut and the waiting room inside is empty. No destinations are listed on the departure board.
With the situation still deteriorating, Dorasan is unlikely to reopen anytime soon, and remains a reminder of a previous botched attempt to engage with the North.
P.S. For a fascinating blog about what is happening inside the Hermit Kingdom, I can recommend North Korea Economy Watch www.nkeconwatch.com/
The Chinese High Street has more muscle
February 27th, 2011 10:17
Chinese graduates sign up for a soldier's life
January 13th, 2011 7:37
Who is Li Keqiang?
January 11th, 2011 8:12
How much are we really paying for the pandas?
January 11th, 2011 7:18
Why does China block foreign websites?
December 30th, 2010 10:54
| 42,727
|
1A complete listing of all general and special face forms of the 32 point groups is given in ch. 10 of Hahn & Klapper (2002), Table 10.1.2.2; the eigensymmetries of the 47 face forms are listed in Table 10.1.2.3. Illustrations of all face forms are contained in ch. 3.2 (pp. 184-188) of the book by Vainshtein (1994), ch. 3 (Fig. 73) of Shubnikov & Koptsik (1974) and ch. 10 of Buerger (1956).
2Representative twin operation m'(10).
3Note that this illustration does not require crystals to exhibit planar (habit) faces and complete face forms. It is applicable to crystals of any (also spherical) shape to be studied by X-ray diffraction. This is shown in Section 2.3, p. 336, of Klapper & Hahn (2010).
4In some cases of reticular merohedral twins certain indices are always integer, e.g. for the tetragonal 5 and hexagonal 7 twins which preserve the tetragonal or hexagonal axis. Here the index l is always integer (cf. §§5 and 6).
5The rhombohedral 3 twins treated here are `twins by reticular merohedry with parallel threefold axes'. They are thus independent of the c/a ratio (hexagonal axes) or the rhombohedral angle (rhombohedral axes) and can occur in any rhombohedral crystal. Twins `with inclined threefold axes' depend on the axial ratio or on . Both types have been derived by Grimmer (1989b).
6They are the same as those in Table 9, subtable (c) of Klapper & Hahn (2010) for crystals with hexagonal lattices and 1 twin laws 2 and m(0001). This is due to the fact that face forms are independent of the lattice type (hexagonal or rhombohedral).
7In principle, however, domains of 3 obverse/reverse reflection twins with twin laws 3 3m, 3 and 32 can be studied by the reversal of their optical rotation sense. The same applies to the corresponding trigonal 1 twins.
8Exact lattice coincidence is, in principle, not possible because the coincidence is not enforced by symmetry as it is in the case of `parallel c-axis' twins. It may occur, however, for a certain temperature if the thermal expansion is anisotropic.
9Q = (k1 - 2P)2 + P2 = (h1 - P)2/4 + P2 for coincidence condition h1 + 2k1 = 5P; similar for h2, k2 with h2 + 2k2 = 5P.
10The d values of reflections hkl of a tetragonal crystal are given by 1/d2 = (h2 + k2)/a2 + l2/c2. Since l2/c2 is the same for both twin-related reflections, the d values are equal for equal h2 + k2.
11Q = 7P2 + h1(h1 - 5P) = [7P2 + k1(k1 + 4P)]/4 for coincidence condition 2h1 - k1 = 7P. The same holds for h2, k2 and condition 2h2 - k2 = 7P.
12The d values of reflections hkl of a hexagonal crystal are given by 1/d2 = (h2 + hk + k2)/a2 + l2/c2. Since l2/c2 is the same for both twin-related reflections, the d values are equal for equal h2 + hk + k2.
13The reduced composite symmetries are the same for 3m1 and 31m etc., because the twin elements m'(120) etc. are the same for both groups. For details of `structural settings', see Klapper & Hahn (2010), Appendix A.
14Note that there are four conjugate subgroups 2/m of 4/m2/m of index . Each of these has a single axis along one of the four body-diagonal axes of the cubic supergroup (cf. Müller, 2004, p. 708).
15If the subgroup is chosen along one of the other body diagonals , or , the types of splitting, given below, remain the same, but the Miller indices of the subforms would change.
16They represent the four conjugate subgroups 2/m of 4/m2/m.
17It is emphasized that the term `opposite' (i.e. related by an inversion) refers here only to the morphology of the two split forms.
| 217,228
|
Google Street View releases devastated Fukushima town tour
A trifecta of troubles: earthquake, tsunami, and nuclear cockup
Pix Google has released Street View images of the unfortunate town of Namie-machi, Japan, which was devastated by the March 2011 Tōhoku earthquake and the tsunami it caused, then rendered uninhabitable by the Fukushima Daichi nuclear cockup.
"Two years have passed since the disaster," the town's mayor Tamotsu Baba writes on the Google Maps blog, "but people still aren't allowed to enter Namie-machi."
All 21,000 residents of Namie-machi had to evacuate their homes, and they're understandably anxious about the state of their property. "Many of the displaced townspeople have asked to see the current state of their city," Baba says, "and there are surely many people around the world who want a better sense of how the nuclear incident affected surrounding communities."
Enter Google, which worked with Baba to drive the company's Street View cars through Namie-machi and capture images of how it looks today. It's not pretty. The tsunami wrecked much of the once-thriving coastal city, and Fukushima Daichi's radiation releases turned it into a ghost town.
But don't take our word for it. Take a Street View drive through Namie-machi and its environs, and see for yourself. Here are a few sample images – our thanks to The Atlantic for pointing us to these particular drive-bys (click each to enlarge):
While the Fukushima Daichi meltdown wasn't the cause of Namie-machi's ruination, it has prevented the evacuated townspeople from recovering or repairing their property to any appreciable extent. "With the lingering nuclear hazard," Baba says, "we have only been able to do cursory work for two whole years."
Baba writes as a politician and civic booster, extolling his town's natural beauty and location – but he also appears to be a man who genuinely grieves for his town. "Ever since the March disaster, the rest of the world has been moving forward, and many places in Japan have started recovering," he writes. "But in Namie-machi time stands still."
Despite the trifecta of troubles – earthquake, tsunami, and nuclear systems failure – Baba remains resolute. "It may take many years and many people's help," he says, "but we will never give up taking back our hometown." ®
| 120,356
|
Note: Answers provided have not been edited for grammar, misspellings or typos. In some instances, candidate claims that could not be immediately verified have been omitted.
City: Hawthorn Woods
Website: Candidate did not respond.
Office sought: Lake Zurich Unit District 95 School Board (4-year Terms)
Family: Married, three children
Education: Bachelors Business Admin., Loyola-Chicago 1986 Juris Doctorate Degree, Univ of Notre Dame 1991 Masters in Elementary Education, National Louis Univ 2009
Civic involvement: District 95 Board of Education member since 2005
Elected offices held: District 95 Board of Education member since 2005
Have you ever been arrested for or convicted of a crime? If yes, please explain: no
Key Issue 1
1 Maintaining fiscal responsibility (living within our means)
Key Issue 2
2. Implementation of the common core standards
Key Issue 3
3. Social/emotional well being of our students 4. Technology enhancements for teachers/students
What do you think about the shift to the common core standards? How big a role do you think the board of education should play in setting the curriculum for students and what ideas do you have for changes to the current curriculum?
The switch to common core standards is an important shift in teaching children how to process and analyze information. The Board's role continues to be the funding of resources for our teachers and administrators so that the common core curriculum can be implemented with fidelity. The curriculum should be designed and written by the District's administrators and teachers who have the experience and background to do so. The Board should ensure that the administration's suggested curriculum is rigorous and is implemented consistently throughout the district.
How satisfied are you that your district is preparing students for the next stage in their lives, whether it be from elementary into high school or high school into college or full-time employment? What changes, if any, do you think need to be made?
As a unit district, I believe that from elementary school through high school, our teachers do an excellent job preparing our students for college. The curriculum that the district offers is rigorous and allows ample opportunity for college level classes. I believe that we need to continue offering a rounded vocational curriculum to our students who may not be college bound. The Board should continue to monitor vocational offerings and, perhaps, expand those opportunities if there is appropriate student interest.
What budget issues will your district have to confront and what measures do you support to address them? If you believe cuts are necessary, what programs and expenses should be reduced or eliminated? On the income side, do you support any tax increases?
The most significant budgetary issue facing our District is the Illinois pension crisis. The shifting of the pension burden to local districts will have a significant financial impact on all school districts. However, because District 95 is in very solid financial shape, no program reductions are anticipated in the near future. Nor is there a short-term need for any tax increases. Our community has already contributed greatly to raising our District's financial stability to the level we now maintain we should not be asking any more of our community at this time.
As contract talks come up with various school employee groups, do you believe the district should ask for concessions from its employees, expect employee costs to stay about the same as they are now or provide increases in pay or benefits?
Over the course of our last two teacher contracts, the Board of Education and the Teacher's Association worked cooperatively to negotiate agreements that, given the economic climates at hand, were fair to the taxpayers and employees alike. The agreements successfully sought to maintain reasonable limits on salary and benefit increases, and those negotiated contracts have allowed District 95 to achieve the highest financial rating possible while maintaining a very respectful and cooperative relationship with our teachers association.
If your district had a superintendent or other administrator nearing retirement, would you support a substantial increase in his or her pay to help boost pension benefits? Why or why not?
I would not support anyautomatic? increase in pay designed to help boost an employee's pension benefits. The Board of Education, during my time on the Board, has removed clauses that called for such increases from both administrator and teacher compensation plans/contracts.
| 256,910
|
Power Technology unveiled its highest power violet laser module to date. The new
temperature controlled Instrument Quality (IQ) module emits 50mW of violet output at
405 ± 10nm.
This development in laser diode technology represents a significant increase in
power over the company’s popular 20 and 25mW versions. Potential applications range
from flow cytometry to high-resolution printing to biodetection. In fact, this
proven technology will serve any number of power-hungry OEM applications,
particularly those requiring exceptional stability. The unit boasts a PID
temperature controller and precision current source that work to ensure stable
wavelength and output.
The new 50mW violet IQ measures a compact 1.50 inches in diameter and 6.20 inches in
length. The unit features an adjustable focus, quality glass optics, and optional
beam expanding optics and is available with a circularized beam or with standard
elliptical output. In addition, it is available with CW or modulated output.
| 163,864
|
Low-maintenance hydrangea border
Do you want a low-maintenance border for part shade that looks good all year? Plant the four species of hydrangeas you see here along with a few favorite perennials. You’ll need a space about 25 feet long and 15 feet deep to grow this border.
The oakleaf hydrangea kicks off the show in late spring, followed by ‘Annabelle’ smooth hydrangea and everblooming bleeding hearts. Bright pinks and purples join the fun in midsummer with BloomStruck bigleaf hydrangeas and ‘Stargazer’ lilies. Citron yellow hostas and white astilbes cool the palette during the hottest summer months. Finally, a magnificent ‘Limelight’ panicle hydrangea provides the grand finale with its prolific white flower panicles that blush pink as the foliage glows gold in fall. After the blooms fade, dried hydrangeas and astilbes give you something interesting to look at out the window all winter long.
- Late summer: Cut back the spent lily and hosta bloom stalks.
- Early spring: Top dress with compost and sprinkle granular slow-release fertilizer in the bed. Rake up leaves and cut back dead perennial stems. Deadhead and prune up to a third of the total height of the panicle and smooth hydrangeas.
- Late spring: Just prune out dead wood and deadhead on bigleaf and oakleaf hydrangeas.
See 9 plants with multiseason interest for your garden
How to change the color of your hydrangea blooms
Most bigleaf hydrangeas’ flower color varies depending on the pH of the soil. Flowers are bluer in acid soil and pinker in alkaline soil. (White flowers won’t change color.) Want to change pink to blue or blue to pink? Here’s how:
- Test your soil with a pH meter or kit. A pH reading of 7 or lower is acid; a pH reading above 7 is alkaline.
- For blue flowers, incorporate aluminum sulfate into the soil to make it more acid.
- For pink flowers, add garden lime to make it more alkaline.
- Soil type and moisture levels affect how quickly plants take up these additives so it can take anywhere from a few months to a season to see results.
Love hydrangeas? So do we! You might also like:
Five panicle hydrangeas for your garden
Seven bigleaf hydrangeas for your garden
How to care for bigleaf hydrangeas
Your handy shrub pruning guide
Flowery foundation garden plan
Meet the plants in this four-season hydrangea border
See more details about the plants used in this garden plan in the slideshow below.
| 141,958
|
dns & grcn are poets, artists, cooks and developers. They work together on various kind of projects, ranging from making and eating free sausage to create application to make your phone come alive, or live radio broadcasts.
Jérôme Saint-Clair is an artist and researcher whose work cover a wide variety of techniques and medias. His preference goes with domains such as software, hardware, electronics and open source.
His work, often critical and tinged by humor, sits in the net-art, generative art and media archeology categories. It ranges from digital interactive installations, video-projections or video-mapping to sound and visual performances.He launched the French cell of the Graffiti Research Lab (GRL[FR]), back in 2011. He is a founding member of the Dead Minitel Orchestra (DeMO) and the Internet of Dead Things Institute (IoDT) collectives. He is also part of the Disnovation.org working group.
Track My Bot is a device that connects to your computer via USB and allows you to replay pre-recorded scenarios of mouse movements and keyboard strokes and thus escape remote surveillance. It is undetectable by teleworkers' surveillance software because it is considered by the computer as a simple keyboard and mouse. As for today, several scenarios exist for community managers, computer developers, students, project coordinators, administrators, ..., "Track My Bot" also allows to record its own scenarios and to replay them endlessly! .
* Features *
record mouse movements
and keyboard strokes,
undetectable by bosswares!
b01 is a multimedia artist involved in several projects dealing with electromagnetic fields.
With the adoption of quarantine measures all over the world, COVID-19 has made telecommuting the new norm for many workers. This shift facilitates the import of "disruptive" methods of platform management into the realm of domestic office work. This is a new step towards a generalisation of a global "governance by numbers". A new generation of remote management software is increasing the reach of labor metrics, allowing companies to capture every possible aspect of their employees' behavior. The increased use of metrics is in line with two centuries of labor's disciplinary tradition, its productivist ideology, and scientific managment. In this context, software offers possibilities for “nudging”, pressurizing workers into producing data that validates the system of statistical metrics rather than focusing on the content or the quality of what is actually produced. Not to mention the nepharious effects on workers' mental health and the many self-censorship mechanisms that these settings promote.
RYBN.ORG invites artists to create a script, a routine, a browser extension, an app, a spreadsheet, or any other kind of application that conteracts the monitoring schemes of management software. Automating mundane computer activity could, for example, artificially inflate metrics to ease the pressure imposed on workers.
Participants: b01, David Benque aka the Diagram Institute, JODI, Sarah Garcin & Frédéric Danos, !mediengruppe bitnik, RYBN.ORG, Jérôme Saint-Clair, Valentina Vuksic & more tba.
Explore the GIT repository and install the most suited apps or scripts on your device. Your computer will then be ready to fight back against the montoring systems and their sophisticated metrics. Scripts are provided for most platforms.
Explore the git repository to try the various softwares, scripts and applications.
| 273,734
|
Tree Traque is a citizen science project to which you are invited to participate.
Each one of use can contribute to science through citizen science projects.
Indeed, researchers sometimes need help to collect data to answer research questions. This is the case with Tree Traque.
We need you to track the timing of seasonal changes occurring on your favourite tree!
What date are leaf buds opening? What date are leaves starting to unfold? In the fall, what date are leaves turning red? This is what we want to know.
Why do we want to document seasonal changes of trees?
Because we need this information to measure the impacts of recent climatic changes on trees from our region.
The data you collect today data will be very useful a few years from now to understand the impact of climate change.
The Lennoxville Phenology Project gratefully acknowledges the Tomlinson Foundation, who provided funds used to hire Andrew Colton, a Bishop’s University student, to help set up this project, create the identification key, put together an information pamphlet and so many other things.
We also thank Bishop’s University for their support.
The data collected by Tree TraQue will be used for research and educational purposes (not for profit), and will generally be open access; free to anyone. Ownership of the data lies with Tree TraQue.
| 84,761
|
The Benefits of Medical Qigong in Patients with Cancer
December 16, 2013 - Medical Qigong
is a mind-body exercise that includes movement and meditation and is beneficial
in reducing high blood pressure, high cholesterol, anxiety, stress, pain, and
incidence of falls. A study by Ohio State University Comprehensive Cancer Center
examined whether patients with cancer and survivors who participated in an MQ
class experienced a change in fatigue, depression, and sleep from a
pre-intervention evaluation to a post-intervention evaluation.
Participants were patients diagnosed with
cancer who participated in MQ classes. Some were actively undergoing cancer
treatment (e.g., surgery, hormone therapy, radiation therapy, chemotherapy) and
some were receiving no treatment. Patients diagnosed with cancer and enrolled in
an MQ class were invited to participate. A packet of surveys was completed
before the first class and before the final class.
Scores showed a reduced depression score after completing the
five-week MQ course. Those findings indicate that MQ is helpful in reducing some
of the problems associated with cancer and cancer treatment.
This new study is published in the December 2013 issue of
Clinical Journal of Oncology Nursing.
| 272,647
|
Monetary Policy in the United States
An Intellectual and Institutional History
After describing the constitutional principles that the Founding Fathers laid down to prevent state and federal governments from printing money. Timberlake shows how the First and Second Banks of the United States gradually assumed the central banking powers that were originally denied them. Drawing on congressional debates, government documents, and other primary sources, he analyses the origins and constitutionality of the greenbacks and examines the evolution of clearinghouse associations as private lenders of last resort. He completes this history with a study of the legislation that fundamentally changed the power and scope of the Federal Reserve System—the Banking Act of 1935 and the Monetary Control Act of 1980.
Writing in nontechnical language, Timberlake demystifies two centuries of monetary policy. He concludes that central banking has been largely a series of politically inspired government-serving actions that have burdened the private economy.
| 77,842
|
Due to scheduled maintenance at the State Data Center, azdhs.gov and associated services may be unavailable intermittently on Saturday, June 15th, between 9 a.m. and 5 p.m. We apologize for any inconvenience this may cause.
Avian (Flu) Influenza
Birds have their own influenza (flu) viruses, known as bird flu or avian influenza (AI) that is caused by type A influenza viruses. These viruses may or may not cause outbreaks in birds. Occasionally, these viruses can also infect humans, and sometimes cause an outbreak or, very rarely, a pandemic. There are many avian influenza viruses that affect birds.
- Avian influenza viruses are very common throughout the world.
- Outbreaks of many different kinds of avian influenza occur commonly among poultry in the United States.
- Avian influenza viruses occur naturally among birds. Wild birds worldwide carry the viruses, but usually do not get sick from them. However, some avian influenza strains are very contagious among birds, and can be deadly to different types of birds, including chickens, ducks, and turkeys.
- There are two general classifications for avian influenza viruses: low pathogenic (LPAI) that generally causes little or no clinical signs in birds and highly pathogenic (HPAI) that can cause severe clinical signs and death in birds.
Avian influenza viruses usually do not affect people, but once in a while may infect people cause mild to severe illness in humans.
- Human cases are mostly found in people who have close contact with infected birds.
- Public health officials worldwide are closely watching for any signs that would indicate if or when avian influenza viruses have changed into a form that could be spread from person-to-person.
- The recent outbreak in China has been caused by a novel avian influenza A (H7N9) and is not the same H7N9 virus found in North American birds.
- Another avian influenza virus of interest is known as avian influenza (HPAI) A (H5N1).
- To date, there have been 10 outbreaks of various avian influenza viruses among poultry in the United States with no known transmission to humans. There have only been two outbreaks in the United States involving transmission to humans.
| 289,954
|
106 Service Tasks The Puppies Learn Part 3
The future service dogs must master 106 service tasks. These duties range from removing shoes and socks, to retrieving a soda from the refrigerator, to dialing 911 in the event of an emergencyPAWING-BASED TASKS (some dogs prefer it to nose nudge)
73. Cupboard door - shut it with one paw
74. Dryer door - shut it with one paw
75. Refrigerator and freezer door - one forepaw or both
76. Call 9-1-1 on K-9 rescue phone - hit button with one paw
77. Operate light switch on wall - jump up, paw the switch
78. Depress floor pedal device to turn on appliance(s) or lamp
79. Jump up to paw elevator button [steady dog if he tries it on slippery tile floor]
80. Operate push plate on electric commercial doors
81. Close heavy front door, other doors - jump up, use both forepaws.
BRACING-BASED TASKS (no harness)
82. Transfer assistance from wheelchair to bed, toilet, bathtub or van seat - hold Stand Stay position, then brace on command, enabling partner to keep their balance during transfer
83. Assist to walk step-by-step, brace between each step, from wheelchair to nearby seat
84. Position self and brace to help partner catch balance after partner rises from a couch or other seats in a home or public setting
85. Prevent fall by bracing on command if the partner needs help recovering balance.
86. Steady partner getting in or out of the bathtub
87. Assist partner to turn over in bed; have appropriate backup plan
88. Pull up partner with a strap [tug of war style] from floor to feet on command, then brace till partner catches balance.
HARNESS-BASED TASKS (Mobility Assistance) (Only appropriate for large sturdy adult dogs with sound joints, proper training)
89. Assist moving wheelchair on flat [partner holds onto harness pull strap] avoiding obstacles
90. Work cooperatively with partner to get the wheelchair up a curb cut or mild incline; handler does as much of the work as possible, never asking the dog to attempt an incline unaided
91. Haul open heavy door, holding it ajar using six foot lead attached to back of harness, other end of lead attached to door handle or to a suction cup device on a glass door
92. Tow ambulatory partner up inclines [harness with rigid handle or pull strap may be used]
93. Brace on command to prevent ambulatory partner from stumbling [rigid handle]
94. Help ambulatory partner to climb stairs, pulling then bracing on each step [rigid handle or harness with pull strap may be used to assist partner to mount a step or catch balance]
95. Pull partner out of aisle seat on plane, then brace until partner catches balance [harness with a rigid handle and a pull strap, or pull strap only]
96. Brace, counter balance work too, assisting ambulatory partner to walk; the partner pushes down on the rigid handle as if it were a cane, after giving warning command, when needed
97. Help ambulatory partner to walk short distance, brace between each step [rigid handle]
98. Transport textbooks, business supplies or other items up to 50 pounds in a wagon or collapsible cart, weight limit depends on dog's size, physical fitness, type of cart, kind of terrain
99. Backpacking - customary weight limit is 15 percent of the dog's total body weight;10 percent if a dog performing another task, such as wheelchair pulling in addition to backpacking; total weight includes harness (average three to four pounds). Load must be evenly distributed to prevent chafing.
OTHER KINDS OF ASSISTANCE IN CRISIS
100. Bark for help on command
101. Find the care-giver on command, lead back to location of disabled partner
102. Put forepaws in lap of wheelchair user, hold that upright position so wheelchair user can access medication or cell phone or other items in the backpack
103. Wake up partner if smoke alarm goes off, assist to nearest exit
104. Operate push button device to call 9-1-1, an ambulance service or another person to help in a crisis; let emergency personnel into home and lead to partner's location
105. Fetch insulin kit, respiratory assist device or medication from customary place during crisis
106. Lie down on partner's chest to produce a cough, enabling patient to breath, when suction machine and/or care-giver unavailable.
| 253,661
|
Master of Human Resource Management: Degree Overview
Master’s degree programs in human resource management are designed for bachelor’s degree holders – or those with proven work experience – who want to identify quality workers and match them to appropriate career positions.
Students in master’s degree programs in human resource management learn techniques for comparing applicants, creating employee training modules and promoting inner-office communications. They also develop skills at designing employee incentive packages, including benefits and competitive compensation. Graduates should have an understanding of local labor laws, conflict resolution strategies and human resources financial management, and they might be eligible for voluntary certification.
To enroll, students must have a bachelor’s degree and background in human resources or a related field. Work experience may also be required.
Master’s Degree in Human Resource Management
Human resource management master’s programs often teach topics on both a local and global scale. Most programs try to provide students with a broad understanding of all major human resource issues, but elective courses allow students to specialize in areas, such as advanced coaching strategies, organizational development or talent management. Core classes may include:
- Financial management
- Policy development
- Human resource technology
- Organizational behavior
- Labor relations and conflict resolution strategies
- Collective bargaining and negotiating
Possible Career Options
Graduates qualify to work within human resource departments at various organizations. Most human resource departments are comprised of several sub-departments, including recruitment, placement, training, benefits and safety management. Potential job titles for workers in this field may include:
- Human resources director
- Placement manager
- International human resource manager
- Benefits manager
- Labor relations manager
Employment Outlook and Salary Information
From 2014 to 2024, human resources specialists were to see a 5% growth in jobs, according to information from the U.S. Bureau of Labor Statistics (BLS). A 9% rise in employment opportunities was predicted for human resources managers. In 2015, the BLS reported that specialists made a median income of $58,350, while managers earned a median salary of $104,440. In the same year, labor relations specialists took home a median salary of $58,820.
Continuing Education and Certification
The U.S. Bureau of Labor Statistics (BLS) reported that most workers in the human resources industry do not pursue degrees beyond the master’s degree level, but those interested in teaching college students or working as consultants can earn doctoral degrees.
To stay up-to-date in this field, professionals may need to take continuing education classes concerning changes to labor laws, technology trends or new employee training strategies.
Several organizations offer voluntary credentials designed specifically for human resources professionals. Candidates can earn industry certification in specialty fields, such as employee benefits, human resource management, training and employee assistance programs. According to the BLS, some programs award certification to applicants who have completed all necessary coursework and passed the assigned exams. Other programs may also require work experience. To recertify, applicants usually have to meet continued education coursework requirements or retake exams.
A master’s degree program in human resource management combines knowledge of human resources issues with a specialized area chosen by the student. Graduates of this program can find a career as a human resources director, international human resource manager, benefits manager, and other related human resource positions.
| 217,144
|
Let’s clear the air, here. China’s air pollution is far from optimal. However, they recently conducted an experiment that drastically reduced emissions. Earlier this September, China held its 70th anniversary of World War II in Beijing. In preparation of the event, the Chinese government banned 2.5 million cars during the 2 weeks leading up to the event. In those two weeks Beijing’s Air Quality Index (AQI) dropped from 160 to 17. That’s a 90% improvement!
So what’s the point? It’s not too late! We can still make changes that dramatically reduce air pollution around the world. Granted, the Chinese had to use some drastic measures, but think of what would happen if we developed environmentally friendly habits in the coming years. We decided to create this custom infographic on China’s air pollution experiment. Take a look at just how viable it is to reverse global emissions worldwide.
| 58,653
|
China will never give up the right to decide on the reincarnation of the Dalai Lama, a top Chinese official said on Monday, despite criticism from rights groups and the exiled Tibetan spiritual leader on the issue.
The Dalai Lama and China’s officially atheist Communist Party have repeatedly tussled over who has final authority on the issue of reincarnation.
Tibetans fear that China will use the issue of the Dalai Lama’s succession to split Tibetan Buddhism, with one new Dalai Lama named by exiles and one by the government after his death.
The central government has stiffened its resolve to decide on the reincarnation of “living Buddhas, so as to ensure victory over the anti-separatist struggle,” Zhu Weiqun, chairman of the ethnic and religious affairs committee of the top advisory body to China’s parliament, wrote in the state-run Global Times.
China says the Dalai Lama, who fled into exile in India after a failed uprising against Chinese rule in 1959, is a violent separatist. The Nobel Peace laureate denies espousing violence and says he only wants genuine autonomy for Tibet.
Tibetan Buddhism holds that the soul of a senior lama is reincarnated in the body of a child on his death.
China says the tradition must continue and it must approve the next Dalai Lama. However, the Dalai Lama has said he thinks the title could end when he dies.
Chinese officials, however, have stressed that the current Dalai Lama has no right to abandon reincarnation.
In a commentary, Zhu said the issue “has never been purely a religious matter or to do with the Dalai Lama’s individual rights; it is first and foremost an important political matter in Tibet and an important manifestation of the Chinese central government’s sovereignty over Tibet”.
As the Dalai Lama is the first political leader of Tibet, “whoever has the name of Dalai Lama will control political power in Tibet,” Zhu added.
“For this reason, since historical times, the central government has never given up, and will never give up, the right to decide the reincarnation affairs of the Dalai Lama,” Zhu wrote.
“It is not only necessary, but is in line with jurisprudence, and has nothing to do with whether the rulers believe in religion or not.”
The Dalai Lama has said his biggest concern was that China would name his successor, saying, “The precedent has been set”.
In 1995, after the Dalai Lama named a boy in Tibet as the reincarnation of the previous Panchen Lama, the second highest figure in Tibetan Buddhism, China put the boy under house arrest and installed another instead.
Many Tibetans spurn the Chinese-appointed Panchen Lama as a fake.
| 49,847
|
Catlin's Giant Ajuga
Ajuga reptans 'Catlin's Giant'
|Description||An excellent spreading groundcover that forms a dense, carpet-like mat of lush foliage - even in shady areas! Large green leaves have attractive purple-bronze hues and feature deep blue flower spikes from spring to summer. Great for use in containers, around shrubs or between stepping stones. An herbaceous perennial.|
|Light||Filtered sun, Full sun, Partial shade, Partial sun|
|Watering||Keep soil moderately moist.|
|Blooms||Spring through early summer|
|Mature Size||Grows 3 to 6 in. tall, 12 to 24 in. wide; flowers reach 8 to 10 in. tall.|
|Special Features||Easy Care|
|Flower Attributes||Showy Flowers|
|Care||Thrives in organically rich, moist, well-drained soils. Best foliage color in sunnier exposures. Water regularly during the first growing season to establish an extensive root system; once established, water as needed to maintain evenly moist soil. Apply a low-nitrogen fertilizer in late summer. Space 1 ft. apart as groundcover.|
|Lore||This garden perennial falls into the mint family along with all the useful herbs. It is known as bugle weed and the more ground hugging species were the carpet bugles. The genus was assigned by Linnaeus from the Latin for "not Yoked" which refers to a certain part of the flower. There are over 50 different species, this one named A. reptans, from the Latin for creeping, which describes its growth habit. Ajuga was an ancient medicinal and used as a wound coagulant, which led to it's lesser known common name, "carpenter's herb".|
We cannot currently ship this product to your zip code.
No Retailers found within 50 miles of your zipcode
We have been pioneers and craftsmen in the art of growing plants for nearly
100 years. Since our founding in Southern California by Harry E. Rosedale, Sr.
in 1926, we have been absolutely dedicated and obsessed with quality.
We have been pioneers and craftsmen in the art of growing plants for nearly 100 years. Since our founding in Southern California by Harry E. Rosedale, Sr. in 1926, we have been absolutely dedicated and obsessed with quality.
| 81,442
|
You can learn how to manage job stress
There are a variety of steps you can take to reduce both your overall stress levels and the stress you find on the job and in the workplace. These include:
- Taking responsibility for improving your physical and emotional well-being.
- Avoiding pitfalls by identifying knee jerk habits and negative attitudes that add to the stress you experience at work.
- Learning better communication skills to ease and improve your relationships with management and coworkers.
Tip 1: Recognize warning signs of excessive stress at work
When you feel overwhelmed at work, you lose confidence and may become irritable or withdrawn. This can make you less productive and less effective in your job, and make the work seem less rewarding. If you ignore the warning signs of work stress, they can lead to bigger problems. Beyond interfering with job performance and satisfaction, chronic or intense stress can also lead to physical and emotional health problems.
Signs and symptoms of excessive job and workplace stress
- Feeling anxious, irritable, or depressed
- Apathy, loss of interest in work
- Problems sleeping
- Trouble concentrating
- Muscle tension or headaches
- Stomach problems
- Social withdrawal
- Loss of sex drive
- Using alcohol or drugs to cope
Common causes of excessive workplace stress
- Fear of being laid off
- More overtime due to staff cutbacks
- Pressure to perform to meet rising expectations but with no increase in job satisfaction
- Pressure to work at optimum levels – all the time!
Authors: Jeanne Segal, Ph.D., Melinda Smith, M.A., Lawrence Robinson, and Robert Segal, M.A. Last updated: June 2011
© 2001-2011. All rights reserved. This reprint is for information and support only and NOT a substitute for professional diagnosis and treatment. Visit WWW.HELPGUIDE.ORG for more information and related articles.
Reprinted with permission from Helpguide.org © 2001-2010. All rights reserved. For more information, visit www.Helpguide.org.
Next will be Tip #2
| 143,016
|
COMMUNION OF SAINTS
A. All saints that are united to Jesus Christ: Eph. 1: 4; June 17:. 2, 6; 2 Cor 5:21; Ro. 6: 8; 8:17; 8: 2; 1 Cor 6:17; 2 Peter 1: 4.
B. His head, by his Spirit and through faith: Eph. 3:16, 17; Gal. 2:20; 2 Corinthians 3:17, 18.
C. (but certainly not come to be a person with him): 1 Corinthians 8: 6; Col. 1:18, 19; 1 Tim. 6:15, 16; Is .42: 8; Psalm 45: 7; I 1: 8, 9.
D. participate in their virtues, sufferings, death, resurrection and glory: June 1 . 1: 3; 1:16 June.; 15: 1-6;Eph. 2: 4-6; Ro. 4:25; 6: 1-6; Phil. 3:10; Col. 3: 3,4.
E. And, being united to one another in love, they involved another of his gifts and virtues: Jun. 13:34, 35;14:15; Eph. 4:15; 1 Peter 4:10; Ro. 14: 7, 8; 1 Cor 3: 21-23; 12: 7 : 25-27.
F. Y are obliged to comply with such duties, public and private, in an orderly manner, leading to their mutual good, both inside and outside man: Rom. 1:12; 12: 10-13; 1 Thes. 5: 11,14; 1 Peter 3: 8; 1 June 3: 17,18;. Gal. 6:10.
A. The Saints by profession are bound to maintain each other holy fellowship and communion in the worship of God and the fulfillment of other spiritual services as tend to their mutual edification: I 10:24, 25; 3:12, 13.
B. and to help each other in outward things according to their abilities and needs: Acts. 11:29, 30; 2 Cor 8, 9; Gal. 2; Ro. fifteen.
C. According to the standard of the gospel, though this communion must be exercised especially in relationships where they are located, whether in families or in churches: 1 Tim. 5: 8, 16; Eph. 6: 4; 1 Cor 12:27.
D. should be extended, as God gives opportunity, the whole family of faith, that is, to all who everywhere call upon the name of the Lord Jesus: Acts. 11:29, 30; 2 Cor 8, 9; Gal. 2; 6:10; Ro. fifteen.
E. However, their mutual communion as saints does not take away or infringe the right or property which every man has on his property and possessions: Acts. 5: 4; Eph. 4:28; Ex. 20:15.
COMMUNION term that appears twice in the Old Testament (KJV: Sal 25.14; Pr 3.32), translated from the Hebrew word sod (friendship or intimate knowledge) .
In the first text it refers to the relationship with God and in the second to 'fair'. In the New Testament, RV, appears twelve times and it is always a translation of the Greek word koinonia (have in common, participation, fellowship).
The Christian has fellowship with the Father (1 Jn 1.3), with the Son (1 Cor 1.9) and the Holy Spirit (2 Cor 13.14); with the body and blood of Christ through the sacrament (1 Cor 10.16), and with his brothers in the faith (Acts 2.42; 1 John 1.7). Therefore, it is called to participate in the sufferings of Christ (Phil 3.10) in their persecuted brethren (Heb 10.33) and the need of the poor believers (Ro 12.13; Heb 13.16). But it is forbidden to have fellowship with the "darkness" (2 Cor 6.14; 1 John 1.6). ( → Excommunication.)
We must not neglect the ordinary Christian fellowship as a valuable means of grace within the church. In the early church it is said that "They devoted themselves to the apostles teaching in communion, in the breaking of bread and prayer" (Acts 2: 42).
And the author of Hebrews reminds believers: "Let us consider one another in order to encourage love and good deeds. Let us not give up meeting together, as some people do, but encourage one another, and all the more as you see the Day approaching "(Heb 10: 24-25).
In the communion of believers ordinary friendship and affection for one another will grow, and the command of Jesus that "we should love one another" Jn 15: 12) will be fulfilled. Moreover, as believers care of each other, they will help "each other's burdens, and so fulfill the law of Christ" (Galatians 6: 2).
An emphasis on the fellowship of believers with each other as a means of grace also help overcome an excessive focus on the ordained clergy as a primary dispensers of grace within the church, and particularly when the church as a whole is gathered.
It will also be healthy for believers recognize that a measure of God's grace is received when believers talk and eat together, and when they have opportunities to work and play together, enjoying the companionship of each other. "They kept meeting in the temple for a single day. From house to house they broke bread and ate together with glad and sincere hearts, praising God and enjoying the favor of the people "(Acts 2: 46-47).
The word sacrament historically used to refer to something that was sacred. The Latin word sacramentum was used to translate the New Testament word mystery. In a broad sense all religious rites and ceremonies can be called sacraments. Over time, the word sacrament took a more restricted and precise meaning, defined as a visible sign by which God offers His promise of grace from an external way.External signs sealed and confirmed the covenant promises of God.
The sacraments consist of a visible element such as water, bread or wine; a certain action ordained by God in association with the sign; and a redeeming benefit given to the believer. The Roman Catholic Church set the number of the sacraments (in a special sense) in seven. Are Baptism, Confirmation, the Eucharist (Lord's Supper), Penance, Marriage, Priestly Ordination, and Extreme Unction.
Historic Protestantism limited the number of sacraments to two: Baptism and the Lord's Supper. While Protestants recognize other rites such as marriage and ordination for special functions, they do not consider these rites to the level of the sacraments. The sacraments are limited to:
(1) instituted directly by Christ ordinances,
(2) the ordinances which by their nature are important,
(3) ordinances designed to be perpetual, and:
(4) ordinances designed to signify and seal instruct believers who receive them in faith.
The sacraments are real means of grace that convey the promises of God. Their power lies not in the elements themselves, but in God, which are signs. His power does not depend on the character or the faith of those who manage them, but the integrity of God.
The sacraments are nonverbal forms of communication. It was never intended that should be held on their own without reference to the Word of God. The sacraments confirm the Word of God, so that administration of the sacraments and preaching of the Word always go together.
Salvation does not come through the sacraments. Salvation is by faith in Christ. However, where faith is present, the sacraments not be ignored or neglected.
They form a vital part of the worship of God and the development of the Christian life. Although the sacraments involve the use of external forms, they should not be dismissed as empty formalities or rituals.While they may rot and become empty rituals they should not be rejected. No doubt they constitute rituals, but have been instituted by God rituals and therefore must participate in them with joy and solemnly.
1. A sacrament is a visible sign of the promise of grace from God to believers.
2. The Catholic Church recognizes seven sacraments, while Protestants recognize two: Baptism and the Lord's Supper.
3. The sacraments not automatically transmit the things they represent. The contents of the sacraments is received by faith.
4. The sacraments are not empty rituals, but were instituted by Christ.
5. The sacraments should be linked to the preaching of the Word.
Matthew 28: 19-20, Acts 2: 40-47, Romans 6: 1-4, 1 Corinthians 11: 23-34, Galatians 3: 26-29.
| 262,420
|
How many metre/day in 1 kilometre/day?
The answer is 1000.
We assume you are converting between metre/day and kilometre/day.
You can view more details on each measurement unit:
metre/day or kilometre/day
The SI derived unit for speed is the meter/second.
1 meter/second is equal to 86400 metre/day, or 86.4 kilometre/day.
Note that rounding errors may occur, so always check the results.
Use this page to learn how to convert between meters/day and kilometers/day.
Type in your own numbers in the form to convert the units!
You can do the reverse unit conversion from kilometre/day to metre/day, or enter any two units below:
I'm feeling lucky, show me some random units.
ConvertUnits.com provides an online conversion calculator for all types of measurement units. You can find metric conversion tables for SI units, as well as English units, currency, and other data. Type in unit symbols, abbreviations, or full names for units of length, area, mass, pressure, and other types. Examples include mm, inch, 100 kg, US fluid ounce, 6'3", 10 stone 4, cubic cm, metres squared, grams, moles, feet per second, and many more!
| 153,385
|
Southern Africa Jewish Genealogy SA-SIG
Ships and Shipping Companies
Editor: Dr Saul Issroff
Copyright © 2002-2003 Saul Issroff, Mike Getz, SAfrica SIG
and Jewishgen Inc.
Updated: 25 May 2003
- General comments:
In July 2002, Dr Saul Issroff wrote:
- Passenger Lists UK to SA
We are doing a feasibility study of relating to creating a database of
names derived from Passenger manifests in the Public Records Office BT 27,
of ships leaving the U.K. for South Africa. The majority of these would be
for the ports of London and Southampton, and largely involve ships of the
Union and Castle lines (though it will be easier to look at all lines going
to SA). The initial period of study will be 1895-1914, to be followed by
The records will either be manually transcribed, or photocopied or
microfilmed before transcription. It would be very helpful, at this stage, to hear from anyone who has either
transcribed a full passenger list, or possibly has previously ordered a microfilm of a series of ships around these time periods.
Please contact me privately by e-mail email@example.com
Dr. Saul Issroff,
Project Director ( London),
The South African Center for Jewish Migration and Genealogy Studies (Kaplan
Centre for Jewish Studies, University of Cape Town),
Prof. Aubrey Newman,
Department of History, Leicester University,
Nicholas J. Evans,
Maritime Historical Studies Centre, University of Hull;
Caird Doctoral Fellow, National Maritime Museum).
In July 2002, Ann Rabinowitz wrote:
There are a number of resources which provide ship's names, i.e., those that
went from Lithuania and/or other countries to England and those that went
from England to South Africa.
For those that are readily available to you, try the following:
1.. For ships that went from Lithuania to England, try the Poor Jews'
Temporary Shelter Database,
2.. For ships that went from England to South Africa, try "The Cape Run."
In terms of a book similar to Morton's that has all the names and sailings
of all the ships, that has not been done. There was a database available of
ships' names at the last IAJGS in London, but it has not been published and
is not available generally. The database did not give the sailings of all
the ships, only their names.
The major purveyers of passenger, mail and cargo traffic to South Africa in
the 1800's were The Union Steam Ship Co., Ltd. and Castle Mail Packets Co.,
Ltd. The two companies amalgamated on March 8, 1900, and became known as
the Union-Castle Mail Steamship Company Limited.
In order to harmonize their efforts after amalgamation, the home base for
the mail ships was designated as the port of Southampton. The home base of
the intermediate service was designated as East India Dock, Blackwall,
The mechanics of the intermediate service required that the ships load their
cargo first at the three major European ports of Antwerp, Rotterdam and
Hamburg. From there, the ships went onto their home base at the East India
Dock, Blackwall, London, where they completed their loading before departing
for their fortnightly sailings for South Africa.
A copy of the SA Passenger Registers, 1924-1929 (donated by Ann Rabinowitz), has been lodged at
the Central Archives for the History of the Jewish People (CAHJP) in Jerusalem where the Registers may be viewed.
- RMS Saxon
In July 2002, Ann Rabinowitz wrote:
It was the last mailship ordered by the Union Steam Ship Co. Ltd. prior to its merger with the Castle Mail Packets Co. Ltd. to form the Union-Castle Line. It made its first sailing to South Africa on June 16, 1900 and its last run
in June, 1931, after which it was sold for breaking up in 1935. Reference to the ship can be found on Page 31 of "The Cape Run" by W.H. Mitchell and L.A. Sawyer.
- On 24-07-2002, Mike Masinter firstname.lastname@example.org wrote:
With regard to the Union line ship SAXON , there were actually 4 ships with
the same name, however only SAXON 4 is relevant.
Saxon 1 made one commercial sail and then served in the Crimean war, Saxon 2
sank in 1890, Saxon 3 wrecked in 1895.
If anyone has any information on passenger lists for this ship I would
SAXON (4) was built in 1900 by Harland & Wolff at Belfast with a tonnage of
12385grt, a length of 570ft, a beam of 64ft and a service speed of 17.5
knots. She was launched as the last vessel for the Union Steam Ship Co. but
delivered to the newly formed Union-Castle Line. Consequently, until she
underwent her first re-paint, she operated with a white hull and cream masts
but with Union-Castle's red funnel.
In August 1902 she arrived at
Southampton with three Boer generals, Botha, de la Ray and de Wet, the Boer
War having ended on 31st May with the establishment of three Boer republics
within the British Empire. When the First World War was declared in August
1914 she continued operating the mail run but often carried contingents of
troops in third class.
By this time London had become the temporary terminal
port as Southampton had been designated a military port. In January 1917 she
became a full troopship in both directions and then used to ferry troops
between Alexandria and Marseilles. She then made one voyage from Alexandria
to Basra, anchoring in Koweit Bay and in November 1918 carried troops to
Australia before resuming commercial service in 1919 after a refit at
Harland and Wolff's in Belfast.
In September 1920 she had a minor mishap
when she lost her rudder after hitting a barge at Cape Town. On 14th August
1921, shortly after leaving Madeira, a fire was discovered in her bunkers
and with it under control she made her way to Freetown in Sierra Leone
escorted by British India's Waipara. The Kenilworth Castle then took of the
passengers and the mail whilst the Armadale Castle escorted her to Cape
Town. She made her final sailing on the Intermediate run on 2nd January 1931
and in the following June was replaced by the Warwick Castle and laid up at
Netley as a reserve steamer.
The last remaining Union vessel, she was sold
for scrap in 1935, realising £27,500, and was broken up at Blythe,
Northumberland by Bolckow & Co.
- The following information is based on "The Cape Run" by W.H. Mitchell and
Castle Mail Packets Co., Ltd., The
- Intermediate service ships included:
- Arundel castle
- Avondale Castle
- Braemar Castle
- Doune castle
- Dunolly Castle
- Harlech Castle
- Lismore Castle
- Pembroke Castle
- Raglan Castle
- Tintagel Castle
Union Steam Ship Co., Ltd.
- The intermediate service of the Union Steam Ship Co. included the following ships:
- Heather's South African Genealogy Help List
- shipping links at http://www.genealogy.co.za
Michael P. Palmer's List of Merchant Vessels
- The Red Duster
Illustrated lists of Union-Castle ships.
- Home page: http://fp.redduster.f9.co.uk/
- 1.. http://fp.redduster.f9.co.uk/UNION2.htm
- 2.. http://fp.redduster.f9.co.uk/UNION3.htm
- 3.. http://fp.redduster.f9.co.uk/UNION4.htm
- 4.. http://fp.redduster.f9.co.uk/UNION5.htm
- 5.. http://fp.redduster.f9.co.uk/UNION6.htm
- 6.. http://fp.redduster.f9.co.uk/UNION7.htm
- 7.. http://fp.redduster.f9.co.uk/UNION8.htm
- 8.. http://fp.redduster.f9.co.uk/UNION9.htm
- 9.. http://fp.redduster.f9.co.uk/UNION10.htm
- 10.. http://fp.redduster.f9.co.uk/UNION11.htm
- 11.. http://fp.redduster.f9.co.uk/UNION12.htm
- 12.. http://fp.redduster.f9.co.uk/UNION13.htm
- 13.. http://fp.redduster.f9.co.uk/UNION14.htm
- 14.. http://fp.redduster.f9.co.uk/UNION15.htm
- 15.. http://fp.redduster.f9.co.uk/UNION16.htm
- 16.. http://fp.redduster.f9.co.uk/UNION17.htm
- 17.. http://fp.redduster.f9.co.uk/UNION18.htm
- 18.. http://fp.redduster.f9.co.uk/UNION19.htm
- 19.. http://fp.redduster.f9.co.uk/UNION20.htm
- This web site also includes a substantial list of web sites for genealogists and ship seekers:
- The Union Castle Line
- The Union Castle Line and Emigration from Eastern Europe to South Africa
by Prof. Aubrey Newman, Department of History, Leicester University, United Kingdom.
- Union-Castle Line ships
- Windsor Castle: http://www.maritimematters.com/windsorcastle.html
- Spertus Institute
- Ships -- -- New York (N.Y.) -- -- Passenger lists.
- Ships -- -- New York (State) -- -- New York -- -- Passenger lists
- Ships -- -- Passenger lists -- -- Handbooks, manuals, etc.
| 19,337
|
30-day free trial
Flashcards, matching, concentration, and word search.
LinguaWeb Spanish Level 3: Daily Routine 1
Copy this to my account
E-mail to a friend
Find other activities
Use these flashcard games to practise your daily routine vocabulary.
list of terms
used in these activities.
This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities
| 118,325
|
Free Online Dictionary
Diccionario de Abreviaturas
Download this dictionary
Asociación de Mujeres Rurales
Video results for the word "Ademur"
The following video provides you with the correct English pronunciation of the word "Ademur", to help you become a better English speaker.
You think you have ethics... Take the survey
| 217,770
|
Support for Mr Lee plummeted over his decision to resume US beef imports
South Korean President Lee Myung-bak has apologised to his country for a beef deal with the US that sparked weeks of street protests.
In a televised address, Mr Lee said he had backed the deal to help secure passage of a bilateral free trade deal, thus boosting South Korea's economy.
But he said he was "deeply sorry" for ignoring concern over health risks.
The protesters say Mr Lee's decision to resume US beef imports fails to protect them from BSE, or mad cow disease.
South Korea used to be a major market for US beef but suspended most imports in 2003 after a case of BSE was detected there.
Mr Lee agreed in April to resume most imports, but protesters say the deal does not provide adequate safeguards against diseased US beef.
"I and the government are deeply sorry" for failing to heed public concerns, said Mr Lee in his address, reported AP news agency.
The president said he "was in a hurry after being elected president, as I thought I could not succeed unless I achieve changes and reform within one year after inauguration.
"As a president, I did not want to miss this golden opportunity," he said of the trade agreement with Washington.
Mr Lee said he had realised his mistake while watching lines of candles filling city streets after dark during one of the protests.
He said he would ensure no US beef from cattle more than 30 months old would reach South Korean plates - a voluntary additional guarantee which Seoul's top trade official is currently attempting to secure in Washington.
Older beef is thought to be at greater risk of BSE.
But President Lee added a note of warning to protesters, saying there was "no possibility" of the trade agreement being ratified this year if South Korea continued to reject American beef and demanded complete renegotiation of the deal.
American deputies have tied ratification of the deal to South Korea re-opening its doors to US beef.
Mr Lee was elected last December by a landslide, but now scores an approval rating of under 20%.
His unpopularity has reduced the chances that he will be able to implement other promised reforms including the privatisation of state firms and corporate tax cuts, say analysts.
| 136,917
|
- What country has the worst alcohol problem?
- Is swearing allowed in Christianity?
- Can Christians be cremated?
- Can Christians have tattoos?
- What profession has the most alcoholics?
- Which race drinks the most alcohol?
- What country has the worst alcoholism?
- Do Muslims drink alcohol?
- What religions dont allow alcohol?
- Can Christians drink alcohol?
- What cultures dont drink alcohol?
- Does the Bible say you Cannot drink alcohol?
What country has the worst alcohol problem?
BelarusBelarus had the world’s highest level of alcohol consumption, with 17.5 liters of alcohol consumed per capita.
The country’s high level of consumption has had serious health consequences on its residents..
Is swearing allowed in Christianity?
Thus most Christian churches believe that only false and vain oaths are prohibited. … Shebuoth, was that while oaths to God were binding, oaths to other subjects, such as heaven, were not. Schweizer thinks that Jesus is indicating here that swearing by heaven is swearing by God as heaven is God’s throne.
Can Christians be cremated?
The Church still officially prefers the traditional interment of the deceased. Despite this preference, cremation is now permitted as long as it is not done to express a refusal to believe in the resurrection of the body.
Can Christians have tattoos?
Some Christians take issue with tattooing, upholding the Hebrew prohibition (see below). The Hebrew prohibition is based on interpreting Leviticus 19:28—”Ye shall not make any cuttings in your flesh for the dead, nor print any marks upon you”—so as to prohibit tattoos, and perhaps even makeup.
What profession has the most alcoholics?
Research indicates that people employed within the hospitality and recreation industries have the highest rates of drug abuse and addiction among professionals. The construction and mining industries possess some of the highest rates of alcohol abuse.
Which race drinks the most alcohol?
Native Americans have the highest prevalence (12.1 percent) of heavy drinking (i.e., five or more drinks on the same occasion for 5 or more of the past 30 days; followed by Whites (8.3 percent) and Hispanics (6.1 percent).
What country has the worst alcoholism?
Pure alcohol consumption among persons (age 15+) in litres per capita per year, 2010CountryTotalRecorded consumptionBelarus17.614.4Moldova16.86.3Lithuania15.512.9Russia15.111.526 more rows
Do Muslims drink alcohol?
Although alcohol is considered haram (prohibited or sinful) by the majority of Muslims, a significant minority drinks, and those who do often outdrink their Western counterparts. Among drinkers, Chad and a number of other Muslim-majority countries top the global ranking for alcohol consumption.
What religions dont allow alcohol?
Jainism, Islam, Buddhism discourages, Hinduism discourages it, Sikhism, “Christian” cults such as Mormonism, and Jehovah’s Witnesses are against it, some more “Puritan” forms of “Christianity” that have a higher standard for alcohol consumption than even Jesus did, prohibit it as well.
Can Christians drink alcohol?
They held that both the Bible and Christian tradition taught that alcohol is a gift from God that makes life more joyous, but that over-indulgence leading to drunkenness is sinful.
What cultures dont drink alcohol?
While not exclusively Southern, these counties are mostly congregated in the Bible Belt, where the idea of temperance still has a hold. The countries that currently outlaw alcohol are located in Africa, the Middle East, and South Asia.
Does the Bible say you Cannot drink alcohol?
The Bible does not forbid drinking alcohol, but it does warn against dangers of drinking too much, engaging in immoral behavior, and other consequences of alcohol abuse. While the Bible recognizes that drinking in moderation can be enjoyable and even safe, it contains passages that advise against heavy drinking.
| 249,877
|
We began by tracing out several pieces of 18th century lace with lines of stitching,
following every little jut and shape. The we arranged the pieces we'd done so you can make continuous lines with
the pieces. We swiveled the lace around to make circles and frames.
Next we took the motifs from the lace and enlarged them, filled them with patterns and made them in a variety of
We took the squares from the edging and set them up in continuous lines for edgings, or collars or cuffs.
The larger squares are enlargements of the little ones decorated with decorative
edge frames and lots of satin stitches.
They're beautiful alone -but fill some of the little circles with crystals and they're spectacular.
All of the larger designs can be re-created by re-hooping smaller designs. For those with large hoops, the larger
designs have been re-digitized to eliminate unnecessary jump stitches.
| 158,175
|
News Release: Research
Oct. 19, 2009
Dana Foundation Awards $200,000 Grant to Emory for Nanotechnology Brain Tumor Research
Emory University researchers have been awarded a Dana Foundation grant of $200,000 for nanotechnology and brain tumor research. The principal investigator is Costas G. Hadjipanayis, MD, PhD, assistant professor of neurosurgery in the Emory University School of Medicine and Emory Winship Cancer Institute.
"Novel treatment approaches are required to attack the molecular and biological features of invasive malignant brain tumors," says Hadjipanayis. "We have recently introduced a new generation of nanoparticles that are more effective at MRI contrast enhancement and treatment delivery." The grant will fund continued development of this new nanotechnology for imaging enhancement and therapy delivery in glioblastoma multiforme (GBM), a common and difficult-to-treat brain tumor. The magnetic nanoparticle has emerged in recent years as a clinical tool for cancer cell detection, treatment and monitoring. Current magnetic nanoparticle technology relies on iron-oxide nanoparticles (IONPs). Various formulations of IONPs have been developed for drug delivery, magnetic resonance imaging (MRI) contrast enhancement and hyperthermia, or heat-induced treatment of cancer. Use of these particles is limited, however, due to their weak magnetic properties.
Hadjipanayis and his team developed nanoparticles composed of pure iron, which in preliminary studies have greater magnetic properties in comparison to IONPs. Studies indicate that these nanoparticles are much more effective at MRI contrast enhancement and local hyperthermia treatment than standard IONPs.
The grant highlights important preliminary data in which standard IONPs are joined to an antibody that is specific to GBM cells. In mice that have been implanted with human GBM tumors, the newly developed nanoparticles will be used to target implanted brain tumors to demonstrate MRI contrast enhancement of the GBM cells as well as hyperthermia delivery. "The ability to combine MRI contrast enhancement and therapy delivery may further advance the use of magnetic nanoparticles in biomedical research and eventually in clinical applications," says Hadjipanayis.
The research is a unique multidisciplinary collaboration among Hadjipanayis, Hui Mao, PhD, associate professor in Emory's Department of Radiology, and George Hadjipanayis, PhD, head of the Magnetics Laboratory, and chairman of the Department of Physics and Astronomy at the University of Delaware.
About the Dana Foundation
The Dana Foundation is a private philanthropic organization with particular interests in neuroscience, immunology and arts education.
| 99,441
|
Equine-assisted activities and therapies (EAAT) has grown in popularity as its benefits are highlighted in events and news stories across the country and around the world. The timing is perfect for those who want more information on how partnering with these sentient creatures benefits humans in physical, cognitive, emotional and social ways. The PATH Intl. Conference and Annual Meeting, sponsored by Purina, November 4-7, at the historic Renaissance Cleveland Hotel in Cleveland, Ohio, offers a superb opportunity to learn more, to become involved and to meet the people and a few participants who are the faces behind the stories.
The sessions at the PATH Intl. Conference appeal to a wide range of interests and experience. If you are not familiar with EAAT and wish to get an overview of some of what PATH Intl. does, you might try, for example, the session “Rough Ride: How to Reach Difficult Boys Through Horses,” which will discuss behavior management strategies while working with at-risk boys.
“Recording Complex Movement Patterns and Recreating Them in a Mechanical Device” will demonstrate how riding a horse creates a similar movement to human activities, such as walking, underscoring the benefit therapeutic riding may have on those individuals with physical challenges. Attendees will learn about equine-facilitated psychotherapy for veterans with post-traumatic stress, how equine-assisted learning may affect older adults, and the latest research in the field.
The PATH Intl. Horse Expo on Saturday, November 7, provides attendees with hands-on sessions, including live demonstrations of carriage driving.
Opportunities abound for networking, including the PATH Intl. Exhibitor Hall of Fame Party on Wednesday night, November 4, to officially kick off the conference. The PATH Intl. Awards Banquet on Friday night gives everyone the opportunity to see what we are all about as we celebrate the accomplishments of certified professionals, equines, volunteers and veterinarians, and as we listen to the incredible stories of our equestrian winners who overcame challenges through the unique bond developed between horse and human at PATH Intl. Member Centers.
Early registration is currently offered online on the conference page at www.pathintl.org, as well as more information about conference sessions (click on the registration book), the Renaissance Cleveland Hotel and fun things to do in Cleveland, the Rock and Roll Capital of the World. The early registration discount ends September 17, so register now and discover for yourself why everyone is talking about the power of the horse to change lives.
The Professional Association of Therapeutic Horsemanship International (PATH Intl.) was formed in 1969 to promote safety and optimal outcomes in equine-assisted activities and therapies (EAAT) for individuals with special needs. At 866 member centers, more than 61,000 children and adults may find improved health, wellness and a sense of pride and independence through involvement with horses. Therapeutic horsemanship at member centers may include hippotherapy, equine-facilitated mental health, driving, interactive vaulting, trail riding, competition, ground work and stable management. Through a wide variety of educational resources, the association helps individuals start and maintain successful EAAT programs. There are more than 55,000 volunteers, 4,666 instructors, 7,672 equines and thousands of contributors from all over the world helping people at PATH Intl. Member Centers.
| 90,102
|
Hack attacks over the weekend show that defense contractors, public TV and even members of Congress are vulnerable.
New York Rep. Anthony Weiner has hired a lawyer after someone hacked into his Twitter account and sent a woman a picture of a man's bulging underpants.
Cyber attacks at defense contractor Lockheed Martin Corp and PBS show how widespread corporate breaches have become, the Wall Street Journal reports.
Cyber attacks can mean war, the Pentagon says.
Could it be true? The Washington Post hints that iPads have supplanted Blackberries in parts of Washington.
Apple CEO Steve Jobs will take a break from medical leave to deliver the keynote speech at next week's Apple conference in San Francisco.
Twitter will announce a photo-sharing service at the D9 conference in California this week.
Don't Miss Today's Top Stories
Rick, Executive Director for Policy
Concise coverage of everything I wish I had hours to read about."
Chuck, Graduate Student
The day's action in one quick read."
Stacy, Director of Communications
I find them informative and appreciate the daily news updates and enjoy the humor as well."
Richard, VP of Government Affairs
Chock full of usable information on today's issues. "
Michael, Executive Director
| 181,948
|
What can I expect I if connect several TTL outputs together?
Pull up's on all outputs and diodes cathode to output anode to common "Controlled" input, put a 4K7 pull up there too.@ Mike an OC output is open... until it's activated or it's inverted and low until activated when it becomes 'open'.Bob
Runaway Pancake gave you the right answer: run one resistor from the rail to the output bus; and then run 1 diode / module from the bus to the module's output pin. The output is low if any of the module outputs a low.
This eBay sensor has active high output.
QuoteThis eBay sensor has active high output.In that event, run each output, through a diode, to a common resistor to ground and take your signal from that resistor.The output is high if any of the output is high.
Please enter a valid email to subscribe
We need to confirm your email address.
To complete the subscription, please click the link in the
email we just sent you.
Thank you for subscribing!
via Egeo 16
| 24,045
|
Malta is the most difficult place in the EU to do business, and the situation has been getting worse over the last three years, according to The World Bank Doing Business 2020 report.
The government touts Malta as a hub for igaming, blockchain, cryptocurrency, medical cannabis, and now Artificial Intelligence, but the regulatory and business environment in the country is not as welcoming as the image promoted by government statements.
Malta has fallen 12 places in the annual report by the World Bank since 2017. The country is now ranked lowest in the EU, and is being outperformed by countries such as Albania, Tunisia, Uzbekistan and the reclusive kingdom of Bhutan.
The Doing Business 2020 report takes an in-depth look at the costs to companies of business regulation. Some 190 economies from Afghanistan to Zimbabwe are compared across sub-indices including starting a business, getting credit, getting utilities, trading across borders, paying taxes, and labour market regulation.
Malta ranked at 88 this year, a drop of four places from the previous year, and a major decline from its best ranking of 76 in 2017. Only a few improvements have been made in Malta’s regulatory environment, according to the report. Unsurprisingly, this includes making it easier and faster for businesses to apply for construction permits.
The other areas where Malta showed improvement were in the reliability of the national power supply, the creation of a website for online registration of employees and VAT, and the introduction of new annual leave regulations.
Despite these poor results, Prime Minister Joseph Muscat told parliament last week that “Malta is a top performer […] We are on par with Germany.” That confidence seemed to contradict the latest EY Attractiveness Survey 2019, where just 46% of foreign respondents said they were happy with doing business in the country.
Finance Minister Edward Scicluna echoed Muscat’s confidence in an interview with South European Summit. “Many countries are much more advanced than Malta, but they get it wrong when it comes to regulation,” he said. “They are so heavy and so bureaucratic, and it takes time, while in Malta if we hear of a disruptive idea, which you sense that is going to be the next big wave of economic activity, [we] grab it and run with it and build a regulatory framework for it.”
Unfortunately, that strategy doesn’t seem to be working. Despite branding Malta as ‘Blockchain Island’, a number of crypto companies have already left Malta less than a year after three highly anticipated cryptocurrency acts entered into force.
Coineone Global Exchange closed in August after operating for just 10 months. Zebpay left Malta in September after operating for 11 months. And industry rumours indicate Binance, the crypto exchange that announced its move to Malta before the new crypto laws were passed in parliament, is thinking of leaving, too.
Cryptocurrency exchange Bittrex also announced last month that it was relocating from Malta to Liechtenstein, but gave no reason for the decision. The Shift contacted Bittrex with questions on how they found doing business in Malta and why they decided to leave. The company responded by requesting an extension to the deadline. We “would love to be able to answer your questions,” they said, but declined to comment in their next email.
Access to banking seems to be part of the problem. Corporate service providers who have spoken to The Shift complained it is “nearly impossible” to open a bank account in Malta, a sentiment echoed in a number of industry articles.
In June 2017, four months before she was assassinated, journalist Daphne Caruana Galizia had reported that Deutsche Bank had cut all ties with Bank of Valletta (BOV). ING followed suit in June 2019, ending BOV’s sole remaining US dollar correspondent banking relationship. They have not yet found a replacement.
BOV is also conducting a major de-risking exercise, following a review by the European Central Bank, and is terminating relationships with ‘high risk’ clients including igaming companies. The gaming industry currently accounts for approximately 12% of Malta’s GDP.
Despite these problems, the government insists that Malta is a centre of excellence in the igaming industry. This didn’t stop four igaming companies from shedding staff over the last few months. Multilotto, Stars Group, and GiG have collectively made some 90 redundancies, with more expected before the end of the year.
Malta has also come under increasing scrutiny from institutions and regulatory bodies across Europe. The country failed the Council of Europe’s Moneyval anti-money laundering evaluation in 2019 and was given one year to fix the issues raised or face potential blacklisting procedures.
Malta’s Moneyval rating was “poor overall”, with low scores in areas that include risk management, money laundering investigation and prosecution, and the prevention of financial crime.
Finance Minister Edward Scicluna dismissed concerns by claiming money laundering happens everywhere. “I do not know of any jurisdiction that can put its hand on its heart and say we don’t have any money laundering here,” he said.
| 242,700
|
Known as one of the most powerful raster programs available, Adobe Photoshop has long been the application of choice for many photographers, graphic designers, and digital artists. Now, with CS6, we can add Animatiors and Video Editors to the list …
Outlined below are the steps one should take when testing the webpage using the Browser Compatibility Check feature:
1. Choose the page you want to edit by clicking on the file menu bar where you choose the page from the open button.
Premiere Pro CS6 is the newest incarnation of Adobe’s professional non-linear editing system. Combining a sleek user interface, powerful editing tools and effects, broad support for most of the industry’s high-end camera formats, as well as the world-renowned Mercury Playback Engine, it is no wonder that Premiere Pro has seen use in such major Hollywood productions as The Social Network, Monsters, and James Cameron’s Avatar.
Employment policies have traditionally served a single purpose – to ensure legal compliance. However, in today’s progressive business environment, they also need to clearly communicate expectations and provide guidance to help managers and employees succeed. Insperity business software is the go-to choice for companies worldwide needing to create professional employee handbooks.
Slicers are visual controls that let you quickly filter data in a PivotTable in an interactive, intuitive way. If you insert a slicer, you can use buttons to quickly segment and filter the data to display just what you need.
Excel 2010 – 12 Time Saving Tips
1. Add content or formatting to multiple sheets at once
You can add content or apply formatting to two or more of the sheets on a multisheet worksheet by “grouping” the sheets together. When you group multiple sheets, any content or formatting that you add to one sheet also gets added to all the other sheets, so you can add a row of headers to one sheet and have it automatically appear on all the sheets that are grouped together with it.
How to Create and Publish a Web Database in Microsoft Access 2010
Microsoft Access 2010 offers many new features and improvements. The improved integration with SharePoint Server 2010 via Access Services allows for Access 2010 databases to be published to SharePoint, which enables multiple users to interact with the database application from any standards-compliant Web browser.
| 121,668
|
With seaplanes, crosswinds can often be avoided as there is often room to take off or land into the wind. However, if a crosswind takeoff or landing is needed, there are several options for taking off and landing with a seaplane on the water. These various methods and differences are detailed below.
The primary obstacle a seaplane has handling crosswind is related to the seaplane’s weathervaning tendency. There are three primary methods to compensate for this during the initial takeoff run.
Crosswind Takeoff: Weathervane Control – Adjusting Aiming Point
Like a landplane, the seaplane pilot will lower the upwind wing with aileron control. However, the seaplane will tend to weathervane into the wind as there is little friction on the water. A method to handle the crosswind is to aim slightly to one side and let the aircraft weathervane some during the initial takeoff run. This method can be used when the winds are fairly light. The main reason for the method is that when the water rudders are lifted, the plane will want to weathervane into the wind. Unless the weathervaning is compensated for, the takeoff path would be to the side of the intended path.
Pro: Easy to do.
Con: Only useful in light winds.
When to Use: Winds are light, and a specific takeoff path is required.
Crosswind Takeoff: Curved Takeoff Path
To help with controllability, the water run could be started into the wind with a turn to crosswind. The plane should be on the step and pointed into the wind and then gradually turned more and more as needed. At this point the air rudder and ailerons should be more effective. To keep the upwind wing down, good aileron use is paramount. This method is useful in stronger crosswinds. If a straight path was used, like in a landplane, the downwind float could dig in when the nose was raised. The downside with this method is that it requires enough room to move in a circular path. A good use of this method would be around the bend of a river or in a confined section of a lake.
Pro: Allows for safe takeoff in stronger crosswinds.
Con: Needs room for the curved path.
When to Use: If room allows, this method should be used as the seaplane is less likely to capsize.
Crosswind Takeoff: Water Rudders Down During Takeoff Run
If there is no room to perform a curved takeoff path, or modified aiming point, another option remains. The water rudders can be left down to provide steering during the initial part of the takeoff run. However, excessive speeds with the water rudders down can damage the floats. Like on land, appropriate aileron and rudder control during the takeoff run is required. After takeoff, the water rudders are retracted.
Pro: Allows for crosswind takeoff in confined areas.
Con: Potentially damage the water rudders or float structure.
When to Use: Not enough room for other options.
Crosswind Takeoff – Runway – Amphibian
An amphibian taking off on land is handled the same as any other land-based plane. However, the additional surface area of the floats minimizes the amount of crosswind it can handle. In general, a seaplane cannot handle as much crosswind as its land-based brethren.
During the initial takeoff roll on the runway, the amphibian may be pushed in the direction of the wind, due to the large surface area in front of the center of gravity and the lack of friction from the front caster wheels. Because the rudder is not effective at slow speeds during the initial takeoff roll, differential braking may be required.
Crosswind landings, like crosswind takeoffs, can often be avoided as many landing areas are large enough to land directly into the wind. The most likely scenario that would require a crosswind landing would be an engine failure shortly after takeoff. If needed, there are several methods to conduct a crosswind landing. With all methods, there are a few important items.
- There should be no sideways drift on landing. The side loading on impact with the water can be devastating, leading to a water loop or damaging the float structure.
- Because it can be difficult to detect drift over the water, using reference points on the shore can be helpful.
- Be prepared for significant drag from the float that touches first.
- If possible, strong crosswinds should be avoided. If the wind is strong, the need for a crosswind landing is unlikely as the landing distance would be quite short.
The two most common methods for crosswind landings are discussed below.
Crosswind Landing: Side Slip
The main concern with crosswind landings in a seaplane is to stop any sideways drift on landing. Like a landplane, the drift can be countered by lowering the upwind wing and applying opposite rudder to keep directional control. This method is primarily used during light winds or if there is an engine failure shortly after takeoff. As the plane slows down, it will be impacted by the crosswind more and more. The plane is most vulnerable when in the plow position during the transition from the step to displacement position. Anticipate this and be prepared with appropriate rudder and aileron inputs. Full aileron should be applied when there is a direct crosswind.
Pro: Similar to landplane technique.
Con: Not able to handle significant crosswinds.
When to Use: Use in light winds or after an engine failure after takeoff.
Crosswind Landing: Curved Path
Landing in a curved path uses centrifugal force to negate the crosswind. The landing is started slightly into the crosswind and turned away from the wind. The arc of the turn will become more pronounced the slower the speed. The airplane will weathervane into the wind once in the displacement position. Like other crosswind maneuvers, the seaplane will be most vulnerable during the plow position between the step and displacement position. The use of full aileron is required.
The curved path creates enough centrifugal force to counteract much of the lifting forces on the upwind wing from the crosswind. The amount of arc comes with practice but should increase further along into the landing.
Pro: Can handle stronger crosswinds.
Con: Takes some real estate and this maneuver takes practice.
When to Use: Recommended during all crosswind landings (expect engine out right after takeoff).
The following is a diagram that shows how the curved path takeoffs and landings may look when overlaid on the same area.
Crosswind Landing: Amphibian on Runway
Like the crosswind takeoffs, the amphibian on land is very similar to a normal landplane. However, the amphibian will not be able to handle as much crosswind. The large surface area of the floats is impacted more by the wind than the same aircraft without floats. As such, the crosswind component capabilities of the aircraft on floats must be known. The crosswind will also impact the amphibian more than a normal landplane during the roll out. The front caster wheels do not provide resistance to the wind blowing the nose in the direction of the wind. While a taildragger may want to weathervane into the wind as it slows on landing, the amphibian’s nose will try to move with the wind. As the amphibian slows on the runway, there may not be enough rudder authority and differential braking may need to be applied.
| 283,970
|
Nyquist plots of CdS QDSSCs under dark condition and 1,000-W/m2 illumination. (a) Nyquist plots of CdS QDSSCs in dark; the equivalent circuit of the QDSSC with the representation of impedance at CE/electrolyte interface (subscript CE), QD-sensitized TiO2/electrolyte (subscript r) and series resistance (subscript s). The symbol R and CPE denote the resistance and constant phase element, respectively. (b) Details of plots (a) at high frequencies. (c) Nyquist plots of the same cells under 1,000-W/m2 illumination. (d) Details of plots (c) at high frequencies. The solid lines are the fitted curves.
Jun et al. Nanoscale Research Letters 2014 9:69 doi:10.1186/1556-276X-9-69
| 180,005
|
This lesson follows in the series about the prophet Elijah. The story picks up where Elisha helps a widow who has no money to pay a debt her husband owed. This lesson was prepared for older elementary students in mind. The lesson can be adapted for younger student and can be used as a Children’s Church lesson. It would also work as a Sunday School lesson about Elisha and the widow. Please leave your feedback in the comment form at the bottom of this post. At the end of the lesson are additional resources to help you plan for the individual needs of your classroom.
Scripture: 2 Kings 4:1-7
Target Age: 3rd-5th Grade
PRINT this lesson plan
- Students will learn that they can ask God for help in times of need because He is able to abundantly provide for our needs.
- Whatever gift or talent students have is not insignificant for God to use in His Kingdom.
- Students will learn that as believers God can use them to help others in their time of need.
Ephesians 3:20 NIV “Now to Him who is able to do immeasurably more than all we ask or imagine, according to His power that is at work within us.
A hymn that could be used along with this lesson is Little Is Much when God is in it.
Elisha Helps a Widow Bible Lesson
(Before beginning the Bible Lesson provide Bibles for the students who do not have one so they can have an open Bible to the passage and can participate when asked to read verses from the passage.)
Activity to introduce lesson:
In a bag have items that would represent difficulties children may face. (Divorce (2 toy houses), death of a loved one (framed picture), death of a pet (stuffed animal), a friend moves away, moving away, sickness, loss of a friendship, unkind children, and not doing well in school are some examples.) As a student comes and draws something from the bag ask the following questions: How do those difficult situations make you feel? Who do you go to for help when you feel sad, angry, or all alone?
God is always available to help us when we are facing a difficult problem. He knows our deepest needs and gives us exactly what we need, unlike anyone on this earth can do.
Let’s open our Bibles to 2 Kings 4. This morning in our Bible lesson we are back in our study on Elisha (See Elijah rides chariot for review if needed). Last week in our lesson God gave Elisha a double portion of Elijah’s spirit when he was taken up in a chariot to heaven.
(Note for teacher: In researching for this lesson I came across sources that indicate that Obadiah may have been the prophet who died. (Here is one of the sources that I read: Josephus) Sometimes it helps draw interest in a story if a character has a name. It is important to emphasize if you choose to say that some believe the prophet may have been Obadiah make sure that you explain that the Bible doesn’t speak clearly on the matter. The students need to know that the Bible is our final authority and since it doesn’t say we don’t know for sure who the prophet in this passage is.
If you want to use Obadiah in the story you could start your lesson by saying, “If you have been studying the life of Elijah with us you may remember Obadiah. Obadiah was a man who worked in Ahab’s palace. He protected 100 of God’s prophets by hiding them in 2 caves and feeding them food and water. Some think the man who died from 2 Kings 2:1 is Obadiah. Since the Bible doesn’t clearly tell us what this man’s name is we can’t be sure. For our story this morning let’s call this man Obadiah.”
(If you choose not to use that method the following lesson doesn’t assume Obadiah as the prophet.)
When Elisha and Elijah ministered together before Elijah went to heaven, they trained a group of men in different places how to teach God’s Word to the people. It was kind of like Bible colleges of our day except it was groups of men who were prophets of that time. These men were called the sons of the prophets (NIV uses company of the prophets). Many of these men had families to take care of as well as learn how to teach God’s Word.
One day something very sad happened to one of these families. The father, one of the sons of the prophets died. He left behind a wife and two sons. They were very saddened by his death. After this man died there was a knock at the widow’s door. It was a man who was looking for money that her husband owed him. Her husband had an unpaid bill with this man. The man wanted his money now. “I am sorry sir, I have no money to pay you the money my husband owed” the widow may have said. “Well, ma’am since you don’t have the money to pay your husbands debts, the law says I can take your two sons as full payment for his debt. I will make them my slaves for the debt your husband didn’t pay.”
How do you think this widow felt at this news? Her husband had just died and now she was going to lose her only 2 sons. What could she do? She had no money and nothing to offer this man to pay the debt that was owed.
She knew that Elisha was God’s prophet. He could help her. When we have a need we should go to someone who believes and trusts in God for help. The widow went to Elisha and said, “Your servant, my husband is dead, and you know that your servant feared the Lord. Now that he is dead the man he owed money to is going to take my sons away to be his slaves!”
“How can I help you?” Elisha asked this sad widow. “What do you have in your home that you could sell to make money?”
“All I have is a jar of oil.”
Sometimes we may feel like this widow that what we have is something that is insignificant for God to use. (Examples: I can’t sing but I enjoy sharing with others what God is teaching me from His Word. I can’t play sports well but I do like to write notes and send them to people I know.) As we learn from this story today listen to how God used what the widow had to see that what we see as little or insignificant is much if God is involved.
(Note for teacher about the value of oil in Biblical times.
“Oil in Palestine, during Elisha’s time, was used both as a luxury and as a
necessity. The Egyptians were known to use oil extracted from vegetables and
animals. The most common type of oil was olive oil. The olives were sometimes beaten (Leviticus 24:2), sometimes trodden (Micah 6:15), but generally crushed in a mill designed for that purpose. Olive oil was used almost every day by everyone. It was expensive because it was time-consuming to make. One olive tree will yield about ten gallons of oil a year.
There were many purposes for the oil. It was used for lighting, medicinal
purposes, cooking, and even for cosmetics and soaps. In the tabernacle, pure
olive oil was used in the golden lampstand. Cuts and scrapes on animals and
humans would be rubbed with olive oil to help the healing process. Priests,
prophets, and the kings of Judah and Israel were anointed with the finest of olive oils. Queens would put it on their body.”
Elisha told the woman and her sons to go around to their neighbors and ask for as many empty jars as they could get. “When you get as many jars as you can, go into your house with your sons and close the door. Take the jar of oil that you have and begin to pour that oil into the empty jars that you have collected.”
The widow went home and did exactly what Elisha had instructed. She and her sons went knocking on their neighbors’ doors and asked them if they could borrow any empty jars that they had. When they had borrowed all the jars that they could find, the widow and her sons went inside and shut the door.
The widow picked up the small jar of oil that she had and began to carefully pour it into an empty jar that she had borrowed. Amazingly the jar filled with oil to the top. There was still oil left in the widow’s original jar. She went to the next empty jar and began filling it with oil. Again she was able to fill that jar with oil and still have oil in her original jar. Imagine how her sons felt as they were watching this miracle happen before their very own eyes! Their mother kept filling each and every empty pot that was in their house and she still had oil in her jar! She finally filled the last empty jar with oil.
The widow and her sons looked around at all the jars filled with oil that came from her one jar of oil. This was a miracle! God had provided in an amazing way! The widow ran to tell Elisha what had happened. He told her to go and sell her jars of oil and pay the debt her husband owed. With the money that would be left over she and her sons would be able to live on for a very long time.
It was a great day for the widow and her sons. They were faced with a very difficult situation and they had no way of getting out of their problem without God’s help.
All the widow owned was one jar of oil and God was able to use that oil and multiply it to meet the widow and her 2 sons’ needs. God takes whatever gift or talent you may have no matter how great or insignificant you may feel it is and use it in a great way to help others to know Him better.
As the widow went to the man to pay her husband’s debt I wonder if she shared how God provided so miraculously to give the needed money and also to have money to live on as well? As the widow and her sons returned the jars to their neighbors did they share God’s miraculous provision?
God went above and beyond what she or her sons could ever imagine! God was glorified through this widow’s difficulty. Everyone was able to see the miracle God performed by providing for this widow. When God helps you in your difficulties it’s important to share with others so they can see how much God loves and cares for His people.
The widow went to the right place to ask for help. She went to God’s servant and cried out for help. That’s true for us today. When we face difficulties in our lives we must cry out to God and ask Him for help. God may send us to a Christian we know who loves and obeys God so they can help us. God is waiting to answer and meet our every need.
If you are a Christian you are God’s servant. He can use you as He used Elisha to help someone who is in need. Will you pray that God will show you how you can help others in their time of need?
Check this article out for the importance of sharing the gospel with each Bible lesson: Share the Gospel
This story reminds me that we have something in common with the widow in our story. She had a debt she had no money to pay. She was helpless and could do nothing to change her circumstances on her own.
We have a debt that we can never pay on our own. We all have sinned against God and the payment for our sins is death. We cannot do anything to buy our way to heaven. We can’t be nice enough, honest enough, obedient enough or go to church enough to buy our way to heaven. The only way we can pay for our sins is by believing in Jesus. He died and paid for all of our sins with His sinless sacrifice on the cross. God raised Him from the dead and by faith in Jesus we can have the debt of our sin cancelled. Jesus Christ paid a debt that we owed with His own life. Have you trusted Him as your Savior and had your sins forgiven so you can live for all eternity with God? If not today you can by accepting Jesus as your Savior. Please talk to one of us before you leave so we can show you from the Bible how you can be saved.
If you have been saved, whom do you go to when you have a need that cannot be met? When have you seen God take care of your needs? Did He give you even more than you could’ve imagined? Did you thank Him? Will you share this with others so they can see God’s care for you? Do you shared others how God has helped you in your life? Do you show your thankfulness to God for all He has done for you by looking for ways to help others who are going through difficult times?
Close in prayer.
Game Activity for Review: Take a manila folder and divide top flap into 6 equal parts. Cut out 6 jar shapes and color and paste them in the 6 places. Number the 6 jars. Cut to edge the top of the folder making a flap out of each of the numbered jars. On the inside of the folder divide into 6 equal parts. Find 3 unique pot pictures (2 each) or if you are artistic you can draw 3 different jars (2 each) and place them in random order on the inside 6 spaces. How the students will use this is when they answer a question correctly they can come to the front of the class and open two different flaps looking for matching jars. If they find matching jars then leave the flaps open. If the jars don’t match close the flaps and go to the next question. Play the memory game until all the jars have been matched.
1. Who were the company of prophets/sons of the prophets?
2. What happened to one of the sons of the prophets?
3. Why did a man come to the widow’s house after her husband died?
4. Who did the widow go to for help?
5. What did Elisha instruct the widow to do?
6. What miracle took place at the widow’s house behind closed doors?
7. How did God provide above and beyond for this widow’s needs?
8. How is God honored or glorified when He meets our needs? (We see His power and thank Him, We grow in our faith and walk closer to Him, others see His provision and want to know Him better)
Here is a way you can show God that you are thankful for all He has done for you. You can begin by looking for ways to help others in need and remember this acrostic of HELP. Have HELP acrostic on the board and fill in as you discuss each letter.
(Helpless: Unable to help oneself; Lacking support or protection. The definition of helpless makes us realize that there are many people all around us that need help.)
H-Hands to serve someone in need.
(Let students act out ways they can use their hands to help someone in need.)
E-Ears to hear that someone needs help.
(Let students give examples of things they might learn about someone who has a need.)
L-Lips to speak encouragement to those in need.
(Let children share Scriptures that could encourage someone in need. If they aren’t familiar with such verses bring some prepared verses written on pieces of paper that they can look up and read.)
P-Pray for people in need.
(Close this activity for praying for specific people that you and the class know that are in need.)
- Daily Devotions from Elisha
- Coloring page of jars
- Coloring page of jar
- Mission Arlington Teacher’s Lesson
- Calvary Chapel Coloring page/Puzzles
- Bible Lesson Activity
| 40,510
|
home I index I latest I glossary I introductions I e-mail I about this site
St Andrew, Hingham
the captions by hovering over the images, and click on them to
see them enlarged.
This is a big church. The vast, blockish tower is a landmark for miles around, and the church itself is more than fifty metres long. In almost any other county, St Andrew would be the biggest. But this is Norfolk, and Hingham church must take its place in the ranks behind a dozen or so that are bigger.
Hingham today is little more than a large village. But in the past it was a market town, and Remigius de Hethersett built a church that befits a place of some importance. The Victorians restored St Andrew with the same enthusiasm, and this is a thoroughly urban building, both inside and out. Inside, it must be said, the church has rather less character than out; the 19th century has left an anonymous atmosphere, and the church could be in any large town; but it is not without interest.
Presumably lost in the Victorian clear-out was the classical font cover seen here by Richard Hart in 1842. It was remarkable for having a palindromic inscription. There is another at Knapton in the far north-east of Norfolk, and that one reads NIYON ANOMHMA MH MONAN OYIN - 'wash not only my face but my sins as well' - and so the one here probably did as well. I suppose that it might even be the same font cover.
Perhaps the best single feature of Hingham church today is the huge Morley tomb in the north wall of the sanctuary, a great towering edifice that incorporates an Easter sepulchre at the base. It dates from the middle of the 15th century, a period we know well in East Anglia; and yet the red stone from which it is carved creates an unfamiliarity. Despite its size, it is not an arrogant piece; the Morleys kneel facing outward in relief, among the weepers, with the Saints above. Pevsner thought it was the finest of its type in England. For some reason that I don't understand the upper part of the alcove is now covered in blue canvas. Perhaps this is to protect it from the light.
The sheer size of the piece means that it even puts the apostles, life-size in the north and south windows, in their place. Perhaps that is why they all look so miserable and serious. I can accept it from St Paul, but I'd always thought of St Peter as a fairly jolly man. He isn't very jolly here, I'm afraid.
The most famous person commemorated at Hingham is not from the village at all. In a reconstructed alcove in the north aisle there is a bust of Abraham Lincoln. The Lincolns left Hingham in the middle of the 17th century, a good 200 years before he became president, but his origins are remembered here.
Heading back down this vast, well-kept building, I was struck by the sound of my own footsteps. The church is so tall, so long, that the echo they produce is familiar from walking through cathedrals. What a fine acoustic for singing this building must have.
Simon Knott, January 2006
Amazon commission helps cover the running costs of this site.
home I index I latest I introductions I e-mail I about this site I glossary
links I small print I www.simonknott.co.uk I www.suffolkchurches.co.uk
ruined churches I desktop backgrounds I round tower churches
| 111,431
|
Financial Management suggestions
Hons 3rd Year Exam 2021
বিসমিল্লাহির রাহমানির রাহীম
1. What is business ethics?
Ans: The standards of conduct by which ones action are budget as right of wrong, honest or dishonest, fair or unfair are ethics.
2. Define IRR.
Ans: The discount rate that equates the present value of the future net cash flows from investment project with the projects initial cash outflows is called IRR (Internal Rate of Return), an
3. What is cost driver?
Ans: Any output measures of resources and activities is called cost driver.
4. Define marginal cost.
Ans: The additional cost resulting from producing and selling one additional unit is called marginal cost.
5. What is budget?
Ans. Budget is a plan showing a company’s objectives and how management intends to acquire and use resource to attain those objectives.
Ans. Budget is a quantitative expression about a target plan for acquiring and using resources over a specified time period.
6.What is an EPS?
Ans. Earning per share is the amount earned during the particular period on behalf of each outstanding share of common stock.
7. What is cash dividend?
Ans. If the dividend is paid in the form of cash to the shareholders is called cash dividend.
8. Define stock split.
Ans. A stock split is a corporate action that increases shares by dividing each share, which in turn diminishes its price.
9. What is right shares?
Ans. Right shares are those shares which are issued to existing shareholders.
10. What is gross working capital?
Ans. Total amount invested in the current assets of a company is termed as gross working capital.
11. Elaborate BSEC.
Ans. The Bangladesh Securities and Exchange Commission.
12. What is Economic Order Quantity (EOQ)?
Ans. The order size associated with minimized cost is called Economic Order Quantity.
13. What is risk premium?
Ans. The excess return required from an investment in a likely assets over that required from a risk free investment.
14. What is debt capacity?
Ans. Debt capacity is the manimum proportion of debt that the firm can include in its capital structure and still maintain its lowest composite cost of capital.
15. What is net working capital?
Ans. Net working capital referes to the difference between current assets and current liabilities.
16. What is price carning (P/E) ratio?
Ans. The P/E ratio measures the amount that investors are willing to pay for cash taka of firm’s carvings.
17. What is primary market?
Ans: A primary market is a ‘New issues’ market and a firm raises new capital from this market.
18. What is lease financing?
Ans. contract between a lease, who acquires the services of a leased asset by making a series of rental payments to the lessor, who is the owner of the asset.
19. What is initial public offering (IPO)?
Ans. Initial public offerings (IPO’s) typically have a “POP” in price on the first day of trading.
20. What is spontaneous financing?
Ans. Spontaneous financing consists of the trade credit and other accounts payable which aris ‘Spontaneously in the firms day to day operations. Examples include wages and salaries payable, accrued taxes.
21. What is record date?
Ans. Record data are composed of fields, each of which contains one item of information. A set of records constitutes a file.
22. What is cash conversion cycle (CCC)?
Ans. The flow of cash from purchase of inventory to production from production to sell of goods and collection of receivables and again purchase of raw material can be termed as the cash Conversion Cycle.
23. What is corporate finance?
Ans. Corporate finance deals with promotion, capitalization, financing administration of the corporation.
24. What is agency cost?
Ans. The loss or cost arises from the agency problem is called as agency cost.
25. What is net present value?
Ans. The present value of an investment-Project’s net cash inflow minus the project’s initial cash outflow.
26. What is correlation?
Ans. A statistical measure if relationship between any two series of numbers representing data of any kind.
27. What is money market?
28. What is risk?
Ans. Risk may be defined as the variability of possible out comes from a project.
29. What is prospectus?
Ans. A prospectus is a formal legal document that is required by and filed with the securities and Exchange Commission that provides details about an investment offering for sale to the public.
30. What is operating lease?
Ans. Short term, Cancelable lease agreement are called operating lease.
31. What is optimum capital structure?
Ans: The is capital structure having overall cost of capital is minimum and by which value of the firm is maximized is called optimum capital structure.
32. What is arbitrage process?
Ans: Arbitrage means finding two assets that are essentially the same buying the cheaper and selling the more expensive.
33. What is venture capital?
Ans: Provide early stage financing to new enterprises.
34. What is secondary market?
Ans: A market for existing (used) securities rather than new issues.
35. What is financial lease?
Ans: Long-term. Non-cancellable lease contracts are known as financial lease.
36. What is stock?
Ans: Stock is the capital raised by a company or corporation through the issue and subscription of shares.
37. Define wealth maximization.
Ans: Wealth maximization means maximizing the net present value or wealth of a course of action to shareholders.
38. What is Hurdle rate?
Ans: The minimum required rate of return on an investment is known as hurdle rate.
39. What Scenario analysis?
Ans: Scenario analysis is risk analysis technique in which the best and worst case NPVs are compared with projects expected NPV.
40. What is preferred stock?
Ans: Preferred stock is that kind of stock which provides a specific dividend that is paid before any dividends are paid to common stockholders.
41. What dividend policy?
Ans: The firm’s plan of action to be followed whenever a dividend decision is made is calleddividend policy.
42. What is retention ratio?
Ans: Retention ratio refers to the percentage of net income that is retained to grow the business.
43. What is public issue?
Ans. Public issue is the formal offering or sale of securities to the public by a joint stock company for raising capital. What is pre-emptive right ?
44. What is sale and lease back?
Ans: Under the sale and leaseback arrangement, the firm sells and asset that it own and then leases to same asset back from the buyer.
45. What is stock dividend?
Ans. Stock dividend is paid in the form of the company stock due to raising of more Finance.
46. What is underwriting?
Ans. Bearing the risk of not being able to sell a security at the established price by virtue of purchasing the security for resale to the public; also known as firm commitment underwriting.
47. What is lease?
Ans. Lease is a contract between a lessons; the owner of the assets and a lessee the user of the assets.
48. What is operating cycle?
Ans. The time period between the requisition of inventory and the collection of receivables is called operating cycle.
49. Define corporate governance.
Ans. As the real owners or shareholders are not entitled to take part actively in the management of a company, thus it is governed by elected directors and professional managers. Therefore corporate governance is the task of managing the company and maintaining relationship with the stakeholders by the directors and professional managers.
50. What is indifference points?
Ans. Indifferrence point is that level of EBIT having equal EPS between two different capital structure plans.
51. What is RADR?
Ans. RADR- Risk-Adjusted Discount Rate. The risk-adjusted discount rate is the discount-rate which combines time as well as risk of preference of investors.
52. What is social responsibility?
Ans. Social responsibility refers to those activities which are performed for the welfare of the society.
53. What is business risk?
Ans. A firm’s operational risk is called business risk. Business risk is defined that the firm will not have the ability to complete successfully with the assets that is purchased.
54. What is sensitivity analysis?
Ans. Sensitivity analysis is a risk analysis techniques that indicates how much NPV will change in response to a given change in an input variable, other things held constant.
55. What is levered firm?
Ans. A firm having debt capital is called levered firm.
56. What is hire purchase?
Ans. Hire purchase is a purchase agreement where the ownership of purchased asset will transfer from owner to hirer on paying all installments over a specified period and hirer has no right to sale asset before the payment of last installment.
57. What do you mean by stock repurchase?
Ans. Stock repurchase is a program by which a company buys back its own shares or stocks from the marketplace, reducing the number of outstanding shares.
58. What is best effort offering?
Ans. Best effort offering is an agreement in which the investment bank only takes the responsibility of sale of shares in exchange for commission without being engaged in underwriting and returns the unsold shares to the company.
59. What is bond refunding?
Ans. Bond refunding is a procedure whereby an issuer refinances outstanding bonds by issuing new bonds to reduce the issuer’s interest costs of old bonds.
60. What is working capital management?
Ans. Working capital management is the setting of working capital policy and caring out that policy in day-to-day operations.
61. Define corporation.
Ans. Corporation is an artificial person created by law, having a separate legal entity with a perpetual succession and a common seal.
62. Elaborate CAPM.
Ans. Capital Assets Pricing Model.
63. What is floatation cost?
1. Discuss the principles of business finance.
2. What do you mean by wealth maximization?
3. What is the difference between NOI and NI approach?
4. What are the differences between operating lease and financial lease?
5. Explain in brief the assumptions of Modigliany and Miller (MM) theory.
6. Distinguish between money market and capital market.
7. Discuss the objectives of lease financing as organized in Bangladesh.
8. Discuss the role of a financial manager.
9. Show the difference between risk and uncertainty.
10. Distinguish between bond and common stock.
11. Describe the importance of capital budgeting.
12. Explain the concept of corporate governance.
13. Briefly discuss the importance’s of working capital in a firm.
14. What are the basic criteria for accept-reject decision for different techniques of capital budgeting/Discuss in brief the techniques of capital budgeting.
15. Discuss the goals and objects of financial manager.
16. Why is preferred stock called security?
17. Explain best effort method and firm commitment method of underwriting.
18. What are the techniques adjusting risk in capital budgeting? Explain.
1. a) Define financial management. Discuss social responsibility of financial management. Discuss the importance of financial management. Discuss the three major decisions that financial manager must take. Discuss the factors influencing financial decisions. Describe financial goals in terms of financial management. 99%
2. a) Discuss the advantages and disadvantages of lease. Discuss different method of lease.
(b)Distinguish between lease and purchase.
3. (a) What is agency conflict? Discuss in brief the various techniques of overcoming agency problem/How can it be minimized.95%
4. Define working capital management. Why it is important to study the management of working capital as a separate area in financial management? Briefly discuss various policies of financing working capital. What are the impacts of inadequate working capital.90%
5. Discuss different types of dividend policy.Which factors affecting dividend policy? Write down the benefit of share repurchase.
6. a. What is Zero Coupon Bond? Why do investors buy it although it has no coupon interest?
b. Differentiate between private replacement and public issue.
7. a. Describe the arbitrage process of levered firm?
b. Describe in brief the external factors determining capital structure.
8. Difference between rights issue versus public offering. Discuss IPO proves.
b. Discuss the features of preferred stock.
9. a. What is capital market? Briefly discuss various types of capital market.
b. Briefly discuss the role of security exchange commission (SEC) for capital market in Banglade
10. a. What is bond refunding? Why is it done? Discuss the process of bond refunding.
b. Discus the classification of bond in brief.
Part B: 2015 (3), 2017 (7)
Part C: 2016 (11), 2017 (10)***, 2017 (11), 2018 (11)***
Part B: 2014(4), 2016 (3), 2017 (5)
Part C: 2015 (12)***, 2016(12), 2019 (12)**, 2014(12)
Part B: 2016 (7), 2018 (8)
Part C: 2017-12, 2014-13
Part B: 2014 (8), 2019 (5)
Part C: 2016-14, 2019-14
Part B: 2017 (8)
Part C: 2015(13), 2016 (13)
Part C: 2015-15 (b), 2014-16, 2019-15
বি:দ্র: নিজের সাজেশন নিজে করাই উত্তম। আমার সাজেশন ১০০% কমনের নিশ্চয়তা নেই।
| 102,239
|
Cheetham Hill has been a key arrival point for migrants entering the City for over 200 years. Cultural diversity has brought many positives to the area. It is welcoming and tolerant to newcomers. Many residents feel they have been able to settle and build a better life here. Settled residents feel a great warmth and loyalty towards where they have grown up.
The local environment exudes diversity and encourages a sense of belonging: mosques, churches, temples, shops catering for a wealth of tastes and backgrounds, a plethora of cultural assets such as the Jewish Museum, the Irish World Heritage Centre and the Ukrainian Club.
| 193,392
|
MBA aspirants, who are appearing in MAT being conducted 15th May 2022 (Paper Based) and 15th May 2022 Computer-based) should keep following tips for Language comprehension:
In Language Comprehension section of May MAT 2022, there will be a few questions on the rearrangement of sentences of a paragraph. In each question, there will be four and six sentences, in jumbled form.
You are required to identify the opening sentence, the conclusion and then arrange the remaining sentences in such a manner that the entire paragraph reads in a coherent manner.
- Before you can form paragraphs, it is important to understand the gist of the paragraph. This requires one to read all the sentences carefully. Apart from practicing past years’ papers, one should study sentence construction rules in greater depth. Identifying the opening and concluding sentences are easy.
- The opening sentence is usually the sentence that introduces an idea or a concept. The last sentence will conclude what has been covered in the paragraph.
- Once the opening sentence has been identified, you should zero in on the next sentence that acts as a continuation of the idea being discussed in the paragraph. To ace this section, it is important to find links between two sentences.
Expert advice that it is important to read extensively to ace this section. By reading online newspapers, you will be able to understand how sentences are linked to one another.
Plus, you should make it a point to read all the options in the question to understand the gist of the paragraph. Unless you are clear about what is being conveyed in the paragraph, you will find it difficult to form a coherent paragraph.
You must identify pairs of sentences that go together. For example, if one of the sentences begins with ‘on one hand,’ it should be accompanied by another sentence that begins with ‘on the other hand.’ Also, look for pronouns and respective nouns that sentences refer to.
For example, if one of the sentences has the word, ‘they’ in it, the preceding sentence should have a noun which shines light on what ‘they’ refers to.
|Preparation Tips for MAT 2022||MAT Test Centres|
|MAT Syllabus||MAT Scores accepting Institutes|
|Reading Comprehension Passages|
Stay informed, Stay ahead and stay inspired with MBA Rendezvous
| 264,528
|
In the SparkNote on the Periodic table we discussed a number of simple periodic trends. In this section we will discuss a number of more complex trends, the understanding of which relies on knowledge of atomic structure.
Before getting into these trends, we should engage a quick review and establish some terminology. As seen in the previous section on the octet rule, atoms tend to lose or gain electrons in order to attain a full valence shell and the stability a full valence shell imparts. Because electrons are negatively charged, an atom becomes positively or negatively charged as it loses or gains an electron, respectively. Any atom or group of atoms with a net charge (whether positive or negative) is called an ion. A positively charged ion is a cation while a negatively charged ion is an anion.
Now we are ready to discuss the periodic trends of atomic size, ionization energy, electron affinity, and electronnegativity.
The atomic size of an atom, also called the atomic radius, refers to the distance between an atom's nucleus and its valence electrons. Remember, the closer an electron is to the nucleus, the lower its energy and the more tightly it is held.
Moving from left to right across a period, the atomic radius decreases. The nucleus of the atom gains protons moving from left to right, increasing the positive charge of the nucleus and increasing the attractive force of the nucleus upon the electrons. True, electrons are also added as the elements move from left to right across a period, but these electrons reside in the same energy shell and do not offer increased shielding.
The atomic radius increases moving down a group. Once again protons are added moving down a group, but so are new energy shells of electrons. The new energy shells provide shielding, allowing the valence electrons to experience only a minimal amount of the protons' positive charge.
| 270,160
|
Werner von Blomberg
Werner von Blomberg was born in Stargard, Germany, on September 2, 1878. He joined the German Army and served as a second lieutenant in the 73rd Fusilier Regiment. He attended the War Academy (1904-07) before joining the General Staff in 1908.
On the outbreak of the First World War, Blomberg was General Staff Officer with the 19th Reserve Division. He served on the Western Front where won the Pour le Mérite. By the end of the war he had reached the rank of major. Blomberg's two brothers were both killed in the conflict.
Blomberg remained in the army and in 1920 was promoted to lieutenant colonel and was appointed Chief of Staff of the Doeberitz Brigade. Four years later General Hans von Seeckt appointed him as chief of army training.
In 1927 Blomberg was promoted to the rank of major general and was appointed chief of the Troop Office. In this position he clashed with Kurt von Schleicher and in 1929 was sent to East Prussia to serve under Walther von Reichenau.
In 1932 Blomberg was head of the German delegation at the Geneva Disarmament Conference. The following year Adolf Hitler appointed him minister of defence and in 1935 minister of war and commander in chief of the German Army. It was Blomberg's idea to get all soldiers to pledge an oath of personal loyalty to Hitler. In April 1936 Blomberg became Hitler's first field marshal.
Blomberg believed Hitler's Night of the Long Knives massacre was justified to maintain order against Ernst Roehm's rowdy army of SA legions that threatened to eclipse the German Army itself by sheer manpower. He was outmaneuvered, however, by Hermann Goering, who was jealous of Blomberg's power and used the Gestapo to obtain embarrassing information about his pretty young second wife, who turned out to have been a prostitute with a criminal record. In January 1938, Blomberg resigned when he discovered Goering was planning make his information public. Blomberg and his wife were ordered to spend a year in exile on Capri. The scandal allowed Hitler to take direct control of the army.
After the war Blomberg was captured by Allied troops and gave evidence at the Nuremberg War Crimes Trial. Werner Blomberg died while being held in detention on March 14, 1946.
Sources: Joric Center; Wistrich, Robert S. Who's Who in Nazi Germany, Routledge, 1997; Spartacus
| 100,167
|
SA can’t act against oil-slick shipComment on this story
A South African coastguard aircraft has spotted and photographed a foreign container ship trailing a long oil slick off the Eastern Cape coast.
But local maritime authorities Ä who have identified the vessel as the Conti Hong Kong Ä are “powerless” to act, according to a reliable source in the maritime sector.
The source said the container ship was spotted by a Kuswag plane on Thursday, “discharging oil from its bilges” at a position 14
nautical miles off Hamburg, south of East London.
“The slick was four nautical miles long and 50 metres wide at the time it was spotted,” the source told Sapa.
South African maritime authorities were powerless to act against the vessel because there was “zero response capability”, the source said.
It is understood the Conti Hong Kong is westbound for Lagos in Nigeria, having sailed from Colombo in Sri Lanka.
Contacted for comment, a SA Maritime Safety Authority (Samsa) official - who declined to be named - confirmed the vessel had been spotted by a Kuswag plane within South African waters.
The official said Samsa could not say whether the ship was leaking oil or discharging it from its bilges.
“But it's definitely illegal.”
The official said however there was “no capability to go out there to stop the vessel and what's happening”.
If the Conti Hong Kong did not put into an SA port, there was nothing the local authorities could do.
Two months ago, all South Africa's maritime patrol vessels were handed over, by the department of fisheries, to the SA Navy. The vessels are still being commissioned and, according to a navy official on Friday, will be ready for sea operations “in the next two weeks or so”.
According to the website www.marinetraffic.com, the Conti Hong Kong is a 26 000-ton container vessel, built in 1989. She is registered in the Marshall Islands. - Sapa
| 48,456
|
The Grandview Restaurant is located in Mount Hamilton, California.
This classy yet comfortable restaurant boasts a breathtaking view overlooking the city.
As it turns out, this magnificent view isn’t quite the only thing about the Grandview that’s breathtaking.
The Scorching Past of Mount Hamilton
Updated 9/23/2019 – The history of the Grandview began back in 1884 when it was first built as a hotel.
This building burned down in 1942 and was rebuilt where it originally stood.
Then in 1954 the building was moved across the street where it again burned down in 1956.
Once they rebuilt, it was no longer the Grandview Hotel, but now the Grandview Restaurant.
This restaurant stays busy and live with music and laughter from the pleased customers.
But at night once the laughter and music has died down and people have gone, a spirit emerges to play.
The lights in the dining room will sometimes flicker on and off, followed by the kitchen and hall lights.
A smoky silhouette of a young girl is sometimes spotted on the balcony, then disappears.
Is it possible the ghost of a young girl has haunted the Grandview since its rebuild in 1956?
The locals will eagerly tell you the tale of how the Grandview gained its permanent young resident.
The story of a young girl that came up missing back in 1954, along with several other children.
The exact number of children missing was never confirmed and varies from each of the locals.
“Children!! It’s getting dark, time to come home!!”
One particular girl was a town local that everyone knew and loved, locals believe she is the ghost.
According to the local lore, her eyes were an intense shade of green, that even as a spirit can be seen.
The story tells of children playing during dusk, through the calls to come home from their parents.
Only to never come home, or be found.
The tale surrounding the disappearances point the finger at Satanism and the occult.
Parents blamed a semi-local cult for having sacrificed the children, even suggesting cannibalism.
While there is no documented proof of the events, the empty beds were enough proof for parents.
With no evidence of any real fowl play the accusations went nowhere.
Everything began to die down with the rebuild and transformation of the Grandview.
Things in Mount Hamilton seemed to have come to a quiet rest, until one late autumn evening.
Witness’s begin noticing the lights turning on and off in the large dining room window.
Along with the lights came a dark silhouette with what appeared to be intense green eyes glowing.
Since then many people have witnessed lights turning on and off along with sightings of the ghostly girl.
Many people visit this historical spot for a chance to see the lights or the young bright eyed ghost.
| 125,438
|
Welcome to Mr Guinee's Homework Page
SFA Group - Reading books will be exchanged on a Friday. Please ensure home reading books be brought into school on a daily basis.
Maths Group - Please make sure you login to www.activelearnprimary.co.uk to access the Maths Homework. Please note that all activities set will relate to learning that has taken place in school that week.
Year Six Half Term Homework
Crowning of the Bard Ceremony (Whole school): All children in the school are expected to write a poem called ‘Our Land of Wales’. Please note the child that produces the winning poem will be crowned as the bard for this academic year. A child from Foundation Phase and Key Stage Two will be chosen in a Bardic ceremony. The children should submit their poem with their year group on it an a non de plum (A made up name so teachers do not know the name of the successful bards until they identify themselves on the calling of their secret name on it. The choosing of the successful poems will be made by the headtecher, Ms. Brown.
Cystadlu Pump / Competition Five (All of key Stage Two): to independently produce a Welsh Conversation with a partner - Mr Guinee and Ms. Houston
Cystadlu Pump / Competition Five (All of Key Stage Two): To write in their own words a story that they have read that relates to Wales. To be judged and prizes presented by Ms. Houston.
Cystadlu Un Competition One (Whole school): Cooking competition- The children are asked to cook a Welsh traditional dish. This is to be judged by Ms. Westgarth and Ms Evans, but I feel sure all staff will be there to help them in the decision making process. Please ensure that the container in which the cooked item is delivered in is clearly marked with your child’s name and their class so that they can be returned to you on the 2nd March. A certificate will be awarded four first, second and third at both Foundation Phase and keys stage Two.
Mr Guinee's Year 5/6 Homework (Maths)
This week I have added more maths activities based on what we have been learning in class on the abacus website. Please login and complete the pages selected.
We have been carrying out work on angles in class. Please use a protractor to measure and record the angle of each of these.
Story writing competition entries should be emailed to firstname.lastname@example.org
Please mark emails with the Subject FAO: Mr Guinee - Story Competition.
P)lease make sure that all children's entries are clearly labelled with their name.
Entries can also be sent into school on a disc or memory stick.
| 150,575
|
We send Articulate Online messages from a verified domain and email address (email@example.com) to ensure messages aren't blocked by recipients' email services or internet service providers.
Identifying the Sender
We include the name of the user who sent the email in the From field of the message, so recipients will recognize the sender. For example:
If the sender's Articulate Online profile doesn't include his first or last name, we include his email address in the From field of the message to help recipients identify the sender. For example:
Replying to Messages
If recipients reply to an Articulate Online email, it'll go to the email address of the user who sent the original message rather than firstname.lastname@example.org. For example:
| 184,482
|
The Andrew Field papers include materials gathered and produced during the research, writing, and publication of Field's biography of Djuna Barnes, Djuna: The Formidable Miss Barnes (alternately entitled Djuna: The Life and Times of Djuna Barnes). The collection includes items dated from 1916 to 1989, with the bulk of materials dating to Field's intense period of research and writing, from 1978 to 1982. There are manuscripts of the biography in various states and correspondence with witnesses of Djuna Barnes's life, with other biographers of early twentieth century New York and Paris cultural figures, and with institutions and repositories that hold archival records. There are also research notes, notes from primary interviews, clippings, photocopies of articles, genealogical documents, book reviews, photographs, and publications of other writers gathered during research. Of particular value are individual copies from the chapbook series Bruno's Weekly and Bruno's in which three examples of Barnes's writing and illustration appeared. Copies of these rare publications are not among the materials acquired from Barnes by the University of Maryland Libraries. The collection also contains correspondence from Djuna Barnes to several of the individuals Field contacted while working on the biography.
| 304,006
|
March 13, 2011
Oregon report indicates mandatory minimums transfer sentencing power to prosecutor
As detailed in this local artice, which is headlined "Report on Oregon's Measure 11 incites fierce debate," there is a notable new report in Oregon about the impact of mandatory minimum sentencing in the state. Here are excerpts:
A political firestorm has erupted over whether Measure 11 is working, pitting prosecutors against defense attorneys, victim advocates against victim advocates. The state Criminal Justice Commission ignited the arguments with a report that concludes the measure, passed by voters in 1994, hasn't worked as intended....
The commission found, for example, that one effect of Measure 11 has been to shift power to prosecutors, who use the threat of a mandatory sentence to win plea deals on lesser crimes....
Proponents of Measure 11, however, attacked the report as politically motivated. The report was slanted to "push a political agenda, which is anti-Measure 11, anti-incarceration, anti-law enforcement and anti-victims," said Steve Doell of Crime Victims United.
The renewed debate comes as legislators, looking to save money amid the state budget crisis, face several proposals to change state sentencing laws. Gov. John Kitzhaber is seeking to again defer tougher sentences for repeat property offenders, and legislation is pending to stall Measure 73, which would increase sentences for some sex offenders and drunken drivers.
There's no question Measure 11 has had a profound effect on Oregon's criminal justice system. By setting mandatory minimum prison sentences for certain offenses, the measure has been a significant factor in pushing the state's prison population from about 3,100 in 1980 to about 14,000 in 2010, according to a February analysis by the Legislative Fiscal Office. The commission's report found that the state prison system would need 2,900 fewer beds had the measure not taken effect.
March 13, 2011 at 05:30 AM | Permalink
TrackBack URL for this entry:
Listed below are links to weblogs that reference Oregon report indicates mandatory minimums transfer sentencing power to prosecutor:
This real estate web site shows Oregon to have below average rates of crime.
There are direct costs of crime (health costs for injuries and trauma, property damage where replacement cost does not enhance the economy, police, and criminal justice costs, time lost from work, distraction and diversion from productive activity such as studying and working). There are indirect costs which may dwarf the direct costs, loss of real estate value. With an average criminal committing dozens of crimes a year, these costs far exceed the value of the life of the criminal, even using the high $6 million rate. This is economic justification for the death penalty at the earliest age tolerable to the public. One hopes for the discovery of reliable prenatal test.
The feminist lawyer and it male running dogs have nearly immunized the criminal, and totally shielded, enabled and encouraged the amoral, addict mother that spawned him out of wedlock. Welfare benefits worth $25,000, tax free, pay these addicts to not get married, and to separate from the fathers if they are living with them.
Why? To generate massive government employment in cushy sinecures. Feminism is a masking ideology for Communism, if Communism is defined as the promotion of big government. The biggest victim? Black folks, of course, with an excess of 5000 murders each year after year. The total number of lynchings by the other lawyer founded, led and immunized KKK, was 5000, total, over 100 years. Real advocates of racial equality should consider bringing street justice to their real adversary, the feminist lawyer and its male running dogs, instead of attacking corporations and suing the police to deter law enforcement. The self-dealt immunity of the lawyer hierarchy gives good moral justification for violent self-help if legal liability was supposed to be a substitute for violence. If a proposition is true, its obverse is true (If a then B, is true. It is automatically true that If not B, then not A. If legally liable, then violent self help is not justified. That makes it automatically true, that violent self help is justified (not B) if the party is not legally liable (not A).)
The self-dealt legal immunities of judges, prosecutors, and police are bad for these parties because:
1) the immunities justify violent self-help by crime victims and families;
2) the immunities cover up failure and discourage continuous improvement, with only 10% of major crimes getting prosecuted;
3) immunity grows the immune enterprise, and liability shrinks the entire economic sector, not just the defendant's entity. This industrial policy is without competent and authorized legislative input. Immunity is a strong but stealthy form of unauthorized industrial policy by know nothing appellate judges, as evidenced by the naturalistic, historical experiments listed here, of the size of an activity sector before, after immunity or liability:
In the report cited above, these indirect costs, and hidden agenda to grow government even more than from prison expansion, these indirect costs saved from crime prevented are not addressed.
Posted by: Supremacy Claus | Mar 13, 2011 9:05:11 AM
It's more complicated than just having mandatory minimums. It's also having disparate criminal statutes that punish essentially the same behavior, but different ways. It's like the old George Carlin joke about committing "six sins with one feel" (Google it). It's a crime to possess marijuana, to possess it with intent to distribute it, to conspire to possess it with intent to distribute it, to use a phone while you're doing it, to transport the money from selling it, and in some states not to pay taxes on it, etc.
Federal child pornography law is the perfect example. It is a crime to possess it, and it is a crime to receive it. For some unfathomable reason, receiving child pornography has a mandatory minimum and a 20-year maximum sentence, while possessing it carries no minimum and a maximum of 10 years. No one's ever been able to explain to me how receipt is realistically more nefarious than possession--after all, if you possess it but didn't receive it, then you must have created it, which is far worse. Anyway, I've never seen a CP case where there wasn't receipt, because it almost always is downloaded from the Internet.
But whether this is actually a problem depends on your perspective. Some people don't mind giving prosecutors the power to determine sentences; after all, prosecutors are charged with enforcing laws, so they they don't mind handing prosecutors the discretion to choose which sentences will apply. Others feel that judges should have the central role in determining punishment, because they stand between the prosecutor and the defendant and are best able to mediate the conflicting interests of the public, victims, and the rights of individual defendants.
Posted by: C.E. | Mar 13, 2011 8:35:11 PM
i have to agree C.E. have never been able to get a straight answer to how having multiple charges for the same 5-10 min of stupidty could possible be legal under the double jeopordy clause of the constitution.
as for the fiction stupidity they are from diff jurisdictions i say BULL SHIT!
you are still putting them into multiple chances to lose their freedom and life for the SAME CRIME... sorry to be legal if you have the same law covering the same bit of stupidity then ONE jurisdiction should be the ONLY one to prosecute.
which brings us full circle to another big big big problem with the sytem. multiple prosecutions for the same crime over and over and over if there is not either a complete conviction or a complete ruling of not guilty!
sorry that is also illegal under the constution.
Posted by: rodsmith | Mar 14, 2011 2:09:33 AM
MMs and harsh sentencing guidelines empower prosecutors to raise the stakes so high that going to trial becomes too risky to chance it -- even for citizens who are innocent or wrongly accused.
What's remarkable here is that it's taken Oregon a very long time (and a budget crisis) to figure that out.
Create a few more MMs and toughen up sentencing guidelines (as some learning-disabled Oregon lawmakers still seem eager to do) and soon trials, relatively rare occurrences now, might become extinct altogether.
Great news for the Legion of Congenital Scolds and Stern Disciplinarians (which typically is well-represented in this blog), but for some of the rest of us it's beginning to feel a little tyrannical out here.
Posted by: John K | Mar 14, 2011 11:27:05 AM
| 183,043
|
Hugo Schmeisser (24 September 1884 – 12 September 1953) was a German developer of 20th century infantry weapons.
Schmeisser was born in Jena, Thuringia. His father, Louis Schmeisser (1848-1917), was one of the best-known weapons designers in Europe. The life and work of Hugo Schmeisser mostly took place in the weapons manufacturing city of Suhl, Thuringia.
Before and During World War I
The submachine guns of Theodor Bergmann are closely connected with its name recognition and weapons production in the time leading up to the First World War. Schmeisser also received his fundamental training in weapons technology at Bergmann, where 7.63 mm and 9 mm machine gun rounds were being researched. He remained in Suhl during World War I because of the crucial importance of his expertise in machine gun technology.
Before and During World War II
Manufacturing regulations in the Treaty of Versailles (28 June 1919) forbade Germany from developing heavy machine guns, but permitted machine pistols or submachine guns as a suitable weapon for police. This signalled the end of a 30-year cooperation between the Schmeissers and Bergmann as production was licensed to foreign weapons manufacturers. Schmeisser decided to continue work in weapons development. Together with his brother Hans Schmeisser, he created the “Industriewerk Auhammer Koch und Co” (Industrial Auhammer Koch and Company) in Suhl. Being at the end of World War I, he saw little business, and encumbered by the Treaty of Versailles, the future of the company was unclear. Schmeisser defied the treaty, working to continue development of automatic weapons. It was at this time that the company began cooperating with: C.G. Haenel Waffen- u. Fahrradfabrik Suhl, beginning a 20-year partnership. For the safety of his patents, Schmeisser created a second company under the name of “Brothers Schmeisser” in the summer of 1922. This shrewd tactic was to prevent the loss of his patents if Auhammer went bankrupt. In order to prevent bankruptcy on both sides, Auhammer and Haenel merged, with Haenel taking full responsibility and liability for Auhammer business affairs. Schmeisser’s attorneys who settled the deal became active shareholders in the company. Before long, it was obvious that development of many types of automatic weapons was unaffected or even accelerated by the Treaty of Versailles. In the 1920s Schmeisser developed the MP28, which was used extensively by the German police. Bayard signed an agreement with Schmeisser to manufacture and sell weapons to South Africa and Spain, among other countries. It is notable that these same weapons were used during the Spanish Civil War only 10 years later. Despite Schmeisser’s success, the company often came within inches of bankruptcy.
As the Nazis rose to power during 1933, ten weapons development enterprises in Suhl and Zella-Mehlis merged under the name of “United Suhl-Zella Mehlis Armament Makers”. This central administration was used to coordinate production with the army’s needs. This allowed Schmeisser to make a very important business acquaintance, which later developed to a friendship, with the aviator Ernst Udet, a deputy of Hermann Göring under Germany’s Luftwaffe. Schmeisser had a direct role in military production decisions, often influencing the decisions of Adolf Hitler and Göring. After 1935 Haenel experienced an enormous upswing in weapon production. Against the desires of many engineers and technical designers, the Schmeisser brothers continued to enforce patent royalties and manage company funds.
Berthold Geipel of Erma designed the MP 36 using Vollmer’s EMP. The chief designer, Heinrich Vollmer, revised the basic construction of Erma MP-36 and developed from it the well-known German submachine guns of the Second World War, the MP-38 and the MP-40. 1.2 million pieces were manufactured for these weapons, and were among the first weapons to be manufactured with die cast parts, metal stamping, and a complete machine-assembly. This method revolutionised weapon production, allowing manufacture at an unprecedented speed. They became internationally known as “Schmeisser MP”s, mainly due to the use of the straight magazine he had patented.
Schmeisser’s most important work had been underway since 1938. This new automatic weapon, with a short cartridge 7.92 mm, allowed for smart usage of resources and high production. At first named the Mkb 42, it later received the designation of MP-43, and it became one of the first assault rifles. By 1943, 10,000 pieces had already been manufactured for the front. For a short time, Hitler stopped production, as he was mysteriously opposed to the new weapon. In 1944, after troop testing verified the new weapon’s legitimacy, Hitler authorised mass production of the MP-43 as well as further research into a new MP-44. In April 1944 the new weapon received the designation of “Sturmgewehr 44” (“Assault Rifle 44”). The StG 44 was arguably Schmeisser’s most important weapon development.
After World War II
On 03 April 1945 American troops began to occupy the city of Suhl. Weapons manufacturing was completely prohibited during this time. Hugo Schmeisser and his brother Hans were interrogated for weeks by weapon expert teams of the American and British secret services. At the end of June 1945, American troops evacuated Suhl and all of Thuringia. One month later, the Red Army assumed control over the area, starting a civilian works project to manufacture weapons for the Soviet Union. By August 1945, the Red Army had created 50 StG 44s from existing assembly parts, and had begun inspecting their design. 10,785 sheets of technical designs were confiscated by the Soviets as part of their research.
Schmeisser was one of 16 Germans for which a special department (no. 58) was created at factory number 74, later known as Izhmash. Schmeisser was appointed as one of the five designers of the group, together with Kurt Horn and Werner Gruner (both from Grossfuss) and Oscar Schink (from Gustloff), under the formal leadership of Karl Barnitzke (also from Gustloff). There is some evidence that Schmeisser was uncooperative with the Soviets because he received the most negative review by his Soviet handlers in this group of five German designers. In these Soviet reviews, Schmeisser was described as a “practical man”, whose lack of formal training showed whenever he was presented with any design problems.
Schmeisser worked in Izhevsk until 1952 when he and other German specialists returned home to Germany. With short notice, his stay in the Soviet Union was extended beyond that of the other weapon specialists by a half year. He finally returned home on 09 June 1952. Schmeisser died on 12 September 1953, and was buried in Suhl. The 50th anniversary of his death was honoured by a ceremony held in Suhl, as he is recognised as one of the most important technical designers of infantry weapons of the 20th century.
Schmeisser had no role in the development of the MP-40 submachine gun despite its nickname “Schmeisser”.
- Bergmann Nr. 7 mod. 1903 Mars pistol; externally resembling the Mauser C96. 16,000 units made together by Bergmann’s company and by Anciens Etablissements Pieper (under license), most chambered in 9mm Largo.
- Bergmann MG 15nA machine gun; light machine gun (by World War I standards, 12.9 kg) manufactured in 5,000 units towards the end of the war.
- Bergmann MP 18; about 17,000 made, not counting various clones and close copies.
- Haenel Schmeisser mod. I pocket pistol in 6.35 mm, based on two Schmeisser patents. Some 40,000 were made.
- Haenel mod. 1928 air pistol; externally resembling the Parabellum P08. about 25,000 units sold.
- MP 28.
- Haenel mod. 33 Junior; an air rifle resembling the Kar98.
- MP 41, about 26,500 made mostly for export to the Nazi Germany allies.
- MkB 42(H).
- MP 43/1.
- StG 44 (former MP 43, MP 44).
- StG 45(H); new roller-delayed design; one captured prototype was tested at Aberdeen Proving Grounds.
You must log in to post a comment.
| 6,142
|
Young people today have a lot of free time. In your opinion, do they use this time well or do they waste it?
Do young people today use their free wisely? Or do many of them just waste it doing pointless activities? In this essay, I will discuss how most of the young people I know spend their free time.
Of course, many young people, just like many old people, waste their time. Some youngsters choose to sleep instead of getting up and being active. They get used to being lazy and the slightest effort is too much. Others are more active, but prefer to spend all their time in the mall or in the coffee shop, just watching girls or chatting with their friends. This if fine for a while, but it’s not very productive. Still others of course never leave the house and just sit around chatting on the internet or watching sports on television. It’s a lot easier to just sit at home and criticize your team than to get fit and take part, but that’s what many people prefer to do.
However, there are also many young people who are extremely active and productive. After all, most sport is played by young people, and stadiums are full of people supporting their favorite teams. Secondly, most young people are trying to create a good future for themselves. A lot of young people do extra courses or spend their time reading in order to do better in their studies. But the most important point is that young people are not very different from older people. Sometimes we all spend too long doing one thing, when we should try to have a balanced range of activities. All of us need to relax and have fun, and all of us, young and old, need to try new things and meet with friends and family.
In conclusion, it’s not really a question of age. Old and young people can choose to use their time well or to fritter it away. Hopefully we can all make choices that benefit us in the long run.
| 284,334
|
|Publication number||US5818825 A|
|Application number||US 08/564,983|
|Publication date||Oct 6, 1998|
|Filing date||Nov 29, 1995|
|Priority date||Nov 29, 1995|
|Also published as||DE19681171T0, DE19681171T1, WO1997020407A1|
|Publication number||08564983, 564983, US 5818825 A, US 5818825A, US-A-5818825, US5818825 A, US5818825A|
|Inventors||Richard Corrigan, Bruce D. Mueller, Timothy M. Burke|
|Original Assignee||Motorola, Inc.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (4), Non-Patent Citations (4), Referenced by (113), Classifications (17), Legal Events (10)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present invention relates generally to a communications system and in particular, to a method and apparatus for multiple cable access units accessing a cable telephony communications system.
In a cable telephony communications system, frequency division multiplexing (FDM) is employed. FDM allows two or more simultaneous continuous channels to be derived from a transmission medium by assigning separate portions of the available frequency spectrum, separated by some minimal channel spacing within a block of spectrum, to each of the individual channels. FDM provides for a fixed number of physical channels (i.e. separate frequencies) in a cable telephony communications system. To provide more channels to increase the number of users that may operate on a cable telephony communications system, time division multiplexing (TDM) is used. TDM provides time division multiple access (TDMA) in which users share a carrier frequency in the communications system by being assigned and using one at a time, for a limited amount of time, time division multiplex channels (time slots). In effect, each user gets assigned a different time slot on the same frequency. In this way many users can share the same frequency. Data transmissions are sent in time slots in which a communications unit may be assigned a particular time slot only for a limited amount of time.
One of the challenges of a TDMA system is providing to the users access on demand of the TDMA channels. A related challenge is resolving collisions when two or more users try to access or use the same TDMA channel. Consequently, it is desirable to have a system that elegantly provides access on demand of the TDMA channels, and elegantly resolves collisions when multiple users attempt to use the same channel.
The novel features believed characteristic of the invention are set forth in the appended claims. The invention itself, however, as well as a preferred mode of use, further objectives and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings, wherein:
FIG. 1 is a diagram of a communications system in which the present invention may be implemented;
FIG. 2A is a block diagram of components in a cable control unit (CCU) according to the present invention;
FIG. 2B is a block diagram of components in a cable access unit (CAU) according to the present invention;
FIG. 3 is an illustration of spectrum allocations for a communications system according to the present invention;
FIG. 4A is a diagram of a superframe used according to the present invention;
FIG. 4B is an illustration of a downstream channel and an upstream channel;
FIGS. 5A-5K are illustrations of different types of information bursts which are employed in providing CAUs access to a communications system according to the present invention;
FIG. 6 is a state diagram of a CAU during system access procedures according to the present invention;
FIG. 7 is a state diagram of a CCU during system access procedures according to the present invention;
FIG. 8 is a depiction of a burst in the TDMA uplink aligned with a slot in the TDM downlink;
FIG. 9 is a flowchart of a process employed by a CCU during an attempt by a CAU to access the communications system according to the present invention;
FIG. 10 is a flowchart of a process employed by a CAU to access the communications system according to the present invention;
FIG. 11 is a diagram of a burst in a downlink control channel according to the present invention;
FIG. 12 is a more detailed flowchart of a process for handling collisions between CAUs attempting to access the communications system according to the present invention;
FIG. 13 is a flowchart of process followed by a CCU for setting a word error indicator (WEI) bit in response to a collisions between CAU bursts sent to the CCU according to the present invention;
FIG. 14 illustrates the signaling between the CAU and the CCU over system access channels (SAC) in which access is confirmed;
FIG. 15 shows signaling between the CAU and the CCU on the SAC in which access is denied;
FIG. 16 is an illustration of signals between a CAU and a CCU resulting in a successful reconnect access request;
FIG. 17 is a diagram of signals between a CAU and a CCU resulting in a failed reconnect access request; and
FIG. 18 is an illustration of signals used for requesting access for an additional call on slow channel.
The preferred implementation of the present invention allows multiple users of a telephone-over-cable system to access TDMA channels (which carry the calls) on demand. Also, this implementation elegantly and efficiently resolves collisions when two users try to access the same channel. The implementation is somewhat related to two air interface communications protocols, described respectively in Generic Criteria for Version 0.1 Wireless Access Communications Systems (WACS) published by Bellcore, 1993 (TR-INS-001313) and Personal Access Communications System Air Interface Standard J-STD-014 (PACS) published by Technical Ad Hoc Group 3 of the T1/TIA Joint Technical Committee, which documents are incorporated in this description by this reference.
The following description begins with an overview of the cable telephony system. It then describes the electronics in the portion of the system that is at the cable companies' headquarters ("headend"), and then the electronics in the portion of the equipment that is at the subscriber's home or business.
This description then explains how the frequency spectrum that is available on the cable is used by the cable telephony system. Subsequently, this description discusses how the frequencies used by the system are divided into time slots, and how those time slots are structured with respect to the digital messages that they carry. Then, specific message formats are described for some of the particular digital messages sent back and forth in the system to facilitate channel access and collision resolution.
Next, state diagrams are discussed, illustrating the process that the user's equipment goes through, and that the headend equipment goes through, in setting a user up with a TDMA channel. Subsequently, flow diagrams are shown illustrating the related processes. Finally, examples are shown and discuss of particular signaling scenarios which take place in providing the user access to a channel, and in resolving collisions between users attempting to access the same channel.
With reference now to the FIGs., and in particular with reference to FIG. 1, a diagram of a communications system is illustrated in which the present invention may be implemented. Communications system 100 is an example of a basic cable system architecture that is a hybrid fiber/coaxial cable (HFC) system using a combination of fiber and coaxial cable to distribute subscriber services to customer premises equipment. Alternatively, communications system 100 may consist entirely of coaxial cable, fiber, or other suitable communications medium. Regardless of the cable infrastructure, a cable branch will serve a distribution area shared by a community of subscribers. In the depicted example, communications system 100 is a cable telephony communications system that provides telephone services along with cable television services on an HFC television infrastructure.
Communications system 100 includes a cable control unit (CCU) 102 or some other base communications unit that is connected to subscribers 104 by a distribution network 106 and a combiner 108. The CCU is a portion of the equipment at the cable company headend that sends and receives telephone calls to and from the home subscribers. Combiner 108 also has an input for video sources 110. CCU 102 also includes cable port transceivers (CPXs) 112, which are connected to combiner 108. These cable port transceivers generate downstream carrier channels in communications system 100. "Downstream" or "downlink" as used in this description refers to radio frequency (RF) signals going to the subscriber homes. "Upstream" or "uplink" as used in this description refers to RF signals going from the subscriber to the headend.
Combiner 108 receives modulated RF carriers from video sources 110 and from CPXs 112 in CCU 102 and sums these signals together to be sent over distribution network 106. CPXs 112 are controlled by a controller 114 which provides all functions necessary to support the data link portion of the system. The "Data link portion" refers to the ability for the system to carry phone calls in the form of digital data, as well as any other communications in the form of digital data. The headend of the communications system typically includes CCU 102, combiner 108, and video sources 110. Digital switch 116 may be in a remote location from the headend or may be located at the headend itself. These components are the headend equipment responsible for providing access and management of services to the cable system 100 servicing multiple subscribers. Controller 114 CCU 102 is connected to switch 116 through digital carrier facilities, such as T1 or E1, which is in turn connected to a public switching telephone network (PSTN) 118. Switch 116 may be, for example, a class 5 TELCO switch.
Transmissions from CCU 102 in distribution network 106 are facilitated by downstream fiber trunks 120 and upstream fiber trunks 122. These fiber trunks are fiber optic cables and are connected to fiber nodes 124. Fiber nodes 124 perform directional conversion between the optical domain of fiber optical cable and the electrical domain of coaxial cable in distribution network 106. Each fiber node 124 has a connection to at least one serving area 126. In the depicted example, serving area 126 comprises coaxial cable and includes trunk amplifiers 128, which are bi-directional amplifiers in the depicted example. Additionally, bi-directional line extenders 130 are located near taps 132, which are connected to cable access units (CAUs) 134 located at subscriber 104. These CAUs are also called "subscriber communications units".
CCU 102 is used to provide telephony (as well as other digital data communications) in communications system 100. Additionally, CCU 102 controls the cable spectrum, infrastructure resources, and services for all CAUs on a serving area, as well as managing multiple serving areas. CAUs 134 provide telephone and television services at subscriber premises. Typically, a CAU is mounted on the side of the subscriber's home, or on an unintrusive place, such as a basement or attic. The CAU manages the uplink and downlink communications paths and transports cable television channels to the subscriber's television. For example, "A plain old telephone" (POTS) at the subscriber's home plugs into the CAU. The CAU puts the phone signals from the POTS on to the cable system. Additionally, the CAU takes phone calls off the cable system and forwards them to the POTS, as well as taking regular cable TV signals off the cable and passing them along to the subscriber's TV.
Turning next to FIG. 2A, a block diagram of components in a CCU control unit is depicted according to the present invention. In CCU 200, upstream burst receiver 202 receives a TDMA burst from a CAU and down converts the burst to baseband quadrature I and Q signals. A "burst" is a fixed transmission of data in bits bearing information. The burst is π/4--DQPSK modulated. These baseband I and Q signals are converted to a digital signal by analog to digital (A/D) converters 204 and 206 and processed by upstream digital signal processor (DSP) 208. In the depicted example, A/D converters 204 and 206 are 8-bit A/D converters. Upstream DSP 208 sends the processed information to microprocessor 210.
Microprocessor 210 sends messages back to the CAU through downstream DSP 212 and downstream TDM transmitter 214, which is connected to the communications network on which the CAU is located.
Upstream burst receiver 202, A/D converters 204 and 206, upstream DSP 208, microprocessor 210, downstream DSP 212, and downstream transmitter 214 are components found in CPXs 112 in FIG. 1. The downstream components depicted in FIG. 2A may be in the same transceiver or a different transceiver (CPX) from the upstream components illustrated. Upstream DSP 208, microprocessor 210, and downstream DSP 212 make up a processing unit in FIG. 2A. Microprocessor 210 is found in controller 114 in FIG. 1. This microprocessor and the DSPs in CPXs 112 form the processing unit in CCU 102.
With reference now to FIG. 2B, a blocked diagram of components in a cable access unit (CAU) is depicted according to the present invention. CAU 250 is connected to a hybrid coaxial cable in distribution network 106 in FIG. 1 by RF interfacing and control 252. This interface and control unit provides a 75 ohm interface to the hybrid coaxial cable. RF interfacing and control 252 also provides a connection to cable television equipment on the subscriber premises. Additionally, RF interfacing and control 252 includes a control switch to turn on or off signals to premise cable television systems at the subscriber premises. Data received from the CCU at RF interfacing and control 252 are sent to digital receiver (demodulator) 254. The signals received from the CCU are in a frequency range from about 50 MHz to 750 MHz and converted to a low intermediate frequency (IF) by digital receiver 254. From this form, digital receiver 254 translates the low frequency IF to a baseband π/4 DPQSK modulated signal. Next the signal is demodulated to obtain bits from the signal. Thereafter, data/clock recovery 256 takes the bits from digital receiver 254 and separates the bits to send to processing unit 258 or pulse code modulated (PCM) coder/decoder (codec) 260. Control information is sent to processing unit 258 while user data is sent to PCM codec 260, which converts the user data into an analog form to be passed along to the subscriber's phone.
Processing unit 258 in the depicted example includes one or more microprocessors or digital signal processors (DSPs) along with random access memory (RAM) and read only memory (ROM). The RAM and ROM contain data and instructions coding for processes performed by the microprocessors or DSPs within processing unit 258. User information is converted by PCM codec 260 to an analog form and sent to subscriber loop interface (SLIC) 262. SLIC 262 provides basic telephony functions, such as indicating whether the phone is ringing or off hook, or whether loop closure has occurred. Additionally, SLIC 262 separates duplex signals into a send signal and a receive signal. SLIC 262 and the functions performed by it are well known to those who are skilled in the art. Ring generator 264 actually provides the voltage used to cause the telephone to ring.
User data from the subscriber premises (such as output from a phone or even output from a standard computer modem) are sent back through SLIC 262 to PCM codec 260, which transforms the data from an analog form to a digital form for processing by transmit data framing 266. Transmit data framing 266 takes raw speech data and puts this data into the frame for transmission to the CCU. For example, transmit data framing 266 includes the necessary synchronization information and calculates the cyclic redundancy code for error checking, which is placed into the slow channel of the frame (as described in more detail below). Transmit data framing 266 is controlled by processing unit 258 and sends signals upstream which are synchronized with the downstream signals. This synchronization in transmit data framing 266 is controlled by data/clock recovery 256. In other words, uplink and downlink transmissions to and from CAU 250 are synchronized. Finally, the data, as a burst, is transmitted by digital transmitter (modulator) 268 to RF interfacing and control 252 and back to the CCU.
Data carried across distribution network 106 in FIG. 1 may include both voice and non-voice data, such as ISDN digital video, phone data, interactive video, or interactive multimedia services. In the present invention, the transport technology used for the cable telephony exchange service is trunked. In other words, a cable telephony traffic channel is not dedicated to one particular user, but is available to all users on the basis of a request for service. Such an arrangement is called multiple access or subscriber loop concentration.
Typically, once a particular channel is assigned to a subscriber, it is assigned for the duration of a call. When the call is terminated, the temporary assignment to the subscriber is revoked and the channel is made available for a subsequent service request. Consequently, it is possible for a CCU to serve many more subscribers than the channels available in a serving area. Additionally, the whole spectrum can be used over again in each service area that has its own physically isolated cable-wire layout.
According to the present invention, the cable telephony communications system divides up the radio frequency (RF) spectrum for use with multiple subscribers such that no individual subscriber has a dedicated frequency range.
With reference to FIG. 3, an illustration of spectrum allocations for communications system 100 is depicted according to the present invention. As mentioned above, the spectrum allocated for service within a single serving area may be used again for a different group of subscribers in every serving area of distribution network 106. In the depicted example, RF spectrum 300 includes uplink spectrum 302 and downlink spectrum 304. In the depicted example, uplink spectrum 302 covers a range from 5 MHz to 42 MHz while downlink spectrum 304 covers a range from 50 MHz to 750 MHz. The spectrums are further subdivided into channels that are each 6 MHz in width. In the depicted example, downlink spectrum 304 includes 120 channels with each channel being 6 MHz in width. Although the depicted example shows an uplink spectrum of 5 to 42 MHz and a downlink spectrum 304 from 50 to 750 MHz with each channel having a width of 6 MHz, other spectrums and channel widths may be used according to the present invention.
Communications system 100 is divided up into areas with separate signal paths in which the RF spectrum allocated for the cable telephony service may be used again for a different group of subscribers in each separate area of the distribution network 106. In the downlink transmission, a large number of conventional television channels (for example 80 channels, each 6 MHz in width) are typically conveyed to cable television subscribers. The uplink spectrum (5-42 Mhz) can be used for any communications returning from the subscriber. A portion of the downlink spectrums, preferably one 6 MHz section as shown in FIG. 3, and an equal or larger portion in the uplink spectrum are dedicated to a plurality of trunked traffic channels serving a large number of subscribers having telephone and/other two way service. Within these dedicated spectrum allocations, a number of RF carriers (exemplified by portions 303) are deployed. These RF carriers are spaced 600 KHz apart. Active carriers are operated in pairs with one in the uplink segment of the allocation associated with each one in the downlink segments. This association provides for frequency division duplex (FDD) operations. Nevertheless, the system is completely flexible in that any of the upstream channels can be matched with any of the downstream channels.
Accordingly, in the preferred embodiment of the invention, a 6 MHz portion (somewhere within 50-750 MHz) contains ten 600 KHz RF carriers 303 used for downstream communications. Similarly, a 6 MHz portion (somewhere within 5-42 MHz) contains ten 600 KHz RF carriers 303 used for upstream communications.
According to this described scheme, each RF carrier is time division multiplexed into eight sequential "frames". Each frame is further broken down into eight sequential "slots". Each of these slots is one time divisioned multiplexed "channel" available for use by a subscriber, upon demand.
FIG. 4A shows the above described scheme diagramatically. The figure represents one RF carrier. The carrier is divided into eight frames 399. Each frame is divided into eight time slots 401, which are each a channel. The whole box 400 shown, i.e. eight frames of eight slots, is sometimes referred to as a superframe.
FIG. 4B shows the scheme in a different way. FIG. 4B shows downstream carrier 402 and upstream carrier 406. More specifically, with reference to carrier 402, two consecutive frames 404 and 405 are shown. These are two of the eight frames 399 in FIG. 4A. Each of the frames is made up of eight consecutive time slots 407. Each of the time slots is available as a communications channel on the cable telephony system. As illustrated by FIG. 4B, upstream carrier 406 is configured in the same way as downstream carrier 402.
Each time slot is further partitioned for different types of signaling by by the CCU or CAU. For example, as shown in the figure time slot 1 in frame 404 includes a synchronization channel (SYC) 414, a control channel (CC) 416, a slow channel (SC) 418, a fast channel (FC) channel 420, and an error control channel (EC) 422. Sync channel 414 is a synchronization channel used for frame synchronization. CC 416 is used to indicate word errors, signaling, and power control. SC 418 is used for signaling, and FC 420 is used for both user data and signaling. EC 422 is used for error detection. In both the uplink and downlink bursts, SC 418 includes 26 bits, FC 420 includes 160 bits, and EC 422 contains 20 bits. CC 416 contains 2 bits in uplink bursts and 9 bits in downlink bursts. Particular digital messages which use these various portions of the time slot will be discussed in further detail below.
CCU channel 402 is a downlink channel transmitted in a frequency range from 50 MHz to 750 MHz while CAU channel 406 is an uplink channel transmitted in a range from 5 MHz to 42 MHz according to the present invention. A data transmission within these channels is sent as a "burst", which is a fixed length transmission of data, such as a transmission of a group of bits. In the depicted example, a burst is 224 bits per time slot in CAU channel 406 and 240 bits per time slot in CCU channel 402.
Each time slot in both the uplink and downlink may be used for different types of channels such as a system broadcast channel (SBC), a system access channel (SAC), or a traffic channel (TCH). Each of these different "channels" has a different functionality. The SBC and SAC may both be considered system access channels because of their function. SBCs broadcast system information in the downlink to all CAUs monitoring the SBCs. A downlink SBC carries system wide information, such as alerts used to "page" a CAU and system database information used for controlling and managing CAUs. A SBC is divided into two logical information streams that are time multiplexed onto the SBC. In particular, a system information channel (SIC) and an alerting channel (AC) are time multiplexed onto the SBC. A CAU locates the SBC and listens to the SIC for information of general interest to all devices attached to a CAU. According to the present invention, the SIC identifies general system identifiers and capabilities; security information used for authentication and encipherment; and location of carrier frequencies, SBCs, and SACs.
On the AC, messages are used to notify or "page" a CAU with information, such as an incoming call. These messages include alert identifiers. Each CAU is assigned an alert identifier and monitors the AC to determine whether a message on the AC is directed towards it. Multiple SBCs are used to provide redundancy in communications system.
A CAU uses a SAC to obtain a TCH assignment so that the CAU can place a call, or send other digital data. Additionally, the CAU listens to the AC of the SBC for notification of incoming calls.
The SAC is a physical channel conveying three logical channels, a time alignment channel (TAC), a request access channel (RAC), and a system request channel (SRC). The TAC carries shortened uplinked bursts (SUBs) in the uplink used for time alignment, and the RAC carries access requests in the uplink. The SRC carries responses to uplink messages from the CAU. SACs are employed to perform time alignment and request and/or assign TCHs. As a result, CAU will use a SAC for one of the following purposes: time alignment, initial request for a traffic channel, or reconnect to a traffic channel. Multiple SACs (i.e. multiple slots on the same or different carrier) are used to provide both redundancy and to reduce contention between multiple CAUs requesting access to the communications system. TCHs provide user services on the communications system and may be requested and assigned for varying rates. A TCH is divided into two types of sub channels: a user information channel (UIC) and a message channel (MC). The UIC carries user information, such as voice data or analog modem data. The MC carries signaling information between the CCU and the CAU. TCHs are either busy (in use) or idle (not in use). According to the present invention, the access channels (the SBCs and the SACs) and data channels (the TCHs) may be moved to different frequencies depending on the quality of the carrier transmissions. Changing the frequency of SACs results in the new frequencies being broadcast on the SBCs. Changes in frequencies of a TCH may be performed using an alternate link transfer (ALT) to allow a CAU to maintain a connection in spite of movement of the channel to another frequency. ALTs are known in radio communications but are historically used to maintain a call while a user moves geographically among cells in a cellular system.
With reference to FIGS. 5A-5K, a number of bursts in the form of requests and responses employed in providing CAUs with access to a communications system are illustrated according to the present invention. Messages between communications units, such as CCUs and CAUs, contain access request numbers (ARNs) to identify to which CAU a particular message is directed. ARNs are unique to each CAU within a serving area. ARNs are employed to uniquely identify messages, such as requests and responses. All bursts or requests from a CAU include an ARN to identify the origination of the burst. Similarly, when responses are sent back to a CAU, the CAU can identify the response as being directed towards the CAU based on the ARN contained within the response from the CCU.
According to the present invention, an ARN, such as ARN 500 in FIG. 5A, is employed. ARN 500 is a 24 bit ARN and includes an alert value, an alert phase, and a random number. The alert phase indicates the period of time in a superframe that a CAU will monitor the SBC. The use of this alert phase allows a CAU to stay in a standby or sleep mode and activate its receiver only for a brief period of time. The CAU will remain in a sleep mode during most of a superframe and activate its receiver only during its alert phase, allowing for a reduction in power consumption. The alert value is a unique identifier assigned to a CAU and is unique within a particular alert phase. The alert phase and the alert value form an alert identifier that is unique within a serving area. A random number is included in ARN 500 to ensure that a CAU in a serving area will not generate the same ARN twice.
In some instances a 3 bit ARN is employed to identify messages between a CAU and a CCU. In particular, a 3 bit ARN is used when a CAU already has a TCH and sends and receives messages on the SC. A 3 bit ARN can be employed because, in the depicted example, a connection between the CCU and the CAU has been establish, meaning that no other CAUs will be using the channel. As a result, the CCU only needs to be able to distinguish between different requests that the CAU might make. The 3 bit value allows for 8 ARNs to be used by a CAU that can support multiple lines or TCHs.
In accessing a communications system, SAC messages are contained in a single burst to allow each SAC frame to be equally accessible by any CAU. Typically, messages on a SAC use the full time slot. Thus, misalignment of uplink bursts will cause collisions to occur with other uplink transmissions. Thus, initially, a shortened uplink burst (SUB) is used to determine if any changes in alignment of uplink bursts from the CAU are required. In FIG. 5B, SUB 502 has a length less than half of a time slot to avoid interference with adjacent time slots according to the present invention. The position of SUB 502 in the time slot is used by the CCU to determined what changes if any are needed to align bursts sent by the CAU within the time slots. In the depicted example, SUB 502 contains three synchronization patterns, such as synchronization pattern 504 (shown in FIG. 5C), a differential encoder (DE), and an ARN, such as ARN 500 in FIG. 5A. In FIG. 5B, the same synchronization pattern is repeated three times within the SUB to increase the chances of the CCU properly receiving and decoding the synchronization pattern. The DE is a two bit value that serves to indicate that a burst is arriving at the CCU and that decoding should begin.
Next, a time alignment response is a response sent by a CCU to a CAU in response to receiving a SUB to indicate if any changes in timing of uplink bursts are needed. With reference to FIG. 5D, time alignment response 506 contains a time alignment value indicating what change in the timing of transmission of uplink bursts is needed to align uplink bursts within the time slots. In particular this value indicates the change in the offset in time between receiving a downlink burst and transmitting an uplink burst. This response also contains a power control indicator (PCI) and a power adjustment value telling the CAU what transmit power level the CAU should use in transmitting bursts. The PCI tells the CAU whether to increase or decrease the power level of transmissions while the power adjustment value indicates the magnitude of the power level adjustment.
An initial access request, such as initial access request 508 in FIG. 5E, is sent by the CAU to the CCU on the RAC to initiate a system access request at the CCU. The initial access request 508 identifies the maximum bandwidth rate and minimum bandwidth rate that are desired and/or acceptable in a TCH that assigned to the CAU. According to the present invention these bandwidth rates in communications system 100 may be 8 kilobits per second (kbps), 16 kbps, 32 kbps, or 64 kbps. The initial access request also may include bits for indicating a priority of the request and a delay value (not shown). The priority of the request may be used to provide different classes of services, such as voice, digital video, or ISDN. The delay time value indicates how long the CAU will wait for a channel assignment before taking some other action, such as sending another initial access request.
Further, a CAU already assigned a TCH using initial access request 508 can send an initial access request, such as initial access request 510 in FIG. 5F. This request is sent to the CCU on the slow channel. This initial access request on the slow channel is typically a request, from a CAU that can handle multiple connections, for a another TCH for a new connection when the CAU already has an ongoing connection. The access request rate in initial access request 508 is the desired bandwidth for the new TCH.
With reference to FIG. 5G, a reconnect access request is depicted according to the present invention. Reconnect access request 512 is a request sent by the CAU to the CCU to request another TCH due to a loss of synchronization with a TCH and is sent to the CCU on the RAC in an attempt to reconnect a call. A loss of synchronization can occur when the TCH is assigned and the CAU does not receive notification of the new carrier, or if the physical connection is cut. Reconnect access request 512 includes an uplink carrier ID and a downlink carrier ID specifying the original TCH used by the CAU. The flag bits indicate whether time slot and bandwidth fields are associated with an active TCH. Multiple time slot and bandwidth fields are used in reconnect access request 512 to allow a CAU that can handle multiple TCHs to request a reconnection of all TCHs at the same time.
In response to requests from the CAU, the CCU sends a number of responses including an access confirm response, which is sent in response to a system access request from a CAU. FIG. 5H shows an access confirm response 514 that is sent from the CCU to the CAU on the SRC to assign a TCH to the CAU. Access confirm response 514 includes channel assignment information, such as the time slot and bandwidth associated with an assigned TCH. The time slot field tells the CAU which time slot to use while the bandwidth field tells the CAU which frames within a superframe to use for transmitting bursts, such as superframe 400 in FIG. 4A. For example, time slot 2 and a bandwidth of 64 kbps would tell the CAU to transmit in time slot 2 of every frame of superframe 400, while time slot 2 and a bandwidth of 32 kbps would tell the CAU to transmit in time slot 2 of every other frame within superframe 400. Flag bits indicate whether useful information is found in the associated time slot and bandwidth fields. With an initial access request, only one time slot and bandwidth field will contain information for the CAU because only one TCH is assigned in response to an initial access response. When a request is made to reconnect, the other time slot and bandwidth fields are used when a CAU that can handle multiple TCHs requests a reconnection to more than one TCH.
An access confirm response also may be sent on the slow channel by the CCU to the CAU in response to an initial access request made by the CAU on the slow channel, as illustrated by access confirm response 516 in FIG. 5I. This type of access confirm response is sent to assign the CAU another traffic channel for a new connection. Access confirm response 516 contains an identification of the bandwidth and time slot of the new TCH assigned to the CAU.
With reference to FIG. 5J, an access deny response 518 is a message sent by the CCU to the CAU on the SRC to reject a system access request by a CAU. This response is sent to tell the CAU that a TCH will not be assigned to the CAU. On the slow channel, access deny response 520 in FIG. 5K is denying a CAU another TCH for a new connection. The access deny response includes a cause value, indicating the reason why access was denied. Reasons for denying access may include, for example, inadequate cable resources available, inadequate network resources available, reconnection not possible, or service denied for some unspecified reason.
Turning now to FIG. 6, a CAU state diagram for system access procedures is depicted according to the present invention. State diagram 600 depicts different states of the CAU occurring while accessing communications system 100. The CAU begins at Null state A1. In this state, a SAC is randomly selected based on the number of SACs broadcast in the SIC. The CAU locates a selected SAC on the appropriate downlink carrier and moves to Sync state A1, which is the CAU SAC synchronization state. Any access confirm or access deny responses received in Null state A0 are ignored because the CAU is not listening to the SAC at that time. One of these responses would be received by a CAU if the user hangs up before the system sends an access confirm or access deny response. When the CAU detects the loop closure, the CAU goes back to monitoring the SBC, which means the CAU will not receive the SAC response from the CCU. As a result, a CCU must be capable of detecting a dead link, which is an assigned traffic channel where the CAU is not transmitting. In all the other states, if the CAU detects a loop closure from the telephone equipment at subscriber premises, the CAU will return to state A0 and continue monitoring the SBC.
In Sync state A1, the CAU continues to try to synchronize to the SAC for a period of time. If the CAU exceeds a selected number of retries, the CAU then transitions back to Null state A0, where the CAU may chose to select another SAC for access or indicate an access failure to a higher layer protocol entity. After the CAU has synchronized to the SAC, the CAU waits for a time alignment channel (TAC) uplink indication. Upon detecting a TAC, the CAU sends a shortened uplink burst (SUB) on the TAC and begins a time alignment response timer and transitions to Alignment state A2. The time alignment response timer sets a limited amount of time for receiving a time alignment message from the CCU before resending an SUB.
In Alignment state A2, the CAU waits for a time alignment message from the CCU. If a collision is detected or the time alignment response timer expires before receiving a time alignment message from the CCU, the CAU adjusts it's transmission power and resends the SUB up to a selected number of times on the SAC. The power adjustment value is a value used to adjust the transmission power of the CAU to a level to achieve an optimal attenuation relative to power level. More detailed information regarding on method of power level control may be found in copending patent application for Method and Apparatus for Adaptive RF Power Control of Cable Access Units, by Timothy M. Burke et al., filed on Oct. 27, 1995, which is incorporated herein. If the number of SUB retries is exceeded, the CAU may select another SAC for access or indicate access failure to a higher layer protocol entity. When the CAU receives a time alignment message from the CCU, the CAU adjusts its transmit offset and waits for a RAC uplink indication. Upon detecting the RAC, the CAU sends an initial access request on the RAC, starts an access response timer, and moves to Access state A3. The access response timer is a timer used to limit the amount of time the CAU waits for a response from the CCU in response to the initial access request.
With reference to Access state A3, the CAU is awaiting for an access confirm or access deny request from the CCU. If the access response timer expires or the CAU receives an access deny request, the CAU will resend the access request message until a number of retries has been exceeded. If the number of retries is exceeded, the CAU sends a message stating the cause for the access failure and moves back to Null state A0. On the other hand, if the CAU receives an access confirm request, the CAU then moves to the assigned traffic channel to perform supervision signaling then moves to traffic channel (TCH) Assigned state A4.
In TCH Assigned state A4, the CAU waits for a normal release of the channel or a dead link indication. If a normal release is received, the CAU moves back to Null state A0. On the other hand, if a dead link indication is detected because of a loss of synchronization or a failed alternate link transfer (ALT), the CAU will perform a reconnect procedure. In particular, the CAU selects a SAC and locates the selected SAC on the appropriate downlink carrier and moves to Sync state Al.
With reference now to FIG. 7, a state diagram of a CCU used for system access procedures is depicted according to the present invention. State diagram 700 depicts the different states of the CCU that occur while handling request for access by a CAU. The CCU begins in Null state B0 in which the CCU may have received either an initial access request, a SUB, or a reconnect access message. Reception of an initial access request by the CCU results in the CCU queuing the request with a normal priority and moving to Request state B1. When a reconnect access request is received, the CCU queues the request with a high priority and moves to Reconnect state B2.
Reception of a SUB causes the CCU to calculate time alignment and power adjustment information, format a response, and transition to Dispatch state B3.
Turning now to Request state B1, the CCU determines whether has the capability of fulfilling the access request. If the CCU does not have the capability, the CCU then creates an access deny response and moves to Dispatch state B3. If the CCU can fulfill the request, it waits for an available TCH. Upon a TCH being available for assignment, the CCU checks the age of the request. If the request is greater than a selected period of time, the TCH is assigned to another request and the aged request is removed from the queue and the CCU moves back to Null state B0. If the request is less than the selected amount of time indicated by the CAU in its initial access request as a delay value, the CCU creates an access confirm response and moves to Dispatch state B3.
In Reconnect state B2, the CCU determines whether the call can be reconnected. If the call cannot be reconnected, the CCU creates a deny response and moves to Dispatch state B3. If the CCU can reconnect the call, the CCU waits for an available traffic channel. Upon a TCH becoming available for assignment, the CCU checks the age of the request. If the request is greater than the amount of time indicated by the CAU in its initial access request as a delay value, the request is "aged", and the CCU assigns the traffic channel to another request and removes the aged request from the queue and transitions back to Null state B0. If the request is not aged, and is not greater than the selected amount of time, the CCU creates an access confirm response and moves to Dispatch state B3. In Dispatch state B3, a response is sent once from the CCU to the CAU. After sending a time alignment or access deny response, the CCU moves back to Null state B0. After sending an access confirm response, the CCU begins a verification timer and moves to verify state B4. The verification timer indicates the amount of time the CCU will wait for a first burst from a CAU in a time slot that has been assigned to it and the access confirm response.
In Verify state B4, the verification timer is active and the CCU is waiting for verification that the CAU is transmitting valid uplink burst on the assigned TCH. If the assignment is verified, the CCU moves back to Null state B0. If the verification timer expires, the CCU will initiate procedures to idle the assigned TCH and send an alarm indication and transition to Abandon state B5. The CCU in Abandoned state B5 is idling an assigned TCH. Any uplink bursts received in Abandon state B5 are ignored. When the TCH has been idled, the CCU moves back to Null state B0.
To insure that the communications system using TDMA operates properly, the transmission of bursts from individual CAUs must be aligned within a predefined window, also called a "slot", and cannot overlap adjacent slots, or burst collisions will occur resulting in transmissions errors. As can be seen with reference to FIG. 8, burst 800 in the TDMA uplink is aligned with slot 802 in the TDM downlink. Time alignment is performed by the CAUs by advancing its burst transmission in time relative to the associated received TDMA downlink signal. The CAUs do not know what propagation delays are occurring through the network. Each CAU has a unique delay because of its physical location on the distribution cable. It may be necessary to adjust time alignment because of changes in characteristics of the distribution network and environmental conditions such as temperature.
The CCU is employed to determine the variable propagation delay by measuring the reception of a shortened burst transmitted from the CAU relative to its processing window. The delay is digitized and conveyed to the CAU in the downlink time slot. A shortened burst from the CAU to the CCU is employed so that any unknown propagation delays do not result in collisions between bursts. Upon receiving the delay compensation number from the CCU, the CAU adjust its burst transmission time for the duration of the call.
With reference now to FIG. 9, a flowchart of a process employed by a CCU during an attempt by a CAU to access a communications system is depicted according to the present invention. The process beings by indicating a TAC in the downlink (step 900). Thereafter, a determination is made as to whether a CAU SUB has been received from a CAU (step 902). If a CAU SUB has been received, a time alignment value and a power adjustment value are determined (step 904).
More specifically, the CCU measures the relative time difference between the start of the received sample window and the position of the shortened burst. This time difference is expressed in bit times and represents the far-end propagation delay. This value is referred to as the time alignment value. The time difference for the time alignment value is measured from the beginning of the transmission of the downlink bursts to the CCU on the TAC to the beginning of the receipt of the uplink bursts, for the same frame number, time slot, and superframe from the CAU. More information on time alignment can be found on co-pending patent application for Method and Apparatus for Synchronizing Timing of Components of a Telecommunication System by Timothy M. Burke et al. filed on Nov. 29, 1995, which is incorporated herein. The time alignment value is sent to the CAU (step 906). Thereafter, the RAC is sent in the downlink (step 908). With reference again to step 902, if a CAU SUB has not been received, the process then proceeds directly to step 908.
A determination is then made as to whether a CAU request has been received (step 910). If a CAU request has not been received, the process then returns to step (900). Otherwise, a determination is then made as to whether TCH resources are available (step 912). If resources are available, then process then sets up a TCH for the CAU (step 914). Thereafter, an access confirm response is sent to the CAU (step 916) with the process then returning to step 900. With reference again to step 912, if resources are not available, an access deny message is sent to the CAU (step 918) with the process then returning to step 900.
Turning now to FIG. 10, a flowchart of a process employed by a CAU to access a communications system is depicted according to the present invention. The SBC maintains a list of SACs available for system access. This list is broadcast continuously in the SIC. The CAU uses this list to select a SAC and request access to the communications system. The process begins with the CAU monitoring the SBC for a SAC list (step 1000). At (step 1002) a CAU event requiring a TCH (for example, a subscriber takes the phone off the hook) occurs. A retry counter is set equal to zero (step 1004). A SAC is selected from the SAC list (step 1006). The CAU then retunes and synchronizes to the selected SAC (step 1008). A determination is then made as to whether synchronization has been achieved with respect to the selected SAC (step 1010). If synchronization has not occurred, the process then determines whether the number of retries has been exceeded (step 1012). If the number of retires has not been exceeded, the process increments the retry counter by one (step 1014) and the process then returns to step (1006). Otherwise, the process notifies a higher layer in the communications system of the SAC failure (step 1016) with the process terminating thereafter. The communications system includes a group of services arranged in layers similar to the Open Systems Interconnection model.
If synchronization has occurred, the retry counter is set equal to zero (step 1018). Thereafter, SUB is sent on the TAC to the CCU and a time-out timer is started (step 1020). Thereafter, a determination is made of whether a collision has occurred by checking to see if a word error is present in the word error indicator (WEI) (step 1022). According to the present invention, the WEI in the downlink SAC is used to detect a collision between two or more CAUs transmitting in the same time slot. For example, when a CAU sends a burst in time slot 3, frame number 5, then the WEI in time slot 3, frame 5, of the next superframe, will indicate if the burst was received successfully by the CCU. If a collision has occurred, a determination is then made as to whether the number of retries selected for the CAU has been exceeded (step 1024). If the number of retries has not been exceeded, the retry counter is incremented by one (step 1026).
Thereafter, a delay occurs (step 1028). In the delay (step 1028), a random amount of time is added to the delay timer. The delay for the timer is set as follows:
delay=(random number MOD (2N -1))
Also in step 1028, the delay timer is started and the process does not proceed to (step 1020 to send another SUB until after the delay timer expires). Next, the process returns to step 1022 as described above. With reference again to step 1024, if the number of retries has been exceeded, the process then proceeds to notify a higher layer of the SAC failure (step 1016) with the process terminating thereafter. With reference again to step 1022 if a collision has not occurred the process then waits and determines whether a time-out occurs or a response is received (step 1030). If a time-out occurs, the process proceeds to step 1024 as previously described. Otherwise, time alignment and transmission power is adjusted as indicated by the received response (step 1032).
A retry counter is set equal to zero (step 1034). Thereafter, a request for a TCH is sent on the RAC to the CCU and a time-out timer is started (step 1036) and a determination is made as to whether a collision has been indicated in the WEI (step 1038). If a collision has been indicated, as determination is made as to whether the whether the number of retires set for the CAU has been exceeded (step 1040). If the number of retires has not been exceeded, the retry counter is incremented by one (step 1042) and the process then performs a delay, as described above in step 1028, before sending the request again in step 1036.
With reference again to step 1040, if the number of retries has been exceeded, the process then proceeds to step 1016 as previously described. If a collision has not occurred a determination is then made as to whether a time-out has occurred or a response is received (step 1044). If a time-out occurs, the process proceeds to step 1040 as described above. If a response is received, the process then determines whether a TCH has been assigned (step 1046). If a TCH has not been assigned, the process proceeds to step 1040. Otherwise, the process retunes and synchronizes to the TCH (step 1048) and notifies the higher layer in the communications system of the TCH assignment (step 1050) with the process terminating thereafter.
A WEI is used to detect a degradation in the quality of transmissions between communications units, such as between a CCU and a CAU on TCHs. The WEI bit is set by the CCU to indicate that an error was detected in a previous burst by a failed cyclic redundancy check (CRC). The WEI is set in the same frame number and time slot of the next superframe in the depicted example. In determining whether the burst was received correctly, the CCU determines whether it is able to detect the synchronization pattern within a burst. If the CAU or CCU is unable to detect the synchronization pattern within a burst, a loss of synchronization has occurred and the WEI will indicate that an error has occurred.
According to the present invention, the WEI also is used to detect collisions between multiple CAUs attempting to access the communications system on access channels such as the SACs. Multiple CAUs attempting to transmit bursts in the same time slot and frame of a SAC result in the CCU being unable to detect the synchronization pattern in the bursts received from the CAUs. This inability to detect the synchronization pattern results from two or more CAUs attempting to transmit bursts in the same time slot and frame of an SAC, rather than from a degradation in transmission quality caused by damage to the cable medium or external noise sources. Additionally, a collision may occur when a CRC fails.
With reference now to FIG. 11, a diagram of a burst in a downlink control channel from a CCU to a CAU is depicted according to the present invention. Burst 1100 includes a frame number in bits 1 through 3 the burst as being in that particular one of the 8 sequential frames that constitute a superframe. Frames are marked sequentially from 0 ("000") to 7 ("111") in bits 1 through 3. The value identifies a frame's position within the superframe and is called the frame number. As can be seen, the least significant bit of the frame is transmitted first. Bits 4 through 6 of the control channel mark time slots within a given frame. These time slots are marked sequentially from 0 ("000") to 7 ("111"). The least significant bit is transmitted first. Bit number 7 is reserved for later use according to the present invention. Bit number 8 is the word error indicator and is a "1" when an error has occurred and a "0" when no error has occurred. Bit number 9 in burst 1100 is the fast channel indicator, which indicates whether the fast channel contains signaling information or user information.
Turning now to FIG. 12, a more detailed flowchart of handling collisions between CAUs is depicted according to the present invention. The process begins by sending a burst in the uplink in a selected time slot and frame number (step 1200). Thereafter, a downlink burst from the CCU is detected in the same time slot and frame number of the next superframe (step 1202). The WEI bit is checked to determine whether a collision has occurred or if the burst was correctly received by the CCU (step 1204). Due to the lag of one superframe, the CAU receives notification of a corrupt burst approximately 20 milliseconds after the burst is sent according to the present invention. If a collision has occurred, the process then determines whether the number of retries has been exceeded (step 1206). If the number of retries has not been exceeded, the process then randomly calculates an amount of time to add to a delay timer (step 1208). The delay for the timer is calculated as follows:
delay=(random number MOD (2N -1))
The calculated delay is then added to the present delay for the delay timer (step 1210). The delay timer is started (step 1212) with the process returning to step 1200 to send another burst to the CCU after the delay timer has expired (step 1213). With reference again to step 1206, if the number of retries has been exceeded, the process then terminates. Additionally, the process terminates if a collision does not occur in step 1204.
With reference now to FIG. 13, a process followed by a CCU for setting a WEI bit in response to a collisions between CAU bursts sent to the CCU is depicted according to the present invention. The process begins by receiving a burst in a given time slot and frame of the uplink at a CPX in the CCU (step 1300). Thereafter, a determination is made as to whether the burst has been correctly received (step 1302). In determining whether the burst was received correctly, the CCU determines whether it is able to detect the synchronization pattern within a burst or if a failed CRC is present. If the burst has been correctly received, the process sets the WEI bit to indicate that no collision has occurred (step 1304). Otherwise, the process sets the bit to indicate a collision has occurred (step 1306). In either case, the value for the WEI bit is incorporated into the burst in the next superframe corresponding to the same time slot and frame number of the received uplink burst (step 1308) with the process terminating thereafter.
FIG. 14 illustrates the signaling between the CAU and the CCU over channels SAC and TCH in which access is confirmed.
A SUB is sent from the CAU to the CCU on the SAC with the CCU sending a time alignment signal back to the CAU. Thereafter, the CAU sends an initial access request on the RAC.
Each access request received by the CCU is queued. The CCU saves the information sent in the uplink transmission from the CAU plus the channel address (carrier and time slot) on which the system access was received. Thereafter, the CCU will transmit either a successful response or a unsuccessful response on the downlink of the SAC on which it received the request.
FIG. 15 shows signaling between the CAU and the CCU on the SAC in which access is denied. The CAU sends a shortened uplink burst to the CCU with the CCU responding with a time alignment response. Thereafter, the CAU sends an initial access request to the CCU as in FIG. 14, in this case, however, the CCU replies with an access deny response. Upon denial of access, the CAU may either retransmit the request for initial access or report that the maximum number of retry attempts have been exceeded.
A channel refers to the carrier and time slot or slots assigned to a CAU in an access confirm message. Channels are assigned and/or allocated according to the following rules:
1. Time slots on the same carrier as the SBCs and the SACs will be assigned first. The CCU will always try to locate these channels on good carriers. Furthermore, the system will be able to derive problems with SBCs and SACs based on ALT requests from other channels on the same carrier.
2. The available time slots on a carrier will be assigned before moving onto another carrier. The CCU will pack carriers to improve the efficiency and probability of carrier link transfers.
3. When a CCU starts assigning time slots on a new carrier, it will select the carrier with the best quality metrics.
Once a channel has been assigned, the CAU will return to the assigned carrier, and the CAU will use the assigned time slot(s) to perform the call supervision messaging for establishing a call, or connection. Channel assignments will be granted to the top entry of a priority queue.
Each serving area will be associated with a single priority queue for system access requests. Often times errors can occur during transmission of data in which the CAU will try to reconnect to a new carrier from the effected carrier. This transfer of carriers occurs when a CAU experiences loss of synchronization on a downlink carrier. This loss of synchronization is typically reported as a word error indication on the uplink carrier to the CCU. Upon receipt of the word error indication, the CCU performs a downlink transfer from the affected carrier to a new carrier. FIG. 16 is an illustration of signals between a CAU and a CCU resulting in a successful reconnect access request. The CCU will suspend the data link and encipherment (if active) when a command to execute an alternate link transfer (ALT), ALT-- EXEC, is sent, whether the CAU sees the ALT-- EXEC or not. An ALT is a procedure used to maintain a connection between communications units while a call is in progress in spite of changing frequencies of a channel. When the reconnect request, RECON-- ACCESS, is received, the CCU will effectively assign the CAU to same CPX, which will be transmitting the new downlink carrier. Upon assignment of the new channel, the CCU will transmit a busy pattern in the slow channel of the new link, and send an access confirm response to the CAU identifying the new channel. The CAU will retune to the new traffic channel, and resume the data link. The same initial access protocol timers and parameters will apply to the reconnect access procedure.
With reference now to FIG. 17, a diagram of signals between a CAU and a CCU resulting in a failed reconnect access request is illustrated. This scenario occurs when the CCU is unable to reconnect the CAU. Therefore, when the CAU receives an access deny response in response to it's reconnect access request, RECON-- ACCESS, the CAU will send an initial access request to get a new TCH assigned. If the reconnect access request was for multiple connections, then separate initial access requests will need to be sent for each connection. The impact on the customer is that their original call may have been disconnected, in which case, dial tone would be provided to the customer when a new connection is established.
Additionally, in some instances a CAU may use multi-line access to the communications system. A multi-line CAU may use a TCH, of an active call it controls, to request access for an additional call. No contention exists for the TCH already being used by the requesting CAU. As a result, no contention is present for this channel and no SUB is necessary because time alignment already has been performed. Thus, only an initial access, an access confirm and access deny messages need to be sent on the active traffic channel. These are sent on the slow channel portion of the time slot. FIG. 18 depicts a procedure used for requesting access for an additional call on the slow channel. As can be seen with reference to FIG. 18, the access procedure is initiated by the CCU. If a CAU with multiple active traffic channels loses synchronization, then a signal reconnect procedure will be performed from all of the active traffic channels on the CAU. The traffic channel assignments in the access confirm response will correspond, one-to-one, to the traffic channels specified in the reconnect access request. If an access deny response is received in response to the reconnect access request for multiple traffic channels, the CAU will send individual initial access requests for each of the traffic channels.
The process depicted in FIGS. 6-7 and 9-19 may be implemented by those of ordinary skill in the art within the hardware illustrated in FIGS. 1, 2 and 3. The processes of the present invention also may be implemented in a program storage device that is readable by processors within the hardware depicted above, wherein the program storage device encodes executable instructions of the processes of the present invention. The program storage device may take various forms including, for example, but not limited to a hard disk drive, an optical disk, a ROM, an EPROM, or a RAM, which are know to those skilled in the art.
The process stored on a program storage device are dormant until activated by using the program storage device with a processor, such as a microprocessor or a DSP. For example, the processes for providing access to the communications system may be coded as instructions stored on a hard disk drive or an optical disk. Connecting the hard disk drive or the optical disk to the processor in the CCU allows the processor to execute these instructions and control access to the communications system. Additionally, the processes used in handling contention between CAUs for the same time slots may be implemented in a ROM in which the processes become active when the ROM is connected to the CAU.
The present invention provides an improved communications system by providing a separate set of channels used for accessing the communications system. These SACs are separate from the TCHs used for user information, such as a digital voice data. These SACs may move frequencies depending on the quality of transmissions. The SBCs provide a list of the SACs and their locations for access to the communications system. Upon receiving a request for a TCH on a SAC, the CCU assigns a traffic channel to the requesting CAU depending on available resources. This assignment is sent to the CAU on the downlink SAC. Additionally, the present invention provides a method for CAUs to detect and resolve collisions between multiple CAUs attempting to transmit burst on the same time slot. As a result, the methods and apparatus of the presently claimed invention provide for an improved system to access a communications system.
While the invention has been particularly shown and described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4785450 *||Aug 6, 1987||Nov 15, 1988||International Mobile Machines Corporation||Apparatus and method for obtaining frequency agility in digital communication systems|
|US5191410 *||Feb 5, 1991||Mar 2, 1993||Telaction Corporation||Interactive multimedia presentation and communications system|
|US5343240 *||Nov 4, 1991||Aug 30, 1994||At&T Bell Laboratories||Bidirectional video telephony using shared channels on coaxial cable networks|
|US5640196 *||Sep 29, 1995||Jun 17, 1997||Motorola, Inc.||Method and apparatus for facilitating two way oral communications utilizing a television cable system|
|1||*||Generic Criteria for Version 0.1 Wireless Access Communications Systems (WACS) published by Bellcore, 1993 (TR INS 001313), specifically Sections 6.4.5 and 6.5.2.|
|2||Generic Criteria for Version 0.1 Wireless Access Communications Systems (WACS) published by Bellcore, 1993 (TR-INS-001313), specifically Sections 6.4.5 and 6.5.2.|
|3||*||Personal Access Communications System Air Interface Standard J STD 014 (PACS) published by Technical Ad Hoc Group 3 of the T1/TIA Joint Technical Committee, specifically Sections 6.4.5 and 6.5.2.|
|4||Personal Access Communications System Air Interface Standard J-STD-014 (PACS) published by Technical Ad Hoc Group 3 of the T1/TIA Joint Technical Committee, specifically Sections 6.4.5 and 6.5.2.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US5956343 *||Dec 23, 1997||Sep 21, 1999||Alcatel Usa Sourcing L.P.||Designating a control channel in a telecommunications system|
|US6052377 *||May 27, 1997||Apr 18, 2000||Matsushita Electric Co., Ltd.||Access control method in communication system|
|US6088723 *||Nov 24, 1997||Jul 11, 2000||Hyundai Electronics Ind. Vo., Ltd.||Optical CATV system having enhanced transmission efficiency of communication channels|
|US6222849||Jul 2, 1999||Apr 24, 2001||Alcatel Usa Sourcing L.P.||Designating a control channel in a telecommunications system|
|US6275468 *||Jul 31, 1996||Aug 14, 2001||Motorola, Inc.||Automatic timing adjustment for diverse routing of HFC systems|
|US6453040 *||Mar 17, 1999||Sep 17, 2002||Motorola, Inc.||Telephone adapter and telephone system providing multiple telephone lines|
|US6484318 *||Aug 26, 1997||Nov 19, 2002||Pioneer Electronic Corporation||CATV communication system and method for the internet connection|
|US6490727 *||Oct 7, 1999||Dec 3, 2002||Harmonic, Inc.||Distributed termination system for two-way hybrid networks|
|US6498821||Jan 26, 2001||Dec 24, 2002||Vyyo, Ltd.||Space diversity method and system for broadband wireless access|
|US6512751 *||Dec 1, 1999||Jan 28, 2003||Paul F. Struhsaker||Method and system protocols for providing voice, data, and multimedia services in a wireless local loop system|
|US6542495 *||Mar 8, 1999||Apr 1, 2003||Sony Corporation||Wireless communicating method, wireless communicating system, communicating station, and controlling station|
|US6552998 *||Apr 6, 1998||Apr 22, 2003||Nec Corporation||Two-way communication system, and delay and transmission level methods|
|US6584147 *||Jun 19, 1998||Jun 24, 2003||Imec||High speed modem for a communication network|
|US6697632 *||May 7, 1998||Feb 24, 2004||Sharp Laboratories Of America, Inc.||Multi-media coordinated delivery system and method|
|US6707829 *||Dec 28, 1999||Mar 16, 2004||General Instrument Corporation||Enhanced automatic timing adjustment for alternate routing of HFC systems|
|US6842435 *||Sep 15, 1999||Jan 11, 2005||General Instrument Corporation||Congestion monitoring and power control for a communication system|
|US6856786||Jan 26, 2001||Feb 15, 2005||Vyyo Ltd.||Quality of service scheduling scheme for a broadband wireless access system|
|US6876834||Jan 26, 2001||Apr 5, 2005||Vyyo, Ltd.||Power inserter configuration for wireless modems|
|US6940833||Jan 26, 2001||Sep 6, 2005||Vyyo Ltd.||Two-dimensional scheduling scheme for a broadband wireless access system|
|US6941119||Jan 26, 2001||Sep 6, 2005||Vyyo Ltd.||Redundancy scheme for the radio frequency front end of a broadband wireless hub|
|US6987754||Mar 7, 2001||Jan 17, 2006||Menashe Shahar||Adaptive downstream modulation scheme for broadband wireless access systems|
|US7027776||Jan 26, 2001||Apr 11, 2006||Vyyo, Inc.||Transverter control mechanism for a wireless modem in a broadband access system|
|US7116644 *||Nov 14, 2001||Oct 3, 2006||Sony Corporation||Data sharing and linkage for IP telephony set-top boxes|
|US7123650||Jan 26, 2001||Oct 17, 2006||Vyyo, Inc.||Offset carrier frequency correction in a two-way broadband wireless access system|
|US7149188||Jan 26, 2001||Dec 12, 2006||Vyyo, Inc.||Distributed processing for optimal QOS in a broadband access system|
|US7200129 *||Mar 12, 2004||Apr 3, 2007||Motorola, Inc.||Method of signaling reverse channel information with minimal voice/data delay|
|US7298715||Mar 14, 2001||Nov 20, 2007||Vyyo Ltd||Communication receiver with signal processing for beam forming and antenna diversity|
|US7359434||Jan 26, 2001||Apr 15, 2008||Vyyo Ltd.||Programmable PHY for broadband wireless access systems|
|US7437750 *||Apr 10, 2000||Oct 14, 2008||Matsushita Electric Industrial Co., Ltd.||Data transceiving system and method therefor|
|US7669224 *||Dec 30, 2004||Feb 23, 2010||Electronic And Telecommunications Research Institute||ONU and method for converting/combining frequency, and apparatus and method for converting/combining frequency in CATV headend system|
|US7738436 *||Sep 16, 2005||Jun 15, 2010||Kabushiki Kaisha Kenwood||Wireless communication system, wireless communication control apparatus, wireless communication apparatus and wireless communication method|
|US7827303 *||Sep 14, 2005||Nov 2, 2010||Engate Technology Corporation||Loop protection for a protective proxy|
|US7873662 *||Jan 18, 2001||Jan 18, 2011||Bull, S.A.||Link between a central system and a satellite system for executing operations of the central system|
|US8094661 *||Mar 31, 2009||Jan 10, 2012||Comcast Cable Communications, Llc||Subscriber access network architecture|
|US8238289||Oct 27, 2006||Aug 7, 2012||Qualcomm Incorporated||Method and apparatus for requesting selected interlace mode in wireless communication systems|
|US8243747 *||Mar 25, 2005||Aug 14, 2012||La Jolla Networks, Inc.||System and method for scalable multifunctional network communication|
|US8248950||Oct 27, 2006||Aug 21, 2012||Qualcomm Incorporated||Method of transmitting and receiving a redirect message in a wireless communication system|
|US8265066||Oct 27, 2006||Sep 11, 2012||Qualcomm Incorporated||Method and apparatus for reducing power consumption in wireless communication systems|
|US8286209||Oct 21, 2008||Oct 9, 2012||John Mezzalingua Associates, Inc.||Multi-port entry adapter, hub and method for interfacing a CATV network and a MoCA network|
|US8289897||Oct 27, 2006||Oct 16, 2012||Qualcomm Incorporated||Method and apparatus for processing open state in wireless communication system|
|US8289908||Oct 27, 2006||Oct 16, 2012||Qualcomm Incorporated||Method and apparatus for processing simultaneous assignment in wireless communication systems|
|US8321899 *||Apr 10, 2002||Nov 27, 2012||Alcatel Lucent||System and method for delivering video products to a subscriber unit|
|US8326330||Oct 27, 2006||Dec 4, 2012||Qualcomm Incorporated||Method and apparatus for updating configuration attributes using FastRepage attribute in wireless communication systems|
|US8331285 *||Oct 27, 2006||Dec 11, 2012||Qualcomm Incorporated||Method and apparatus of establishing access channel in wireless communication systems|
|US8350641||Jan 26, 2010||Jan 8, 2013||John Mezzalingua Associates, Inc.||Band selective isolation bridge for splitter|
|US8356322||Sep 21, 2009||Jan 15, 2013||John Mezzalingua Associates, Inc.||Passive multi-port entry adapter and method for preserving downstream CATV signal strength within in-home network|
|US8428063||Mar 26, 2010||Apr 23, 2013||Comcast Cable Communications, Llc||Access network architecture having dissimilar access sub-networks|
|US8428152 *||Dec 16, 2007||Apr 23, 2013||Amimon Ltd.||Device, method and system of uplink communication between wireless video modules|
|US8429695||Feb 12, 2010||Apr 23, 2013||Ppc Broadband, Inc.||CATV entry adapter and method utilizing directional couplers for MoCA signal communication|
|US8457042||Oct 27, 2006||Jun 4, 2013||Qualcomm Incorporated||Method and apparatus for transmitting and receiving a sectorparameters message in an active state in wireless communication system|
|US8457092||May 6, 2010||Jun 4, 2013||Qualcomm Incorporated||Quick paging channel with reduced probability of missed page|
|US8477682 *||Aug 5, 2010||Jul 2, 2013||Hitachi, Ltd.||Base station, terminal and wireless communication system|
|US8477808||Oct 27, 2006||Jul 2, 2013||Qualcomm Incorporated||Method and apparatus of assigning in wireless communication systems|
|US8479247 *||Apr 14, 2010||Jul 2, 2013||Ppc Broadband, Inc.||Upstream bandwidth conditioning device|
|US8510782||Jan 21, 2010||Aug 13, 2013||Ppc Broadband, Inc.||CATV entry adapter and method for preventing interference with eMTA equipment from MoCA Signals|
|US8520628||Oct 27, 2006||Aug 27, 2013||Qualcomm Incorporated||Method and apparatus for monitoring other channel interference in wireless communication system|
|US8554236 *||Jun 18, 2007||Oct 8, 2013||Intel Mobile Communications GmbH||Method for transmitting data and transmitter|
|US8561125||Jul 11, 2011||Oct 15, 2013||Ppc Broadband, Inc.||Home network frequency conditioning device and method|
|US8599712||Apr 7, 2011||Dec 3, 2013||Qualcomm Incorporated||Method and apparatus for setting reverse link CQI reporting modes in wireless communication system|
|US8675549||Oct 27, 2006||Mar 18, 2014||Qualcomm Incorporated||Method of serving sector maintenance in a wireless communication systems|
|US8744444||Oct 27, 2006||Jun 3, 2014||Qualcomm Incorporated||Method and apparatus for transmitting a pilot report (PilotReport) message in wireless communication systems|
|US8750908||Jun 15, 2006||Jun 10, 2014||Qualcomm Incorporated||Quick paging channel with reduced probability of missed page|
|US8755401 *||Aug 13, 2012||Jun 17, 2014||Paganini Foundation, L.L.C.||System and method for scalable multifunctional network communication|
|US8761080||Nov 19, 2009||Jun 24, 2014||Qualcomm Incorporated||Multiple other sector information combining for power control in a wireless communication system|
|US8923211||Oct 27, 2006||Dec 30, 2014||Qualcomm Incorporated||Method and apparatus of processing an access grant block in wireless communication systems|
|US8971222||Oct 27, 2006||Mar 3, 2015||Qualcomm Incorporated||Method and apparatus for decrementing assignments in wireless communication systems|
|US9055552||Jun 15, 2006||Jun 9, 2015||Qualcomm Incorporated||Quick paging channel with reduced probability of missed page|
|US9118496 *||Dec 7, 2011||Aug 25, 2015||Comcast Cable Communications, Llc||Subscriber access network architecture|
|US9125078||Sep 20, 2013||Sep 1, 2015||Qualcomm Incorporated||Method and apparatus for setting reverse link CQI reporting modes in wireless communication system|
|US9125102 *||May 31, 2013||Sep 1, 2015||Lg Electronics Inc.||Method of transmitting measurement report in wireless communication system|
|US9231817||Mar 1, 2013||Jan 5, 2016||Comcast Cable Communications, Llc||Access network architecture having dissimilar access sub-networks|
|US9264012||Jun 18, 2013||Feb 16, 2016||Ppc Broadband, Inc.||Radio frequency signal splitter|
|US9363469||Jul 17, 2008||Jun 7, 2016||Ppc Broadband, Inc.||Passive-active terminal adapter and method having automatic return loss control|
|US9641147||Jan 6, 2016||May 2, 2017||Ppc Broadband, Inc.||Radio frequency signal splitter|
|US9647851||Oct 13, 2008||May 9, 2017||Ppc Broadband, Inc.||Ingress noise inhibiting network interface device and method for cable television networks|
|US20010036841 *||Jan 26, 2001||Nov 1, 2001||Vyyo Ltd.||Power inserter configuration for wireless modems|
|US20010051512 *||Jan 26, 2001||Dec 13, 2001||Vyyo Ltd.||Redundancy scheme for the radio frequency front end of a broadband wireless hub|
|US20010053180 *||Jan 26, 2001||Dec 20, 2001||Vyyo, Ltd.||Offset carrier frequency correction in a two-way broadband wireless access system|
|US20020024975 *||Mar 14, 2001||Feb 28, 2002||Hillel Hendler||Communication receiver with signal processing for beam forming and antenna diversity|
|US20020052205 *||Jan 26, 2001||May 2, 2002||Vyyo, Ltd.||Quality of service scheduling scheme for a broadband wireless access system|
|US20020056132 *||Jan 26, 2001||May 9, 2002||Vyyo Ltd.||Distributed processing for optimal QOS in a broadband access system|
|US20020137456 *||Jan 18, 2001||Sep 26, 2002||Denis Pinson||Link between a central system and a satellite system for executing operations of the central system|
|US20020159511 *||Jan 26, 2001||Oct 31, 2002||Vyyo Ltd.||Transverter control mechanism for a wireless modem in a broadband access system|
|US20030093808 *||Nov 14, 2001||May 15, 2003||Eyer Mark Kenneth||Data sharing and linkage for IP telephony set-top boxes|
|US20030196209 *||Apr 10, 2002||Oct 16, 2003||Lee Anne Yin-Fee||System and method for delivering video products to a subscriber unit|
|US20050201352 *||Mar 12, 2004||Sep 15, 2005||Biggs Robert A.||Method of signaling reverse channel information with minimal voice/data delay|
|US20070047586 *||Mar 25, 2005||Mar 1, 2007||La Jolla Networks, Inc||System and method for scalable multifunctional network communication|
|US20070274730 *||Dec 30, 2004||Nov 29, 2007||Han-Seung Koo||Onu And Method For Converting/Combining Frequency, And Apparatus And Method For Converting/Combining Frequency In Catv Headend System|
|US20080043678 *||Sep 16, 2005||Feb 21, 2008||Kabushiki Kaisha Kenwwod||Wireless Communication System, Wireless Communication Control Apparatus, Wireless Communication Apparatus and Wireless Communication Method|
|US20080144726 *||Dec 16, 2007||Jun 19, 2008||Amir Ingber||Device, method and system of uplink communication between wireless video modules|
|US20080311908 *||Oct 27, 2006||Dec 18, 2008||Qualcomm Incorporated||Method and Apparatus for Zonecode-Based Registration in Active State in Wireless Communication System|
|US20080311922 *||Jun 18, 2007||Dec 18, 2008||Infineon Technologies Ag||Method for transmitting data and transmitter|
|US20100017842 *||Jul 17, 2008||Jan 21, 2010||Wells Chad T||Passive-Active Terminal Adapter and Method Having Automatic Return Loss Control|
|US20100095344 *||Oct 13, 2008||Apr 15, 2010||Newby Charles F||Ingress Noise Inhibiting Network Interface Device and Method for Cable Television Networks|
|US20100100918 *||Oct 21, 2008||Apr 22, 2010||Egan Jr John M||Multi-Port Entry Adapter, Hub and Method for Interfacing a CATV Network and a MoCA Network|
|US20100125877 *||Jan 21, 2010||May 20, 2010||Wells Chad T||CATV Entry Adapter and Method for Preventing Interference with eMTA Equipment from MoCA Signals|
|US20100146564 *||Feb 12, 2010||Jun 10, 2010||Halik Gregory F||CATV Entry Adapter and Method Utilizing Directional Couplers for MoCA Signal Communication|
|US20100246582 *||Mar 31, 2009||Sep 30, 2010||Comcast Cable Communications, Llc||Subscriber Access Network Achitecture|
|US20100254386 *||Mar 26, 2010||Oct 7, 2010||Comcast Cable Communications, Llc||Access network architecture having dissimilar access sub-networks|
|US20110064061 *||Aug 5, 2010||Mar 17, 2011||Hitachi, Ltd.||Base station, terminal and wireless communication system|
|US20110072472 *||Sep 21, 2009||Mar 24, 2011||Wells Chad T||Passive Multi-Port Entry Adapter and Method for Preserving Downstream CATV Signal Strength within In-Home Network|
|US20110181371 *||Jan 26, 2010||Jul 28, 2011||John Mezzalingua Associates, Inc.||Band selective isolation bridge for splitter|
|US20110258677 *||Apr 14, 2010||Oct 20, 2011||John Mezzalingua Associates, Inc.||Upstream bandwidth conditioning device|
|US20120075997 *||Dec 7, 2011||Mar 29, 2012||Comcast Cable Communications, Llc||Subscriber Access Network Architecture|
|US20130128897 *||Aug 13, 2012||May 23, 2013||La Jolla Networks, Inc.||System and method for scalable multifunctional network communication|
|US20130265903 *||May 31, 2013||Oct 10, 2013||Lg Electronics Inc.||Method of transmitting measurement report in wireless communication system|
|CN1930809B||Feb 22, 2005||Jun 22, 2011||摩托罗拉公司(在特拉华州注册的公司)||Method of TDMA system|
|CN102025472A *||Aug 12, 2010||Apr 20, 2011||株式会社日立制作所||Base station, terminal and wireless communication system|
|WO1999033210A1 *||Dec 18, 1998||Jul 1, 1999||Alcatel Usa Sourcing, L.P||Designating a control channel in a telecommunications system|
|WO2000056071A1 *||Mar 8, 2000||Sep 21, 2000||Motorola Inc.||Telephone adapter and telephone system providing multiple telephone lines|
|WO2001056179A1 *||Jan 26, 2001||Aug 2, 2001||Vyyo, Ltd.||Programmable phy for broadband wireless access systems|
|WO2001056180A1 *||Jan 26, 2001||Aug 2, 2001||Vyyo, Ltd.||Two-dimensional scheduling scheme for a broadband wireless access system|
|WO2005093977A1 *||Feb 22, 2005||Oct 6, 2005||Motorola, Inc., A Corporation Of The State Of Delaware||Method of signaling reverse channel information with minimal voice/data delay|
|U.S. Classification||370/329, 370/347, 725/123, 370/337, 348/E07.07, 725/106, 455/403, 725/126|
|International Classification||H04N7/173, H04J3/16, H04J3/06|
|Cooperative Classification||H04N7/17309, H04J3/1694, H04J3/0682|
|European Classification||H04J3/16D, H04N7/173B, H04J3/06C4|
|Nov 29, 1995||AS||Assignment|
Owner name: MOTOROLA, INC., ILLINOIS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CORRIGAN, RICHARD;MUELLER, BRUCE D.;BURKE, TIMOTHY M.;REEL/FRAME:007962/0822
Effective date: 19951129
|Jun 8, 1999||CC||Certificate of correction|
|Mar 28, 2002||FPAY||Fee payment|
Year of fee payment: 4
|Apr 23, 2002||REMI||Maintenance fee reminder mailed|
|Mar 28, 2006||FPAY||Fee payment|
Year of fee payment: 8
|Mar 23, 2010||FPAY||Fee payment|
Year of fee payment: 12
|Dec 13, 2010||AS||Assignment|
Owner name: MOTOROLA MOBILITY, INC, ILLINOIS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MOTOROLA, INC;REEL/FRAME:025673/0558
Effective date: 20100731
|Oct 2, 2012||AS||Assignment|
Owner name: MOTOROLA MOBILITY LLC, ILLINOIS
Free format text: CHANGE OF NAME;ASSIGNOR:MOTOROLA MOBILITY, INC.;REEL/FRAME:029216/0282
Effective date: 20120622
|May 28, 2013||AS||Assignment|
Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, IL
Free format text: SECURITY AGREEMENT;ASSIGNORS:ARRIS GROUP, INC.;ARRIS ENTERPRISES, INC.;ARRIS SOLUTIONS, INC.;AND OTHERS;REEL/FRAME:030498/0023
Effective date: 20130417
|Dec 18, 2015||AS||Assignment|
Owner name: ARRIS ENTERPRISES, INC., GEORGIA
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ARRIS TECHNOLOGY, INC;REEL/FRAME:037328/0341
Effective date: 20151214
| 18,354
|
Jeongwol Daeboreum refers to the first full moon of the Lunar New Year, which falls on the 15th day of the lunar calendar. This first full moon is considered to be the largest and roundest of all the moons in the year. On this day, traditions and customs are performed to wish for a peaceful and bountiful year. In 2017, Jeongwol Daeboreum falls on February 11 of the Gregorian calendar. Jeongwol Daeboreum is a wonderful opportunity to learn more about Korea’s traditions, and there are plenty of hands-on activities and events taking place to celebrate.
• Drinking gwibalgisul: A tradition of drinking a cup of chilled liquor on the morning of Jeongwol Daeboreum to open one’s ears to hearing only good news all year round.
• Cracking bureom: Bureom are nuts, such as peanuts, walnuts, pine nuts, chestnuts, and ginkgo nuts. A common tradition of Jeongwol Daeboreum is to crack a nut in your mouth in the morning. This is believed to help strengthen one’s teeth and avoid skin problems in the coming year.
• Sharing ogok-bap rice: Ogok-bap is steamed rice made with five grains. The rice is eaten with various seasoned vegetables and is believed to bring good luck.
• Burning daljip: Daljip is a heap of straw or twigs. Burning daljip is a tradition intended to ward off misfortune and bring good luck.
• Jwibulnori: Jwibulnori is a tradition of burning grass and weeds on dry fields and rice paddies after sunset in order to kill insect eggs and to fertilize the fields with ashes. The flames lighting up the night sky also make for a spectacular sight.
• Jisinbapgi: On Jeongwol Daeboreum, a band of farmer musicians travel from house to house to stomp on the ground to call on jisin, the gods of the earth. As the traveling band of musicians visits each house in the village, thereby bringing good fortune to all, the villagers in turn provide the musicians with food and drinks.
• Juldarigi: Juldarigi is a traditional tug-of-war game, with people dividing into two teams to pull on a rope. On the day before Jeongwol Daeboreum, the villagers gather together and make one large rope out of many smaller ropes. The next day, the villagers divide into two teams, depending on which side of the village they live in.
• Deowipalgi: Deowipalgi literally means "selling heat." This fun, symbolic tradition involves calling a friend or family member by name. If they respond, they are then told, "Buy my heat!" The buyer is then responsible for absorbing all the heat the seller would have otherwise received in the coming summer.
Located on Namsan Mountain, Namsan Seoul Tower is the most visited observatory and the best place to view the full moon for couples in Seoul. It has an outdoor observatory as well as restaurants and coffee shops. Visitors can also stop by entertainment facilities in the tower, or enjoy a walk in the neighboring park.
Namhansanseong Fortress is located on Namhansan Mountain, which spans three cities in Gyeonggi-do, including Gwangju-si, Seongnam-si, and Hanam-si. Here, visitors get great views of the full moon from Sueojangdae command post, as well as night views of the Songpa-gu district of Seoul and the central part of Gyeonggi-do. The historic sites within Namhansanseong Fortress also look great under the full moon.
Gyeongpodae Pavilion is situated on a hill by Gyeongpoho Lake on Korea’s east coast. The pavilion offers great views of the sea and the lake. The sight of the moon reflecting on the lake at night is so impressive and inspiring that the pavilion has been visited by people for centuries.
Ganworam Hermitage is a small Buddhist temple in Seosan-si, Chungcheongnam-do. Ganworam looks like it is floating on the sea during high tide, while the land under the temple is exposed with a path connecting it to the mainland during low tide. The hermitage is popular for watching the moon as well as the sunset.
Wolchulsan literally means "mountain of the rising moon," and the view of the moon rising above the peaks is indeed one worth seeing. Wolchulsan Mountain has several dramatic peaks that join together to create a splendid view. The mountain is a popular place to hike at night during the full moon.
Dalmaji-gil Road is well-known as a place where couples can come to make a wish on the full moon for their love to stay strong. The combination of myth and beautiful landscape is what attracts many young couples on romantic dates.
Various regions throughout the nation hold annual Jeongwol Daeboreum events in order to keep Korea’s traditional culture alive. If you are looking to enjoy hands-on experiences on Korean folk customs, check out some of the following events!
* This column was last updated in February 2017, and therefore information may differ from what is presented here. We advise you to check the details before visiting.
| 200,410
|
Facts about Edward Kennedy
Edward M. “Ted” Kennedy Biography
Edward Moore Kennedy was a powerful U.S. senator from Massachusetts for nearly five decades.
A member of the famous Kennedy clan, “Teddy” Kennedy was elected to the Senate in 1962 to fill the seat formerly held by his brother, John F. Kennedy, who had become president in 1961. Ted Kennedy was re-elected in 1964 and then again in 1970, 1976, 1982, 1988, 1994, 2000 and 2006; he remained in office until his death in 2009.
A staunch Democrat, Ted Kennedy gained a reputation as a hard-working liberal on issues such as education and health care. His messy personal life, including many tales of drinking and womanizing, also made him a hot topic for gossip columnists. Ted Kennedy was the driver during a 1969 car accident in which a young woman, Mary Jo Kopechne, drowned on Chappaquiddick Island, off the coast of Massachusetts. Kennedy was convicted of leaving the scene of an accident, yet his political career survived.
Ted Kennedy ran for president in 1980 but was defeated for the Democratic nomination by incumbent president Jimmy Carter. In time, Kennedy became one of the Senate’s elder statesmen, known for his bipartisan friendships with conservative Senator Orrin Hatch and others. Kennedy had a seizure in May of 2008, after which he began treatment for a malignant brain tumor, but remained in the Senate and supported the candidacy of President Barack Obama that year.
Ted Kennedy lived to see Obama inaugurated, but died at his family home in Cape Cod in August of 2009. He was replaced temporarily by his longtime colleague Paul Kirk, but Republican Scott Brown won the seat in a special election in January of 2010. Brown then was defeated by Democrat Elizabeth Warren in the general elections of 2012.
Ted Kennedy’s older brother Robert F. Kennedy also was a U.S. senator, from New York state, before his 1968 assassination… His sister Eunice Kennedy Shriver founded the Special Olympics. She died just two weeks before her brother… Edward Kennedy was married to the former Virginia Joan Bennett from 1958 until their divorce in 1984; they had three children, Kara, Edward Jr., and Patrick… Ted Kennedy married the former Victoria Reggie in 1992. They had no children together… Ted Kennedy was buried at Arlington Cemetery, next to his brothers John and Robert.
| 113,613
|
Pediatric Dentist Wellesley MA
Having good oral hygiene should begin at a young age, that’s why it is important to have a pediatric dentist in Wellesley, MA. If you practice healthy dental habits while you’re still a child, you’ll find it easier to avoid potential dental issues as an adult. This is why it’s important to find the right pediatric dentist. Wellesley, MA parents should be mindful of who is taking care of their child’s oral hygiene. Hiring the right pediatric dentist in Wellesley, MA could set your child up for a lifetime of clean teeth and good oral practices, while the wrong one could seriously and irreparably damage your kid’s dental needs.
What to Look for in Your Ideal Pediatric Dentist in Wellesley, MA
Choosing a pediatric dentists in Wellesley, Masssachusetts for your child isn’t a decision you should make lightly. If you don’t know what to look for in a pediatric dentist in Wellesley, MA, our dentistry have you covered. We’ve listed down the considerations you ought to make when picking your ideal pediatric dentist in Wellesley, Massachusetts.
- Qualification and Certification at Pediatric Dentist Wellesley MA
The first thing you ought to look for in your ideal pediatric dentist in Wellesley, MA is his or her qualifications. While all dentists must earn a degree as a Doctor of Dental Medicine or Doctor of Dental Surgery, a pediatric dentist in Wellesley, MA must undergo additional schooling. A pediatric dentist in Wellesley, MA will have to complete a two-year residency to learn special skills and knowledge related to pediatric dentistry such as child-related pharmacology, child psychology, and more.
When you’re deciding on a pediatric dentists in Wellesley, Massachusetts, you need to make sure that he or she has completed a course in Pediatric Dentistry from an accredited institution. Additionally, the pediatric dentists in Wellesley, MA should have an active professional dental license that permits him or her to practice in the state. Certifications and licenses are usually displayed in the reception area of the clinic. If the pediatric dentist in Wellesley, Massachusetts you’re considering does not have these, turn away.
- Good Behavior Management Skills at Pediatric Dentist Wellesley MA
Going to the dentist for the first time can be a stressful experience for a child. This is why it’s important for a pediatric dentist in Wellesley, MA to have good behavior management skills. Your perfect pediatric dentist in Wellesley, Massachusetts must know how to handle a child who is unruly, shy, or scared. See how the pediatric dentist in Wellesley, MA interacts with your child. Does he or she greet your child with a big, warm smile? Can he or she handle a child with special needs? Is he or she gentle while communicating with your child? These are factors you need to consider when choosing a pediatric dentist in Wellesley, Massachusetts.
- Knowledge of All Available Procedures and Updates at Pediatric Dentist Wellesley MA
Knowing which dental services a pediatric dentist in Wellesley, MA offers is essential to making a decision. The ideal pediatric dentist in Wellesley, MA is well-informed about and experienced with different child-appropriate dental procedures, from the basic to the advanced. Make sure that the pediatric dentist in Wellesley, MA you’re considering knows how to perform routine dental practice, as well as more complex procedures like root canals.
You should also ensure that the pediatric dentist in Wellesley, MA you choose can do procedures that your child needs. For instance, if your child likes playing sports and doing physical activities, choosing a pediatric dentist in Wellesley, MA that offers injury prevention and treatment is a wise idea. If your child’s teeth are broken or crooked, you should pick a pediatric dentist in Wellesley, Massachusetts that provides orthodontic services.
Find Your Perfect Pediatric Dentist in Wellesley, MA at Weston Pediatric Dental
Now that you know what to look for in a pediatric dentist in Wellesley, MA, your next move should be hiring the right pediatric dentist. Wellesley, MA parents who are looking for an excellent dentist for their kids should reach out to Weston Pediatric Dental. Come to our clinic, and you’re sure to find your ideal pediatric dentist in Wellesley, MA. Read the following article to find other facts to why pediatric dental care is important for a child: https://www.colgate.com/en-us/oral-health/life-stages/infant-oral-care/the-importance-of-pediatric-dental-care-1212
Weston Pediatric Dental: Your Family’s Pediatric Dentist Wellesley MA
Dental is important for people of all ages but a child, in particular, should be taught correct oral hygiene practices. If not treated with the proper dental services, a child may face oral decay and disease that can cause a lifetime of pain and complications. Help your kids keep their teeth clean and healthy by paying a visit to Weston Pediatric Dental in Wellesley, MA. Our dentists specialize in pediatric dentistry and orthodontic treatment.
Pediatric Dentistry: Healthy Teeth, Happy Children – Pediatric Dentist Wellesley MA
At Weston Pediatric Dental in Wellesley, MA, our dentists are dedicated to maintaining and improving the dental health of a child, from infancy throughout adolescence. Through our various pediatric dentistry services, our dentists can instill good oral practices habits in children. Our pediatric dentists are primary and specialty oral providers who are also experienced with treating a child with special needs.
Our dentists located in Wellesley, MA answer all questions and address any concerns parents may have about their child’s treatments at our Wellesley, MA location. Our dentists are well-versed in managing a child’s fears and worries. For cases where children have anxieties or are in need of extensive dental treatments, kids can be given general anesthesia while the dentists perform procedures. Dentists now that when your children are our patients, we’ll make sure that their first visit will be a positive and fun experience.
- First Visit in Wellesley, MA: For your child’s first visit, our dentists will conduct a thorough oral examination. Depending on your child’s age, our dentists may also perform teeth cleaning, administer fluoride treatment, and take digital x-rays. Teeth cleaning will be done by removing plaque and tartar from tooth surfaces and along the gum line, followed by flossing and polishing the teeth. Preventive treatments offers also be recommended at our Wellesley, MA location.
- Preventive Care in Wellesley, MA: Preventing dental problems is better than treating them after they occur. Our dentists offer a variety of treatments that will keep your children’s teeth and gums healthy and disease-free. Preventive treatments include fluoride, dental sealants, guidance of erupting teeth, instructions on proper brushing and flossing, and counseling on proper nutrition and dietary habits.
- X-Rays in Wellesley, MA: These diagnostic tools help us view different areas of the mouth and assess a child’s overall dental needs. Our dentists will recommend taking X-rays once a child is four years old. Parents should be assured that our dentists take all the necessary precautions to minimize the children’s exposure to radiation.
- Emergency Treatment in Wellesley, MA: When your child has a chipped tooth or an unbearable toothache, you can come to us for emergency treatment. No matter the nature of the dental emergency, our dentists can treat it immediately and efficiently.
Trust Weston Pediatric Dental With Your Family’s Dental Health – Pediatric Dentist Wellesley, MA
When it comes to family oral health care in Wellesley, MA, no one is better than Weston Pediatric Dental. Our dentists deliver the highest standard of pediatric dental and orthodontic care. You can schedule an appointment with us by calling our phone number today at 781-893-3003 or by filling out the form on our website. Get in touch with us today, and leave your dental worries to the professionals!
| 186,292
|
Predictive Validity Of Accelerometer Prediction Equations For Energy Expenditure (EE) During Overland Walking and Running in Children and Adolescents
- Published on 05/2004
Purpose The aim of this study was to assess the predictive validity of three accelerometer prediction equations (Freedson et aL, 1997; Trost et aL, 1998; Puyau et al., 2002) for energy expenditure (EE) during overland walking and running in children and adolescents.
Methods 45 healthy children and adolescents aged 10-18 completed the following protocol, each task 5-mins in duration, with a 5-min rest period in between; walking normally; walking briskly; running easily and running fast. During each task participants wore MTI (WAM 7164) Actigraphs on the left and right hips. VO2 was monitored breath by breath using the Cosmed K4b2 portable indirect calorimetry system. For each prediction equation, difference scores were calculated as EE measured minus EE predicted. The percentage of 1-min epochs correctly categorized as light (<3 METs), moderate (3-5.9 METs), and vigorous (≥6 METS) was also calculated.
Results The Freedson and Trost equations consistently overestimated MET level. The level of overestimation was statistically significant across all tasks for the Freedson equation, and was significant for only the walking tasks for the Trost equation. The Puyau equation consistently underestimated AEE with the exception of the walking normally task. In terms of categorisation, the Freedson equation (72.8% agreement) demonstrated better agreement than the Puyau (60.6%).
Conclusions These data suggest that the three accelerometer prediction equations do not accurately predict EE on a minute-by-minute basis in children and adolescents during overland walking and running. However, the cut points generated by these equations maybe useful for classifying activity as either, light, moderate, or vigorous.
Medicine & Science in Sports & Exercise
| 36,304
|
A Vision at the Heart of Leadership - Setting the DirectionA Vision at the Heart of Leadership - Setting the Direction
13th Feb 2008 12:53 pm
Without vision, we are blind – and without a vision, an organisation is liable to be stumbling around, lost in the blizzard. As champions of vision, leaders use this powerful tool to lead their communities through the challenges of the environment, and create the space for empowered action by the organisational community.
This second article in our series asks – what is the leader’s role in vision? And as we empower our organizations, how does our thinking about vision need to change?
A Miroslav Holub story tells of a military reconnaissance unit in the mountains, hopelessly lost in a terrible snowstorm. Short of supplies, with no means of finding their way to safety, it seemed hope was lost. Then, one of them found a map somewhere in his pocket. They were saved! Sure enough, using the map they navigated their way through danger, to reunite with their unit in safety.
Only later was it discovered that the map that saved the day was of the Pyrenees. They were in the Alps.
This tale highlights the power of a vision (or a map) to unite and re-energise a group of people around a common purpose –so significant that perhaps, the content is less important than the effect it has on the community being led. In this second in our series of articles on the subject of leadership, we explore the conversations we are having with leaders in our Nine Conversations in Leadership program around vision, one of the most commonly cited roles of a leader.
The power of organisational vision
Championing a clear, shared vision of where we as a group or organisation are going has always been seen as a key part of the leader’s role. In fact, the vision might be seen as the leader’s statement of their leadership goals – where is it that I am leading us to? This visionary role is never more important than in the increasingly complex and chaotic business environment we live in today.
Organisationally, research indicates that a clear vision that aligns strategic direction does indeed improve a number of performance measures, with those companies that are powered by vision outperforming the market by up to 15 times. We have all seen teams and individuals languish without a clear sense of purpose and direction, and thrive with clarity and shared purpose.
As Joel Barker suggested in his work on The Power of Vision, “Vision without action is a dream. Action without vision is simply passing the time. Action with Vision is making a positive difference.”
This is, of course, never more true than when that sense of shared purpose resonates strongly with the individual’s own personal purpose and value system. Your vision serves as a statement to all employees, both current and potential, of where the organisation is going, and allows them to choose whether they wish to undertake that journey or not.
A good vision will inspire and guide people, facilitating co-ordinated action while allowing room for interpretation and empowerment. With modern organisations moving away from highly detailed, centralised planning that is cascaded down to individual units, to a more empowered workplace where workers are expected to create their own solutions and act in alignment with the strategy, the ‘vision thing’ becomes even more important.
We see this trend in organisations across industries, from the knowledge worker organisation that empowers and frees their people in pursuit of innovation, to the manufacturing organisations where assembly line workers take ownership of streamlining and improving their processes. As this shift occurs, the power of simply, clearly understood strategic guiding principles become even more critical to truly empower the organisation and its people.
Championing shared vision
Vision links the organisation’s purpose, values and image of the future, defining the results that the organisation desires and the principles that guide their achievement. In this way, it incorporates not only the picture of the future we want to achieve, but in community conscious organisations, also the values that will guide us on that journey, and the purpose for our existence, even.
The leadership role, in championing a vision and values for the led community, creates a paradox. On the one hand, the values component of the vision mix typically involves a process of discovery, drawing on intuition and careful listening to check against the true values that drive your community of employees. However, the envisioned future – that vivid description of the future we are creating - will involve a process of creativity, as you and your organisation imagine an inspiring future.
For a truly shared vision, we may need to reject the traditional idea that visions are announced from “up on high”. A vision that does not resonate with the reality of the organisation’s experiences is unlikely to create energy, more likely to create cynicism. The leader’s role is therefore more a champion of vision than a creator. At the very least, we can share our own personal vision and then ask “Will you follow me?” or “Is this something worth striving for?”. This paradox – between boldly forging the path and consultation – is a delicate balance that leaders must walk in many areas, but will result in a vision and values that are authentic and yet challenging.
Elevator speeches or manifestoes?
The conventional thinking around vision is that a vision statement should be succinct, evocative, and easily communicated in under a minute. These short, powerful statements do indeed serve as rallying cries – but some organisations are now questioning the richness of such an ‘elevator speech’ vision. Particularly if we as leaders intend to use the vision as a way of building a clear shared understanding such that our people can go ahead and act in pursuit of our strategy, perhaps something more detailed is required.
One of our clients is experimenting with a longer vision statement – a two-page document that clearly articulates the vision, the business idea and the high level strategic principles of the company. This document is beginning to seem like something that truly could be given to a new recruit, and give them a clear sense of the journey that organisation is on. The snappy, sexy ‘image of the future’ still remains as a shorter version, easier to post on a wall or use as an energising reminder… but with the additional meaning behind it also clearly shared and articulated.
The evolving idea of leadership and vision
The leader’s role in championing a vision is an enduring idea that defines the earliest understandings of leadership, but which is being challenged and enriched in changing organisational times, as our ideas around leadership shift. If you as a leader are looking to empower your organisation and increase collaboration, your role as a visionary does not fall away, but rather becomes even more critical. By championing a powerful vision in a way that is authentic to his or her leadership and inspires the community, leaders tap into a powerful leadership tool.
This is the second of 9 articles published in Management Today in August 2007.
Donna Kipps is Consulting Director at WorldsView, a consulting and program development house based in South Africa. Her career has seen her taking a change agent role in various corporate and consulting roles, with a passion for transforming organizations and their leadership for sustainable success.
WorldsView is a consulting and product development house based in South Africa, with a global perspective and client base. Our focus is on transforming organisations, developing adaptive leaders and growing high-performing teams, to create sustainable business solutions.
| 36,593
|
How to write essay about myself?
Essay about myself is the assignment, given to every student who wants to enter college. Also it is excellent exercise for learning essentials of writing all kinds of essay topics. It is considered to be the very first step of writing essays. It can be easy as ABC because all you have to know in order to write the essay is your own self. This kind of essay settles accounts of category of narrative essays. Here you have to include the details of your life such as birth date and location, family and relatives, friends, your likings, dislikings and your hobbies.
Essentials of essay about myself
The main purpose of this kind of essay writing is to provide necessary information about yourself and to show your audience that you can rationally evaluate your strengths and weaknesses. What is more important, you should show that you know about the challenges that your weaknesses may cause in the future and, furthermore, that you know how to handle them. You should remember that essays about myself should look like a written copy of your personality. Remember that you have to highlight only the major events of your life.
- It is a common mistake of many authors to include the thorough list of their achievements and thus transverse essays about myself into humdrum catalogue of accomplishments. You should take into consideration that details are the icing on the cake of the essay. That is why it is preferable to circumscribe one or two items or events rather than writing the whole life story. Think back that thoughtful and detailed story of difficult time in your life can tell much more.
- The point is, you should use less citations and express your own views about each and everything.
- As far as the essay about myself is a presentation of a personality, each essay should differ from another, as human beings differ from one another. Never try to copy someone because in this case you will not be able to reveal your personality.
- Remember that honesty is best policy. Essay about myself is an outstanding chance to show your tutor that you have good evaluation skills.
Essay about myself writing tips
In order to write outstanding essay about myself you have to appoint your ideas, thoughts and facts in strict and logical way. These instructions can come in handy almost in every case.
- Assure yourself that one paragraph of the essay should be focused on a particular fact or aspect. Otherwise your audience will feel problematic in terms of comprehension.
- You should try to be open-minded and forthright when writing essay about myself. You should use simple sentence structures and word combination. In such a manner your audience will be able to cope with provided information.
- Keep balance between self-praise and self-humiliation.
- Stick to the theme. Of course, this kind of essay calls for originality. Nevertheless, don’t let your imagination lead you too far away.
- You have to be persuasive in your essay. Look over persuasive essays available via the internet in order to get useful ideas on essay writing. Take into consideration various essay examples.
| 310,320
|
The #1 source for fashion inspiration from real people around the world.
6 Give up waiting. – What we don’t start today won’t be finished by tomorrow. Knowledge and intelligence are both useless without action.
7 Give up lying. – In the long-run the truth always reveals itself. Either you own up to your actions or your actions will ultimately own you.
8 Give up trying to avoid mistakes. – The only mistake that can truly hurt you is choosing to do nothing simply because you’re too scared to make a mistake.
9 Give up saying, “I can’t.” – As Henry Ford put it, “Whether you think you can or you think you can’t, you are right.”
10 Give up trying to be everything to everyone. – Making one person smile can change the world. Maybe not the whole world, but their world. Start small. Start now.
11 Give up thinking you’re not ready. – Nobody ever feels 100% ready when an opportunity arises. Because most great opportunities in life force us to grow beyond our comfort zones, which means we won’t feel totally comfortable at first.
12 Give up setting small goals for yourself. – Many people set small goals because they’re afraid to fail. Ironically, setting these small goals is what makes them fail.
13 Give up trying to do everything by yourself. – You are the sum of the people you spend the most time with. If you work together, you will be far more capable and powerful than you ever could have been alone.
14 Give up buying things you don’t need. – Manage your money wisely so your money does not manage you. Do not spend to impress others. Do not live life trying to fool yourself into thinking wealth is measured in material objects. Read I Will Teach You To Be Rich.
15 Give up blaming others for your troubles. – The extent to which you can live your dream life depends on the extent to which you take responsibility for your life. When you blame others for what you’re going through, you deny responsibility – you give others power over that part of your life.
16 Give up making mountains out of molehills. – One way to check if something is worth mulling over is to ask yourself this question: “Will this matter in one year’s time? Three years? Five years? If not, then it’s not worth worrying about.
17 Give up trying to live up to the expectations of others. – Work on it for real and exceed your own expectations. Everything else will fall into place.
18 Give up the ‘easy street’ mentality. – There is too much emphasis on finding a ‘quick fix’ in today’s society. For example taking diet pills to lose weight instead of exercising and eating well. No amount of magic fairy dust replaces diligent, focused, hard work.
19 Give up making promises you can’t keep. – Don’t over-promise. Over-deliver on everything you do.
20 Give up letting your thoughts and feelings bottle up inside. – People are not mind readers. They will never know how you feel unless you tell them.
| 144,063
|
- Perler beads
- also called fuse beads or Hama beads
- standard perler beads are about 0,5 cm in diameter: you can also buy 'biggie beads' for kids, these are about double the size and are easier to hold.
- Ironing paper
- One sheet can be used multiple times.
- Peg board
- these come in all sorts of shapes and sizes
- 'biggie beads' do not fit on a standard peg board, you must use a 'biggie bead' peg board.
All supplies are available at craft stores, toy stores or online
2D Perler beads creations
- Pre-heat the iron to medium heat.
- If using a template, place this under the peg board.
- Use tweezers to poisition perler beads on the peg board, either following the pattern or free-styling.
- When you have finished the design, cover with ironing paper.
- Move the iron in circular motions for about 15 seconds until the beads are fused together.
- Allow to cool.
- Remove the peg board and turn the design over.
- Cover with ironing paper and iron the other side, again for about 15 seconds.
- This video shows how to place the beads onto a hexagonal peg board with a Christmas candy cane pattern:
This video shows how to iron the pattern:
3D Perler beads creations
- Create a 2D perler bead creation as explained above.
- NB: for 3D creations, only iron for about 10 seconds, as overly-fused beads are difficult to put together.
- Simply glue the two 2D creations together with a dab of PVA glue.
- Some 3D creations can be made through the 'tab and slot' method, in which case glue is not required. This means you must co-ordinate the 2D pieces to ensure that tabs will fit into slots.
Add glitter to your perler beads
- To add glitter to your perler bead creation, simply sprinkly fine glittler onto the beads before ironing.
To repair a perler bead creation
- If your perler bead creation snaps, put it back together in the peg board.
- Cover with ironing paper.
- Iron in circular motions along the crack for about 15 seconds: this should fuse the two broken parts back together.
- For more information, watch the video:
- Perler beads are not edible! Ensure small children are not left unattended with them.
- Find lots of great patterns here.
- Why not attach a magnet, key chain or hanging hook to give your perler bead creation a practical function as well?
- Bear in mind that 'biggie beads' take about 20-30 seconds to fuse together, so allow a little more time when ironing them.
| 193,226
|
YELLOW BAY — The first time Jack Stanford traveled the shores of Flathead Lake in 1972, he gaped at the translucent ripples.
“I nearly drove into the lake because it was so clear,” he said. “There have been a lot of changes in the lake but it’s nearly as clear today as it was then.”
Looking out at a crowd of nearly 150 lakeshore residents and other interested parties last week, the renowned scientist added, with a tone of warning in his voice, “Our well being is closely tied to the clarity of that water out there.”
Over the last five decades, Stanford has grown intimately familiar with the largest freshwater lake west of the Mississippi. As the longtime director of the Flathead Lake Biological Station on the southeast shores of Yellow Bay, Stanford has led research efforts with his wife, Bonnie Ellis, and their team of scientists who all together are carrying on the legacy of Dr. Morton J. Elrod. A biology professor at the University of Montana, Elrod founded the field station in 1899, and 115 years later it’s one of the oldest active, and most respected, research stations in the U.S.
Flathead Lake – the 79th largest natural freshwater lake in the world, with over 200 square miles of water and 185 miles of shoreline – continues to evolve amid both natural and man-made influences, Stanford says. It also faces increasing threats to its iconic identity as one of the world’s cleanest lakes, including aquatic invasive species and increased rail traffic carrying crude oil and other chemicals throughout the Flathead River Basin.
Stanford explained the current conditions and circumstances surrounding the revered lake while presenting his “State of the Lake” report last week at the annual meeting of the Flathead Lakers, a nonprofit organization formed in 1958 to protect clean water and healthy ecosystems in the Flathead watershed. The organization presented Ellis with its Stewardship Award, recognizing 30 years of distinguished research that is regularly cited in scientific journals and ecology projects around the world.
Aquatic invasive species, such as non-native mussels and plants, are a worsening threat across the continent, and the same is true within the Crown of the Continent Ecosystem, which remains one of the last strongholds without major infestations.
During summer, boaters in Montana are required to stop at monitoring stations to ensure they are not carrying anything that could drastically harm the state’s lakes and aquatic ecosystems. This year there are 18 check stations and over 10,000 boats have been inspected, according to Montana Fish, Wildlife and Parks. Among those, there were 164 “fouled boats,” including three with mussels attached. Mussels are quick to reproduce and can clog intake pipes and damage piers and, most significantly, disrupt whole ecosystems and change a lake’s identity, according to biologists. The same goes for vegetation like Eurasian milfoil, which can rapidly take over a lake’s shoreline.
“We have to focus on our incredible resources and keep fighting,” Greg McCormick, president of the Lakers, said.
The amount of nitrogen continues to gradually increase in Flathead Lake, according to the field station’s ongoing monitoring data. Though nitrogen is naturally abundant in the environment, it is also introduced through sewage and fertilizers, which inevitably threaten water quality and habitat. The heightened nitrogen levels may be enhancing phosphorous limitation, too, Stanford said, which is an important change.
Also, Flathead Lake is getting warmer, Stanford said. Research shows the lake is warming by 1 degree centigrade per decade. At the same time, wind is consistently blowing more intensely than before.
“We’ve got all of these things going on, and now we’ve got an agency that’s manipulating the number of lake trout out there,” Stanford said, referring to the new efforts by the Confederated Salish and Kootenai Tribes to largely reduce Flathead’s population of non-native lake trout.
In light of these emergent – and significant – changes, the FLBS is creating a new module that will be the first of its kind involving big lakes and will combine the robust database of research from the last century. It’s expected to become operational this year.
“We will be able to use some sophisticated computation to combine this all together, the physical factors and biophysical factors influencing water quality variables that we care about,” Stanford says. “We will build a computation that reflects how Flathead Lake works based on what we think we know.”
There’s always the chance that the research could be flawed in some way, Stanford acknowledged, but there’s also the chance that the new information will illustrate some severe issues.
“I just worry about the module telling us we did the wrong thing as far as taking the lake trout out of the lake, or we did the wrong thing on not paying attention to nitrogen loading,” he said.
The influx of rail traffic is also a growing concern, Stanford said.
Last year more than 400,000 carloads of oil were moved on America’s railroads, due in large part to the Bakken oil boom.
Stanford fears the toxic chemicals being shipped on the local rails could harm the Flathead River system if a spill or derailment ever occurred, similar to recent incidents across the U.S.
“These things are bad news, and what is not on the table right now is that when you get a break or accident, you don’t just get crude oil that maybe you can go mop up. You’ve got benzene plumes coming down and they are going to partially volatilize and they’re going to partially go into the water,” he said. “If they go into the water, they’re going to go into the aquifer system.”
Stanford would like to see more preparation around these sensitive areas, such as the Middle Fork, which flows into Flathead Lake.
“We’ve got to be able to have our act together if we do have the big accident,” he said. “Because believe me, if one of those big long trains goes into the Middle Fork, that will be something that we’ll regret for a long, long time.”
| 182,170
|
Lesson # 959 from the Noble Quran
Here; it is easy to say that the Hereafter is nothing
Surah ‘A’-RAAF (The Heights) – Chapter – 7)
Stage – 2, Verse – 186 of 206, Section – 23 of 24 (Part – 9)
In the name of God, the Beneficent, the Merciful
|Those whom Allah sendeth astray, there is no guide for them. And He leaveth them to wander blindly on in their contumacy.||Many-yuzli-LIllaahu falaa haa-diya lah. Wa yazaruhum fii tug-yaanihim ya’-mahuun.|
It was stated previously that there are many things in the world for them who think, from which they can get correct results by means of correct meditation. They can know that one should engage his attention unto the charming things of the world only as much that his heart should not be averse from useful things. Moreover, actual attention should remain unto them, because comfort and ease, tastes and relishes of the world are temporary only. Wealth and property, honor and dignity etc. are the things of coming and going – some- time those are with me and sometimes with you. The mind should be engaged in those things which will stay with the mankind all the time and should be base of everlasting joy. What are these things? These things cannot be attained by the human being from anywhere else. These can be learned only from the Messengers (peace be upon Them). Their provisions are held in the Scriptures of God Almighty. If really, the humankind is in search of perpetual peace, endless ease, satisfaction and pleasure, he should bear the Sayings (Commands) of God’s last Messenger; Muhammad (grace, glory, blessings and peace be upon Him) in his mind. He should begin reciting the Holy Qur’an with full commitment and determination, and obey Its all Commands unhesitatingly. Alas! There are innumerable people who call everyone towards the world but only some individuals are who invite unto the Holy Qur’an. Producers of worldly things have goods; ready to give with immediate profit, whereas, those who call to arrange the Hereafter, have mere promises, only warnings and hope of future advantage. The law of the people of the world is “A bird in hand is worth two in the bush”, whereas; behavior of the believers is “worshiping God continuously with patience and being hopeful of Allah’s Bounty. They sacrifice existing benefits in search of His Willingness; and give everything in His Way, whichever they possess. Can anybody think that someone will incline unto Allah Almighty in such difficulty? Really; it is very difficult.
It has been commanded in this verse that changing the heart from worldly casual benefits and inclining towards the benefits of the Hereafter is not in the power of any human being. It can be done by Allah Almighty only. If He lets someone entangled in the world and does not guide unto the Straight Path, then there is no such individual who has power to guide him.
From this verse, an Established and Prescribed Order of God Almighty is known about this matter that “Many Signs and Tokens have been produced before every individual in the world besides the Messengers (peace be upon Them) and the Scripture of God Almighty. None has been forced. If any individual wants to remain entangled in the worldly deceptions and is unable to see above it, Allah Almighty will leave him as he wishes, and he will be wandering blindly in his contumacy, and at last; he will die. His wealth, power, dignity, force, pomp and show even that; nothing will be helpful to save him.
Here; it is easy to say that the Hereafter is nothing. Reward and punishment, the Heaven and the Hell – all are self-made talks, but if these are proved true, then which is the abode of those people who deny and ignore? Allah Almighty save us on the Day of Resurrection from this affliction and repentance; and guide us in the world.
Transliterated Holy Qur’an in Roman Script & Translated from Arabic to English by Marmaduke Pickthall, Published by Paak Company, 17-Urdu Bazaar, Lahore, Lesson collected from Dars e Qur’aan published By Idara Islaah wa Tableegh, Lahore (translated Urdu to English by Muhammad Sharif)
| 283,022
|
From bungee jumping to skydiving, jet boats to zip-lining, New Zealand has transformed itself into a magnet for thrill-seekers from around the world, turning adrenalin into a billion dollar industry.
But not everyone walks away from an adventure tourism experience in New Zealand. Over the past eight years at least 50 visitors have died when things went dreadfully wrong. Many more have suffered crippling injuries.
Of course, many of these white-knuckle pursuits are dangerous but is New Zealand doing enough to ensure that companies and individuals selling these thrills to a wide-eyed crowd are playing by the rule-book – and is that rule-book as comprehensive as it should be?
Many think not.
The full 25 minute AlJazeera documentary is embedded below:
| 264,598
|
The paintings, including this Cézanne, are on a US tour
A US gallery has been forced to close an exhibition of art on loan from Wales worth an estimated £325m due to issues with a new air conditioning system.
The Corcoran Gallery in Washington DC was showing paintings by artists such as Turner and Cezanne, on loan from the National Museum Wales.
"There was no damage done to the art," Kristin Guiter, from the gallery, told the Washington Post newspaper.
The Turner to Cézanne show was viewed as a "true coup" for the gallery.
In total, 14 paintings, including this work by Daumier, are on loan
The show opened at the end of January and was due to run until 25 April.
The gallery posted an apology on its website for the exhibition's closure.
"It was doing well," Ms Guiter said. "We were definitely disappointed to close it."
The decision to shut the exhibition on Wednesday was "completely precautionary," she said, explaining that temperatures in the gallery had been fluctuating within an "acceptable range of variance".
The Washington Post said the decision to close was "almost unheard of".
Ms Guiter told the newspaper: "We had some issues with the new air handler, the one providing the heating and cooling to the gallery. The levels were fluctuating."
She said the gallery had decided not to risk any problems. The exhibition will now continue on its tour of the US, and will open at a gallery in Albuquerque, New Mexico, next month.
The Turner to Cézanne show, features collection of 19th and 20th Century works that belonged to sisters, Gwendoline and Margaret Davies, who acquired most of them between 1908 and 1923.
The spinsters lived all their life in mid Wales but travelled abroad and put together one of the largest art collections in the UK.
The paintings have rarely been seen outside of Europe, and many are by artists who changed the direction of modern art, such as Paul Cézanne, Honoré Daumier, Édouard Manet, Claude Monet, Vincent van Gogh and Pierre-Auguste Renoir.
A spokeswoman for the National Museum Wales said the gallery had been right not to risk the paintings.
She said: "We are obviously disappointed the Corcoran has had to take the decision to close the exhibition. It has been a great success there as it has been at previous venues.
"The safety of the art works [is] of paramount importance to National Museum Wales and its American partners, and has been since [the tour] began in March 2009."
| 72,805
|
A conservative group with Republican ties called the Independent Women’s Forum is airing an ad that says "300,000 American women with breast cancer might have died" if our health care were "government run" like England’s, citing the American Cancer Society as a source for the figure.
According to FactCheck.org, in fact, a spokesman for the cancer society’s advocacy arm says that figure is "not reliable" and adds: "[I]t’s not one that we have ever cited; it’s not one that we would ever cite." Furthermore, an epidemiologist with the cancer society told us that the way this figure was calculated was "really faulty."
- The ad uses outdated survival rate statistics. More recent numbers show England’s survival rate to be closing the gap with that of the United States.
comments powered by Disqus
- Experts with the American Cancer Society and the National Cancer Institute told us that mortality rates provide a much more accurate comparison. And the mortality rates for breast cancer for the two countries are similar.
And of course, nothing like England’s system is being considered currently by either house of Congress anyway, as we’ve often pointed out. We judge this ad’s main insinuation to be a false appeal to women’s fears.
CLICK HERE for the full report and links to supporting documents.
| 95,071
|
Question after question could be asked of the artistic process – the exact nature of inspiration, how, when and why it strikes, to whom, and to what end. What is even more difficult to qualify is the nature of creativity itself. How does one know what is good art, and at what point should one give up on their inclination to create if what they do create is not up to par?
In this short clip, Ira Glass makes clear the perversity of self-doubt that afflicts nearly every artist at the beginning of their career. You may love the craft and know what is good, he seems to say, but it takes years of close study and hard work to master the craft. Bad art is a necessity to learning how to create the kind of art that goes on to transform those who encounter it. Don’t give up on your art when the work that comes out is terrible, but rather work through the bad instead. It may take years for what comes out to match your discerning taste, but the finished work will thank you.
This theme of patience with one’s work is matched by sentiments held by the critically acclaimed, Dominican-American writer Junot Diaz. As a professor of creative writing at the Massachusetts Institute of Technology, he comes across students who want to be great writers without committing themselves to the process of mastery. In typical fashion of those posts that go viral on tumblr, was this quote by Diaz who, saddened by the professional mindset some of the young people he comes across have towards the production of art, had this to say:
”You’d be surprised how many of my young, creative writers are not interested in pushing deeply into themselves. In fact, they think of this as more of another profession. They think of this not as an artistic calling, this is just a replacement for being a dentist. And I think that’s not uncommon. Rare is the writer who is serious about being an artist and doesn’t think about this as being a profession. If you think of your writing as a profession, I can always tell because you’re in a rush. You’re in a rush to get published. You’re in a rush to get applause. But if you’re thinking about this as an artist, the only thing that you’re in a rush to do is to f***ing be in life. And your art tends to come very, very slowly.”
| 38,635
|
Were you frequent travelers before having children? Were you taking a trip at every opportunity you find? What about after having children? Have you ever travelled with your children? Or, did you give up traveling and holidays in distant places until your child is 15 years old.
But despite all the tiredness, it will be an unforgettable experience to wander along the sea coast, to visit the historical places with your baby. In fact, giving up travels after having child should not be the only alternative. There may be methods to have every individual in the family enjoying in the holiday. But raising a child who does not know how to travel should not be the only option.
In general, the new parents prefer to close themselves at home in the first months and then they do not know when and how to start to travel again. It is of course difficult to travel at the first month of your little baby, but remind that it will also be difficult when he/she starts to walk and when he/she starts to go school. Thus, without thinking of the difficulties you must start the best journey you had never had before.
Babies love routine. Trying to sleep in a different bed every evening means sleepless nights and unhappy days for the whole family. Thus, at the first months of your baby, it will not be a good idea to stay at different places every night. Choosing the most appropriate fixed place and turning it home with a few toys, and organizing daily trips to the places you want to see, will be a good point to start.
It will be advantageous for a child to stay in apartment style houses with small rooms and a kitchen instead of city hotels. You may pay a lot for an extra room in a hotel, but in an apartment flat you may find an extra room to chat with your partner after your little baby sleeps. The kitchen option will also be helpful for you to wash the feeding bottles and prepare soups for her/him.
It will be impossible to see every museum, every historical place or art gallery with your baby. Avoid planning to see many places during a day. Start the day with a museum or art gallery and continue with the zoo, pool or park activities where the children enjoy. Including your children in your daily plans will also cause them to enjoy the trip.
Leave your children free to choose to eat what they want. As you know it will mostly difficult to feed children properly at home. Thus, do not enforce them to eat healthy foods in such different places. The potato fries we do not allow at home will not poison the children in a week. Let them eat if they want to eat, and try to feel a bit comfortable.
A light stroller, which you will deliver at the airplane gate, is one of the things you should always have with you when you are on holiday with your child. You can have him/her sleep in stroller when you are having lunch or visiting the museum.
Traveling with another family who has children will be more enjoyable for everyone. Children can play with each other and do not need the constant attention of their mothers. Parents can socialize with their peers.
An enjoyable summer holiday with children should definitely include the pool or the sea. If your children do not know how to swim, you cannot sit on the edge of the pool and relax. Safety of your child will be your priority. For that reason, take precautions with vehicles like arm-floats or do not leave your children at the pool / sea side.
I know most of the parents opposed to give iPad, iPhone, video entertainers to their children. But sometimes these technological devices may be helpful when your child is t kicking the front row at the airplane, throwing the toys around while waiting for dinner in the restaurant. Watching the musical, video applications for 30 minutes can help him calm down.
Have basic first aid supplies in your suitcase. Take the thermometer, fever reducing syrup, pain reliever syrup, the wound band, and the fly repellent measures with you.
In short, children who are accustomed to boarding and traveling starting from their infancy are able to adapt more easily to different people, tastes and cultures, as circumstances change. Thus, do not give up holidays with family after the birth of your child. As you continue your normal life, and travel as you do before, you will see how your little child turn into a small social individuals who knows how to respect and entertain themselves.
| 191,083
|
When we think of metadata, we tend to think of attributes that describe the data. Where do the numbers come from? What do the values in a categorical column mean? Etc. But there is a type of metadata we rarely even recognize as such: values computed from the data. They're often treated as part of the data, but that's a mistake.
Most metadata is so different from the data itself that it's easy to spot: of course the URL pointing to the source of the data is not part of the data! Even the number of records typically looks different than any of the values (it doesn't have a unit like dollars, for one). The line is much less clear, though, when it comes to values that are derived from the data.
The Average In The Data
This is the disconnect that bugged me when I saw this tweet from The New York Times the other day:
— NYT Graphics (@nytgraphics) April 18, 2017
Seeing the average included in the chart like this bothers me. It feels wrong. I think there are a few reasons for this. For one, it's ugly. The average has to be dressed up to make clear that this is not a regular data value. But then, why include it as one?
When the data is sorted, including the average makes some sense to see which airlines, in this case, are above or below the average. This is useful especially when the distribution is a power law like here, and there is data that is not shown but that is part of the calculations (passenger volume for each airline in this case, which the number of complaints is normalized by).
But then, it's not like you can't see that when you draw a simple line. After I tweeted that I found the above confusing, RJ Andrews did a quick redesign of what I would consider to be the obvious way of showing the average (and also fixed the odd title on the other one):
Why not do this? Dressing up the average required some graphics work beyond a simple chart in the original, wouldn't it have been easier to just draw a line instead?
I understood what had bothered me beyond the aesthetics when Elijah Meeks made an interesting point: the core issue here was that the average was treated as part of the data, rather than as metadata . The average is not a special value, it's not a data value at all! It's not part of the data.
The average describes the data. It summarizes it. That means it’s data about the data. It’s really no different than the number of rows in the table or the data dictionary. Just because it’s a number and in the same units as the data values doesn’t make it one.
Including averages and totals in a table is something that strikes me as very much rooted in the thinking that is dominated by printed tables and spreadsheets. When data is released as spreadsheets, it's quite common to include totals and averages. They are provided for convenience or because it may not be possible to compute them from the data provided (because of weighting or other issues). U.S. government data often does this, including the U.S. value in addition to all the states, etc., and there are many other examples.
The problem isn't that these values are included, it's how this is done: as part of the main table, not a separate sheet or file. That makes the average, total, etc., just another value in the table, rather than a piece of clearly delineated metadata. When you create a chart from such a spreadsheet, it will include the average like all the other values. So it’s understandable that charts like the one above are being made.
Clear Distinctions, Clearer Thinking
This becomes problematic when the data is to be used in some more sophisticated analysis than just turning it into a simple chart, where the non-data values will get in the way (and the data needs to be recast in a more database-like structure). A calculated average will now be wrong, because the average that's already in the data distorts it. The same is true for sums, medians, etc.
The reason for including these values, convenience, now becomes an obstacle. And since it's not possible to know beforehand what kinds of analysis will be done on the data, it's impossible to include all the derived values that might be needed.
The way to fix this is to treat derived values as metadata and not throw them into the main table. Spreadsheets have lots of features for this, like tabs. Files can be separated out. Spreadsheets (and in particular CSV files) don't have to exactly mirror the structure of a printed table – in fact, that's usually a terrible way of releasing data.
But what's more, data tables aren't like printed ones. They are the raw material for further processing, not the end result. They need to be readable by machines, not humans. Including averages and other derived values shows a fundamental misunderstanding of this basic fact.
| 130,351
|
Reviewed by Robert Amussen
For the narrator of his novel, David Homel has imagined Aleksandar Jovic, a Belgrade clinical psychologist. The time is early in the breakup of the former Yugoslavia. Jovic’s wife of twenty years is a psychologist as well who teaches at the University. They have a teenage son more devoted to listening to turbo rock than attending to his studies. Since the boy is afflicted with an incurable form of kidney disease, his parents are inclined to indulge him. As a government employee, Jovic is forbidden from having a private practice. However, like many of his colleagues, he gets around the prohibition by seeing his private patients in his apartment. One day, a man he takes to be a new patient turns out instead to be a government emissary. He tells Jovic not only that the government knows of his illegal private practice but that he must now report to work at the hospital treating veterans of the war suffering from post traumatic stress.
Jovic’s new job assignment as a metaphor for the plight of the people of the former Yugoslavia makes sense as does the choice to dress him as a jaded east European intellectual with a world view of bemused irony at finding himself a passenger on a ship of fools and knaves. The difficulty with the novel is that neither Jovic nor the other principals emerge from behind their assigned roles to take on lives of their own. Their words and actions seem scripted. The narrative as a result becomes equally predetermined. When the novel ends with Jovic boarding a plane for Canada, it bears the unmistakable signature of the god out of the machine.
The novel’s prose is serviceable enough and Homel’s impressive understanding of the political and cultural dynamics works in its favor. While his sympathies are clearly on the side of the good guys, his fiction is not equal to the task he has set before it. It may be that in the present circumstances it is best to leave it to writers native to the region to tell us of their land’s malaise without necessarily providing a remedy for a cure. One thinks of the likes of Aleksandar Tisma, Imre Kertés, and Danilo Kis.
Robert Amussen is a writer and editor living on Vancouver Island.
- La Polysémie de l'altérité by Jorge Calderón
Books reviewed: Altérité et insularité: relations croisées dans les cultures francophones by Alessandra Ferraro, L'Autre en mémoire by Dominique Laporte, and Practiques d l'ici, altérité et identité dans six romans québécois des années 1989-2002 by Svante Lindberg
- Writing through Terror by Douglas Barbour
Books reviewed: Anil's Ghost by Michael Ondaatje
- Patience & Perseverance & Integrity by Gordon Fisher
Books reviewed: Lines on the Water: A Fisherman's Life on the Miramichi by David Adams Richards, The Bay of Love and Sorrows by David Adams Richards, and Mercy Among the Children by David Adams Richards
- Sweetly, Sourly Canadian by Anthony De Sa
Books reviewed: Barnacle Love by Anthony De Sa and Big White Knuckles by Brian Tucker
- Closing the Circle by Chelva Kanaganayakam
Books reviewed: The Swinging Bridge by Ramabai Espinet
MLA: Amussen, Robert. Shrink-wrapped. canlit.ca. Canadian Literature, 8 Dec. 2011. Web. 25 Oct. 2014.
This review originally appeared in Canadian Literature #184 (Spring 2005), (Grace, Dolbec, Kirk, Dawson, Appleford). (pg. 142 - 143)
***Please note that the articles and reviews from the Canadian Literature website (www.canlit.ca) may not be the final versions as they are printed in the journal, as additional editing sometimes takes place between the two versions. If you are quoting from the website, please indicate the date accessed when citing the web version of reviews and articles.
| 125,074
|
Hello and thank you for visiting AikiWeb, the
world's most active online Aikido community! This site is home to
over 22,000 aikido practitioners from around the world and covers a
wide range of aikido topics including techniques, philosophy, history,
humor, beginner issues, the marketplace, and more.
If you wish to join in the discussions or use the other advanced
features available, you will need to register first. Registration is
absolutely free and takes only a few minutes to complete so sign up today!
We started with a strange type of kokyu doza (a strage beginning indeed). Uke grabs nage's hands from the bottom, so the connection is not so strond to do the usual kokyu doza. First movement is dropping hands to your knees palms up, then raise your wrists toward uke's armpits, now cut as usual kokyu doza. I still don't get it and sensei saw that. He asked us to do the same thing with one hand and it's much more understandable. The trick is to feel the connection with uke - his hand is the continuation of your hand. Sounds like some ki trick
Anyway, next one was shomenuchi sankyo and we concentrated on keeping the uke's hand in arch so that he can't escape during the technique. I also noticed ans memorized foot work, which I was missing before. After you grab the wrist of the uke in sankyo, step into him, then step back with other foot keeping the arch, another back step, kneel on the back foot, handchange, kneel on both feet.
Then we did jo kata from 22 to 31 and sensei announced that next week we will work on bokken suburis. I'll have to do jo kata after class with someone to keep it in mind.
Then we did shihonage omote and ura from morote dori, first stepping to one side and working with one hand, then stepping on the other side and working with the other uke's hand (uchi and soto ?) I knew something is wrong and after class Jim helped me to discover the problem. When raising the hands I place the right at my forehead (lower or middle part of it), instead hands should be at the upper part of forehead so they are connected and at the same time you can move under uke's hand.
| 66,418
|
Benign Positional Vertigo (cont.)
IN THIS ARTICLE
Benign Paroxysmal Positional Vertigo (BPPV) Prevention
Most cases of BPPV do not have a known cause; therefore, no prevention is possible. There may be an association with minor head injury or repeatedly changing head position, for example working with a computer and constantly looking up and down at the monitor.
As one gets older, it is reasonable to change positions a little more slowly to potentially prevent vertigo.
Medically Reviewed by a Doctor on 8/12/2015
YOU MAY ALSO LIKE
Must Read Articles Related to Benign Positional Vertigo
Patient Comments & Reviews
The eMedicineHealth doctors ask about Benign Paroxysmal Positional Vertigo:
Benign Positional Vertigo - Diagnosis and Treatment
How was your benign positional vertigo diagnosed and treated?
Benign Positional Vertigo - Exercises
What exercises helped with your benign positional vertigo?
Benign Positional Vertigo - Experience
Please describe your experience with benign positional vertigo.
Benign Paroxysmal Vertigo - Symptoms
What were the symptoms of your benign paroxysmal vertigo?
| 13,893
|
China is often blamed for launching online attacks, but the evidence is almost always circumstantial. Many of the targeted espionage trojans seem to come from China, but we can't actually prove it.
However, some new evidence has just surfaced.
On 17th of July, a military documentary program titled "Military Technology: Internet Storm is Coming" was published on the Government-run TV channel CCTV 7, Millitary and Agriculture (at military.cntv.cn).
The program seems to be a fairly standard 20-minute TV documentary about the potential and risks of cyber warfare. However, while they are speaking about theory, they actually show camera footage of Chinese government systems launching attacks against a U.S. target. This is highly unusual. The most likely explanation is that this footage ended up in the final cut because the editor did not understand the significance of it.
Here's the critical snippet from the program:
Rough translations of the texts shown in the dialog:
People's Liberation Army Information Engineering University
Select Attack Destinations
List of Falung Gong sites
Falun Dafa in North America Falun Dafa website Meng Hui website Witnesses of Falun Gong website 1 Witnesses of Falun Gong website 2
The targets listed in the tool are related to Falun Gong or Falun Dafa — a religious organization that is banned in China. In particular, the attack is launched against an IP address, 220.127.116.11, which belongs to a U.S. University. What kind of an attack is launched remains unclear. But already the existence of such software with such targets is breaking news.
The software is credited to have been written in the Information Engineering University of China's People's Liberation Army.
| 160,761
|
People get into music for a lot of reasons. After all, there are several personal benefits to learning to play a musical instrument. For a lot of people, the desire to create music as a form of artistic expression or even as a career inspires them to start their musical journey. Many are inspired by their favorite bands or singers to learn a certain genre or instrument.
Once a person learns to play a musical instrument, they often want to start playing music with others. For a lot of musicians, the goal is to play well enough to join an orchestra. For others, the goal is to start a band. Starting a band is a great way to break out of your musical mold and learn to apply your musical skills to playing with others. It’s also a great opportunity to make a career out of being a musician. For anyone who is interested in starting a band, we thought we’d share some essential tips for new bands.
Before You Start a New Band
Some people want to start a band before they’ve even started to learn to play an instrument. If your dream is to start a band, but you don’t own an instrument yet or haven’t started to learn, then your first step is to figure out which instrument you think you’d like to play. There are a lot of great options for buying or renting an instrument. At Music & Arts, you’ll find a number of different starter instruments which come with all the accessories you need to get started. It’s also a good idea to take lessons. Although a lot of bands are filled with musicians who are self-taught, many of the most successful bands have members who learned music the traditional way from a music teacher. Understanding music can be very helpful down the line when you’re trying to structure a song and play with other musicians.
Essential Tips for Starting a New Band
Once you’ve figured out which instrument to play, gotten a hold of one, and have learned to play it, you’re ready to start a band. There are a lot of different options for starting a new band, and which you choose depends on your goals as well as your skills.
The first essential tip for starting a new band is figuring out what kind of music you want to make. Are you interested in playing a specific genre of music? If so, you should find shows in your area where bands that play that specific genre are performing. It can sometimes seem difficult to find like-minded musicians in your area, but live concerts are always a great place to start. You should also take advantage of the internet. There are many places online where like-minded musicians come together, and new bands get formed.
The next essential tip, once you’ve found a group of musicians who also want to be in a band, is to stay open minded. It’s great to share your vision with your fellow band members, but you should remember that some of them could have joined the band because of their own specific vision. Hear them out, see if there are ways you can integrate your ideas. It’s possible that you can come up with something totally unique and appealing. Holding onto this open-mindedness throughout the life of the band can help you to keep things fresh, to keep evolving musically. As time goes on and your skills increase, you want to make sure that the band you’re in grows with you.
Another essential tip for new bands is not to sweat the name too much. Of course, you’ll want to come up with something clever and unique, but you should also be somewhat practical. Although some bands and artists can get away with unpronounceable or inscrutable names, it’s highly unlikely. Pick a name that will make it easy for fans to find you online.
Once you’ve got your genre of music, your band members, and your name figured out, it’s time to actually start playing. Set a consistent schedule for practicing together. This is perhaps the most essential tip. Consistent practice is the only way you and your band mates will get a feel for each other’s strengths and weaknesses. Practice should be a commitment taken seriously by every member of the band. How you practice is up to you. Whether you and your band want to learn to play covers together or just jam depends on your preferences.
Once you’ve been practicing a while and have created some music, put yourself out there. Play shows, make connections, and keep practicing. Once you’ve hit this point, you’ve started a band. Congratulations!
| 66,093
|
Sales Associate Cover Letter and What to Write Inside It
The sales associates are the people that have responsibility to run the business operation of the retail stores. There are some people that will take care the needs of the customers. Well, it is a good position of job but you need to make sales associate cover letter before getting this job.
The cover letter of sales associate become the requirement for those who want to join with a retail to be sales associate. In this occasion, we will talk about some matters of this letter in order to help you who want to write it.
Well, for those who are curious with it, please take a sit and read some following writings below.
Kinds of Sales Associate Cover Letter
As its explanation as above, we may see that the cover letter of sales associate is an important letter, especially for those who want to join becoming sales. By its importance, making the right sales associate cover letter is the first task that you need to do before joining.
However, before talking about the ways to write cover letter of sales associate, there are some kinds of this letter to know. By knowing the kinds of this letter, of course you are able to make a right letter based on what you need.
The kinds of the cover letter of sales associate to know are:
- Sales support associate cover letter
- Entry level sales assistance cover letter
- Sales and marketing associate cover letter
- Sales and service assistance cover letter
- Sales associate job cover letter
- And others
Seeing the points as above, we may see that there are some kinds of this letter that you may write. By the kinds of it, of course you are able to write the specific letter as you want. Something that you need to know, the different letter will need the different format.
Things to Consider in Writing Sales Associate Cover Letter
There are some things to consider in order to write good sales associate cover letter. To get best result in making this letter, your letter should consist of:
- Basic information
The first matter is the basic information. Write about the name, address, contact number and email address inside the letter. It will ease the employer to call you
- Introductory remark
In opening this letter, it is important for you to apply the good greeting. Then, follow it by making short introduction of yourself
- Job title
Before telling about the skills and capabilities, it will be good when you introduce your job title. Follow it with the years of experience that you have.
It is important for you to show your skills, especially the skills that are relevant with the world of sales associate. Tells about the skills as much as you could. Then, follow the skills by the explanation about other abilities that you have.
To close this letter, you need to make a good closing. In making the closing, state your hope to join with the company.
Well, that is all about the sales associate cover letter that you need to know. Do some researches in order to find the sample of this letter.
- Entry Level Marketing Cover Letter Sample PDF Word
- Sample Sample Closing a Business Letter
- 3 Graphic Design Cover Letter Sample
- Sample Recommendation Letters
- Thank You Letter for Job Offer Sample
- Business Letter Template Sample
- 6 Sample Job Interview Thank You Letter Template
- Formal Proposal Letter and What to Write Inside It
- Thank You for Your Support Letter and How to Write It Best
- Sample Donation Letters and What to Do to Make It
- Project Proposal Letter and How to Write It Best
- Sample College Letter of Intent and What to Do in Writing It
- Graduate Nursing Cover Letter Template
- Letter of Reference Format Sample
- Employment Offer Letter and Ways to Make It
- Real Estate Offer Letter and How to Write It Best
- Fund Raising Letters and What to Do in Writing It
- Appreciation Letter and How to Write It Best
| 46,099
|
RasGas Sustainability Report: Absolute Emissions Jump 13%
From 2010 to 2011 Qatar-based liquified natural gas producer RasGas’s absolute and normalized greenhouse gas emissions increased 13 percent and 1.7 percent respectively, according to its 2011 sustainability report.
In 2011 the company produced 18.8 million tonnes of greenhouse gas equivalent compared to 16.8 million tonnes in 2010. RasGas’s normalized greenhouse gas emissions rose from 0.510 to 0.519 tonnes of greenhouse gas per tonne of LNG produced over the same time period.
RasGas says that a number of factors contributed to the increased level of absolute emissions, such as higher reported emissions from flaring due to the introduction of a new reporting basis which includes emissions related to jetty storage tank and flaring operations.
The marginal increase in the normalized emissions metric is better than the industry average RasGas says. The companies performance was ranked third out of the 11 companies in the 2011 benchmark, the report says.
RasGas generates its own power using fuel gas-driven turbine generators and also sources a small proportion – less than 6 per cent – of its energy as imported electricity from the national grid. Most of the energy used on the plant is for compression to liquefy gases for transportation as well as separation of the intake gas received from offshore operations to produce the RasGas range of products.
As it generates the lion’s share of it energy itself, RasGas measures it energy efficiency based on the percentage of gas intake used to generate power. From 2010 to 2011 the proportion of the company’s gas intake used for energy generation rose from 8.2 percent to 8.6 percent, above the industry average of 8.5 percent. Last year was the first year RasGas has underperformed the industry average since at least 2006 -the earliest year the report includes figures for. It ranks 7th out of the 11 industry producers included in the ranking.
Energy-efficiency initiatives carried out in 2011 included the launch of a steam trap-monitoring program using infrared camera technology to detect leaks of steam in process equipment. Detecting and eliminating such leaks saves energy, water and reduced CO2 emissions. It can also improve operational efficiency, the company says.
The total volume of waste from RasGas’ operations increased in 2011 to 5,544 tonnes, an increase of 14 per cent on 2010. However, total waste disposed per million tonnes of total intake was the best in the industry benchmarking comparison.
The percentage of that waste that RasGas recycled dropped year-on-year from 50 percent in 2010 to 43 percent in 2011. (see chart, below) In 2009 RasGas recycled 65 percent of its total waste. That year saw RasGas’ launch its corporate waste management program – a “cradle-to-grave framework” for waste minimization, collection, treatment, storage, reuse, recycling and final disposal, according to the report.
In 2011 the company installed new waste collection points at its plant thast it hopes will improve the collection, segregation and containment of waste. The roll-out of a new waste information system was also completed, which RasGas says enables automated waste identification, collection, record and report generation using a web-based database and hand-held tablets.
RasGas’ water discharges remained fairly static at around 4 million tonnes per day. The company calls water management an increasingly important issue in the oil and gas industry, and in particular the use of fresh water in operations. This is especially sensitive in regions and countries such as Qatar, where fresh water resources are scarce, RasGas says. The company’s primary water source is sea water.
LNG is becoming an increasingly important source of cheap energy. A report released in June by the US Energy Information Administration showed coal generation decreased 29 billion kWh from March 2011 to March 2012, while natural generation increased 27 billion kWh during the same period. The share of electricity generated from coal-fired power plants dropped to 34 percent in March, the lowest level in at least 39 years, as LNG prices hit 10-year lows, the report showed.
The shift to cleaner-burning fuels like natural gas has helped public power systems reduce carbon dioxide emissions 2.4 percent since 2001, despite a 9.4 percent increase in power generation, according to a May report by Target Rock Advisors.
Energy Manager News
- Drama Aside, Tesla’s Acquisition of SolarCity Makes Sense
- SunPower Solar Technology Breaks 24% Energy Efficiency Mark
- U.S. Data Centers Increasing Energy Efficiency
- A New Role for Mats: Promoting Sustainability
- Palmco to Refund $4.5M to New Jersey Consumers for Deceptive Sale Practices
- SolarCity Poll: Most Illinois Residents Oppose Utility Demand Charges
- Behind the Meter Podcast: Seeing U-Haul’s HQ Parking Structure in a New (LED) Light
- Uninterruptible Power Supplies: The Case for Moving Beyond Batteries
| 91,088
|
Warm winter boosts business for Indiana's maple syrup industry
NEW CASTLE, Ind. -- Warmer than usual temps this winter may be disappointing for some businesses, but it's actually turning into big bucks for Indiana’s maple syrup industry.
The Rutherford Sugar Camp is already hard at work nearly two weeks ahead of schedule. Business is definitely booming, but workers didn't expect things to be this way.
“Since the ground wasn't frozen this year at all we were concerned about the sugar content,” said Dave Hamilton. “If it gets in the 60s we're in danger because the trees will bud out.”
The camp's already tapped about 1,800 trees this season. A lot of work goes into getting that syrup.
It takes 43 gallons of sap to make one gallon of syrup, so every drip counts.
| 7,684
|
Feature Of The Week 9/18/11: Combined Two-Photon Microscopy and Optical Coherence Tomography Using Individually Optimized Sources
Researchers from Phohang University of Science and Technology (POSTECH) in South Korea recent published an article on combined two-phton microscopy and optical coherence tomography using individually optimized sources. Below is a summary of that work.
The combination of two-photon microscopy (TPM) and optical coherence tomography (OCT) is useful in conducting in-vivo tissue studies, because they provide complementary information regarding tissues. In the present study, we developed a new combined system using separate light sources and scanners for individually optimal imaging conditions. TPM used a Ti-Sapphire laser and provided molecular and cellular information in microscopic tissue regions. Meanwhile, OCT used a wavelength-swept source centered at 1300 nm and provided structural information in larger tissue regions than TPM. The system was designed to do simultaneous imaging by combining light from both sources. TPM and OCT had the field of view values of 300 μm and 800 μm on one side respectively with a 20x objective. TPM had resolutions of 0.47 μm and 2.5 μm in the lateral and axial directions respectively, and an imaging speed of 40 frames/s. OCT had resolutions of 5 μm and 8 μm in lateral and axial directions respectively, a sensitivity of 97dB, and an imaging speed of 0.8 volumes per second. This combined system was tested with simple microsphere specimens, and was then applied to image small intestine and ear tissues of mouse models ex-vivo. Molecular, cellular, and structural information of the tissues were visualized using the proposed combined system.
For more information see recent Article. Courtesy Bosu Jeong.
| 279,003
|
Commonly known as ‘silver dental fillings’ - Amalgam dental fillings have several side effects on the health. As the amalgam fillings contain mercury, it damages the health to great extent. Mercury is the most poisonous and non radioactive element on earth. Compared to cadmium, arsenic, or lead- mercury is more poisonous substance. This element is very dangerous to health. It is highly effective poison.
Scientifically, mercury is certified neurological poison. This element has the potential to affect nervous system including the brain cells. Kids’ posses more sensitive brains compared to the brains of adults. The brain of a child is unable to bear such high concentrated toxic substance. Even exposure to small amount of mercury will invite the symptoms of Alzheimer’s disease at very young age.
As mercury is scientifically proved poisonous enzyme- it badly affects the functioning of enzymes. This element stops enzymes from working. Enzymes are very important for good health and thus our body cannot function properly without them. They help in restoring the energy levels during sickness. Recurring tiredness and weakness is a sign of continuous mild exposure to mercury.
This element has great potential to affect women’s health. Exposure to mercury will affect the female reproductive system. This often leads to miscarriages or infertility. Repetitive exposure to mercury will damage the female reproduction organs. Pregnant women should strictly stay away from mercury as; they might lead to severe complication during obstetrical delivery. If you find any symptoms of mercury side affects- opt for detoxification process. The detoxification process will help to remove all mercury particles from the body. Consult your doctor and remove all mercury dental fillings.
Amalgam fillings contain mercury, which is extremely bad for our health. Mercury makes the dental filling material more flexible. The silver amalgam dental fillings contain more mercury than any other metal. In fact it is equivalent proportion of mercury and other metal. This silver dental filling is prepared by mixing liquid mercury with powdered alloy of silver, zinc, tin, and copper. The soft mixture prepared is pressed into tooth. This mixture quickly solidifies and helps to support the chewing system. Al though, our teeth contain moisture in the form of salvia, this mercury based dental filling is comparatively durable. Hence the health department continues to use them for dental problems.
Mostly in all cases, the side affects of amalgam and the toxicity of amalgam are mainly caused due to the presence of large amount of mercury in the fillings. Almost 80% invisible vapors of mercury arise from the surface of fillings. These vapors easily enter the surface of skin and thus it reaches different parts of the body. Almost every individual is poisoned due to mercury, even though if it is in very small proportion. It takes some time for our body to develop abnormal symptoms after being exposed to mercury. The medical association itself has ample of evidence against amalgam filling, but they have continued to use mercury for dental fillings. In order to protect yourself from the harmful aide affects of mercury, avoid the exposure to mercury.
Please check my blog at amalgam fillings
Could megadoses of energy-giving NAD—which allegedly relieves withdrawal symptoms, flushes out stored drugs in the body and replenishes balance in the brain—really be the cure-all for addictions and PTSD, as well as many other diseases and mental health d>> See All Articles On Medical Advice and Resources
| 26,086
|
A traumatic event or impact is the primary cause for a broken bone, however certain diseases including cancer can be a cause.
- Pain – especially when moving
- Deformity at the area of injury
- Reluctance to weight bearing
- Resistance to touch
Massage can only take place once the healing process has taken place.
- Reduce swelling and inflammation and give relief from pain
- Increase the healing process and strengthens the injured limb
- Helps relieve areas of overcompensation
- Can reduce scar tissue
- Increase mobility and flexibility
- Improve Gait and posture
- Helps reduce stress
| 44,789
|
Ever wanted to make a BEAM robot, but couldn't find a easy circuit to build? Well, meet the FLED solar engine! The robot works by collecting sunlight in the capacitors, then when the voltage is just right the transistors turn on allowing a pulse of electricity, this pulse travels to the FLED (Flashing Light Emitting Diode) which gives the motor a quick turn, then the cycle repeats. The most important part of this project is the FLED which essentially control's most of the electricity generated, so if you use a regular LED the circuit will not work. Now let's get started.
Step 1: Materials
You will need the following materials...
A solar cell with an output of 3vDC (Volts Direct Current)
At least a 1400 uF Capacitor (or more)
A 2.2K ohm resistor 5% (color bands are Red, Red, Red, Gold)
2N 3904 Transistor
2N 3906 Transistor
Motor (make sure it runs on 3Vdc, most do, but just to be sure check with two AA batteries)
FLED (flashing LED)
I got all my components from ripping them out of toys and buying them online. You can try http://www.solarbotics.com/ or http://www.digikey.com or ebay.
you will also need:
a soldering Iron (any cheap one will do)
some solder ( a small/ thin size works great)
a pair of Extra Hands (can buy online or at Radio Shack)
and a sunny location for testing
| 159,380
|
Trump takes first step towards H-1B visa reform
Published: 2017-04-18 14:36:39.0 BdST Updated: 2017-04-19 17:10:11.0 BdST
US President Donald Trump, hammering his "America First" campaign theme, signed an executive order that he said would favour American companies for federal contracts and tighten the H-1B visa programme for foreign technical workers.
The move is a deterrent to Indian IT firms which send software engineers to the US on H-1B visas.
Trump signed the "Buy America, Hire America" order on Tuesday night during a visit to a tool factory in the US state of Wisconsin, reported CNN.
The order tasked four department heads of State, Justice, Homeland Security and Labour to propose reforms in order to ensure H-1B visas are given to the "most-skilled or highest paid" petitioners.
Additionally, it asked them to propose new rules and guidance for preventing fraud and abuse of work visas.
Trump made it clear that he doesn't agree with fact that H-1Bs are currently doled out under a lottery system.
"Right now, H-1B visas are awarded in a totally random lottery, and that's wrong. Instead, they should be given to the most skilled and highest-paid applicants, and they should never, ever be used to replace Americans," the US President asserted.
There's an annual quota of 85,000 new H-1B visas (with 20,000 reserved for Master's degree holders).
Applications opened on April 3 and closed five days later. It was the fifth consecutive year that the cap was met within five days. This year, 199,000 applications were received, CNN reported.
"With this action we are sending a powerful signal to the world that were going to defend our workers, protect our jobs and finally put America first," the US President said.
White House Deputy Press Secretary Sarah Sanders said that the executive order "will make significant progress towards Buy American and Hire American, the cornerstone of Trump's vision for a government that answers to the American workers who built this country".
The new directive also attracted scepticism from Chuck Schumer, the Senate Minority Leader, who said Trump's policies put profits over people. He seems to do what the CEOs want, not what the workers want.
Any unauthorised use or reproduction of bdnews24.com content for commercial purposes is strictly prohibited and constitutes copyright infringement liable to legal action.
- UK lawmakers criticise social media over response to extremist content
- 'Fate of the Furious' drives China box office to fastest growth in over a year
- US-led fight on ISIS has killed 352 civilians: Pentagon
- Trump says China could have hacked Democratic emails
- Saudi Arabia arrests 46 suspects over 2016 Medina attack
- Iran satellite TV head shot dead in Istanbul: Dogan news
- Iran's leader dismisses Rouhani's detente policy ahead of vote
- US-backed militias claim big advance against IS in Syria's Tabqa
- Labour gains in British polls, but May's party keeps strong lead
- Pope calls for end to violence, respect for human rights, in Venezuela
- Suspicion over claim against Dhaka University teacher over use of 'indecent' photos
- Bangla film star Shakib Khan boycotted indefinitely
- Bangladesh prodded to 'reposition’ itself to improve business climate
- New VAT law: Heated exchange between Muhith, FBCCI
- Sehri and iftar timings for the coming Ramadan
- Mashrafe flying back to Bangladesh from England as wife falls sick
- Steps will be taken if neglect found in haor dam construction: PM
- Bangladesh is now free of formalin in food, says commerce minister
- Bangladesh actor Shakib Khan apologises to film fraternity after boycott
- BGB recovers more than 1.2 million Yaba tablets in Teknaf
| 76,021
|
Super Rugby rules are flawedComment on this story
Call it peculiar, bizarre or just silly… the fact is it’s wrong. How can a team that has seven log points less than another team be placed higher in the standings?
Well, that’s Super Rugby for you. I find it incredibly disappointing to think that the Brumbies, with just four wins from eight matches, are third in the standings, while the Bulls, with six wins, are fourth.
But that’s not all. The Highlanders and Crusaders, also with more wins and points than the Brumbies, must accept, like the Bulls, that unless they win their conference, they will have to play a “quarter-final”, an extra game that may also involve having to travel halfway around the world.
How can a much weaker team, in this case the Brumbies, be rewarded so handsomely, while other stronger teams are “punished” – for simply not being their country’s best outfit? Surely in competition sport, the best teams, those with the most wins and log points, should be the ones to advance.
The structure of Super Rugby is flawed and no one can tell me differently.
We’re at the halfway point of the competition and it’s interesting to find that not much has actually changed from one year to the next. Not only is the conference system being shown up, but what is it with teams getting four free log points every time they have a bye? I still don’t understand what the reason is behind it and someone who has not read a manual about Super Rugby would take one look at the log and be very confused.
The Lions, for example, have recorded one win (four points) and picked up two bonus points, yet they have 14 points in total. It doesn’t add up. But add eight free points for their two byes and they total 14 points. Why? What’s the point?
Other interesting points to come out of the competition are the following: The Lions, despite bagging the Currie Cup last year, are still weaklings in Super Rugby, the Crusaders are hitting their straps after another slow start, the Stormers’ defence is as strong as ever and the Bulls keep winning despite not always playing to their full potential.
The major surprise of the year are the Reds, winners in 2011, but whipping boys in 2012. They’re down in 10th position overall, but the scary thing is they’ve won the same number of games as the Brumbies and are just five points worse off than the Australian Conference leaders.
Perhaps Sanzar should revisit the current Super Rugby format, because it clearly doesn’t reward the best teams … and then the whole issue of the Southern Kings might also be resolved. Just a thought. – The Star
| 263,852
|
The Learning Studio
The Learning Studio is a partnership of KU Libraries, Undergraduate Studies and KU Information Technology to create a dynamic, student-centered space located on the 3rd and 4th floor of Anschutz Library. It builds on the success Anschutz Library already enjoys as the central hub of undergraduate research and learning at KU. The Studio features technology, an integrated service point, and a variety of study spaces. All of this is brought together with librarians, IT professionals and academic achievement staff, to support students in writing, research, study skills and use of technology.
This welcoming environment offers unique opportunities for students to collaborate with their peers, study and research, and find support for their academic work.
- Check out Writing Center hours.
- Learn more about consultations with an expert from the Writing Center.
- Browse the Writing Center's writing guides.
- See FAQs about the KU Writing Center.
Research and information
- Ask-a-Librarian: We're here to help!
- Get all your KU questions answered at KU Info.
- Search articles and databases.
- Find subject and course guides.
- Access citation management tools.
The open computer areas on the 3rd and 4th floors of Anschutz house more than 100 workstations (check availability). These include multiple scanning workstations (with Adobe Design Premium), specialized workstations with assistive technology and accessible furniture, as well as express print and quick access stations.
- Learn more about printing, scanning and copying at the Libraries.
- Find tech help at KU IT's Knowledge Base.
- Sign up for a technology workshop.
- Find everything you want to know about software at KU.
- Read our Internet Use Policy.
Come visit us at the 3rd floor circulation desk in Anschutz to inquire about technology available for check-out at the Learning Studio.
Laptops are available for use in the library building. These cannot be taken outside of the library. Four laptops are also available for extended, out of building check-out.
Two iPad minis are available to check out for use in or outside the library. If neither is available, you can request to be added to the waiting list.
Headphones and voice recorders
These are also available on a first-come, first-served basis.
- TI-83 (3 available)
- TI-86 (1 available)
- TI-89 (3 available)
- TI-30x (1 available)
- Casio fx-115 (1 available)
- Casio fx-260 (1 available)
- HP10bll (1 available)
Learn more about group and individual study areas.
View a floormap of Anschutz to locate group study rooms and quiet zones.
Tutoring groups: Space for formal tutoring groups is located on the 4th floor of the Learning Studio. These spaces are scheduled by Tutoring Services (part of the Academic Achievement and Access Center) for tutoring sessions. Reservations are posted outside each space. When not in use, these are available on a first-come, first serve basis for all Anschutz users. Learn more or sign up for a tutoring group.
| 288,565
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.