text
stringlengths
166
589k
__index_level_0__
int64
1
312k
Box 9021, Wilmington, DE 19809, USA Phone: Toll-free in USA 1-888-721-3555 Focus On Nature Tours in The Cayman Islands For Endemic & Specialty Birds, Butterflies, and Other Nature on these Caribbean Islands Two tours that can be done either separately or in combination. (tours FON/WI5A & B, '15) 25-28, 2015, in the Caymans 5B: November 28 - December 4, 2015, in Jamaica In the Caymans Among the Specialty Birds: See the list following the itinerary for an explanation of these names. Lists of Cayman & Jamaican specialty birds follow the itineraries. List - Caymans List - Jamaica A List & Photo Gallery of Caribbean Birds, in 2 Parts: Part #1: Guineafowl to Hummingbirds Part #2: Trogons to Buntings Rare Birds of the Caribbean, Now & in the Past Butterflies & Moths (with some photos) Tropical Plants Of West Indian (including the Caymans and Jamaica) Plants of the Americas a List in 2 Parts including some in the Caribbean Marine Life of the Caribbean including Sea Turtles, Fish, Corals & Jellyfish, Mollusks (Shells), Arthropods (Crustaceans & Echinoderms) Highlights of some Previous FONT Tours in the Caymans & Jamaica Tour Registration Form The "Cayman Parrot", Amazona leucocphala caymanensis, one of two subspecies in the Caymans. Others are in Cuba and the Bahamas. for Tour WI-5A, in the Cayman Islands: Wed: Nov 25: Arrival on the Caymans - small islands but with some specialty birds, among them the Vitelline Warbler, a species nearly restricted to the Caymans. There are two subspecies there - the brighter one, only on Grand Cayman Island. This, the first of 3 overnights on Grand Cayman. Thu: Nov 26: There are other good birds to see on Grand Cayman as well, and we will during this full-day of birding on the island. Among them: Rose-throated Parrot, Cuban Bullfinch, Yucatan and Thick-billed Vireos, and the West Indian Whistling-Duck. Overnight, again, on Grand Cayman. Fri: Nov 27: An interesting day starting with a morning flight, north and east, to the small island of Little Cayman. A small island it is, only 1 mile wide and 10 miles long. Located in the middle of the Caribbean Sea, south of Cuba. On the small island, one of the largest colonies in the world of Red-footed Boobies (some 3,500 pairs). Also there's a breeding colony of Magnificent Frigatebirds. And there are other species of note on this small island - some endemic subspecies. In all, a nice day, and again an interesting day of birding on a very small isolated island, before flying back to Grand Cayman. (After Little Cayman, that island may even seem big!) Our last night on Grand Cayman. Sat: Nov 28: Departure from Grand Cayman either for home, or on a flight to Montego Bay to begin our Jamaica Birding Itinerary for Tour WI-5B, in Jamaica: Sat: Nov 28: Arrival at Montego Bay, Jamaica. Birding will begin with an afternoon visit to the Rocklands Feeding Station. Numerous birds can be seen during a relatively short-stay, including the Orangequit and Caribbean (or White-bellied) Dove. Hummingbirds, the exciting Streamertail and Jamaican Mango come in, at close range, to feed. All of the flycatchers of Jamaica are in the area, as is the Jamaican Oriole. Overnight in the area of Montego Bay. one of the endemic birds in Jamaica (photo by Suzanne Bradley) Sun: Nov 29: Most of the day birding in "the Cockpit Country". In this "backcountry" of the island, there are some of the "best" birds of the island, endemics and rarities. Among them, both of the native Jamaican Parrots, the Yellow-billed and Black-billed. Also, the Jamaican, or Jabbering, Crow. Usually, in this area, we get good looks at the Chestnut-bellied Cuckoo (1 of 2 endemic cuckoos on the island). Occurring, as well, is the local and often reclusive Yellow-shouldered Grassquit. It's not actually a grassquit at all, but an endemic genus and species most closely allied to the Greater Antillean Bullfinch. At the day's end, in the "Cockpit Country" during previous tours, we've had some good experiences with the Jamaican Potoo, and the endemic Jamaican Owl. Overnight, again, near Montego Bay. Mon: Nov 30: Travel east, this day, across the northern side of Jamaica, to Port Antonio - a beautiful area, with wonderful birding. There will be birding along the way, and upon our arrival in Port Antonio, where we'll spend the night. Tue: Dec 1: Birding, this morning, in the area of Port Antonio. Here, during previous FONT tours, we've had fine looks at the rare Ring-tailed Pigeon, the Jamaican Becard, and Jamaican Euphonia. But the foremost bird of the area is the localized Black-billed Streamertail. We'll also have another opportunity, here, for the Yellow-shouldered Grassquit, that "grassquit" that's not a grassquit. Also, nearby, we'll bird in the John Crow Mountains, where in the past, we've seen two of the more difficult Jamaican endemic birds to find: the Crested Quail-Dove and the Jamaican Blackbird. At cliffs, along the seacoast, not far away, during the latter part of the day, we may see graceful White-tailed Tropicbirds, as we have in the past. Another overnight in the area of Port Antonio. Wed: Dec 2: This day, birding in the Blue Mountains, where endemic and specialty birds include the Blue Mountain Vireo, the arboreal Jamaican Blackbird (we'll have another shot at it, in case we missed it previously), and the ethereal Rufous-throated Solitaire. Other niceties of the area include: the Arrowhead Warbler, and White-eyed Thrush. In the afternoon, those who wish may visit a factory where the renowned and tasty Blue Mountain Coffee is prepared. Those who wish to may drink some; those who wish to may buy some. Overnight at a nearby guest house in the Blue Mountains. Thu: Dec 3: This morning we'll depart the Blue Mountains and head west along the southern side of the island, with some birding, along the way, in the desert-area of the Hellshire Hills. Among the birds there is the Bahama Mockingbird (a very localized species on Jamaica). Going from dry to wet, we'll continue that afternoon to some wonderful wetland habitats: the Black River Morass, and the Great Pedro Pond. Numerous waterbirds occur there. Of particular interest: jacanas, gallinules, and grebes, with possibly Yellow-breasted Crake or Spotted Rail. Also, this area can be good for the rare West Indian Whistling-Duck. During one of our recent tours, over 200 of them were seen, well, with the late-afternoon sun shining on them. In the evening, we'll arrive back in Montego Bay, where our tour of the island began. Our last overnight near the airport. Fri: Dec 4: After some final birding in the morning, departure for home. US $2,795 per person, based upon double occupancy, for a combination of the Cayman Islands and Jamaica tours (5A & 5B), - Nov 25 - Dec 4. US $1,195 per person, double occupancy, for the Cayman Islands tour only (5A), Nov 25-28. US $1,995 per person, double occupancy, for the Jamaica tour only (5B), Nov 28 - Dec 4. US $345 for the two-tour combination Nov 25 - Dec 4. US $215 for the Cayman Islands tour only. US $275 for the Jamaica tour only. All overnight accommodations. Meals, except dinners. Ground transportation on the Caymans & in Jamaica. With the Cayman Tour: the round-trip flight between Grand Cayman and Little Cayman islands. Services of the birding guide. Does not include: Dinners, alcoholic drinks, and any items of a personal nature. Flights: to/from Jamaica, between Jamaica and Grand Cayman, and from Grand Cayman. Airport tax. Gratuities. Tours to be led by Armas Hill. A deposit of US $400 a place on the Cayman Islands tour. A deposit of US $500 would assure a place on the Jamaica tour, or the Cayman/Jamaica combination. Maximum number will be 8 participants. Some of the Specialty Birds of the Cayman Islands (A listing of some Jamaican bird specialties follows this Cayman bird list.) West Indian Whistling-Duck Rose-throated Parrot (has been called Cuban or Bahama Parrot) West Indian Woodpecker Grand Cayman Thrush (formerly. now extinct) Yucatan Vireo (only place in the Caribbean for this species) Vitelline Warbler (endemic) Greater Antillean Grackle Jamaican Oriole (formerly on Grand Cayman Island) Specialty Jamaican Birds, followed by their Jamaican Bird Names A Jamaican Potoo photographed during a FONT tour (e) endemic to Jamaica (t) a globally threatened or rare species, designated by Birdlife International. (nt) a nearly-species globally. Pied-billed Grebe / Duck-and-Teal White-tailed Tropicbird / Bo'sun Bird Brown Pelican / Old Joe Magnificent Frigatebird / Man o'War Bird Snowy Egret / Golden Slippers Little Blue Heron / Blue Gaulin Cattle Egret / Tick Bird Black-crowned Night-Heron / Quok Yellow-crowned Night-Heron / Crab-catcher West Indian Whistling-Duck (t) / Night Duck Turkey Vulture / John Crow American Kestrel / Killy-killy Clapper Rail / Mangrove Hen Yellow-breasted Crake / Twopenny Chick Black-necked Stilt / Captain Lewis Northern Jacana / River Chink Plain Pigeon (t) / Blue Pigeon Ring-tailed Pigeon (e) (t) / Ringtail White-crowned Pigeon / Baldpate White-winged Dove / White-wing Zenaida Dove / Pea Dove Caribbean Dove / White-belly Crested Quail-Dove (e) (nt) / Mountain Witch Ruddy Quail-Dove / Partridge Chestnut-bellied Cuckoo (e) / Old Man Bird Jamaican Lizard-Cuckoo (e) / Old Woman Bird Jamaican Owl (e) / Patoo (with the big eyes) Jamaican Potoo (e) / Patoo (with the long bill) Antillean Nighthawk / Gimme-me-bit Streamertail (e) / Doctorbird Vervain Hummingbird / Little Doctorbird Jamaican Tody (e) / Robin Redbreast Jamaican Elaenia (e) / Sarah Bird Sad Flycatcher (e) / Little Tom Fool Rufous-tailed Flycatcher (e) / Big Tom Fool Stolid Flycatcher / Tom Fool Gray Kingbird / Petchary Jamaican Becard (female) (e) / Mountain Judy Jamaican Becard (male) (e) / Mountain Dick Jamaican Crow (e) / Jabbering Crow Rufous-throated Solitaire / Mountain Whistler White-chinned Thrush (e) / Hopping Dick White-eyed Thrush (e) / Shine-eye Black-whiskered Vireo / John To-Whit Jamaican Vireo (e) / Sewi-sewi Arrow-headed Warbler (e) / Ants Picker American Redstart / Butterfly Bird Bananaquit / Sugar Bird Jamaican Euphonia (e) / Blue Quit Jamaican Spindalis (e) / Mark Head Yellow-shouldered Grassquit (e) / Yellow-back Jamaican Blackbird (e) (t) / Wildpine Sargeant Greater Antillean Grackle / Cling-cling Jamaican Oriole (e) / Other Jamaican endemics: Jamaican Parakeet (*), Yellow-billed Parrot (t), Black-billed Parrot (t), Jamaican Mango, Jamaican Woodpecker, Jamaican Pewee (#), Blue Mountain Vireo (nt), Orangequit. (*) was part of Olive-throated Parakeet (of Central America). (#) was part of Greater Antillean Pewee. To Top of Page
277,707
Henry Wise Wood Math Club 910 - 75 Ave SW, Calgary AB January 3, 2011 - L Game This is a simple strategy game. Each player takes turns moving their L piece and then optionally moving one (not two) of the neutral pieces. For more information, see the Wikipedia article. |moves possible for current player|
182,958
World’s First Reasoning Curriculum @ Schools Reasoning Quotient is a Must. Prepare Now! Reasoning Trainer Plus The catalyst to boost and sharpen logical thinking and reasoning skills. All the topics in this book are grouped as under: VERBAL REASONING & NON-VERBAL REASONING For each question type, worked out examples shows exactly what the question demands, and explains how to tackle it in three or four clear steps. The approach is systematic and highly effective, lending itself to active learning. This book contains several interesting and investigative problems with worked out examples and explanations. The Following Topics are covered. 1. Which letter in the Alphabet ? 2. Odd one out 3. Complete the two words 4. Matching Pair 6. Letter Coding 7. Inserting Numbers 8. Analytical Reasoning 9. Break the codes 10. Which one is different ? 12. What comes next ? 13. Shape After Adding 14. After Subtraction 15. Block Test 16. Counting Figures Solutions *All non Olympiadtester logos are trademarks of the respective organizations. Also, Olympiad tester is not an official partner to any of the Olympiad conducting agencies. It is advisable for the students to go through the reference material supplied by the organizer of the exam. Olympiadtester is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Olympiadtester.com; Copyright©Olympiadtester . All Right Reserved
298,090
A molecule made up of amino acids. Proteins are needed for the body to function properly. They are the basis of body structures, such as skin and hair, and of other substances such as enzymes, cytokines, and antibodies. Last updated: 2016-01-06 Source: The National Cancer Institute's Dictionary of Cancer Terms (http://www.cancer.gov/dictionary)
216,184
Fortinet Disclosed Top Ten Security Threats For February 2008 Fortinet, the company provides solutions of UTM (Unified Threat Management) announced on March 3, 2008, the top ten security threats in Feb 2008. According toFortinet, the families of mass-mailing worms, MyDoom and MyTob were most active in February representing the greater part of total malware attacks in the month, as reported by DANIWEB on February 3, 2008. Fortinet said that Trojan Pushdo!tr's individual contribution through compressed file attachments containing porn comprised an aggressive attack lasting for two days. With this the Pushdo worm entered the Top Ten list of malware in February 2008. According to Fortinet, the most dangerous Pushdo Trojan occupied the sixth position due to massive attack for three days in end January 2008 and later on conducted a two-day peak attack in mid-February 2008. Fortinet also said that in February 2008, there was a major interchange in positions among the most frequently observed threats while an introduction of the two malware variants, Netsky and MyTob, made a mark in the Top Ten list. According to comments by Derek Manky, a Security Research Engineer at Fortinet, accessible malware that mutate have allowed worm families like MyTob to flourish and make a notable presence in present time threat landscape, as reported by DANIWEB on February 3, 2008. The February 2008 Top Ten security threats from Fortinet's research include Netsky, MyTob, HTML/Iframe_CID! exploit, Pushdo, and the Storm worm as the five variants at the highest positions. The next individual threats down the line were MyDoom, Bagle, Agent, Grew, and Trojan W32/Istbar.PK!tr.dldr. The Valentine's Day in February 2008 was another reason that pushed more malicious code and spam during the month. Fortinet suggested that the total amount of spam mails increased significantly in February 2008, typically around the Valentine's Day. Manky said that the most genuine e-cards arrive as a link to the site that hosts the e-card, using a distinct ID, instead of as an attachment, as reported by itvarnews around mid- February 2008. Manky also said that in the dark alleys of the cyber world not everyone connected to the Internet is a friend. In January 2008, according to Fortinet, malware and spam were over 11% of all threats. Related article: Fortinet Pinpoints Ten Biggest Threats » SPAMfighter News - 11-03-2008
71,635
In nuclear fuel cycle No failures are allowed. And Chernobyl was a failure. Why did you allow Chernobyl? Why did you allow Narora? Why did you allow Three Mile Island where by breakfast time from 402 AM more than half the core was allowed to be melted. Learn thou that nuclear power requires 100% safety unlike other machines but can never be attained (1). Human being is not allowed by nukes because they want infallibility. Not understanding this man continued into Fukushima where they are incinerating nuclear waste creating exposure to 300 mSv/y instead of not more than 0.1 mSv/y for the general public(3). Ignorance in action is the hallmark of modern civilization(hereafter referred to as mc). Await now another Fukushima(Three meltdowns and recriticalities of nukes in the open and the tragedy of open fuel pools: A billion infant mortalities due to Fukushima in India alone expected(4)). We are being converted to nuclear wastes. Putin and all of us in this world must embrace a normal civilization to survive in health. Is it too late? If it is then his going back or not matters not. What a waste. Even way back in 1908, in Hind Swaraj, Mahatma Gandhi warned us of the consequences of the cumulative effects of mc. And wanted us to use our endowment of living energy, live where we work, produce goods and services in synchrony with needs and show a human face. Dont tell me that you have already spent Rs 25000 Cr(1 Cr= 10^7) on trash and therefore the trash must be saved so we can become one with it. Way back in 1986 in May, I put up an energy audit of nukes in a leader article in Prajavani, the Kannada Newspaper published by the Deccan Herald Group, telling that from year to year nuclear power programmes only consume more than they deliver (2). Why was this not debated? 1. ‘Oyster Creek proximity to New York poses threat during flooding’ - Prof. Busbyhttp://rt.com/usa/news/hurricane-sandy-nuclear-plant-613/ 2. The energy audit of the Indian Nuclear Programme. 3. Report from Japan: Radioactive fallout around Fukushima incineration plant being hidden — “It’s very odd” (VIDEOS) 4.nuclear fuel cycles cause extinction
213,567
The first and most basic way to unclog a sink drain is by using boiling water. Boil a pot of water and slowly pour it down the drain in shifts, waiting a few seconds between each pour. The hot water will melt soap scum and loosen grime or solids to help clear the blockage. A clogged drain sends most homeowners running for a bottle of caustic drain cleaner or the plumber’s phone number. But it is often possible to remove a stubborn clog with items you already have at home. Boiling water is often enough to break up grease clogs and other debris that accumulates over time. Simply pour boiling water down the drain. You can also mix baking soda and salt to create a natural scouring mixture and pour it down the drain. Just be careful not to damage your PVC pipes with this method. PVC can melt if exposed to high heat for long periods of time. Baking soda (sodium bicarbonate) is a household staple with many uses, including cleaning stinky drains. It also has disinfectant properties that can help eliminate odor-causing bacteria and fungi. Pour a large pot of scalding hot water down the drain to loosen gunk, then dump in one cup of baking soda. It’s important to use a 1:1 ratio of baking soda to vinegar so that the chemicals have enough gas to react properly. Expect to hear a loud fizzing reaction as the two ingredients mix together and start breaking down the gunk that’s causing your clog. Wait for the fizzing to stop, then flush the drain with another pot of boiling water. Using vinegar to unclog a sink drain is an old-fashioned, time-tested lifehack that’s getting a new generation of users excited after a TikTok challenge went viral. Mixing equal parts baking soda and vinegar creates a fizzing, clog-busting chemical reaction. Baking soda is sodium bicarbonate, a base, and vinegar is an acid. The two react to neutralize each other, causing water and carbon dioxide bubbles that jostle a clog and dissolve grime. Once the reaction is done, heat up a pot of boiling water and pour it down the drain to flush the pipes. If the clog persists, call a plumber. They can help with harder-to reach clogs that require more than DIY solutions. Sites such as https://www.fixitrightplumbing.com.au/plumber-canberra/ will have all the information you need for plumbing services. Often, sink drains become clogged by soap scum, hair, lint and other debris that clump together inside the pipe. Rather than calling in a plumber, you can try one of the simple home-based methods listed below to clear your drain. First, remove any standing water in the sink. Place a towel or rag over the sink overflow hole to prevent any water from escaping. Next, pour a cup of salt and a cup of baking soda down the drain. Let the mixture sit for about 15 minutes and then flush with boiling water. This should break up light clogs and clear away the remaining gunk. A drain snake—also called a hand auger—consists of a drum and cable with a corkscrew end that fits into and breaks apart clogs. It’s important to wear rubber gloves when using a snake and have a trash bag or can to dispose of the debris it pulls up. Start by removing the p-trap (the curved section of pipe underneath your sink). You can usually loosen and remove this by hand. Next, feed the snake down the pipe and keep rotating the handle so it grinds against the clog. Once you feel the snake catch on something, slowly crank it back up and pull both the snake and clog out of the pipe. You probably have a wire coat hanger lying around, and it’s just as useful for unclogging your drain as it is for hanging your clothes. Bend the end of the hanger to make a hook, and push it down the drain to catch any hair or other debris that might be blocking your pipe. Just be sure to use a wire hanger that can handle the heat and avoid bending it too much. You should also run water through the drain afterward to see if it’s cleared. If not, it may be time to call a plumber. Clogged drains can quickly turn into dangerous and expensive problems.
245,011
This first hand account in urdu narrated by the main architect himself, will provide the readers with a picture of how Ismailis started their “renaissance” and development to the present happy situation. The main purpose of this post is sharing correct information and correction of inaccurate perceptions that have emerged in the present day society as part of bias and inaccurate propaganda by spoilers. You can read other parts of the complete book if you successively click following links: Also see and hear this You-tube link: Ghadir-e-Khum Continued on:Continue reading ….
310,689
DYNAMIC AGENCY: MODELS FOR CREATIVE PRODUCTION AND TECHNOLOGY APPLICATIONS* Francesco Amigoni, Viola Schiaffonati, Marco Somalvico Politecnico di Milano Artificial Intelligence and Robotics Project. Dipartimento di Elettronica e Informazione. Politecnico di Milano. Italy. Among the most promising modern approaches to creativity, a very important one makes use of non-standard problem solving techniques of artificial intelligence for addressing methodological descriptions of creativity. The purpose of this paper is to present creative dynamic agency as a novel partial description of creativity, which is based on a recent and powerful technique of artificial intelligence, developed by authors and called dynamic agency. The proposed approach is embedded in an epistemology on creativity which is envisaged in a more general epistemology of rationality, namely in the framework of the debate between weak and strong approaches to artificial intelligence. The position of the authors is that creativity cannot be fully modelled. However, with the adoption of creative dynamic agency, we can extend the size of rational elements and reduce the size of irrational elements (which still continue to be present) in both product and process of creativity. 1 - INTRODUCTION
111,453
A steep rise in civilian casualties in Somalia, due largely to attacks by the Al-Shabaab armed group, has exacerbated already grim human rights and humanitarian situation for the people of Somalia, UN High Commissioner for Human Rights Volker Türk said Monday. According to the latest UN figures, at least 613 civilians have been killed and 948 injured so far this year – the highest number since 2017 and more than a 30 percent rise from last year. Most of the casualties, 315 killed and 686 injured, have been due to Improvised Explosive Devices (IEDs), at least 94 percent of which were attributed to Al-Shabaab. Other casualties have been caused by State security forces, clan militia and other unidentified actors. “This year has brought an abrupt halt to a general decline in deaths and injuries documented since 2017,” said Türk. “I am deeply concerned that more Somalis continue to lose their lives on a daily basis.” “All parties to the conflict must uphold their obligations under international humanitarian law and ensure that civilians are protected. This also includes armed elements engaged alongside the Government in the conflict against Al-Shabaab, as well as international forces.”
202,332
People v. Lol-lo & Saraw, 43 Phil. 19 G.R. No. 17958 February 27, 1922. • 2 boats of Dutch possession left matuta. In 1 of the boats was 1 individual, a Dutch subject, and in the other boat 11 men, women, and children, subjects of Holland. The 2nd boat arrived between the Islands of Buang and Bukid in the Dutch East Indies. There the boat was surrounded by 6 vintas manned by 24 Moros all armed. The Moros first asked for food, but once on the Dutch boat, too for themselves all of the cargo, attacked some of the men, and brutally violated 2 of the women. All of the persons on the Dutch boat, except the 2 young women, were again placed on it and holes were made in it, the idea that it would submerge. The Moros finally arrived at Maruro, a Dutch possession. 2 of the Moro marauder were Lol-lo, who also raped one of the women, and Saraw. At Maruro the 2 women were able to escape. • Lol-lo and Saraw later returned to their home in South Ubian, Tawi-Tawi, Sulu, Philippine Islands. There they were arrested and were charged in the Court of First Instance of Sulu with the crime of piracy • All of the elements of the crime of piracy are present. Piracy is robbery or forcible depredation on the high seas, without lawful authority and done animo furandi, and in the spirit and intention of universal hostility. • Pirates are in law hostes humani generis. • Piracy is a crime not against any particular state but against all mankind. It may be punished in the competent tribunal of any country where the offender may be found or into which he may be carried. The jurisdiction of piracy unlike all other crimes has no territorial limits. • As it is against all so may it be punished by all. Nor does it matter that the crime was committed within the jurisdictional 3-mile limit of a foreign state, "for those limits, though neutral to war, are not neutral to crimes." ISSUE: W/N the provisions of the Penal Code dealing with the crime of piracy are still in force. HELD: In accordance with provisions of Act No. 2726, the defendant and appellant Lol-lo, who is found guilty of the crime of piracy and is sentenced therefor to be hung until dead. Penal code dealing with the crime of piracy, notably articles 153 and 154, to be still in force in the Philippines. The crime of piracy was accompanied by (1) an offense against chastity and (2) the abandonment of persons without apparent means of saving themselves. It is, therefore, only necessary for us to determine as to whether the penalty of cadena perpetua or death should be imposed. At least 3 aggravating circumstances, that the wrong done in the commission of the crime was deliberately augmented by causing other wrongs not necessary for its commission, that advantage was taken of superior strength, and that means were employed which added ignominy to the natural effects of the act, must also be taken into consideration in fixing the penalty. The Tale of Our Siam Reap Tuk Tuk Driver Brothers - So we *Travel Tripsters* spontaneously booked our flights to *Siam Reap*. [image: siam reap international airport] Every guide online said we can easily f... 5 days ago
33,397
I recently experienced the massively nerve wracking experience of presenting the case for Moving Image Arts Education in Northern Ireland to a group of esteemed Scottish Educationalists. The title of the conference was ‘Moving image education and digital media in Curriculum for Excellence’ and it was hosted in the rather impressive Scottish Youth Theatre building in Glasgow. On arriving in Scotland I suddenly realised I was delivering a presentation alongside some of the top Moving Image specialists in the UK, Dr George Head, Scott Donaldson, Ollie Bray, Derek Robertson and David Griffith to name but a few offered a position from years of research and Higher Education. It was a tremendously interesting day and I left with a greater understanding of Scotland’s Curriculum for Excellence as well as a much greater appreciation of the work of Northern Ireland Screen, the Nerve Centre and CCEA on actually managing to get the Moving Image Arts curriculum from dream to the classroom. The development of Moving Image Education in Northern Ireland is down to the perseverance and dedication of a small but growing number of people there is clear evidence our young people are benefiting massively. Evidence alone can be seen in the quality of student films created on zero budget and low quality equipment. You can see samples here. Since introducing Moving Image Arts A-level six years ago I have not only witnessed massive improvement in the area of digital and technical literacy but I have also seen a much greater understanding and appreciation for the area of Moving Image education. The study of narrative, the art of cinema and by gaining a taste of the television and film industry our students have become self motivated to learn and succeed in the creative industries. CREATIVE LEARNING CENTRES Northern Ireland Moving Image Education is supported by a number of creative learning centres who not only come to the aid of our students but also actively train teachers on both the technical as theoretical sides of Moving Image Arts. The centres advise on resources, networking and school equipment. The Creative Learning Centres together with the Moving Image Arts teachers forum managed by Jennifer Johnston offer excellent opportunities for the sharing of good practice across the province. It is this ignited student motivation that drives us to call in the support of local industry professionals who fortunately are only too willing to pass on their advice and experiences to our ‘knowledge hungry’ group. It was our student’s ability to impress even the greatest of film professionals that led to 150 of them rubbing shoulders with the likes of Ben Barnes, Robert Sheehan, Nick Hamm and Northern Ireland’s own Mark Huffam during the filming of Killing Bono in 2010. Despite being shot in the surrounds of our own school building during possibly the coldest weekend in January the students loved it and craved more with many attending a number of different shoots across the province. The result wasn’t just the chance of appearing on the big screen along side Krysten Ritter or having your name in the credits of a global film release it was about experience and the opportunity of seeing the film industry first hand. The first twelve hour shoot in freezing cold conditions was enough for me to crave my classroom but for many of the students it was a focus and a realisation there is an entire creative industry out there crying out for talented students who don’t just have an knowledge of the techical side of film making but an appreciation of the art of the Moving Image. You can download a stripped down version of my presentation below. I have removed some behind the scenes footage of Killing Bono generously provided by Greenroom Entertainment and a short student created animation. You can view a vimeo version of the animation here.
44,738
|Location||Rosemont–La Petite-Patrie, Montreal, Quebec, Canada| |Area||80 ha (200 acres)| |Operated by||City of Montreal| Established in 1910, it is 118 hectares (290 acres) in size, with 38 hectares occupied by the Montreal Botanical Garden and Montreal Insectarium, 55 hectares (140 acres) by a nine-hole public golf course and the remaining 25 hectares (62 acres) hectares by public spaces. Originally the park contained an 18-hole golf course which was reduced to 9 holes in the mid-1970s in order to construct the Montreal Olympic Park. Maisonneuve Park borders partially on Sherbrooke Street East. The park is a unique place where people enjoy walking day or night, bicycling on its bike trail which runs all the way around the park. The center of the park is a calm area where people enjoy picnics and tranquility and is very popular among young people and families. The "loop" section of the bicycle path is 3.1 kilometres (1.9 mi) long. This does not include the path outside the fenced area, along Sherbrooke St. |This Montreal geographical article is a stub. You can help Wikipedia by expanding it.| |This golf club or course-related article is a stub. You can help Wikipedia by expanding it.|
183,305
|born on||30 January 1946 at 15:43 (= 3:43 PM )| |Place||Pittsburgh PA, USA, 40n26, 79w59| |Timezone||EST h5w (is standard time)| |Astrology data||10°23' 12°38 Asc. 18°56'| American feminist, author and editor who wrote "The Lost Goddesses of Early Greece." She edited "The Politics of Women's Spirituality." Linda Clark quotes her. - Notable : Book Collection : Profiles Of Women - Vocation : Writers : Fiction - Vocation : Writers : Publisher/ Editor (Editor) - Vocation : Politics : Activist/ feminist
235,806
"Across the nation, antiquated infrastructure like Seattle’s, swelling populations, and weather extremes are stressing our triplicate freshwater, stormwater, and wastewater systems like never before," says Barnett. "Industry groups such as the American Society of Civil Engineers, American Water Works Association, National Association of Water Companies, and U.S. Chamber of Commerce repeat the mantra that the nation’s water systems are some of the oldest, most overused, and most seriously failing of all America’s infrastructure—worse off than the nation’s bridges. The EPA estimates that repairing, replacing, and upgrading these aging water systems will cost between $300 billion and $1 trillion over the next two decades." "Yet, too often, the engineers and the estimators aren’t taking into account that, rather than rebuilding waterworks in the twentieth-century tradition, an increasing number of communities are finding creative solutions that can be cheaper and better for the environment, and build resiliency to climate change," she notes. "The water revolution reaches beyond the filtering and storage capacity of wetlands, plants, and trees to the way we perceive, use, and pay for H20. It involves seeing value in every kind of water—from irrigating with recycled water to finding energy in sewage. It sometimes eschews infrastructure altogether."
232,750
This is the first post of the FubuMVC series mentioned in the Introduction post. Perhaps the coolest thing about FubuMVC (and I’m not kidding when I say there’s a lot of cool stuff) is the behavior model. This fundamental concept enables almost all of the other coolness in FubuMVC. The concept is this: There is no controller. I’m not trying to be cute or clever, I mean it. When you look at some of the other MVC frameworks out there, they have a fairly strong notion of “Controller class” baked into the framework. So much so that they require a base class for you(*) to derive from. [(*) Django doesn’t require to you subclass a controller (what they call a ‘view’, confusingly) but it enables some scenarios you can’t get unless you subclass]. Main problem #1: The framework is far too invasive into my code. Stated differently: I shouldn’t have to derive from anything or import/”using” any of your code to do simple-to-medium complexity things with your framework. And if, in an average controller class “.cs” file, I need to have more “using” statements for your framework than I need for my app code, we have major problems. To be specific, most of these frameworks are of the “Model 2” variety of MVC. It turns out that these frameworks, by nature of their fundamental design, encourage fat controllers (except, perhaps, Django, but I don’t know it well enough to speak definitively). Each has a way (some better, some worse) to get some of the logic out of the controller and move it somewhere else. But in using them, you definitely get the sense that things would be a lot easier to toss into the controller action itself and be done. The framework doesn’t “encourage” you to spread out responsibilities. A typical controller might have the following responsibilities: - Authenticate the user - Authorize the request - Bind the request to one or more model or models - Validate those models - ! Perform the primary logic of the action ! - Respond to failure if the primary logic failed for some reason (threw an error, returned negatively, etc) - Determine what result to send to the client (render a view, JSON, HTTP redirect, etc) - Prepare the output model/json/redirect URL in order for the result to proceed - Transfer control to the result (with an explicit call in many cases) Most everyone realizes that this list is far too long for the average controller action to handle. Your method will be very long, have lots of branching, and be nearly impossible to unit test effectively. You will also be repeating a lot of code (violating the DRY principle). Problem #2: Many MVC frameworks encourage “fat” controllers. In ASP.NET MVC, you’d move many of the earlier things to ActionFilters that run before and some of the later things into ActionResults. The other frameworks have similar ways of adding pre- and post-logic to an action which helps with SRP and DRY. While these help, the level of granularity and control over the web request pipeline generally isn’t enough to allow better separation and composition of responsibilities. Problem #3: Not enough granularity and/or compose-ability (usually, it’s an after-thought). Seeing these problems and many others, we realized that we needed to change a few things about how we approached our web framework. We needed to have a framework that encouraged skinny controllers. When you get down to it, the only thing the controller should be doing is the “! Perform the primary logic of the action !”. We found that when we had multiple actions in a controller, that, while each action was skinny, the controller was still pretty fat. This let us eventually to determine: There should be no controller at all! All that matters is the action. Since, in C#, you can’t have a method without a class around it, we still needed a class to wrap around the action method, but that’s it. This class’s sole purpose is to provide a container for the action method. It can have fields, private methods, etc. that all support that one action method, but it should only have one action method. You can call this class a “controller” if you like, but it has very little in common with the Model 2 frameworks’ “controller” classes. The solution we came up with involved a pipeline of small, compose-able units of functionality. Each should have its own small responsibility. Each should have the ability be able to wrap the entire pipeline to execute before, after, or around the action. When we first built FubuMVC, we called these “decorators” because they were originally designed a lot like the decorator pattern, but not exactly. They also behaved somewhat like a chain-of-responsibility pattern, but not exactly. They also behaved somewhat like “commands” in the Front Controller pattern, but not exactly. We struggled with the nomenclature and a word that captured the unique essence of what these things did. Hat tip to Steven Harman, he coined the term “Behavior,” and it stuck. More than just ActionFilters and ActionResults, behaviors can hook into and override any part of the pipeline allowing for many interesting scenarios and maximum flexibility when building complex, compositional applications (which is what we were and are still trying to do at Dovetail Software – we’re hiring, by the way). The way behaviors work is simple. They have a very simple interface (basically one method: Invoke() and a method InvokePartial in case the behavior needs to behave differently when being invoked in a partial). Since everything in FubuMVC runs through IoC and is fully compositional in design (versus inheritance-based as in the other frameworks), a behavior takes in the next behavior in the chain and can execute it or not. By not executing it, the behavior takes on the responsibility for completing the entire request. An example of this would be an authorization behavior that needs to usurp the pipeline because a user doesn’t have the correct permissions to view this page. The behavior will then send the request down another pipeline that results in an “HTTP 403 Access Denied” view being rendered. For your convenience (and only for convenience, it’s not required), there is an abstract base class you can derive from which does some of the boring basic behavior stuff. To learn more technical details and how-to about behaviors, you should probably read the FubuMVC Guide on the subject (yes, these guides look like Rails guides because they are a fork from Spree guides). Conventions, the real pay-off Up until now, you may think something along the lines of: “Meh, behaviors are cool, but they’re really just glorified before/after filters/results and don’t really change *that* much of the game.” Of course you’d be wrong, but not unreasonable – until you consider the conventional application of those behaviors to actions. As the sub-title suggests, conventionally applying behaviors to actions is where things get really interesting and when most people have the big “Ah-hah!” moment. Again, I encourage you to read the “Advanced Behaviors” guide as it goes into a lot of the specifics. This post will just be an overview and conceptual treatment of the subject. Every app has its own conventions whether you call them that or not. When I say “conventions” I mean anything that, when a new developer joins your team, you explain to him/her that “this is the way we do things.” For example, any method in any class in this namespace is “secure” or any method with the “[Secure]” attribute, and any method whose name ends in “Secure” are examples of conventions. FubuMVC allows you to define those conventions in code, make them first-class citizens in your app, and use them to apply behavior(s) to your actions. The best part is, you don’t have to use any of the framework’s attributes or interfaces or base classes. You can do it by names of types or methods, or by your own custom attributes or interfaces. This helps lessen the number of “using” statements required to use the framework. Our goal is to have zero-to-a-few “using” statements in your app code. When we talk about more or less “intrusive” or “unobstrusive” (look Ma, no using statements! Pure POCO!), this is what we mean. In fact, almost everything in FubuMVC is based on your conventions. The idea is FubuMVC brings the bag of tools and you tell it where and how you want things wired up. I realize this post was light on code and some specifics. This was intentional. I wanted this to be more a philosophical post about our approach. It is important for you to understand this as the rest of the posts in this series will make increasingly more sense as you begin to understand this and think like we do when it comes to approaching framework building (especially web framework building). If you really want specifics and haven’t checked out the “Advanced Behaviors” guide, I invite you one last time. As this series progresses, I’ll get into more specifics of just how deep the configurability and conventional approach runs in FubuMVC and a lot of this post will begin to make more sense.
229,027
The new Create Review and real gym Dice have now arrived and not only look amazing, but are going down a storm with the first schools to receive them! Create Review Dice To add to practitioners’ creative and colourful set of resources, we’ve created the new Create Review Dice. The dice are colour coded, tactile and durable, and encourage dynamic and creative work within PE, as well as support pupils to self and peer review their learning. The new set of Create Review Dice is based on the six multi-ability cogs, with two additional dice for a deeper review of learning. From rolling the dice, the child or teacher supporting them receives a question that can be used to evaluate what they’ve learned from the activity undertaken and see how their skills can be better developed. Not only can these dice be used to complement real PE, they can also be transferred to support other areas of the curriculum, providing an invaluable resource to get cogs turning and minds rolling! Click here to purchase yours. Schools that are already using the dice have told us that the children were really excited using them and found them to be a really useful resource. real gym Dice This brand new set of real gym Dice aid the teaching of the real gym scheme of work. These dice work with the Dice Matrix Poster and show all the unique symbols for easy use. By exploring different choreographic techniques, children can develop their skills in increasing challenging situations, as well as extend sequence development. Reception teacher and Senior Management Team member, Flo Head, from Abington Vale Primary School shared her thoughts: “I have found them useful using them alongside numbered dice which really challenges them to create multiple moves i.e. 4 star shapes/3 tuck shapes etc – then you can see if children have grasped the concepts of each shape. The children lead the session as the ownership is shifted to them as they are the ones rolling the dice and following the simple instructions and drawings. We have only just started using them but I have been very impressed with how the learning culture has shifted as well as how easy they are to use on their own or with numbered dice. I am looking forward to using them alongside equipment to again enhance the sessions and the flexibility and range of choice!” Like the Create Review Dice, the real gym Dice be purchased on the Create shop for the same price. Click here to purchase yours.
61,367
So Many Galaxies We live in the Milky Way galaxy, orbiting our Sun on one of its spiral arms. Astronomers recently mapped 3,000,000 new galaxies, using Australia’s CSIRO telescope! Our solar system has 8 planets. Our Milky Way galaxy has 100 to 400 billion stars, each with their own solar system, which means 800 to 3 trillion planets. Think any have alien life?
152,999
Confused. I'm confused. I hear on the news that in an effort to reduce gas prices, President Obama is considering releasing oil from the strategic petroleum reserve. If gas prices can be reduced simply by increasing the amount of petroleum on the market, why wouldn't he authorize the Keystone pipeline? And wouldn't it also make sense to allow and encourage more drilling along with the development of our natural gas supplies? Seems pretty elementary to me. And at the same time, I have an idea to reduce federal spending. The Department of Energy was created in 1977 at which time we were importing 30 percent of our oil. Today that same department has 16,000 federal employees, 100,000 contract employees, an annual budget of $24.2 billion dollars and now we import 70 percent of our oil. Doesn't make much sense to me. No wonder I'm confused. Dr. John Dougoveto
144,832
The art of making whiskey is a foundational part of American culture. It seems strange to say it, but for a large part of our history, producing alcoholic beverages was a means to survival and a way of life. In the 1920’s, when the Federal Government outlawed the production and consumption of alcohol, it unintentionally sparked a fire of free spirit and rebellion. Even to this day, some of the most interesting pages in the American history books are attributed to outlaws and bootleggers of the prohibition era. Today, the art of distilling and aging whiskey is spreading its wings again. As entrepreneurs, young and old, dig up the stories, recipes, and trade secrets of iconic master distillers from our past, a new breed of locally produced spirituous goodness is being reborn. Produced within a very specific set of guidelines and standards, some of these distilleries are even able to call their end product bourbon, which is the quintessential American whiskey. The Carolinas have played a large role in shaping the art of distilling whiskey, but when we think of bourbon, the great state of Kentucky always comes first to mind. To my surprise, there are several noteworthy craft distilleries right here in the Carolinas (and presumably other states as well), and we will feature a write up for each right here on the Bourbon Journal. My first stop on this journey was Dark Corner Distillery in Greenville, SC. Greenville is a very charming city near the eastern tip of South Carolina, just north of Clemson and is also home to Furman University. This attractive southern city boasts a hip young culture that screams “local” and “homegrown”. From a bustling Main Street to the vibrant riverside greenway, Greenville is a perfect place for a micro-distillery. Speaking of which, look no further than Joe Fenten and his crew of not-so-outlaw moonshiners who have set up a fully functioning distillery and barrel warehouse on Main Street Greenville, SC. Dark Corner Distillery prides their surprisingly smooth moonshine product, which they have perfected by using a signature balance of corn, red wheat, barley, and rye in their mash. They also age their smooth white dog liquor in smaller 5 and 15 gallon new charred oak barrels for about one year and bottle it under the label Lewis Redmond Carolina Bourbon. one year doesn’t seem like a lot of time, but because the smaller barrels offer a higher ratio of surface area contact with the whiskey, it ages faster than it would in a traditional 53 gallon barrel. They named this delectable bourbon after Major Lewis Redmond, a reputable reconstruction era moonshiner who was often thought of as Appalachia’s Robin Hood. If you visit their web site it is evident that this distillery has a deep respect for the tradition and history of whiskey in the Carolina region. I sampled through all of the Dark Corner sprits, including their unique absinthe and their honeysuckle infused moonshine, but as you could probably guess, I was most interested in the Lewis Redmond Bourbon. My initial impression of the whiskey was that it tasted very young, but it was surprisingly smooth and flavorful. The use of high quality ingredients along with the addition of mellow red wheat to the mash recipe gives this very young bourbon plenty of potential. Given that most mass-produced bourbons age between four and six years, I would say this one-year-old product is quite amazing, and could stand its ground next to most of the brands you recognize from store shelves. At over $50 a bottle, it is priced a little high compared to more widely distributed products, but the fact that it is made by hand in small batches helps to justify the price in my opinion. The distillery has not (at least to my knowledge) released any official announcement that they will produce a bourbon that is aged longer than one year, but I have a feeling that they will give it a shot. If Joe and his gang are able to produce such a great product with only a year of metamorphous, I can only imagine what might come out of their basement in round two. Not only is this South Carolina’s first whiskey distillery established since prohibition, but it might just put the state on the bourbon trail one day. As far as I am concerned, it is just another great reason to visit Greenville and participate in one of America’s oldest traditions, makin’ whiskey. Next time you are driving near Greenville, perhaps on a long drive to Atlanta or Central Florida, be sure to stop in for a tasting at Dark Corner Distillery. You will love their collection of outlaw memorabilia and their fully functioning copper pot still that they operate right there in the store. It is a stop worth taking, even if you end up spending an extra night in Greenville!
223,224
Bear Park teacher Hiromi McCarthy-Dowd jetted off on a staff trip to Italy earlier this year to gain first-hand experience of the Reggio Emilia philosophies. Here she reflects on the culture of community that their teachers and parents have embraced, and how we can introduce these practices into our own circles here in New Zealand. Q: On your Staff trip to Italy how long did you spend in the city of Reggio Emilia? I was part of the 2016 international study group that travelled to Reggio Emilia, Italy in April. It was a one week conference about the Reggio Emilia approach to education and was hosted in the city of Reggio Emilia itself – where the approach was born. Just being in the city was inspiring in itself. I could see how the philosophy had developed and evolved, it fits so perfectly within the general community and culture of the city. Schools here have strong community integration and children are actively involved outside the centres. I loved the Bruner quote that was shared in the first session: “you don’t understand the schools in Reggio Emilia, if you don’t understand the city.” Q: What inspired you about the city, generally speaking? I was envious of the many beautiful piazzas (squares) and the narrow lanes that lead to these central areas of living; the fountains and old wells; the restaurants and cafes whose tables spill out into the streets; the fixed park benches/seats that are positioned to encourage interaction with others; the bookshop which had an atelier for children. All of these elements combine to create a strong culture of community participation and respect for one’s surroundings. Q: What significant learnings did you take away from the experience on your staff trip to Italy? Overall I felt this huge clarity of understanding, the philosophies just made so much more sense when they were being discussed and used in Reggio Emilia itself. Here they truly live out their teaching principles. As an early childhood teacher at Bear Park, you have a lot of exposure to such concepts. To witness the inspiring teachers, atelieristas and pedagogistas in action, as they explain their thinking and reasoning behind their projects, was incredibly inspiring. One concept that really resonated with me was around identity formation and how this is developed through our relationships with others. Children develop an understanding of ‘self’ as well as ‘other’ – they learn who they are through learning about who others are. Our identity emerges through our relationships with others, therefore valuing these relationships is crucial. Marika Fontana, a teacher in a preschool in Reggio Emilia, posed this question: ‘How do children perceive themselves in the world?’ While discussing this quite broad focus we could see strong links to the concept of identity formation. An interest in self and each other, discovering who I am in relation to the wider world. For instance, what makes me, me and you, you? How do we connect, what is our relationship? After reflecting on my notes from my time in Reggio, I’ve realised that I’m now making clearer and stronger connections to the group context of being at Bear Park. Another concept that stands out is the image of the child as being a ‘rich child’ and referring to schools (and centres) as either ‘rich’ or ‘poor.’ This word is not used to describe financial status but to indicate whether a school has a rich pedagogy, to establish if they are first and foremost places of education, where children’s potential is respected. In Reggio Emilia, everything is linked back to the image of the child. Peter Moss talked about how even policy development should start with the question ‘what is your image of the child?’ This shows just how strong the culture of respect is for children in the city of Reggio Emilia. It’s definitely something we could think about here in New Zealand at a policy level. For example, minimum legal teacher to child ratios or the minimum percentage of qualified teachers – what do these low expectations say about our image of the child? Q: Was there a particular speaker or person who inspired you? What was truly impressive was the way parents valued the idea of citizenship and participation; their child as part of a wider community fabric. Again, this ties back to the culture of the Reggio city, generally speaking. Here, children are valued as citizens, not ones ‘in progress’. Children are valued for their role in shaping what the future looks like and therefore the city invests in children. I attended a session where two parents shared their experiences. Both parents spoke about participation and how this is a democratic right. They shared their reasons for choosing to enrol their children in infant and toddler centres at young ages – to socialise, develop relationships, build an understanding of ‘other’ and to learn how be part of a group. They liked the idea of their children being part of a community through attending the centre and this is how they viewed the centres – as a community for their children. One mother described how important she believed it was to participate in general community events so that her daughter feels she is part of the community. She believed that through this, her daughter was experiencing active citizenship. Q: What would Bear Park need to do in order to help these ideas and learnings thrive in a New Zealand context? The connection of early childhood to citizenship is something that we could work on within New Zealand as a whole. Of course, this would involve changing the mindsets of the wider community along with a number of policies and regulations! On a smaller scale at Bear Park, we could increase parent involvement and discuss with parents about how they’d like to be more involved. It would be great if parents enrolled their children primarily because they want them to learn about being part of a community, as well as benefiting working parents who need childcare. Overall our staff trip to Italy was an incredible experience – thank you Bear Park.
61,272
Hundreds rally at Capitol for stricter gun control Published 11:46 pm, Thursday, February 14, 2013 HARTFORD -- A crowd of more than 5,500 came by bus and cars to converge at the Capitol Thursday in the March for Change -- a rally for stricter gun laws, including a ban on assault weapons, organized in response to the Sandy Hook massacre that killed 20 first-graders and six educators. Lasting more than an hour and spreading out on the grounds of the Capitol, the rally was timed for two months to the day since the Dec. 14 shootings. Many of those attending said it was time in the face of such horror for the silent majority to be heard. "I hope we can make a change," said Shelley Northrop, a Sandy Hook resident who took one of seven buses that left Newtown in the snow and cold for the Capitol. "The NRA has such a strong voice. There are people who feel like I do, whose voices are not being heard because we're not organized, but that's changing." During the bus trip, Northrop spoke about the pain felt by the community. Many people in town are connected to the massacre in some way, she said, either through a friend, a relative, a teacher or a neighbor. "I used to say that if you don't vote, you can't complain," she said. "Now I feel that if I don't do something, I can't complain." After stepping off the bus and onto the Capitol steps, Northrop and others unrolled a banner signed by the students from Columbine High School that had been sent to Newtown in the days following the shooting. "If you can't get on a plane without a background check, you shouldn't be buying a gun without a background check," Malloy said. Residents from every corner of the state came to have their voices heard and to listen to speakers who told their own tales of personal tragedy in the face of gun violence. Sally Cox, the nurse at Sandy Hook Elementary School, came Thursday to listen, and to lend her support. When the shooting started at the school on Dec. 14, Cox said privately that she could hear the gun fire, and the screams, from down the hall. "That sound, the sound of that gun and the speed, that's something you never forget. There are too many young people dying. Something has to be done," Cox said. "I believe if the assault weapon ban was still in place, this may have never happened. These guns were purchased legally." Among the speakers was Jillian Soto, whose sister, Victoria Soto, has been hailed as a hero for trying to save the first-grade students in her care. "For me Vicki was a hero long before Sandy Hook," Soto said, "she didn't have to die to prove that to me." Soto said she wanted her sister to be remembered for the wonderful teacher she was, and the great sense of humor she had, such as the time she wore flamingo pajamas to school for PJ day. "That's how I want her to be remembered," Soto said. "Not as a hero staring down the barrel of an assault rifle held by an extremely sick man." Veronique Pozner, whose 6-year-old son Noah was the youngest victim of the massacre, said citizens may have the right to bear arms, but not "weapons of mass destruction." Pozner held up and showed the crowd a picture of a turkey Noah had colored at school for Thanksgiving. On each of the feathers, she said, he wrote what he was thankful for, "electricity, books, family and friends." On the center feather, Pozner said Noah wrote, "the life I live." "That's the life that was taken," she said. Bridgeport resident Robert Thompson reminded the crowd that young children are killed from gun violence every day in America's cities. Thompson's 14-year-old son, Justin, was killed last year when walking home with his friends from a birthday party after three masked men opened fire at the crowd. "He was just starting to come into his own, just starting to realize that he had his whole life ahead of him," Thompson said, adding that a friend of Justin's was also "gunned down in the streets." "I'd like to say that what happened in Newtown was an anomaly, but in urban areas this happens on a daily basis. In cities like Bridgeport children are killed every day. We have to do something." "I'm here today not because of what happened to me, but because it keeps happening to other people, and nothing is being done about it," he said. "Hopefully, this time it's different." email@example.com; 203-731-3358; www.twitter.com/DirkPerrefort
101,520
Every child with a cleft needs more than just surgery — they may also need orthodontics, speech therapy, or nutritional support. A Single, Solvable Problem: Cleft Lip and Palate Many children around the world are living with untreated clefts. Most have difficulties eating, breathing, hearing, and speaking. children born with a cleft lip/palate annually in India. can cover the cost of a cleft surgery. minutes can change a child’s life forever. One Goal: To Give Every Child the Chance to Smile Smile Train is an international children’s charity that supports 100%-free cleft repair surgery and comprehensive cleft care for children globally. Our sustainable model empowers local medical professionals to provide cleft care in their own communities. We use the 'teach a man to fish' model focusing on training and empowering local doctors to provide comprehensive cleft care in their own communities. 365 days a year, a child in India receives their life-changing cleft repair surgery by one of Smile Train India's 235+ partner surgeons. News & Stories No Better Gift Than Aditya’s Smile! I still remember the day when my husband Siva and I learnt that we were expecting our first baby. Our happiness and excitement knew no bounds! I gave birth to a boy, whic... CHARLES WANG’S LEGACY OF SMILES Charles was the driving force behind Smile Train and the reason why so many deserving children continue to receive the care they so desperately need. His unwavering passion, com... The smiles that really matter! Smile Train is a blessing for children with clefts, born to families who cannot afford the cost of cleft surgery and related treatment. Identifying cleft patients and getting th...
308,037
Social network analysis of captive lions The African Lion and Environmental Research Trust (ALERT) is a not-for-profit organisation operating out of Africa that aims to breed captive lions for future release into the wild. As lions are slowly disappearing from the wild, programmes such as these are crucial to their survival. "After volunteering at ALERT in Zambia three years ago I instantly fell in love with the beautiful lions there and knew that I wanted to return and conduct my honours research with them." "After much hard work I had the good fortune to find that the Fenner School was home to Professor Robert Heinsohn, who had previously done research with lions in Africa. I was delighted; my dream of conducting research with these lions was going to become a reality!" "I wanted my research to reveal information that would be beneficial to the function of ALERT. I decided to analyse the social environment of these lions to see if they form social bonds within prides despite close contact with humans in their formative years." "My results were positive and I found that these lions are socialising with one another amicably. Honours at the Fenner School was an amazing experience as it allowed me to do such an ambitious project; it was definitely a year I will never forget!"
200,422
P.V. Glob, tr. Bruce-Mitford, The Bog People, 1965/1969. Without having read it, I’ve been citing this bog (“book” = “bog” in Danish) for years now just for the euphony, and now I can trump that. Even without the snappy title the book would be intrinsically worth reading, if only for the 64 pages of well-done black and white pictures of ~ 2,000 years old human sacrifices and other relics. Ideal bog conditions (not every bog will do) have preserved many bodies so well that they’re often thought to be recent murder victims, and one body was successfully fingerprinted. Such finds are common in Denmark, neighboring areas of Germany and the Netherlands, and parts of the British Isles (but not Sweden or Norway). Glob’s archaeology is presumably out of date (too much mutterrecht, for one thing), but his history of how these discoveries have been handled in Denmark over the centuries is interesting. In every era the police have usually been called first, with the local priest called next during the earliest period, either to give the bodies a Christian burial or to exorcise them. During the 19th century bodies were sometimes treated as curiosities and could become circus exhibits, but nowadays everything is routinely handled by scientists. In 1950s a tabloid newspaper claimed that the recently-discovered Tollund Man was a recent murder victim, but that hooplah died down once the radiocarbon dating came in. In one instance the railway freight agent rather unreasonably insisted on charging the high fresh-cadaver price for the shipment of a bog body, even though it was encased in a much larger quantity of peat, which ships much more cheaply. (This will remind some Americans of an old humor piece, “Pigs is pigs”, in which a railway agent charges the per-hog price for shipping guinea pigs.) Sinister bogs figure in Ibsen’s Peer Gynt, Hamsun’s Mysteries, and presumably many other Scandinavian literary works. And since Christ’s death on the cross was an atonement and substitute for this kind of spring sacrifice, my post is timely.
237,697
Light a Candle St. Catherine of Siena Church (click on the candle) (c) Daniel Amarilio Please give Humanity wisdom To eliminate the Poverty in the World. So that the rich become richer. So that no Poverty exists. So that no Parent bury his Child. So that our wonderful Planet is safe. So that we to live with Joy, in Peace and surrounded by So that we will glorify You through our short lives, finished even before So that to hear New prayers coming from every humans Which is the same for every Human in this World, independently rich or poor, white or colored, Abraham or Buddhas children. Because I believe only in Goodness.. The construction of St. Catherine of Siena Church began on October 23, 1951 and it was the second parish church built in Portsmouth. The land on which the church was built on was an original gift from the Immaculate Conception Parish of Portsmouth, NH. The church was dedicated on December 1, 1952. Its servants and members gave much efforts for fundraising. The church hall also became the midst for Christian Doctrine classes in the winter and for summer religious school. For more information click here Copyright Povertyvision and Daniel Amarilio © 2001-2003
101,459
All of the human embryonic stem cells available to federally funded scientists under President Bush's three-year-old research policy share a previously unrecognized trait that fosters rejection by the immune systems, diminishing their potential as medical treatments, new research indicates. A second study has concluded that at least a quarter of the Bush-approved cell colonies are so difficult to keep alive they have little potential even as research tools. The two studies -- the second still incomplete and the first one provisionally accepted for publication in a top-tier scientific journal but not yet published -- add new elements to the escalating debate over U.S. stem cell policy. Embryonic stem cell research has become an unexpected wedge issue in the neck-and-neck race for the White House, with Bush insisting that it would be immoral to expand the research to include new cell colonies and Democratic challenger John F. Kerry promising to loosen the restrictions that today limit federal funding to 22 of the more than 150 known cell colonies. The first study, led by Fred Gage of the Salk Institute in La Jolla, Calif., and Ajit Varki of the University of California at San Diego, focused on a peculiar aspect of the federally approved cell lines: Unlike colonies being derived using newer techniques, all the Bush-approved colonies were initially cultivated in laboratory dishes that also contained mouse cells. Scientists and the Food and Drug Administration have already expressed concern that animal viruses lurking in those mouse cells might infect the human cells and cause trouble when they are transplanted into patients, as doctors hope to do. With adequate testing, those cells may yet gain approval for use in patients, the FDA has said. But the new work suggests that the mouse-exposed cells have an additional drawback. At the heart of the problem is that all mammalian cells -- with the exception of human cells -- bear certain molecules on their surface, known as N-glycoylneuraminic acid. (Human cell surfaces bear a different but related molecule, N-acetyl neuraminic acid.) Varki had previously demonstrated that the vast majority of people have antibodies against this molecule, perhaps as a result of eating mammalian meat such as beef. The new work shows that human embryonic stem cells grown on mouse cells "consume" the mouse molecules and then display them on their own surfaces. When human blood serum was added to the mouse-cultivated human stem cells in lab dishes, antibodies attacked the stem cells and killed them. In the eyes of the immune system, "these human cells look like animal cells . . . which leads to [their] death," Gage said at a recent scientific meeting. Details of the experiment are embargoed until the research report is published, but Gage described the work on Oct. 12 to a panel of experts at the National Academies of Science, which is drawing up policy recommendations on stem cell research. Several teams around the world have lately had success growing human embryonic stem cells without mouse cells, and proponents of stem cell research said yesterday that the findings strengthen the case for letting federally funded researchers work on newer stem cell colonies. "This study appears to point out yet another flaw with the president's policy," said Sean Tipton of the Coalition for the Advancement of Medical Research, a Washington-based consortium of patient advocacy groups, scientific societies and research institutions. "It means these cells are unlikely to be useful for medical purposes." James Battey, who heads the stem cell program at the National Institutes of Health, said, "No question, this raises important safety questions." But he said he could envision techniques that might remove the problem molecules. "As with so many safety issues, there are a variety of clever solutions that could potentially be brought into play that could mitigate against this kind of problem," he said. Former FDA commissioner Mark McClellan added that some patients have already been treated with tissues grown on mouse cells without rejection problems. But he conceded that anti-rejection drugs -- which doctors hope to avoid with new stem cell therapies -- may have been needed. The second study, also summarized at the academy meeting, is comparing the characteristics of 14 of the 22 Bush-approved colonies. At least five of those colonies "will never be useful for the clinic" because they are so difficult to grow, said Carol Ware of the University of Washington, who led the study. Moreover, she said in an interview, she has found that each colony has its own quirky propensity to turn into one kind of body cell or another, suggesting many more than the 22 colonies available will be needed if the field is to reach its full potential to treat a wide variety of failing organs. Richard Doerflinger of the U.S. Conference of Catholic Bishops said the new findings could not justify expanding the research arena. "It's throwing good money after bad," he said, "but here the cost is not in money but in nascent lives."
297,190
23 Abr New Spaces, New Voices: Guide For New Feminist Educational and Media Policies by BeFem team The feminist and cultural center BeFem has been actively working for the past nine years to revitalize the feminist movement in Serbia, to reduce stereotypes on feminism and to make it easier for young people to engage in feminist and social justice issues. BeFem works mainly through media analysis and media production, education, training, and creating meetings places for debate, exchange of ideas and culture. BeFem also has a strong focus on promoting newer and smaller initiatives, especially those being created by marginalized groups or in marginalized areas of Serbia. BeFem is one of the initiators and active members of the regional network for feminist and cultural initiatives that includes all countries of the former Yugoslavia. The Program New Spaces, New Voices: Guide For New Feminist Educational and Media Policies is a continuation of what BeFem has focused on for the last few years, namely, production of media content that promotes feminism, women’s politics and resistance strategies to rising militarism, racism and nationalism. It is also about the experience of solidarity and the transformation of the local communities initiated by marginalized groups such as rural women. This year we recorded a short documentary “Women in the country side and rural tourism, about new women’s economic empowerment initiatives in small villages in Serbia. Through the production of media contents BeFem will make visible emancipation policies and the work of girls and women from villages, of girls and women who economically empower various groups of women in their local communities, and encourage them to take an active role in changing their environment. Through the BeFem independent feminist production, we will provide new innovative communication models, as well as an improved representation of women in media.
201,207
There really is no free lunch. The aphorism comes to mind in considering the matter of housing costs in Buffalo. They’re going up, so much and so fast that builders can’t afford to construct houses priced for first-time buyers. That’s one of the costs of Buffalo’s welcome and ongoing revival. As problems go, it’s not a bad one to have, especially since it goes hand in hand with an area’s desirability. Prices go up and some people can’t afford them. That’s supply and demand. Buffalo has an opportunity to play those rising prices to its advantage by encouraging lower-cost housing projects in areas that have long resisted the developer’s eye. While that could include a number of neighborhoods, the city’s East Side is an obvious place. Between its vacant lots, substandard homes and lower land costs, it’s a section of Buffalo whose time has come. It offers the flip side of the coin that is driving prices out of reach in other neighborhoods. That phenomenon is what one expert called “a new normal” in Buffalo. “Builders are building, absolutely,” said Jessica Lautz, vice president of demographics and behavioral insights research for the National Association of Realtors. “But they’re building at higher price points, and there’s no impetus for that to change.” It’s a big turnaround for Buffalo, a city that not so long ago was better known for its declining Rust Belt inheritance – that and snow – than for its many assets. That has changed. Between the continuing, long-awaited development of the city’s waterfront and the economic expansion driven in large part by the Buffalo Billion economic development program, the city is now a magnet for Millennials, empty-nesters and others who are drawn by the lure of urban life, especially in a city with as much going for it as this one does. But the cost: After years of stagnant prices, Buffalo is hot. The improving local economy and low interest rates have turned an oversupply of houses for sale into a shortage. The result is that Buffalo-Niagara’s long-depressed housing prices are rising faster than in any other upstate market – up 35% since December 2011, according to data from CoreLogic and the Federal Reserve Bank of New York. "Buffalo is the shining star among the upstate metros,” Jaison Abel, regional economist at the Federal Reserve Bank of New York, told The News. “We’ve had the fastest home price appreciation in decades and are outpacing the rest of upstate New York.” For sellers, that’s been a bonanza. For buyers, it’s a frustration as bidding wars erupt in some neighborhoods and builders meet a demand for higher-priced homes. But, as is usually the case, the city’s East Side lags. That’s long been its plight as advantages that come to other neighborhoods pass it by. This time, though, things can be different. The East Side is in the development sights of the Buffalo Billion. The Northland Workforce Training Center is helping to produce able employees from the East Side. The state is investing money in East Side infrastructure, prompting developers to predict substantial private-sector investment. Why not housing? It’s possible to build lower-priced homes, including prefabricated structures whose elements are constructed off site and assembled on the property they will occupy. That would not only provide lower-priced housing in a city where that is increasingly hard to come by, but will count as another building block in the East Side’s pending revival. And it will expand the city’s tax base. Some public incentives might be needed to start that ball rolling, but this is the time to do it. Buffalo, itself, is on a roll and the city now has a golden opportunity to help would-be homeowners, a struggling neighborhood and its own rising fortunes. Why wait?
98,317
The Say Yes challenge (Social Awareness Youth Enterprise Scheme) is about to enter its second phase after launching in Nottingham last year. The first phase of this highly successful project, driven by Victoria Centre, Nottingham, involved young people working to identify anti-social behaviour problems in their community and then finding solutions to address those problems. The organisers worked with young people from Bulwell Youth Inclusion Project and was a huge success, with at least two of the ideas coming from the project being implemented in the City of Nottingham. The challenge has been devised to enable young people to observe, investigate, evaluate and come up with workable ideas that will promote them in a positive light and at the same time constructively contribute to the areas in which they live. The challenge affords them an opportunity to make a difference. One essential and vitally important element of the Say Yes challenge is the presence of business mentors who work alongside the groups of young people offering guidance and support. The mentors are all volunteers working in business in Nottingham, and those participating in the first phase of the project came from companies such as Eversheds, Yorkshire Bank, House of Fraser, Heart 106 fm, Hoofers Health Club and Nottinghamshire County Cricket Club. This second phase of the project is now seeking additional mentors to work with young people who will be drawn from Youth Inclusion Projects, Pupil Referral Units and schools across Nottingham. Training will be given and mentors can work in pairs, which will allow greater flexibility and additional support. The young people, aged between 14 and 17, are given the challenge of setting up their own mini enterprise ‘companies’, and, under the guidance of business mentors, they work their ideas through into realistic and workable solutions to problems in their community as they see it. If you would like to become a business mentor for the Say Yes Challenge in Nottingham, or simply would like to know more about the project, then please contact Beverley Clark on 07951 922654 (firstname.lastname@example.org). THURSDAY 21 SEPTEMBER 2017 ENGLAND v WEST INDIES
96,059
Problems of Success Back Because education tends to lead to success in life, you are here at Liberty University to get an education -- or at least that's what your family and Dr. Falwell believe. What you really learn and how much you really learn are largely up to you, of course. It helps a lot if you already have a thirst for knowledge. Some people seem born to learn and happy to learn. Others want to learn no more than is absolutely necessary just to get by in the world. For them, all study is boring, and study is even aggravating, because to study amounts to an admission of ignorance. And how many people do you know who are naturally happy to admit their lack of knowledge? Even a poor teacher can do well with students who already have a thirst for knowledge. But the best teachers are those who somehow can inspire in students that thirst for knowledge which will lead their students to success for the rest of their lives. Education involves learning facts, of course. But it also includes learning how to study, how to think, and how to make things happen. Someone once said there are three types of people in the world: Those who make things happen; those who watch what happens; and those who never know what happened. I hope that you are among the many at this large and growing university who already have or soon will develop that thirst for knowledge which will enable you to become one of those people who will make things happen. Liberty University has right now, in this hall, a great many people who will be future leaders of our country. Graduates of Liberty are likely to be better leaders than students now at most other colleges because, in addition to academic learning, your college experience reinforces your moral foundation for a God-centered life. Let us presume for a moment that you, personally, have become well-educated, that your thirst for knowledge has enabled you to learn how to make things happen, that you have already achieved a number of remarkable successes, that many people recognize you as a rising leader. Are you home free? Are your problems over? Not hardly. You see, success brings its own, unique set of problems. The Bible often gives examples of how pride goeth before a fall. A run of success, like power, tends to corrupt. That is not to suggest that you shouldn't strive to be successful. Far from it. You have an obligation to put your God-given talents to their best use. In college, you should strive to be the type of student your professors find it a thrill to teach. In business, you should become someone with whom it is a pleasure to work. In politics, you should act effectively for your deeply held principles. Back in 1982, I asked Dr. Falwell to comment on a saying I was teaching to young conservatives. It goes like this: "Pray as if it all depended on God. Work as if it all depended on you." Dr. Falwell immediately replied that the saying is theologically sound. To that same question, several other prominent religious leaders gave me the same answer. So there's no question that intelligent, moral people should strive for success. And striving prudently for success quite often actually does bring success. But when you strive for success, as you should, you should always keep in your mind that success brings with it its own, new set of problems. Be prepared in advance to deal with the problems of success. Foremost among the problems of success is the temptation, once you're really successful, to believe that you are so special that the rules no longer apply to you, that you're so important you can do as you please, without regard to the standards, ethics, and morality which contributed to your success. For a year now, the news media have heavily covered the troubles of a prominent national lobbyist named Jack Abramoff. You've probably heard a lot about him, almost all of it bad, very bad. Jack Abramoff made tens of millions of dollars. On the other hand, he has pled guilty to numerous felonies and is almost certainly going to jail for a number of years. The scandals surrounding him may destroy the careers of a number of politicians and could have a major effect in next November's elections. You probably have heard nothing good at all about Jack Abramoff. But I'm here to tell you the whole story, which is not to be found in the headlines. His entire story should be highly educational to you and to any other young conservative who strives for success. Jack Abramoff had a sterling reputation. Yes, a sterling reputation. I met and trained Jack Abramoff during the 1980 Youth For Reagan effort, which I oversaw as a volunteer. My faculty and I trained young men and women in five Reagan Youth Staff Schools that year and hired 30 of the best for campus organizing in the 1980 fall campaign. Jack Abramoff, then a student at Brandeis University and College Republican state chairman of Massachusetts, was clearly one of the most outstanding of the 300 graduates of those two-day training schools. I personally offered Jack one of our 30 field staff jobs. Jack graciously declined and told me, "I'm going back to Massachusetts and organize enough students there to carry Massachusetts for Reagan." I laughed and replied, "Jack, if you carry Massachusetts for Reagan, we'll win in a national landslide." He did, and we did. Governor Reagan beat President Jimmy Carter in Massachusetts by 2,421 votes. Jack's campus effort garnered many more than that number of student absentee ballots for Reagan there. The next year, partly on the strength of his remarkable success in winning Massachusetts for Reagan, Jack was elected chairman of the College Republican National Committee. There again he succeeded spectacularly. In 1980, the number of College Republican (CR) clubs on the nation's campuses had grown from 250 to 1,002. In 1981, Jack's campus organizing efforts increased the number of CR clubs to 1,100 -- a new record which remained unsurpassed until very recent years. While a national CR officer, Jack widened his network of friends among conservative Republicans, impressing everyone. Jack was courageously conservative on all the issues: limited government, free enterprise, strong national defense, and traditional moral values. Moreover, Jack obviously took his Orthodox Jewish faith seriously. He kept kosher. He would not travel on the sabbath. He deplored profanity and vulgarity. Jack dropped out of politics for some years to make movies, including at least one which had some worldwide success, an anti-Communist action drama titled "Red Scorpion." Then he returned to political activity and explained he had found that, without major financial resources, he couldn't control his movies' content because the industry inserted into them, against his will, gratuitous profanity and vulgarity. Back in the political arena, Jack benefited greatly from the magnificent reputation he had earned. He had proved himself highly intelligent, highly principled, and highly competent. Clearly he was a hard worker and a talented leader. He joined one of the best known and most successful legal and lobbying firms in the Washington, D.C., area. Because Jack had built a very wide circle of friends in the political process, those of us who had known him since the early 1980s expected him to be successful as a lobbyist. He started up an Orthodox Jewish school and spent a lot of his own time and money on it. His reputation continued as clean as a hound's tooth. Fast forward to today. His reputation lies in tatters. The wealth he reportedly gained as a lobbyist may be eaten up entirely as a result of his legal problems. He'll soon be broke -- and in jail. Many who relied on the sterling reputation Jack built from his youth stand now accused as guilty of consorting with this sleazy character, Jack Abramoff. That's a bum rap against some conservatives who relied on his good reputation. He may have betrayed and damaged them, but they should not be dragged down by the guilt-by-association method. Fortunately for me, I never had any business relations with him or any contact with his lobbying activities. But before allegations regarding his business and lobbying activities arose, I and everyone I know who knew Jack since he was a college student 26 years ago would have given him a highly favorable recommendation. Those who knowingly consort with sleazy people are culpable. Those who associate with people whom they know have good reputations are not. That does not, however, prevent the unfair use of the guilt-by-association technique by the opponents of even the most scrupulous people. Political activists and leaders have no secure defense against the possibility that some associate who has a fine reputation will somehow succumb to disgraceful temptations. Politicians and news media usually hostile to everything conservative revel in the disasters which now surround Jack Abramoff. Clearly, the left intends to use Abramoff to damage or destroy as many effective conservatives as they can, most notably former House Majority Leader Tom Delay. No surprise in that. Piranhas reveal themselves through their feeding frenzies. When the newspapers began to publish and re-publish excerpts from Jack's emails regarding his lobbying business, I could not believe he had written them. Surely, I thought, someone has made up those emails to smear Jack. Sadly, over time it has become clear that he has behaved in ways highly disappointing to those, like me, who knew and admired him from his youth. A principled person does not discuss his clients with contempt. A careful person does not send out personally damning emails into the immortal cyberworld. A moral person does not support opposing sides in order to profit from each. An ethical person does not defraud his associates in business. A loyal person does not set up his friends for embarrassment. Jack Abramoff's fall from grace is not unique. Sadly, I know too many examples of people who built good reputations and extensive political networks who changed dramatically and for the worse when they decided to earn their livings through lobbying or political consulting. A great many people can't resist temptations to increase their income. They hire themselves out to people or causes they would have spurned in the days when they built their reputations by consistent adherence to well-defined political and moral principles. Some sink mighty low. Jack has proven again the wisdom often taught me by my mother and my grandmother, "A good reputation is the hardest thing to build and the easiest thing to destroy." In political activity, when one abandons long-held principles and starts measuring success only by revenue, one should have the decency not to drag down one's formerly trusting friends. Those whose trust is betrayed are the victims. The victims deserve our sympathy and understanding, not condemnation. In his statement after pleading guilty, Jack Abramoff said that his greatest regret was the damage he had done to those who trusted him. Right. But when he was raking in those millions of dollars, while privately showering his clients with contempt, he didn't give much thought to the consequences. Blinded by his own success, Jack succumbed to some very human and very common temptations -- temptations which should be fought and resisted by any highly successful person. Think about this. What if Jack Abramoff had resisted all the temptations spread before him? What if he had decided to work only for clients and causes in accord with his previously long-held conservative principles? Would he have made as much money as rapidly? Probably not. On the other hand, had Jack stuck to his principles, he would certainly have achieved some financial success. He would have kept his sterling reputation. He would not now be headed to jail. And he would not have brought scandal to his friends or disaster to his family. I know of only three ways to learn the lessons of life. 1) You can carefully study the experience of others. You can't observe everything, but you can, by wide reading and formal education, learn from the experiences of your contemporaries as well as those who lived ages ago. You can learn from them all. 2) By observation, by paying attention to what goes on around you, you can learn from the experience of others. Careful observation benefits anyone in any field, from sports to science to politics. Lessons from the lives of Jack Abramoff and many others are unfolding before your eyes. Keep those eyes open, and you can learn useful lessons of life every day. 3) Finally, you can learn though your personal experience. That's learning by trial and error, better known as the school of hard knocks. Personal trial and error is usually the hardest way to learn anything, though I can't deny that that school teaches its lessons well. Its drawback, however, is that by the time you graduate from the school of hard knocks you may be too old to go to work. No matter how diligent a student you are of the school of hard knocks, you cannot learn by first-hand experience everything you should know. So if you leave this thriving Liberty University and have the success which your family, Dr. Falwell, your professors, and I all hope you will have, please keep in mind that you will then have to face a new set of problems, the problems of success.
166,205
By Amy Campbell | August 11, 2008 4:00 pm If you regularly read my postings, you probably realize that I tend to write about a specific topic on a weekly basis. However, this week, my posting will be something of a "mishmash" of three topics—all diabetes-related, however. I just got back from the American Association of Diabetes Educators (AADE) 35th Annual Meeting, held in Washington, D.C. this past week. Someone told me that about 3,500 educators (nurses, dietitians, physicians, and more) attended. When you get that many people together, you’re bound to learn something, and I did. I wanted to share some pearls of wisdom, tidbits of interest, and interesting facts that I picked up over the last few days. If things seem a little jumbled, well, it’s because they are. Since you can’t attend more than one session at a time, I picked and chose those sessions that were of most interest and relevance to me. So, here goes: Welchol, or colesevelam, is not a new medication. It’s primarily been used as a cholesterol-lowering agent, binding to bile acids in the intestine. Welchol can be used along with a statin. What’s new about Welchol is that it’s also been found to lower HbA1c levels by at least 0.5%. That may not sound like a lot, but a 1% drop in HbA1c lowers your risk of diabetes complications by 37% and your risk of a heart attack by 14%. Welchol lowers LDL (bad) cholesterol by about 15% to 17%, as well. If used as a diabetes drug, Welchol can be prescribed along with metformin, a sulfonylurea, or with insulin. It’s not meant to be taken by itself. Also, it’s not intended to treat Type 1 diabetes. As with any medication, it comes with a few side effects: It can raise triglyceride (blood fat) levels, so caution should be used if your triglyceride levels are higher than 500 mg/dl. Welchol can also decrease the absorption of fat-soluble vitamins (A, D, E, K), and it shouldn’t be used in people with gastroparesis, other gastrointestinal disorders, or a history of bowel obstruction. Finally, you need to take six tablets every day, so if you’re not a pill-taker, this drug may not be for you. This session was given by one of my Joslin colleagues, Katie Weinger, Ed.D., R.N., who does a lot of behavioral health research. Some of the takeaway messages that I got from this session were that as the duration of Type 2 diabetes increases, one is more prone to hypoglycemia (low blood glucose); that there’s no evidence that hypoglycemia causes a substantial decline in cognition; and that in people with hypoglycemia unawareness (the inability to feel classic symptoms of hypoglycemia), symptoms of hypoglycemia can be restored. Also, she mentioned that, in the Diabetes Control and Complications Trial (DCCT), a landmark Type 1 diabetes study, 55% of hypoglycemic episodes occurred during sleep. My conclusion is that this means one should occasionally set an alarm at 2 or 3 AM to do a blood glucose check or think about wearing a continuous glucose sensor, especially if your lows tend to occur overnight. Hypoglycemia and driving don’t mix, so it’s crucial to check your blood glucose before you get in the car, and if you think you’re on the way down, to eat a snack to be on the safe side. By the way, men are more likely than women to drive when they’re low. A last tidbit of interest: Pediatric endocrinologists are more likely to talk to their patients—meaning adolescents—about the dangers of driving when low than adult endocrinologists. This excellent talk was given by a pharmacist, who relayed that people with diabetes are almost twice as likely to use supplements as people without diabetes, and that 20% to 30% of people with diabetes take some kind of supplement. She provided a lot of helpful information; two supplements that she discussed that I wasn’t aware of were chia (yes, as in Chia Pets!) and salacia. Chia, also called Salvia hispanica, became popular after being mentioned on Oprah (of course!). These are little seeds that are very high in fiber and can lower insulin levels, post-meal blood glucose levels, and blood pressure. Salacia works to inhibit an enzyme in the gastrointestinal tract to help lower post-meal glucose levels (much like the drug acarbose [Precose], although actually more potent). So, expect to hear and read more about these two supplements in the near future. All in all, this conference was another success, and in the future I’ll share more “clinical pearls” that I picked up over the last four days. Source URL: http://www.diabetesselfmanagement.com/blog/how-many-diabetes-educators-can-you-fit-into-one-convention-center/ Copyright ©2016 Diabetes Self-Management unless otherwise noted.
135,720
Visible leg veins have caused many problems for millions of adults around the world. They are often caused by genetic issues, meaning that those who have parents with visible leg veins are more likely to have them themselves. However, this issue can also be caused by disease and by issues that put more pressure on the legs, such as pregnancy and obesity. Understanding Visible Leg Veins As Aging Occurs There are two main types of visible leg veins that affect most adults. The first is commonly known as spider veins and poses mainly cosmetic issues. These are tiny purple veins that appear in web-like patterns across the surface of the skin. Most people do not have physical issues related to spider veins, but these veins could worsen over time without treatment. They may also make individuals unwilling to wear certain clothing or attend certain events where the veins would be showing. While spider veins are not physically problematic, varicose veins can certainly cause problems if they are not quickly addressed. Over time, they can become even more enlarged and can start causing pain with aches and cramping in the legs. They can affect one’s ability to sit or stand for long periods and may interfere with sleep by causing restless legs. If they continue worsening, they can cause swelling of the ankles along with itchy skin and skin ulcers. Addressing Leg Veins Thankfully, there are many ways that a physician can address either of these venous issues. Several noninvasive and minimally invasive treatments exist to destroy the veins permanently, causing the blood to be redirected to a healthier vein. Some of the most popular options include sclerotherapy, laser therapy, and ambulatory phlebectomy. While the veins may not disappear overnight, individuals will see them fade and eventually disappear within a few month.
176,037
By Alan Caruba When I was a kid, some six decades ago, Halloween was one of the most enjoyable holidays other than Christmas. The sixth graders in my town, in cooperation with local merchants, would paint Halloween scenes on the windows of stores and, on the great night, kids of all ages would go forth with bags and baskets to make a circuit of homes on their street to collect a bounty of candy. Flash forward to present times and it is often the grownups who are having the most fun if the sales of Halloween customs and the many Halloween parties are any indication. Kids? Well, they are treated like an endangered species. Among the first signs that Halloween was being exploited was the way UNICEF decided to use the holiday to get little kids to collect money for it. Apparently it is not enough that the United States contributes over twenty percent of the UN budget. According to a news release from The Thinking C.A.P.P Foundation, based in Hollywood, California, while Halloween is “a fun time for millions of children across the country, unfortunately there are thousands that end up in the emergency room due to preventable accidents.” Thousands? Emergency rooms over-flowing with injured children? I seriously doubt this. The foundation is devoted to “teaching children to protect their lives” and CAPP stands for Children’s Accident Prevention Program. Do we really need such a foundation? Isn’t it the job of PARENTS to teach their children what they need to know to avoid accidents? Some of the foundation’s recommendations include: - “Pick a costume both you and your little ones can easily get in and out of” - “A little face paint versus a mask for your toddlers” - “Wear bright colors (Add a splash of neon color if your costume is black)” As is well known all kid’s Halloween costumes tend to spontaneously burst into fire, masks cause toddlers to die from asphyxiation, and any child wearing a black costume is sure to be run over or disappear into the night and never be seen again. Do we really need such needless advice? The foundation goes on to tell parents not to let the kids carry “wands, swords, pistols, etc.” And here I thought the whole idea of dressing up like a pirate or cowboy was to be able to wave a sword or toy pistol around. And surely all our little princesses are not going to impale themselves on a toy wand. These days, most parents accompany the very young as they make their Halloween rounds. The foundation needlessly warns them to “ALWAYS have them within view!” and adds that “Nothing should be in your child’s hands except for their basket” and that “Everyone should have a type of light stick on them at all times.” As for the candy kids receive, you’d think that it was some kind of poison as far as the foundation is concerned. Avoiding the “Sugar Rush” comes with life-saving instructions that include drinking a glass of water or warm milk after they’ve indulged. Then they should “brush (their) teeth immediately after eating candy.” The whole point of Halloween is to over-indulge a bit. The foundation’s instructions to adults attending parties would probably warn them against getting diabetes or just getting too drunk to drive. These instructions are among the first avalanche that everyone will read or hear on their local media, filling the minds of parents with sheer dread of Halloween instead of the fun of picking out costumes and watching from a careful distance as the little ones go completely out of their minds with the joy of collecting FREE CANDY from the neighbors. Bad things happen to some kids everywhere every day. They fall off monkey bars, off of bikes, off of anything and everything. Since “if it bleeds, it leads” is the working motto of all local news television some kidnappings evoke huge coverage despite the fact that all child kidnappings and/or murders are horrible. That doesn’t justify ruining Halloween for the hundreds of thousands of kids who will one day look back on the fun it involves and the thousands of parents who enjoy it just as much. Here’s my advice for all the Halloween kill-joys, butt out! We all know you’re the ones who turn off the lights and pretend you’re not home. Alan Caruba is the founder of The National Anxiety Center, a clearinghouse for information about “scare campaigns” designed to influence public opinion and policy. He blogs daily at http://factsnotfantasy.blogspot.com. Connect with NJTODAY.NET Join NJTODAY.NET's free Email List to receive occasional updates delivered right to your email address!
64,324
Nicholas von Hoffman’s short, breezy, and informative sketch of Saul Alinsky — and of the decade he spent with him working as a community organizer — offers us a very different take on the legendary activist than the narrative we are accustomed to. This is especially the case for those conservatives who consider Alinsky close to the devil. Alinsky made the comparison himself, invoking Lucifer, along with Thomas Paine and Rabbi Hillel, in the epigraphs to his classic, bestselling 1971 guide, Rules for Radicals: A Pragmatic Primer for Realistic Radicals. As Alinsky put it, clearly facetiously, Lucifer was “the very first radical . . . who rebelled against the establishment,” and who was so effective “that he . . . won his own kingdom.” But the reality of Alinsky and his work was significantly different from what this tongue-in-cheek self-presentation — and, a fortiori, today’s conservative attacks on Alinsky — would have us believe. He was not a radical believer in Big Government, and he probably would have had serious problems with Barack Obama’s agenda. Alinsky became famous by organizing ethnic workers in the old Chicago stockyards from 1939 to the end of the 1950s, where he created the Back of the Yards Neighborhood Council as the vehicle to organize them. Because of his work, von Hoffman notes, “what had been an area of ramshackle, near-slum housing tilting this way and that had been rebuilt into a model working-class community of neat bungalow homes.” Candidly, von Hoffman adds that Alinsky did not challenge the neighborhood’s pattern of segregation, which had “become an impregnable fortification of whites-only exclusionism.” Back in 1919, these same workers played a part in the famous 1919 Chicago-area race riots, in which 500 people, most of them black, were wounded and 38 killed. Alinsky did manage to obtain permission for blacks to have unmolested passage through the Back of the Yards as they were on their way to other places — which seems little by today’s standards, but, as von Hoffman notes, was a major accomplishment then. As for the Neighborhood Council’s funding, it came not from government largesse, but from — of all things — the illegal-gambling activities of Alinsky’s partner, Joe Meegan. This spoke to Alinsky’s longstanding friendly relations with gangsters, thugs, and the organized-crime syndicates. That source of funding meant that any pressure from government to end racial exclusion would come to naught. Moreover, Alinsky’s belief that the people had to determine their own destiny meant, for him, that if the people wanted an all-white community, they should not be challenged on the matter. Although he wanted integration, and hoped that he could select and induce a few middle-class black families to buy homes in the Back of the Yards neighborhood and then convince whites to accept them, his partner Meegan nixed the idea. “Even public discussion of a Negro family,” von Hoffman writes, “would have the same effect as news that the bubonic plague was loose.” Even fair-minded whites in the area believed that blacks’ moving in meant “slumification, crime, bad schools, and punishing drops in real-estate values,” and hence the simple idea of an interracial neighborhood “would destroy the community and the council.” Alinsky’s code of loyalty to the Back of the Yards Council came before his personal opposition to segregation. (As von Hoffman rationalizes it, “the leaders behind the whites-only policy were his friends.”) The people pursued a policy he abhorred; and he had no choice but to stand with the people. An even more surprising revelation is that Alinsky admired Sen. Barry Goldwater, whose libertarian objections to the proposed 1964 civil-rights act he shared. Countervailing power from organizations, not decisions made by courts, Alinsky thought, was the only way to achieve permanent change. Thus, von Hoffman tells us, “he was less than enthusiastic about much civil-rights legislation,” and during Goldwater’s run for the presidency, he had at least one secret meeting with the conservative senator, during which they discussed Lyndon Johnson’s civil-rights proposal. “Saul,” von Hoffman writes, “shared the conservative misgivings about the mischief such laws could cause if abused,” but would not publicly oppose the bill, since he had no better idea to propose in its place. Alinsky also opposed Martin Luther King Jr.’s attempted march in Chicago in 1965, criticizing King for not building a “stable, disciplined, mass-based power organization.” He saw King as a man without local roots, who did not know the community, and who did not have any idea about how to organize it. Von Hoffman writes that King led “a little army stranded inside a vast and hostile terrain,” whose efforts “accomplished nothing except to reinforce the perception” that King “was an outsider.” But what did Alinsky think about the other major liberal ideas of the time — for example, Lyndon Johnson’s Great Society program, or Robert F. Kennedy’s program for the poor? According to David Horowitz, the conservative activist and author — in his very influential pamphlet “Barack Obama’s Rules for Revolution: The Alinsky Model” — Alinsky’s radical organizers had a responsibility to work “within the system.” They did not follow the path advocated by the New Left, who preferred to utter meaningless calls for “revolution.” Thus, Horowitz writes, they “infiltrated the War on Poverty, made alliances with the Kennedys and the Democratic Party, and secured funds from the federal government. Like termites, they set about to eat away at the foundations of the building in expectation that one day they could cause it to collapse.” While the New Left created riots like that at the Chicago Democratic convention in 1968, “Alinsky’s organizers were insinuating themselves into Johnson’s War on Poverty program and directing federal funds into their own organizations and causes.” According to von Hoffman, though, Alinsky had nothing but contempt for activists who gladly took money from the government, and hence his own group did not work within or for the government’s War on Poverty programs. Writes von Hoffman:Although Alinsky is described as some kind of liberal left-winger[,] in actuality big government worried him. He had no use for President Lyndon Johnson’s Great Society with its War on Poverty. He used to say that if Washington was going to spend that kind of dough the government might as well station people on the ghetto street corners and hand out hundred-dollar bills to the passing pedestrians. For him governmental action was the last resort, not the ideal one. Moreover, according to von Hoffman, Alinsky also opposed putting community organizers on the government payroll, as Bobby Kennedy sought to do, since “it made an independent civil life next to impossible.” It also created the conditions by which any administration could use their work for “social and political control.” It would “stifle independent action,” and possibly turn paid organizers “into police spies.” As von Hoffman sees his mentor, Alinsky opposed not only big government, but also large corporations and big labor. What he wanted was not revolution — despite his radical rhetoric meant to appeal to the New Left — but “democratic organizations which could pose countervailing power against modern bureaucracies.” Thus, in von Hoffman’s view, Saul Alinsky was a radical, but a Tory radical or a radical conservative: a man with a libertarian sensibility who supported all the little men fighting against any large structure, whether it was the government, a corporation, or organized labor. In today’s America, conservatives have paid a great deal of attention to what was — until its recent demise after a series of scandals — the largest and most successful community organization, ACORN (Association of Community Organizations for Reform Now). Critics have accused the group of electoral fraud, of shakedowns of large banking and manufacturing firms, and of helping to create the housing bubble by fighting to have community banks grant loans to those who had no way to pay them back. Many of the critics claim that the organization, formed in 1970, was inspired by Alinsky’s methods and concepts — but Alinsky had nothing to do with its founding. This is an important issue, because the great interest Alinsky has for commentators today stems largely from his reputed influence on Barack Obama. One often hears critics of President Obama’s policies proclaim that he is acting “straight out of the Alinsky playbook.” Because Obama was a community organizer for a brief time before going to law school, many people have assumed that, as a disciple of Saul Alinsky, he was committed thereafter to apply Alinsky’s principles as a guide for whatever position he held in life. Many therefore assume that he is now acting on them as president. It is true that Obama’s mentors were trained by Alinsky’s organization. In researching a piece for The New Republic in 2007, Ryan Lizza spoke to Gregory Galluzzo, one of the three men who instructed Obama when he became a community organizer. Galluzzo told Lizza that many organizers would start as idealists, and that he urged them to become realists and not be averse to Alinsky’s candid advocacy of gaining power, since “power is good” and “powerlessness is evil.” Galluzzo taught Obama that people have to be organized according to their self-interest, and not on the basis of what Obama himself has characterized as “pie-in-the-sky idealism.” In 1992, Obama famously worked for a voter-registration group called Project Vote, which was an ACORN partner, and helped Carol Moseley Braun defeat an incumbent U.S. senator in the 1992 Democratic primary. A few years later, Lizza reported, Obama became ACORN’s attorney, and won a decision forcing Illinois to implement the Motor Voter Law, with what the Wall Street Journal’s John Fund called “loose voter-registration requirements that would later be exploited by ACORN employees in an effort to flood voter rolls with fake names.” Obama cited ACORN first on a list he composed in 1996 of key supporters for his campaign for the state senate. So Obama’s association with ACORN was real, and close. This, combined with the fact that Obama taught Alinsky’s methods when he worked with community organizers, has led many to assume that Alinsky himself approved of ACORN. Von Hoffman, however, challenges this notion. He writes: “[ACORN’s] cheekiness, truculence, and imaginative tactical tropes have an Alinskyan touch but the organization’s handling of money, embezzlement, and nepotism would have drawn his scorn. Nor would he have been comfortable with the large amounts of government money flowing into the organization.” (Emphasis added.) This conclusion is essentially confirmed by the activist and writer John Atlas, whose new pro-ACORN book, Seeds of Change: The Story of ACORN, explains that the group broke with the Alinsky model in a number of ways — most importantly, by applying for and receiving government contracts. According to von Hoffman, Alinsky had nothing but disdain for the New Left with which Obama was associated. He thought Bill Ayers was wedded to “petulant ego decision making,” as well as a “comic-book leftism whose principal feature was anger at a government which did not do as they bade it. Their foot-stamping anger and humiliation at their failures . . . made them believe they were justified in taking up violence.” He saw the Weather Underground as a group prone to tantrums and “Rumpelstiltskin politics.” Alinsky’s own approach had some major successes. In Rochester, N.Y., he got Eastman Kodak to agree to hire more blacks. In 1965, he had been approached by ministers from Rochester after Martin Luther King Jr. had turned down an overture from them. This in itself provides an interesting contrast with some of the activism of later times: Alinsky took action after he was asked to intervene by community ministers. This was quite different from the kind of shakedown associated in more recent years with Rev. Jesse Jackson and Rev. Al Sharpton, the kind in which large corporations fill an organization’s coffers with money in exchange for a hands-off agreement. Yet, even in the Rochester fight, Alinsky’s methods often appeared rather comical, and it is rather hard to believe that they were taken seriously. According to von Hoffman, what Alinsky proposed, and scared the city’s elite with, was a scheduled “fart-in” at the Kodak-sponsored Rochester Symphony. He planned to gather black activists — for whom concert tickets had been bought — for a pre-concert dinner made up exclusively of baked beans. This would be his substitute for sit-ins and picket lines. Alinsky called it a “flatulent blitzkrieg,” and the result of this threat (along with other tactics, including the use of proxies at stockholder meetings)?evidently was a settlement in which the city fathers agreed to the demands. In Chicago, he threatened a “piss-in” at O’Hare Airport, which immediately led the city to the bargaining table. That such juvenile tactics worked perhaps says more about the fears of the politicians than the genius of Alinsky. Alinsky had some impressive backers. Among them was the old giant of the mine workers’ union, John L. Lewis, who advised him and supported him. (Like Lewis, he used Communists as organizers on his staff. He disdained the Communist Party and its Marxist and pro-Soviet positions, and regarded its members as “servants of an antidemocratic foreign power” — but because he valued the organizing skill of individual Communists, he hired them as staffers anyway.) He also bonded with key figures in the Catholic archdiocese of Chicago. The whites he sought to organize were mainly believing Catholics, and thus Alinsky became particularly close to Fr. John O’Grady, whom von Hoffman credits with doing away with clerically dominated local charities and replacing them with charities run by professionals from social-work schools in Catholic colleges and universities. Later, Alinsky became close to the Catholic philosopher Jacques Maritain, with whom he regularly corresponded. He also befriended Cardinal Stritch and Fr. Jack Egan, who got the archdiocese to give him the money to launch organizing drives in the 1950s. This constituency is hardly what one thinks of as a force for social revolution in America. So what were Alinsky’s goals in the end? Von Hoffman does not really answer this question, perhaps because Alinsky never did. Before people decide whether Saul Alinsky was a man with an actual revolutionary plan, they owe it to themselves to take into consideration von Hoffman’s contrary assessment of the father of community organizing.
289,060
FORT WAYNE, Ind. (21Alive) -- A new Indiana State law will require homes that had meth labs in them to be placed on a registry. The law was created so potential home buyers could find out if a house they are about to buy was used as a meth lab in the past. The Indiana State Police will oversee the the registry of houses and apartments where police have seized meth making materials. According to the law, a house or apartment must be deemed as decontaminated before they are removed from the list. What are your thoughts CLICK HERE to leave us a "QUESTION OF THE DAY” comment. © Copyright 2015, A Granite Broadcasting Station. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.
295,286
Disability insurance replaces your income should you become disabled and unable to work. Many people have some form of disability insurance through their employer. The employers' policy may not be just what your need. In this case, you will probably want to supplement the employer's policy with an individual policy of your own. A steady income is essential for most people. If an accident or illness interrupts that income, it affects both the employee and employer. Short Term Disability (STD) protection is designed to replace a portion of the wages lost when a short term disability occurs. An affordable, flexible STD plan can provide needed benefits to both the employer and employee.
180,225
US 6071317 A A method and system for modifying computer program logic with respect to a predetermined aspect, comprising (a) before run time: analyzing compiled computer program logic of a module for processes involving the predetermined aspect before run time, substantially without decompilation or reference to computer program source code; and storing a set of modifications relating to computer program logic modifications of the module relating to the predetermined aspect; and (b) at run time: based on the stored set of modifications, selectively transferring program control from the module to a separate logical structure, executing modified logical operations with respect to the predetermined aspect, and subsequently returning program control to the module. The predetermined aspect may be, for example, a data type, algorithm type, or interface specification. In a preferred embodiment, the predetermined aspect is date related data, and more particularly, to logical operations relating to date related data which are flawed. The system preferably operates in a mainframe environment, wherein the compiled computer program constitutes one or more load modules, executing under an operating system, wherein the computer program logic modifications preferably comprise program flow control diversions in an original object module, which selectively transfer logical control to a separate object module to effect modifications to the computer program logic, followed by a return of control to the original object module. 1. A method for automatically modifying computer program logic with respect to a selected data type, comprising the steps of: (a) analyzing object code representing computer program logic from the computer program to identify references to the selected data type, substantially without reference to or reconstruction of source code, wherein the object code representing computer program logic is analyzed by one or more processes selected from the group consisting of: disassembly, further comprising the step of applying inferential analysis and state dependent analysis to the disassembled object code representing computer program logic, scanning data files referenced by the object code representing computer program logic to locate data formatted as date data, and tracing presumed references to the selected data type through a logical flow of the computer program logic; (b) modifying the computer program logic with respect to the selected data type to alter computer program logical execution with respect thereto; and (c) storing information representing the modified computer program logic for execution. 2. The method according to claim 1, wherein the object code representing computer program logic is modified by substituting elements, substantially without changing a length or arrangement of the object code. 3. The method according to claim 1, wherein the object code representing computer program logic is modified by replacement of an instruction with a subroutine call instruction. 4. The method according to claim 3, further comprising the steps of replacing an instruction of the object code with a no-operation code. 5. The method according to claim 1, wherein the object code is modified by replacing an instruction of the object code with a jump instruction. 6. The method according to claim 1, wherein the object code is modified by replacing an instruction of the object code with a trap instruction. 7. The method according to claim 1, wherein the object code is modified by replacing an instruction of the object code with a new machine instruction. 8. The method according to claim 7, wherein the new instruction is a data-dependent instruction, having at least two functions selectively executed depending on a value of stored data. 9. The method according to claim 1, wherein modified program logic is represented in a separate object code module from the object code representing computer program logic. 10. The method according to claim 1, wherein the object code representing computer program logic is modified by a patch. 11. The method according to claim 1, wherein the object code representing computer program logic is analyzed by a process comprising disassembly, further comprising the step of applying inferential analysis and state dependent analysis to the disassembled object code representing computer program logic. 12. The method according to claim 1, wherein the selected data type comprises date-related information. 13. The method according to claim 1, wherein the computer program logic executes on an IBM mainframe compatible computer. 14. The method according to claim 1, wherein the computer program logic executes under an operating system selected from the group consisting of IBM MVS, VM, OS400 and OS2. 15. The method according to claim 1, wherein said analysis is automated. 16. The method according to claim 1, wherein the object code representing computer program logic is included in a load module, each load module also including a load map defining a computing environment of the object code. 17. The method according to claim 16, wherein a sequence of load module execution is defined by a series of Job Control Language statements. 18. The method according to claim 1, wherein said analyzing comprises scanning data files referenced by the object code representing computer program logic to locate data formatted as date data. 19. The method according to claim 1, wherein said analyzing comprises tracing presumed references to the selected data type through a logical flow of the computer program logic. 20. The method according to claim 1, wherein the data having the data type is presented to the computer program logic as a set of data records, each data record having a length, said modifying comprising altering a data format without altering a data record length. 21. The method according to claim 1, wherein said modifying comprises inserting an instruction to temporarily interrupt program logical execution to allow execution of new program logical instructions, following which logical execution of the computer program logic resumes. 22. A method for automatically modifying computer program logic organized as one or more object code modules, comprising the steps of: (a) analyzing object code logic to identify instances of a desired change, wherein the object code logic is analyzed by one or more processes, selected from the group consisting of: applying inferential analysis and state dependent analysis to disassembled object code, scanning data files referenced by the object code to locate data formatted as date data, and tracing presumed references to the selected data type through a logical flow of the object code; (b) modifying the object code embodied in the computer program logic with respect to the desired change to modify computer program logical execution, substantially without decompilation or reference to source code; and (c) storing information representing the modified computer program logic for execution. 23. A method for modifying computer program behavior resolve an ambiguity, comprising: (a) identifying an ambiguous reference in a computer program; (b) analyzing the ambiguous reference to determine a likely resolution, wherein the ambiguous reference is analyzed by one or more processes selected from the group consisting of: applying inferential analysis and state dependent analysis to the computer program, scanning data files referenced by the computer program to locate data formatted as date data, and tracing presumed references to the selected data type through a logical flow of the computer program; (c) defining an alteration to the computer program execution to implement the determined likely resolution; and (d) applying the alteration such that the determined likely resolution is executed during normal execution of the computer program. 24. The method according to claim 23, wherein said applying comprises applying a patch to said computer program to alter an external reference. 25. The method according to claim 23, wherein said applying comprises altering a parameter of an operating system under which the computer program executes. 26. The method according to claim 23, wherein said applying comprises altering externally referenced program logic to selectively execute in a manner dependent on an invoking program. 27. A method for automatically modifying computer program logic, comprising the steps of: (a) analyzing object code logic of the computer program by applying inferential analysis and state dependent analysis to the object code logic to define instances of a desired change; (b) modifying the object code in line to effect the desired change in object code logic, substantially without decompilation or reference to source code; and (c) storing information representing the modified computer program logic for execution. 28. The method according to claim 27, wherein said analyzing comprises scanning data files referenced by the object code to locate data formatted as date data. 29. The method according to claim 27, wherein said analyzing comprises tracing presumed references to a selected data type through a logical flow of the object code. 30. A medium for storing a program executable on a computer for automatically modifying object code of another computer program, comprising logical instructions for: (a) analyzing object code logic of the other computer program by performing an analysis selected from one or more of the group consisting of: applying inferential analysis and state dependent analysis to the object code logic to define instances of a desired change, scanning data files referenced by the object code to locate data formatted as date data, and tracing presumed references to a selected data type through a logical flow of the object code; (b) modifying the object code to effect the desired change in object code logic, substantially without decompilation or reference to source code; and (c) storing information representing the modified object code for execution. 31. A computer system for automatically modifying object code of a computer program, comprising: (a) means for analyzing object code logic of the other computer program by performing an analysis selected from one or more of the group consisting of: applying inferential analysis and state dependent analysis to the object code logic to define instances of a desired change, scanning data files referenced by the object code to locate data formatted as date data, and tracing presumed references to a selected data type through a logical flow of the object code; (b) means for modifying the object code to effect the desired change in object code logic, substantially without decompilation or reference to source code; and (c) means for storing information representing the modified object code for execution. This application claims benefit of Provisional application Ser. No. 60/069,211 filed Dec. 11, 1997. The present invention relates to the field of systems and methods for the automated detection and remediation of object code errors or anomalies, and in a preferred embodiment to systems for addressing the so-called "millennium bug" present in computer software systems. The software development process typically begins with a statement of the intended functioning of a software module, i.e., a statement of the problem. From this statement, a high level analysis is performed to determine the basic steps necessary to carry out the intended functionality. These high level steps are then further analyzed and translated into a computer language program. In many instances, the computer program interacts with the computer operating system, hardware, and/or other programs operating in the computer system. Often, events occur after a final program is debugged, compiled, and linked, which alter the operation of the software, or make latent defects in the operational logic or code apparent. One such instance is the so-called "Year 2000 Problem", or Y2K problem. This issue is insidious, because existing and operational code with no present deficiency, must be analyzed and appropriately replaced or remediated before certain critical dates, or be at risk of failure. Since many computer systems are interrelated and depend on each other for operation, the failure of even small or remote systems may lead to a "domino effect", resulting in failure of related and more important systems. Some failure modes are relatively minor, with inconvenient consequences, while others are catastrophic, stopping operation of the computer system, or worse, causing a failure of a real system controlled by the computer system. Where the computer system is an embedded controler or otherwise mission critical, the software or firmware errors may lead to death or destruction. For example, utility, elevator, flight control and even medical equipment and systems often have embedded controlers. Even where the date information is ancillary to the main function, a date reference which reveals a program logical error may lead to failure of an entire system. Where this is most apparent is where a system logs events or performs trend analysis. If there is an inconsistency in dealing with date data, the result could be a shutdown or erroneous operation. In fact, legacy embedded systems may particularly present this problem, because in the past, program memory was at a premium and therefore conservation of resources by compressing or truncating date information was employed, even where this meant a critical limitation on system design life. As discussed in detail below, many stable computer systems, particularly mainframe computer systems running immense and complex code, will suffer from the Y2K problem. This is a result of the use and reuse of legacy code and the persistence of efficiency techniques and assumptions which will no longer be valid early in the third millenium. When confronted with this problem, two significant considerations are the availability of accurate source code for the software to be analyzed and corrected, and the testing and debugging of replacement software to ensure that the functionality is correct, the corrected software remains compatible with systems to which it interfaces, and no new errors are introduced. Another consideration is the time and resources required to perform remediation, even where the source code and testing environment are available. There are a number of other, similar types of problems to the Y2K problem. Essentially, the class of problems arise because existing debugged compiled program code, for which the source code may be unavailable or inconvenient, or merely voluminous, becomes defective due to a relatively rare occurrence of a definable event. Other examples include program or operating system updates or partial updates, desired substitution of elements which would not effect fundamental program flow or logic, and translation of parameter sets to ensure operation in a new environment. Particularly, a problem often occurs in Microsoft Windowstype operating systems, e.g., Windows 3.X. Windows 95, Windows 98, Windows NT, Windows CE, and other variants, in which programs typically reference dynamic link libraries or DLLs, visual basic objects or VBX, or other code, which effectively becomes integrated with the operating system, and is often stored in a predetermined path with such DLLs and VBXs from other programs. In this case, where such common code is referenced by a single name, it is possible, and even likely that an updated version of the VBX or DLL by the same name will not operate with older software, and newer software will not operate with an older DLL or VBX. Similar problems occur in other circumstances and under other operating systems, mandating synchronized updates of multiple system software components. Another instance of this problem is the potential rise of the Dow Jones index above 10,000, which may lead to an extra digit required for representing the value in existing software which is otherwise fully functional. A further instance is the change in currency units in Europe to the ECU. Precisely defined, the Year 2000 (Y2K) Problem is the insufficient representation of the year datum as a 2 digit field (or variable) in software applications and their associated data files and data bases, the incorrect calculation of the leap year status, the inappropriate assumption of "1900" or some other year as a base year or "1999" as the final year, and the inaccurate programming of date calculations with respect to these inaccuracies, including computations, comparisons, assignments and other operations. The year 2000 is a leap year, unlike 1900. Normally century boundaries are not leap years; there are several exceptions to this rule, one of them is if the year is divisible by 400 in which case it is a leap year. Identification of date data and date calculations is complicated by the use of pointers and arrays, obfuscated by the lack of standard naming conventions and masked by embedding in other data fields. As a result, the software in affected applications may incorrectly assume that the maximum legal value of the year field is "99" or may incorrectly perform sorts and other operations that involve years designated by "00". Negative time duration could result from subtractions from "00" (assumed to be year 2000). Incorrect leap year calculations will incorrectly assume that February 29th does not exist in the Year 2000. Thus, in the year 2000, (or with some applications even earlier), when the year field is incremented, many date dependent computer algorithms that assume the year field will increase monotonically, and will produce erroneous results or cause abnormal program termination, with possible disastrous consequences. Possible deleterious consequences for affected applications range from outright application failure, to the production of incorrect results or aberrant behaviors, such as the generation of faulty schedules, incorrect trajectories, or flight paths, the failure of time sensitive safeguards in embedded systems, the generation of incorrect paychecks, contract transactions, mortality or morbidity from failure of medical equipment or pacemakers, or payment calculations in commercial applications. Since virtually every major application deals with dates and there is widespread encoding of the year as a two digit field, the likelihood that an application is affected by the Y2K 2000 date problem is very high. Indeed it is foolish, and in many cases life threatening, to assume that any mission-critical application is not potentially affected by the Y2K Problem. Another common oversight is the assumption that newer applications are not affected. Since programmers hardly ever start from scratch, newer applications are frequently contaminated through their use of date and duration. Newer systems often have to use the data structures of older systems, since they provide a new function to be preformed on an already existing system and associated data. Further, programming tools and operating systems may be flawed, resulting in failures even where the source code program itself does not contain explicit non-Y2K compliant logic. As the Year 2000 approaches, most organizations across the country have been wrestling with the problem of reprogramming date-dependent systems. Date-dependency refers to how most programs depend on the manner in which dates are represented in order to run computations. Many legacy software systems provide insufficient representation of date information to avoid ambiguity, and in particular, this problem arises either due to limited indexing address space or to the common abbreviation of a year as a pair of digits. Thus, as 1999 ends, a new date with a two digit year representation will be ambiguous between 1900 and 2000. For example, one common date format in COBOL programs represents Feb. 26, 1990 as 900226, and Jan. 1, 1991 as 910101, allowing the computer to compare the two numbers and correctly assume that the smaller number represents the earlier date. On Jan. 1, 2000, or 000101, however, those comparisons will be invalid. Likewise, programs which calculate the day of the week using only the last two digits of the year will get wrong answers for Jan. 1, 2000, and all subsequent dates. This is because the formulas they use implicitly assume that the dates are in the 1900s. Jan. 1, 1900, was a Monday, but Jan. 1, 2000, will be a Saturday. Another problem arises in systems which use a date as part of the key of an indexed file. This becomes a problem if the date has a two-digit year and the application depends on records in the file being in chronological order. Even if processing of the data does not depend on the records being in chronological order, it could result in records being listed in the wrong order in reports or on-screen displays. In 2000 and later, an application that is supposed to show the most recent items at the top, or on the first screen, would show the items on the bottom or on the last screen. The digit pairs "00" or "99" may be handled by special software routines, in which they may refer, for example, not to a date but rather to a null value or have other significance. Sorting on date is a special case, as discussed below. Reports and screens should therefore be looked at on a case by case basis to ensure readability. There could be bugs there as well, such as hard-coding "19XX" or zero-suppressing the year. There are three common approaches to remediate the software, which are subject to these and other date-ambiguity issues. The first is a complete replacement of two digit date codes with four digit date codes, (YYYY) or year and century codes (CCYY) with all accompanying changes necessary in the source codes of the program as well as necessary changes in the data files. The second approach is a logical analysis of a date representation to determine a most probable interpretation, allowing continued representation of dates as codes which occupy the same data space as two digits. Typically, the analysis provides a sliding window or pivot date, in which a continuous 100 year date range is supported, which does not necessarily coincide with the century break. Note also that a date window can, when a minimum value can be applied for the calculation, handle a range greater than 100 years, e.g., if you have no maximum retirement age, but have a minimum of, say, 16, then if in 1995 you encounter a birth date of 90 you could infer an age of 105 years, not 5. The third technique is compression of date data, in which a larger date range is stored in the same number of bits as the original date code. For example, by allowing an available 4 bits often used to represent the upper digit from 0-9, instead represent the upper hex digit from "0" hex to "f" hex', the years 1900-2059 can be represented. Further by using a binary representation for 8 bits, a 255 year span can be represented; if 14 bits corresponding to 2 ASCII digits are available then a year span from 0-16,000 can be represented. For example, a standard date routine may be provided using a sliding date window to infer the century in performing calculations on 2-digit years. The 00-99 range is divided into a 25-year forward portion (projected dates), and a 75-year backward portion (current year and 74 past years). The routine, for example, calculates a "forward century" (add 25 to current 4-digit year, take two high order digits), a "forward century endpoint" (same calculation, low order digits), and a "backward century" (subtract 75 from the current century). The most obvious solution to many Y2K problems involves increasing the data format of date fields from 2 to 4 digits in every affected application system. However, this is astronomically expensive, and it is may be unnecessary. The conversion to four digit year representations requires both changes to data and programs by converting all references and/or uses of 2-digit-year format (YY) to a 4-digit year format (YYYY or CCYY). It also requires converting all software pro grams to use the new date format and the use of "bridging" mechanisms to perform conversions between old and new data and programs. While this solution is preferable, ensuring that applications will operate correctly for the next 8,000 years, it has some notable drawbacks. The requirement to convert data formats requires every program that references date data to be modified and every data base that contains date data to be modified and bridged. Positional references to adjacent data fields may have to be adjusted. All record formats of records containing date data have to be changed. All data files, including historic data files have to be reformatted and rewritten. Performance may be impacted by increased processing times for bridge programs. Hard disk storage space requirements may double during data base conversion, for duplicated data files. Coordination is required with system owners of all external systems affected by changes to interfaces or shared databases to achieve simultaneous switch over to the updated date data format between multiple communicating systems. The date field format change requires all affected program logic, including declarations, moves, calculations and comparisons to be examined for year 2 to 4 digit expansion side-effects. The sliding window technique requires changes to programs only; no data format changes are required. The data itself however, needs to be modified. The sliding window technique uses an advancing 100-year or 10-year interval. The century or decade of a given year are unambiguously determined by comparing the value in a 1-digit or 2-digit year field against an "application window" that has a fixed upper and lower year boundary that can be periodically adjusted. The size of the "window" for an application depends upon whether the application works with a 100 years or 10 years worth of data. The period of adjustment of the window depends upon a number of factors, including the encoding technique. Some techniques require adjusting the window boundaries every year, or at less frequent intervals of 5, 10, 30, 50 or a 100 years. The "Sliding Window" technique allows the span of years which an application processes to be indefinitely extended by periodically changing the window boundaries and notifying users that the window is about to advance. Adaptation of existing applications to use the sliding window technique requires some extra overhead and code logic around date sorts, collations, literal comparisons and computations to correctly perform the mapping of a 2-digit date into the application "window" and to assure that computations are correctly performed. However, it avoids most of the massive change and inter-organizational coordination associated with the 2-digit (YYMMDD) to 4-digit (YYYYMMDD or CCYYMMDD) date format conversion approach. By using a sliding window technique, many existing applications can be adapted to process dates using a 100 year sliding window, and will have a correct date interpretation for at least another 65 years without requiring any modifications to existing data bases. Unfortunately, it may be quite difficult to create a realistic test environment to assess Y2K effects. It may not be easy to simply roll the clock forwards to see what happens. Setting a computer's internal clock forward may not just cause application failure on account of the date problem. For example, many software packages are licensed with time stamps that limit how long they can be used. Licensed software may not be licensed to run after the year 2000. In addition, it may not be possible to roll the clock backwards after rolling it forward because of irreversible changes made by applications to data files in future time that retroactively contaminate the usage of the application in present time. To isolate on-going operations from such contamination a completely isolated "time machine" is desired to evaluate and test Y2K year roll-over consequences. Even with sophisticated software tools, fixing the Year 2000 problem is an extraordinarily expensive and complex undertaking. The domain modeling task to identify date fields for even a single moderately sized application requires scanning virtually every line of application code, and examining every data declaration or usage to determine if it is date related. Often the usage of date names and computations are obscured or ambiguous even in source code because of the use of acronyms that mask the meaning of application data. Furthermore, determining the meaning of a specific date calculation or a datum occurring in a program is an example of a problem that is known in the software reverse engineering research community as the "program understanding problem." Program understanding is considered to be an extremely difficult problem for which no fully automated solution is known to exist, because it requires the correct assignment to a set of program constructs, that can take a large variety of different algorithmic forms, of a real world interpretation that is known only to humans. Another issue which arises in remediating programs relates to ownership and copyright. Often, programs are licensed by a user, who typically may have less than full ownership of the software, and who has no license to change the software or create a derivative work. In fact, the user may not even have the source code or have any right to use it. Therefore, techniques which require access to and changes to the source code to implement a correction pose certain difficulties. It is noted that it is unclear whether copyright law itself would prohibit self-help, but certainly evaluation of such considerations might impede a project. As noted above, software owners may include physical impediments to software remediation or software locks which prevent changes to the system. The inspection phase involves search through applications to identify all occurrences of date data and calculations and associated data bases. Software inspection tools are typically specialized to focus attention on identification of date data declarations and calculations and comprehension of their context of usage. Some of the more useful tool supported techniques are listed below: Domain Modeling. Identification of the set of entity classes, inter-entity relationships and operations on entities that are likely to be common to most applications in a given problem domain, such as the Y2K date domain. Many large applications share the same data definitions across many programs and thus have many parts of the same Y2K domain model in common. Consequently, domain knowledge gained in one part of a large application or a database may be transferred and used elsewhere to focus analysis. Domain Analysis. The systematic process for identifying the presence of a domain model within an application by identifying the correspondence between terminology and operations occurring in the application and the corresponding domain model. Subdomain analysis is a focused form of analysis that locates, identifies and models just the parts of an application that are most relevant to a specific subdomain, e.g. the date domain. Heuristic Search. The application of focused search techniques that employ insights that are known to be relevant to a problem to accelerate and focus a search for a solution. Heuristic search techniques employ knowledge of the relevance of certain data names, data name components, data types, data structures, data dictionary definitions, the syntax of data declarations and computations known to be relevant to a subdomain to identify declarations and calculations that have relevance to a specific domain model, such as the Y2K date domain model. Data and Usage Dictionary. A repository or database that defines the data names, aliases and data names and legitimate data value bindings for data usage actually found in programs. Software tools can support the incremental extension of a data dictionary during domain analysis of existing applications or the use of a data dictionary as a reference model for date data or usage identification. A data dictionary can serve as an extensible repository for entity classes, inter-entity relationships, operations and patterns referenced during domain modeling, analysis, and heuristic search. Automatic Program Documentation. A technique for automatically documenting a program (or selected portions of a program) by augmenting the program listing with definitions or short descriptions from a data dictionary to explain the acronyms used in the programs. Typically source code program listings are full of acronyms which may obfuscate the meaning of the programs to many readers. Automated program documentation can facilitate human identification of date-related declarations and usage in programs by clarifying the context usage by augmenting the program listings with meaningful descriptions extracted from the data dictionary. Automatic Program Documentation can also accelerate the assessment phase by accelerating human interpretation of the meaning of program constructs and the determination of their relevance to the Y2K Problem. The Assessment Phase involves the performance of change impact analysis with respect to the date data usage and calculations to define the corrective action to be taken at the potential sites of change. Change impact analysis involves techniques for recognizing similar patterns of usage throughout an application or application family, clustering groups of similar patterns of usage into clusters, classifying and assessing usage patterns, and annotating usage patterns with a specification for the adaptive maintenance to be performed. A summary of a few of the more conventionally applied tools is given below: Pattern Recognition. The use of automated and semi-automated techniques to recognize at a syntactical, structural or terminological level (or through general traits recognition techniques) the occurrence of a data declaration or usage across one or more applications. Tools for pattern recognition can be used to automatically identify the potential sites for Y2K change by recognizing parts of programs with correspondences to a Y2K domain model. Pattern recognition can also be used to amplify the human recognition process by automatically searching for other date related data declarations or usage throughout an entire system that are similar to code fragments (matching patterns in a pattern library) that are deemed by humans to be relevant to the Y2K problem. Pattern-based Cluster Analysis. The formation of groups of similar program constructs based upon pattern similarity that facilitates their comparison with the Y2K domain model to determine their disposition with respect to the Year 2000 date problem. By grouping together similar groups of code, tools for cluster analysis can accelerate the recognition by humans of recurring patterns of usage within an application or across different applications for the presence of data related program constructs and algorithms. Pattern-based cluster analysis can be narrowly focused upon a subdomain to accelerate the assessment process by excluding extraneous details. Pattern-based Classification. The automated or semi-automated assessment of the significance of a program construct, such as a date declaration or usage to the Year 2000 date problem. Tools can support the classification process by recommending classification for recurring patterns, performing automatic class assignment with verification, or by presenting potentially relevant parts of a program to the human for disposition. Pattern-based Annotation. The specification for a program construct of a notation that describes the action to be taken for the Year 2000 date problem. Tools for program annotation can support description or prescription of the Year 2000 corrective action by embedding these recommendations as comments in annotated versions of the program listings. These embedded annotations can be used to trigger Y2K corrective actions, such as the application of program transformation and rewriting techniques, in the Correction Phase, discussed below or used to indicate actions to be taken by humans. The Correction phase includes the performance of corrections (pattern-based transformations) to the change sites and the recording of the changes that are made to each application. Traditionally, change to software systems is accomplished by humans making manual corrective actions with desktop editors. Such procedures are prone to error and potentially difficult to trace or explain after they are made. Therefore, a pattern-based transformational approach to software change appears to provide a number of advantages over traditional, purely manual, methods. Transformation. The definition and application of a rule that automatically performs corrective action to software code for a specific type of Year 2000 date construct, whenever the construct is recognized by pattern recognition techniques. Program transformation tools now exist for several programming languages that facilitate definition and application of rule-based program transformations to perform adaptive maintenance. Transformation rules can be systematically defined, reviewed and authorized before programs are rewritten. Using transformation rules rather than humans to actually make the change can be accompanied by automatic insertion of each change as it is made and treating it as a carefully controlled, justified, authorized, (and potentially retractable) transaction with a record of its occurrence made to a log file. Change Logging. The creation of a register of the location, responsibility, and justification for a change applied by a transformation rule to an application to correct for a Year 2000 date problem. The maintenance process can be made more rigorous though the use of tools that keep a log of all program transformations that are applied to perform adaptive maintenance. Change validation. A process for human review and approval or denial of a change recommended by a transformation rule. Change validation assures that changes are reviewed and authorized by a human before they are inserted into the affected programs. Program Rewriting. An automated process for rewriting programs with Year 2000 date corrections installed in the programs. Program rewriting involves regeneration of programs from a knowledge-base while applying authorized change transformations and logging change activities. The Testing Phase includes the definition and running of regression tests, including structural and functional tests for each application, needed to assure (i) compliance with testing criteria, and (ii) demonstrate correct behavior under post Year 2000 operational assumptions. Testing may be the most costly aspect of the Y2K change process. Many organizations lack rigorous testing procedures and perform unnecessary testing or inefficient testing. The tool supported testing processes outlined below seek to offer a high level of automated support and narrowly focuses the emphasis of Y2K testing on affected parts of the applications. Regression Analysis. The analysis of an application or family of applications to distinguish the parts of the application programs that have been changed from those that are unaffected by the maintenance process. Regression analysis can factor out insignificant changes, such as comment introduction, and flag those parts of the programs in which significant changes have occurred. The degree of significance of a change, and even the testing technique that should be used to test a change, can be described in program annotations (comments or log entries) associated with the change. Regression Testing. Following adaptive maintenance of a system, tests performed to demonstrate that the system changed by the maintenance still performs all functions required prior to the change. Functional Testing. The construction of a set of tests to demonstrate that the system performs the intended functions as expected. Functional testing is concerned with the behavior of the program (i.e. the test results produced given test inputs). Functional testing should be guided by regression analysis that focuses test case preparation, unit and functional testing upon the changed parts of the programs. Structural Testing. The construction of a set of tests to assure structural coverage of the program units affected by the maintenance activity. Structural testing is concerned with assurance that affected areas of the programs are executed by the tests that are specified. Structural testing is typically guided by regression analysis to focus test generation upon the changed parts of the programs. Traditional methods of Y2K remediation require access to accurate source code. If unavailable from an original source, source code may be recovered from compiled modules, through a process which includes: Delinking; Disassembly; Pattern matching; Operand analysis; Internals analysis and Supporting information. The basic concepts behind source recovery rely on the assumption that any program intended for recovery is the end result of a clean compile and link. In other words, the source, at the time it was compiled, was syntactically valid and the program can be run the appropriate system. This method has been applied, for example, to IBM or compatible mainframe computers utilizing the 360/370/390 instruction set. The program contains everything required by the machine to execute the instructions contained in the original source and nothing that is superfluous. High level language compilers will generate a distinct pattern of machine instructions that can be analyzed and then programmatically stored, retrieved and applied to the programs to be recovered. These patterns may be as simple as a single machine instruction or they may encompass many dozens of machine instructions. Since the genera ted patterns are distinctive, the high level function which generated them may often be inferred from the assembler code, by pattern matching. The pattern matching technique seeks to recover high level language commands, but does not provide much information about other elements in a program, particularly data items in file descriptions, input and output structures, and the module linkage. These items might be recovered by applying operand analysis. Operand analysis refers to the detailed examination and eventual analysis of the operands of the machine instructions making up the procedure division of the program. The actual operand analysis may occur during both the disassembly and the decompilation of the program being recovered. As each operand is encountered, the probable value based on the machine instruction acting on the operand is determined and stored for later use during the source generation phase of the decompiler. It is noted that decompilation is a difficult process and has not been completely automated. In fact, it is estimated that roughly 30-35% of the decompilation process may be automated, the remainder of the process being the province of human analysts using sophisticated tools. Computer data is stored as sets of bits in a computer memory, which may be a disk, tape or volatile memory. These bits are arranged into larger bytes or words of memory. In contrast to decompilation, which seeks to produce human-readable codes in a high level computer language, for which fully automated tools are not available, computer programs are available which automatically convert the digital representations, referred to as "machine code", into low level "assembler" code containing assembler instructions. These programs are called disassemblers. A dissasembler has an intrinsically simpler task than a decompiler; the disassembler translates and parses the machine readable code into low level assembly instructions, possibly with control flow analysis. Often, there is a simple relationship between the machine readable code and the operators and associated operands. The solutions currently available for the Y2K problem principally involve a "source code" repair. These repairs are labor intensive, and at least as error prone as any software maintenance project, i.e., the possibility of introducing logical errors or incompatibilities is significant. Further, the corrections may also reveal latent errors or trigger software failure in the original software other than those previously known or related to the date function. Therefore, the testing process after repairs are made is a significant component of the process, requiring substantial efforts to exercise the software in situ while allowing a return to normal operation of the system after testing. Additionally, hardware upgrades may also pose additional testing issues. U.S. Pat. No. 5,630,118, expressly incorporated herein by reference, provides a system and method for modifying and operating a computer system to perform date operations on date fields spanning centuries. This patent discloses a system that calls a subroutine which seeks to resolve a date ambiguity and execute a correct set of instructions before returning to the main program. U.S. Pat. No. 5,495,612, expressly incorporated herein by reference, provides a system which executes additional link processes for resolving external references from a load module. Old subroutines are replaced with new subroutines, providing trap instructions at the original placement of entry points of old subroutines. A reference table stores entry points of old version subroutines and new version subroutines. U.S. Pat. No. 5,668,989, expressly incorporated herein by reference, provides a system which uses biased 2-digit "hybrid radix" numeric fields, having a compressed data format, which supports a date range from 1900-2059. U.S. Pat. No. 5,644,762, expressly incorporated herein by reference, provides a method and apparatus for replacing decimal digits representing dates after 1999 with binary representations in the fields previously reserved for 00-99, spanning a larger permissible range while occupying the same number of bytes. A number of methods are known for updating software in an operational system, without system unavailability. See, U.S. Pat. Nos. 5,682,533, 5,555,418, 4,954,941, 5,359,730, 5,175,828, each of which is expressly incorporated herein by reference. U.S. Pat. No. 5,659,751, expressly incorporated herein by reference, provides a system that dynamically links object oriented software components at execution time. U.S. Pat. Nos. 5,649,203, and 5,507,030, expressly incorporated herein by reference, provides systems that translate software, supporting undefined references that are resolved at run-time by an interpreter. U.S. Pat. No. 5,459,866, incorporated herein by reference, provides a method for automatically producing job flow specification by analysis of the job control language code and a load module. The present invention provides a system that automatically analyzes compiled code (e.g., object or machine code) to identify specific program instructions that are to be modified, wherein manual analysis, or even possession or remediation of source code is unnecessary. Therefore, in a Y2K remediation embodiment, the system relics on identification of the particular instructions or program execution points, e.g., date references or date-related code, in compiled load modules, which are then preferably patched in a manner which do not require alteration of the size of the data field or alteration of the general execution of the program. Since the references or locations within the original compiled program are corrected by discrete patches, this process may even be performed at the time the software module is actually loaded. In some systems, this "just-in-time" patching is particularly advantageous. Thus, where the load module or other compiled program is compressed or watermarked, or otherwise inaccessible for alteration without significant efforts, after loading in memory, the code may be subject to a patch overlay, containing the discrete changes, prior to execution. In this context, it is also possible to provide a dynamic overlay, which changes during the course of program execution. While the code being executed is fixed, a typical program includes multiple sections, only a portion of which are subject to execution at any given time. This allows, therefore, the logic of the "patch" to be dynamically changed based upon extrinsic circumstances. Therefore, a set of conditions may be defined for introduction of a patch, which may then be removed after the conditions are absent. This selective modification of program logic reduces the possibility of unintended consequences of patch logic and further reduces the testing burden to only those conditions for which the patch logic is executed and the use of the resulting results. Further, in the case of dynamic patching, a number of different conditions may be established, each with a different type of patch logic. A particular advantage of dynamic patching is that, where the conditions are not met, the program remains effectivley unchanged, and therefore the incidence of new errors and impaired program execution efficiency is reduced. The dynamic patching method would be useful, for example, in a Microsoft Windows-type operating system, wherein multiple threads execute simultaneously (e.g., the main program logic, the conditional sensing logic, and the program patching logic), and wherein loading of software modules is controlled through the operating system. The preferred embodiment of the present invention employs alterations to the operation of the computing system at the most common (and basic) level of programming available, the machine code. Machine code in executable form is typically the result of successful compiling, assembly and linking processes, as well as possible preexisting patches. All higher level computer languages are compiled and assembled into machine code for a specific computer architecture, which is then executed directly by the computing machine under the control of an operating environment. In some instances, code may be compiled for a "virtual machine", which is then implemented on specific hardware. In this case, the patch is typically applied at the level of execution of the program in the virtual machine, and not in the real machine, unless the remediation is specific for flaws in the virtual machine itself, or where functions provided by the virtual machine are particularly adapted for, and used by, program code in a predictable manner for a logical function. In a virtual machine environment, it is possible to virtualize machine behavior, and therefore it is possible to modify both the program logic, to insert traps, calls, and specialized instructions, as well as the virtual machine, to respond to the specialized instructions, in a manner analogous to the addition of new microinstructions to be implemented in hardware. The present invention can provide modifications at the machine code or assembler code level because the objective of the present system is relatively narrow: to find and correct only that portion of the program that directly or indirectly deals with particular program "events", such as date references; the normal program logic and flow is left intact, and indeed the low level structure is preferably left substantially unaltered, other than the necessary changes, reducing the incidence of creation of or functional discovery of new or latent program flaws. The process according to the present invention comprises a number of steps, which may be summarized as (1) Inspection, (2) Analysis, (3) Remediation and (4) Storage of Results. In the first step, inspection, the system is inspected to define the context and relation of program and data elements. Thus, in a relatively high level manner, the state, inputs, outputs, environment, and interrelation of elements is determined. In the second step, the program logic is analyzed for references to the specified "event", for example, reference to or use of date related data. This step encompasses, for example, disassembly of machine code and tracing of program logic. It is noted that not every instance of a reference to the specified "event" must be altered, and therefore the analysis preferably determines whether such alteration is necessary. In the third step, the remediation is applied to alter the program logic. In the preferred embodiment, this remediation takes the form of selection of an appropriate alteration of program logic to achieve a desired result, and patching of the program by substitution of simple program flow control instructions for altered program logic, as well as a logic for circumventing remaining program logic which is undesired. In the fourth step, the revised program logic is stored for execution. While the disassembled code may be reassembled, with the patches, the defined patches in the remediation step may also be applied to directly to unmodified compiled program code, without changing program length by inserting traps to the patch code. When a mainframe-type computer, e.g., an IBM 360/370/390 class computer, running an operating system (OS/360, OS/370, OS/390), prepares to execute a program, a special file, called a "load module", is transferred from mass storage, e.g., computer disk, tape or other volatile or non-volatile memory, and is stored in the computer main memory space. This load module contains the "link-edit" of one or more "object modules", which result from compilation of programs written, e.g. in COBOL or other computer languages. The link-edit process provides a load module, which includes both header information, as well as program object code. The header defines the contextual information and other aspects of module operation. According to one embodiment of the present invention, the operating system-level controls, e.g., "Job Control Language" or JCL commands, are scanned and analyzed to determine a sequence of program modules or load modules, the interrelation of load modules and data structures, including external data files and operating system resources. A load module includes both header information, as well as program object code. As noted above, the header provides contextual and control information for the object modules, including load maps, which define the loading parameters for the load module in memory and allows an offset reference to particular code and/or data elements, such as date references, and also define an execution environment for the code. Therefore, the first step in the process may be performed prior to analysis of the object code of the program element. In order to analyze the program logic, in the second step, an object module, from the load module, at a time prior to execution, is first disassembled into "pseudoassembly code" by a so-called disassembler, a program that converts digital data into assembler code representations of the operations to be performed by the computer. While this conversion is optional, it facilitates logical analysis of the object code. The resulting disassembled code is called pseudoassembly code, because it may differ somewhat in form from the original assembler code from which the load module was assembled and linked; however, it represents the same program logical organization. In the preferred embodiment Y2K remediation system, the pseudoassembly code is then scanned in great detail to look for any reference to a date in a "data field" or "register", or date derived data produced by logical reorganization of date information. A process of "decompilation" is not required, and indeed this is a principle advantage of the present invention. Since the process for fully automated decompilation of software to high level computer language is not readily available, the elimination of such a requirement facilitates automation and therefore reduces the costs of remediation. These date-related software processes may be identified following logical processes, direct or indirect, on external data which includes date information, and environmental variables, such as reference to a JCL "date card", or by a reference to a clock (hardware or software). The date references may be presented through data structures, including data files, which may be identified as date information by an analysis of the data file specification, context, artificial intelligence or manual intervention. In contrast to the unavailability of fully automated decompilation, this analysis step (as well as the inspection step) can be fully automated using existing tools and paradigms. These tools include syntax analyzers and inference engines, such as CLIPS. The data files referenced by the program are also analyzed for the presence of date information, for example by a characteristic data format commonly representative of date-related information. Once date-related information is located in a data file, any program logic that references this date location may also be discovered. Likewise, once a date-related program operation is identified in the program logic, any data processed by that logic would be considered date related. It is noted that the present method is not limited to the processing of date-related programs and data, but rather the present invention provides a new method for automated alteration of the program execution, especially adapted for field overflow exception processing and legacy systems having a number of references to data of a first type which require modification for handling data of a first and/or second type. For example, the modification of computer systems to deal with the new European currency, the Euro, either in addition to or in place of national currencies may be implemented through use of the present invention. Another example is to modify financial computing systems which operate to compute or receive Dow Jones Index information, which historically has been below 10,000, but is nearing 10,000. In addition, many legacy systems are faced with various unanticipated types of data field overflows, and the present invention may be applied to adjust data processing systems to handle larger or richer data sets than originally provided for (e.g., extra digits on license plates, social security numbers, NSN numbers, other serialized numbers or sets of numbers which require an extra digit or identifier or overflow). The present invention may also be used to alias or change a reference to a particular data field, program module, function, directory path, or the like, in programs which normally do not allow such alterations. For example, in a Microsoft Windows-type operating system, programs typically call functions contained in so-called DLLs. These DLLs may be stored in a common directory, and in use are integrated with the operating system. The DLLs are separately compiled, and are subject to independent update and replacement from the program itself, and indeed, a DLL may be supplied by a different source than the program itself and thus be updated through a different channel. However, it often occurs that new DLLs do not operate with older software which reference the name DLL having the same name, and that new software does not operate properly with older DLLs. Thus, the present invention provides the possibility of patching the compiled originating program to reference a DLL by a different name (and renaming the referenced DLL) or to patch the DLL to identify the calling program and appropriately execute the old or new DLL program code, depending on source. The patch may also operate on the original program or operating system to selectively redirect DLL calls to different directories (without renaming the DLL itself) based on the identity of the calling program. This embodiment of the invention therefore requires substantially less inspection of the operating environment of the software, possibly to a point of trivialization. The analysis phase is also simpler, in this case typically employing available tools for determining or analyzing program references, or, in the case of Microsoft Windows NT, 95 and 98, the system registry. The remediation phase, in this case, is preferably in-line, as the magnitude of the changes are such as to make references to external program logic inefficient. Finally, the storage phase is relatively straightforward. It is noted that, in this environment, patches may be made immediately before program execution, after the program is loaded into memory. This is advantageous, for example, where the source of the program is write protected or non-rewritable media (e.g., CD-ROM), or where modifications of the original program is undesired, e.g., in a network computing environment, where the patch is specific for a computing environment and not for all execution of the code. The present invention may also be applied to remediate embedded systems. In these systems, an exemplar or prototype is fully inspected and analyzed, either through analysis of the code or through a functional analysis of the inputs and outputs. On the basis of this inspection and analysis, a remediation protocol is established. However, in contrast to other embodiments of the invention, the storage of the result may take a different form. In many instances, the compiled code for an embedded system is contained in a non-rewritable memory or in a manner which does not allow for the addition of new program logic. Therefore, in order to avoid replacement of the memory or the embedded system as a whole, the "patch" modifications may be typically be applied at the inputs and outputs of the processor to alter or replace the normal signals, without specifically altering the stored instruction code. In such embedded systems, especially those without advanced security features, it may be possible to analyze the instructions and data of an embedded processor during operation. Typically, replacement of the processor with a revised design is difficult and involved a substantial debugging effort. Further, older hardware may be unavailable. Therefore, the present invention allows a hardware device to be implemented, such as by a Programmable Logic Device (PLD) or microprocessor, to specifically detect the imminence of an undesired event or instruction execution. Therefore, the new hardware device may be placed in the embedded system to analyze the instruction and/or data pattern, and preempt, prevent, or fix the execution in real time. If we presume that the remediation is a rare occurrence, then the new hardware will have little effect operationally on the system as a whole, and will unlikely introduce execution errors and "glitches". The presence of any such glitches may be determined with far lesser effort than debugging an entire new system. It is noted that many embedded systems provide real time control functions. Therefore, it may be critical that the new hardware not alter the timing of program execution. Fortunately, it is likely that older hardware which requires remediation will typically be slower in execution than modem hardware. In many instances, even if the remediation code requires a significantly greater number of program execution instructions, it is possible that the overall timing may be kept constant. Thus, the present invention provides a hardware "patch" embodiment for embedded systems and the like, for which pure software patching is impossible or undesired. The analysis program according to the preferred Y2K remediation embodiment must identify date references and analyze associated logic. Date references may typically be identified by characteristic data structures and reference thereto within the code. Particularly, it is noted that high level language compilers use characteristic data formats of limited types for date information, e.g., binary, ASCII, packed decimal or binary-coded decimal format, six or eight digit representations, e.g., YYYYMMDD, CCYYMMDD or YYMMDD for date, and counters which provide a relative time since a reference date (e.g. minutes since 01-01-82). Once a date reference or date derived information is identified, an analysis program analyzes the code and proposes an appropriate logical modification, if necessary, to make the program Y2K compliant. The analysis program thus includes a library of modification types, to fit the pattern of date usages and program context. Where a date reference does not match the specified patterns, an exception may be generated allowing manual intervention or alert to the possibility of inappropriate results. Where immediate correction of the code is deemed unnecessary, the date reference is nevertheless stored, e.g., as part of a table or to ensure that the information is not later used or referenced. According to a preferred embodiment in a mainframe environment, these date-related data references are stored in a separate table of program offsets. Data from this table may be used as part of a modification process to alter program flow during execution to corrective subroutines, returning program control after subroutine execution to the normal object module code (at a point after the replaced logic), to patch the object module or to help define modifications to the object code. After the program logical modifications are defined in the analysis procedure, three options are available for implementation. First, the object module may be "patched", i.e., changes are made to the original object module itself, within the same "footprint". Second, the object code may be subjected to trap codes, which are normally reserved for program debugging and high level system operators. In the case of trap codes, program logical flow is redirected with automatic storage of the machine state prior to the trap. After the trap procedure is executed, the program flow may be directed to normally resume at the subsequent instruction to the trap instruction. Third, the pseudoassembly code may be modified and reassembled as a modified object module. In this latter case, any additional code may be provided in any of the foregoing described manners, as jumps, calls, trap codes, references to code in other object modules or in accessible memory, and the additional code may also be appended to the end of the object module or inserted "in-line" with the original code, i.e., interspersed with the original program code. Where in-line modifications are made, the obsolete code may be replaced with new code, or modifying code placed sequentially with the assembly code to correct program execution. This allows potentially greater efficiency and speed of operation, as compared to references to separate program modules. Preferably, in an IBM mainframe environment, the patch code is not placed in-line with the object code, in order to avoid potential for interference with program logic and memory allocation. Further, in the IBM mainframe environment, other than the appropriate insertion of trap or SVC codes and NOP instructions, the object module is preferably not further modified. However, under different circumstances or in differing environments, in-line patching and reassembly of the patched, disassembled code may be appropriate and desired. The modification may be, for example, a modification of the code to provide a different representation of the year, without expansion of the date field or alteration of program length. This process is termed data compression. Many date references will not require alteration or modification. Some code locations need only have a single "literal" value changed. In cases where code has to be added, a Call Subroutine, Jump or Trap Code is provided, which temporarily redirects program logical flow to a distinct set of program instructions, i.e., located in a different set of memory locations than the original code, allowing additional instructions to be executed, before returning "flow control" to the original object code. This added code may be embedded into a modified object module (by a reassembly process), embedded in an additional object module within the load module, or provided in accessible memory as, e.g., "common code". In cases where code has to be deleted, possibly in conjunction with the use of substitute or additional code, one or more "no operation codes" (NOP) are inserted into the program in place of the deleted instructions, to avoid execution of obsolete instructions, again retaining the logical structure of the original load module. Alternately, especially where Jump instructions are employed to divert program flow, a table of return locations may also be provided which bypass obsolete code. The trap code may be of a number of different types. First, a so-called supervisor call or SVC instruction may be executed, which, through the normal functioning of the operating system, allows one software module to call another, and upon completion of the redirected execution, returns to the subsequent execution point in the calling program. The SVC is a specific type of machine flow control instruction, of which there are a number of possible variants. As employed herein, the term SVC refers broadly to the general class of machine flow control instructions which act to call a software module from another software module, and ultimately allow return of control to the calling software module, and not limited to the particular instructions which are denominated "SVC". The second involves a so-called microinstruction trap, in which an existing or new microinstruction (i.e., a hardware level instruction which potentially allows a complex functionality) is executed, which diverts program execution from undesired code to remediation code in a separate software module, which after execution of remediation code then returns to the subsequent instruction in the calling program after the microinstruction trap. Finally, the remediation may be implemented entirely as one or more machine microinstructions. In this case, one or more special microinstructions may be provided which specifically execute remediation routines in hardware, without diverting object code program execution to a different high level software module. In all of these cases, existing code which is obsolete must be bypassed, such as by insertion of a jump (JMP) instruction, no-operation instructions (NOP) or by other means. Where special microinstructions are provided, these microinstructions may be of a novel, data dependent, functionality. Therefore, in contrast to known "conditional" microinstruction operators, which test flags and control program flow based thereon, these special microinstructions may perform operations which follow different logic paths depending on the data, which may include values stored in one or more registers or memory locations. These data dependent instructions are advantageous because they potentially facilitate minimization of program modifications or "patches" of the load module, and allow direct implementation of much of the required remediation, and indeed a resulting patched program may be of such a nature as to allow permanent usage. Further, where the new microinstruction performs a valuable function, it may be more generally used outside the remediation context, as part of normal compiled code. It is noted that, in terms of program execution efficiency, the SVC and high level machine code flow control may be less efficient than a machine code trap instruction, and a trap instruction may be less efficient than a specific machine instruction for software remediation. However, such machine code trap instructions may not be available for use, and the modification of mainframe microcode to implement special instructions is non-standard and requires low level alterations of the hardware environment. The present invention also allows dynamic or run-time resolution of the patch. In other words, different logical patch algorithms may be executed depending on the program calling the patch routine and the data being processed at the time. Thus, in some instances, no remediation is necessary, and the original program execution may continue unchanged. In other instances, there may be alternate patch functionality desired for differing data or machine states. Thus, the patch program instructions may examine the various registers and data storage locations, stored tables and even the object code of the source program, to control execution of the patch algorithm. In this way, the patch code may be streamlined, with a minimal number of different but generic remediation algorithms, e.g., five, available to handle the various "fixes" which may be necessary. The Call Subroutine and Jump instructions provide somewhat different functionality. Each alters the program environment in a different manner. The Call Subroutine instruction places the present program counter and machine state into predetermined registers or onto the stack, which may have limited capacity. Thus, it is possible that a Call Subroutine which was not anticipated by the original programmer could result in a stack overflow. Further, a non-standard programming practice directly accesses the stack, which would not be in the state expected by the original programmer. The Call Subroutine instruction also automatically causes a resumption of program at the instruction immediately after the calling instruction (program counter plus one). The Jump instruction requires an additional word or two prior to actual jump execution, to define the location of the Jump instruction, to thus define where program execution should recommence after processing of the new instructions. However, a Jump instruction does not alter use of the stack and does not rigidly mandate Return parameters. However, a Jump instruction may be limited in range; the IBM Jump instruction is limited to 4095 bytes. The trap code is somewhat similar to the subroutine call, but has enhanced hardware support, and it is normally not employed in production software. Therefore, it is unlikely that the use of trap codes will conflict with other concurrent uses in a production software environment; however, where separate uses of trap codes exist, conflicts should be avoided. Modification of microcode is considered a substantial undertaking, as there exists the possibility of significant and/or unintended alteration of machine operation. However, if appropriate, this allows a very efficient implementation of a remediation solution. It is noted that, in some cases, the ambiguity created by the overflow of the two-digit representation of year in date-related data was intentionally exploited by the original programmer. Therefore, the system according to the present invention preferably analyzes the pseudoassembly code for these occurrences, to prevent introduction of program logic flaws. For example, if the date-ambiguity problem occurs with dates before 1999 or 2000, for example, or on the date of modification, where program execution appears otherwise normal, then it is possible that the identified "ambiguity" is a normal condition for the program logic. After the modifications to the program execution are defined and implemented, a revised load module is created. The load module is either patched directly or code is added and re-linked. The revised load module may then be immediately executed, or returned to mass storage for later execution. Preferably, the load modules are preprocessed and stored in remediated form. The original load module may be compared for performance against the modified load module, both during normal operation and specialized testing to determine year 2000 compliance. As can be seen, the process according to the present invention may be executed in advance, to provide a set of patched load modules, or on the spot, i.e., in a preparatory stage for load module execution. Therefore, the present invention may be used in environments where code is subject to frequent updates, maintenance, or repair. More specifically, as an adjunct to source-code level modifications of massive software systems, the present invention allows unmodified code and partially modified code to be used in systems to test manually modified code. Thus, according to the present invention, source code may be modified sequentially, debugging each source code module independently, rather than requiring complete systems to be modified prior to testing. Further, the present invention also allows for the automated identification of potential year 2000 compliance issues at a load module level, by an analysis of any changes made to the code. If program source code of the program is later modified for year 2000 compliance, the modifications of the corresponding revised load module according to the present invention will be either eliminated, or any changes made insignificant (from a logical standpoint) to program execution. Further, object modules which interact with revised object modules may also be automatically modified to assure system operation. Thus, the present invention is compatible with manual efforts applied where the efficiency and accountability of optimized source code are necessary, while allowing automated fixes and patches according to the present invention, e.g., in other cases, where potential inefficiencies, i.e., increased program execution times due to trap execution latency and disruption of program logical flow, are tolerable. The system according to the present invention is thus compatible with ongoing programs of program maintenance, as a tool for prioritizing manual recoding, while permitting continually updated system operation. As a part of a software maintenance process, the present invention may be used to automatically test algorithmic "fixes" to the program before manual efforts at modification of the source code are implemented. Thus, the analysis program may be fully automated or controlled at a very fine level. The types of modifications and the pattern analysis applied may also vary according to specific circumstances. The system and method according to the present invention thus eliminates the need for access to source code in making a software system year 2000 compliant, and thus absent or deficient source code systems, or systems written in unknown or "obsolete" languages, may be modified. The level of manual efforts is potentially reduced, and the speed of modifications is increased, due to the highly automated nature of the process. Due to the ability of the system and method according to the present invention to automatically alter entire systems to achieve compliance, information technologies management may prioritize the staffing allocation to manual analysis and maintenance of code, without regard for the availability of source code and with project completion dates after the dates at which program execution flaws would normally have become evident. The system and method according to the present invention also reduce or eliminate the risk of introducing new program execution flaws, such as often occur during even routine source code maintenance or repair, and provide a benchmark for comparison of manually modified programs. Table 1 provides a comparison between the traditional source code remediation method according to the prior art and the object code remediation according to the present invention. TABLE 1______________________________________SOURCE CODE REMEDIATION OBJECT CODE REMEDIATION______________________________________Analysis 18% Analysis 18% Remediation (patching) 2% Testing 30%Source Code Remediation 30% 50%Translation into Machine 1% The computer program willCode function as if it were totally Y2K compliant after only 50% of the work.Unit Testing of New 21% When convenientMachine Code Source Code Remediation 30% Translation into Machine 1%System Testing 30% Code 100% Testing 19% 50%The computer program will only be This final stage of source codefully Y2K compliant after 100% of remediation can be postponed untilthe work and testing has been after the year 2000.completed.______________________________________ Source Code Remediation vs. Object code Remediation. Object code remediation is more desirable than source code remediation for a number of reasons, even though, ideally, the source code should be remediated in either case. The key difference is that a two phase, object code then source code remediation bridging solution, will make a program Y2K compliant in half the time it would take to use source code remediation. The program's source code still won't be modified, but the program will work--it will perform all date calculations correctly, before, during, and after the transition to Year 2000, allowing some work to be deferred, and the source code to be remediated at a convenient time, or even replaced, as appropriate. Each of the fundamental processes required for remediation contains similar segments of work. It is useful to look at the length of time each process takes. Since the actual time will depend on the size of the project, percentages of the total time it takes to do each portion of both processes are useful metrics. Each process requires: Inspection and Analysis. This is a survey that must be taken of the computer program, to see what has to be done to make it Y2K compliant. This takes about 18% of the time, in either process. Source Code Modification, or Remediation. This is the actual code fixing, itself. It takes 30% of the effort, in either process. But with an object code patching method, the Source Code remediation is done after the program has been put into production, where it will function fully and accurately. In other words, object code patching, or "Bridging" quickly enables program to become usable after Year 2000, even though its source code has not yet been modified. Translation into Machine Code is the actual compilation of source code into object code. This takes only 1% of the time, in either process. Testing requires the same amount of time, also--approximately 50% of the effort. This is a vital component, and it's broken down into two parts: Unit Testing of New Machine Code, and System Testing. Move to Production Mode: This step can be done prior to source code remediation if the object code remediation is chosen, resulting in a net savings of 50% of the elapsed time. Comparing the two lists, it is apparent that bridging solutions can save time. The sequences are not identical, but it's easy to see that a Bridging Solution enables system operation right after the first testing component--before the lengthy Source Code Modification is even started. A primary advantage of Bridging Solutions, is that they make systems work in about half the time it would take using traditional methods. There are three general classes of bridging solution approaches; data centric, logic centric, and encapsulation. Data centric approaches can be further divided into three types: (a) Date Compression, which fits four digit years into a space normally used for two; (b) Data Expansion, which finds space for an extra two digits for each of the years in every data record; and (c) Date Windowing or Pivoting, which interprets 2-digit dates above a pivot point (for example, 28) as being in the 20th century, and 2-digit dates below the pivot point as being in the 21st century. For example, if one chooses a Windowing approach using a 2-digit pivot point of 28, then 29 would be interpreted as meaning 1929, whereas 27 would be interpreted as meaning 2027. Clearly, date windowing or pivoting approaches have disadvantages when dealing with a variety of business issues, but it can offer an easy solution for problems which can fit within this scope. The logic centric approach examines the logic to see which segments relate to dates. Then it identifies those segments that do not have Year 2000-compliant logic--that is, segments that cannot process dates correctly as of Jan. 1, 2000. New logic is then installed in those segments, at the Object Code level. Encapsulation techniques provide a barrier wall of logic around the program that's not compliant, either isolating it from other computers, or from other communication lines that might not be compliant. Alternately, a piece of logic can be installed just outside the boundary of the program, which translates the dates in such a way as to make the non-compliant program, together with the external transformation, compliant as a whole. This encapsulation technique is analogous to the proposed solution for embedded systems, wherein hardware is added to the system which encapsulates the processor to selectively force valid inputs and outputs. It is therefore an object of the invention to provide a system for altering an execution of a programmable system, comprising the steps of analyzing program execution code, without decompilation, to identify the prospective occurrence of a condition; interrupting or preventing the occurrence of the prospective condition and controlling the system to replace the condition with an alternate condition; and resuming execution of the program execution code after the prospective occurrence of the condition. It is also an object of a preferred embodiment of the invention to provide a method and system for modifying computer program logic with respect to a selected data type, e.g., date-related data, the program logic being divided into a plurality of load modules whose execution is controlled by an operating system, comprising the steps of analyzing operating system instructions to determine a sequence of load module execution; analyzing object code logic from the load module and data to identify references to the selected data type; modifying the computer logic embodied in the object code with respect to the selected data type to modify computer program logical execution with respect thereto, substantially without decompilation or reference to source code; and storing information representing the modified object code computer program for execution in accordance with the operating system instructions. The object code computer program modifications are preferably implemented without alteration of overall program logical flow with respect to data types other than the selected data type. The object module may be patched, e.g., with subroutine calls, jumps, subjected to traps code execution, or disassembled object code modified and reassembled. According to a preferred embodiment, an object code string length remains unaltered, e.g., the object code is modified by substituting digital information elements having a same length as digital information elements of the unmodified object code, although other embodiments of the invention provide new code added to the terminus of the object module and/or in-line with the pre-existing code. Also in a preferred embodiment, the operating system controls operation of an IBM mainframe compatible computer, for example MVS, executing on an IBM 360, 370, or 390 computer system. Preferably, the object code is disassembled to pseudoassembly code for analysis. Where modifications are performed to the pseudoassembly code, as compared to patches to the object code and the use of trap tables or the like, the modified pseudoassembly code is then assembled into a modified object module. The information from the object module is preferably analyzed to determine a reference to the data type or transformation of the data type. Where the data type is date data, this data often assumes characteristic formats, and operations thereon correspond to the formats, allowing inferential determination of such date data references. The object code is preferably modified, where the modification requires a larger number of bytes than any code replaced, by inserting an instruction to temporarily redirect program logical execution to new program logical instructions, following which, logical execution of the program resumes. The preferred embodiment of the invention will be shown by way of the Figures of the drawings, in which: The FIGURE shows a flow chart for operation of a preferred embodiment of the invention. The process starts at 100 with a retrieval of the JCL code 104 defining the use of the software. The JCL code is, in an inspection process, analyzed 102, including the load map and context, to determine the sequence, nature, interrelation, requirements for execution and external references of the load module 108. The load module 108, transferred from mass storage, without execution, but in its executable state, is then disassembled 110 into "pseudoassembly code" by the disassembler program, i.e., converted from digital data into assembler code representations of the operations to be performed by the computer. The pseudoassembly code is then scanned and analyzed 112 in great detail to look for any direct or indirect reference to a date in a "data field" or "register", or a transfer, comparison or other operation of data with respect to previously identified date-related data or logical transformation thereof. Likewise, the data records are analyzed for the occurrence of data formats commonly associated with date data. Date data may also be identified by a direct reference to a clock (hardware or software), other system level resource providing date-related information, such as a so-called "date card". These identified date references are then stored as date reference offsets 116 for later use. The date references may also be presented through data structures, and the data structures are also analyzed to identify date-related data. The analysis is also dependent on the JCL and load map to provide context for the analysis and to identify parameters which are received or transmitted by the software module. References to date-related data may thus be identified in a number of ways. High level language compilers produce characteristic data formats of limited types for date information, e.g., binary, ASCII, packed decimal or binary-coded decimal format, six or eight digit representations, e.g., YYYYMMDD, CCYYMMDD or YYMMDD for date, and counters which provide a relative time since a reference date (minutes since 01-01-82). Further, once a date-dependent parameter is identified, any logical manipulations, transformations or transfers of this parameter may be tracked and accommodated. It is noted that, where for example, the YYYYMMDD or CCYYMMDD date formats are employed, typically the program logic will be Y2K compliant, while where the YYMMDD format is used, unless particular logic is used to resolve ambiguities, Y2K related flaws may exist, depending on the use of the date-related data. Once the date references are identified, an analysis program analyzes the code and defines an appropriate logical modification 118, if necessary, to achieve the desired functionality, i.e., to make the program Y2K compliant. The analysis program thus includes a library of modification types, to fit the pattern of date usages and program context. Where a date reference does not match the specified patterns, an exception may be generated allowing manual intervention or alert an operator to the possibility of inappropriate results. The modification may be, for example, a modification of the data or program code to provide or accept a different representation of the year, without requiring expansion of the date field with resultant increase in data record or program length. This representation may include a sliding window function that allows logical consistency. The sliding windows may be removed or normalized for any program outputs. In cases where ambiguity of the date reference is inconsequential, alteration or modification may be unnecessary, and the code may remain unchanged. In applying a sliding window function, code locations need only have a single "literal" value changed, for example by the addition or subtraction of an integer window offset. In cases where code has to be added, a subroutine call, jump instruction or "trap" is inserted into the code which temporarily redirects program logical flow to a separate memory location, allowing additional instructions in a subroutine to be executed, before returning "flow control" to the load module. Code in the original object module which would be erroneous or redundant, is replaced with one or more "no operation codes" or a Jump instruction to bypass the undesired code, again maintaining the offset relationships of remaining code. The system may reference common code to implement modifications, such as a separate object module or even common code which persists in memory during execution of various load modules. The individual load modules or even object modules may also be modified. In operation, the object code remediation system according to a preferred embodiment initially inspects and analyzes the code, which is preferably an automated process, but need not be. The analyzer, manual or automatic, will examine a so-called Control Section (C-SEC), and produce a Non-Compliance Data File (NCDF) as output. The following steps are performed to identify non-compliant object code: 1. Disassemble the load module into object code modules 2. Process the disassembled program with an inference engine, e.g., CLIPS, C-Language Integrated Production Systems, a state dependent analyzer, and through "filter" algorithms or other intelligent systems, to perform a detail analysis for these categories: Data and program flow analysis to separate process logic from data manipulations I/O code analysis to determine the points in the code where data records containing dates are read in from storage I/O buffer usage tracking to follow the date fields as they propagate through the program logic and expressions Analysis of calculations which are affected by any of the date fields which have been located Application of a rules based transformation, inference engine and state dependent analyzer, to locate calculations Once the instruction sequences, which are not year 2000 compliant, have been located, and an NCDF has been produced, the Object Code Patcher is executed. The Object Code Patcher replaces the identified instruction sequences with a Supervisor Call (SVC), followed by as many NOP (no operation) words as necessary to cover the remainder of the instruction sequence. The Object Code Patcher also creates a Runtime Patch Data File (RPDF). This file is used by a runtime support environment when the inserted instructions are executed, and describes how the transformed code should execute. An NCDF editor allows a user to examine code produced by the analysis module. An NCDF contains a header record followed by a record for each instruction sequence to be remediated, and contains, for example, the following information: Signature string that identifies the file as an NCDF The library and load module names The date and time of the analysis A summary of invocation parameters The number of instruction patch records for the remediated load module Each instruction patch record, for example, contains: The offset of the instruction within the load module The length of the instruction The data bytes of the original instruction The instruction operands Data required by the patch type to perform its operation Active patch flag The NCDF is the direct input to the Object Code Patcher create process, that utilizes data from the instruction patch records to create a so-called Zap Deck and RPDF. The Zap Deck contains directives which verify that all the bytes to be replaced have the expected values. Following these are directives which replace these bytes with SVC (or other type of machine flow control instruction), and NOP instructions, as described above. The Zap Deck is executed by IMASPZAP, an OS/390 (MVS) system utility that uses the Zap Deck as input. The RPDF is created as an assembly language source file containing only data directives; i.e. it does not contain any operating instructions. This file is then assembled, resulting in the RPDF. The load module containing the SVC instructions is the remediated program in Y2K compliant form. When the remediated load module is executed, each inserted flow control instruction transfers control to a separate software module, e.g., the SVC module (which is the runtime support environment). The software module searches the RPDF for the record which corresponds to the particular location at which the SVC was executed. This record describes the remediation behavior to be executed. The RPDF consists of a header record, followed by one patch data record for each instruction patch in the NCDF. The header record contains: The library and load module name The number of sub-records Space reserved for SVC usage. Each patch data record contains: The patch type Control Section (C-SEC) offset of the patched instruction (the address of the SVC) Parameter data which the SVC, uses to execute the patch When SVC starts running, it loads a library of patch modules. There is one of these modules for each type of patch that can be applied. When SVC needs to execute a patch, it calls the patch module specified by the RPDF record, passing a parameter block which contains information determined at analysis time. The library module then executes the patched code, and returns to SVC, and then to the remediated program. After the necessary modifications are analyzed, the modifications necessary to the load module to provide the modified functionality as described above are thus defined 120. The defined modified load module 124 is then saved 122. The modified load module 124 may include an external reference table for trapping date exceptions or otherwise controlling program execution, as well as modified and/or additional object modules. For example, additional load modules may provide input and output data reformatting and/or transformation using a sliding window technique, which might possibly alleviate the need for modifications to the original object modules within the load module 108. The stored modified load module 124 is subsequently executed by evaluation of the JCL referencing command 126 in the normal sequence of program execution. It is noted that the modified load module 124 may be generated in advance of use or the entire procedure applied immediately prior to program execution. After execution of the modified load module 126, normal program execution continues, indicated by the stop 128, which may include execution of other load modules, modified load modules, or the modification and execution according to the present invention of other load modules. There has thus been shown and described novel object code remediation systems, which fulfill all the objects and advantages sought therefor. Many changes, modifications, variations, combinations, subcombinations and other uses and applications of the subject invention will, however, become apparent to those skilled in the art after considering this specification and the accompanying drawings which disclose the preferred embodiments thereof. All such changes, modifications, variations and other uses and applications which do not depart from the spirit and scope of the invention are deemed to be covered by the invention, which is to be limited only by the claims which follow.
197,133
1.Boutros-Ghali, Boutros. 1992. An Agenda for Peace: Peace-making and Peace-Keeping. (Report of the Secretary-General Pursuant to the Statement Adopted by the Summit Meeting of the Security Council, January 31, New York: United Nations.) 2.Surely the preamble to The Charter of the United Nations is among the most inspired passages in the history of human governance: "WE THE PEOPLES OF THE UNITED NATIONS DETERMINED "to save succeeding generations from the scourge of war, which twice in our lifetime has brought untold sorrow to mankind, and "to reaffirm faith in fundamental human rights, in the dignity and worth of the human person, in the equal rights of men and women and of nations large and small, and "to establish conditions under which justice and respect for the obligations arising from treaties and other sources of international law can be maintained, and "to promote social progress and better standards of life in larger freedom, "AND FOR THESE ENDS "to practice tolerance and live together in peace with one another as good neighbors, and "to unite our strength to maintain international peace and security, and "to ensure, by the acceptance of principles and the institutions of methods, that armed force shall not be used, save in the common interest, and "to employ international machinery for the promotion of the economic and social advancement of all peoples, "HAVE RESOLVED TO COMBINE OUR EFFORTS TO ACCOMPLISH THESE AIMS. "Accordingly, our respective Governments, through representatives assembled in the city of San Francisco, who have exhibited their full powers found to be in good and due form, have agreed to the present Charter of the United Nations and do hereby establish an international organization to be known as the United Nations." United Nations. 1994. Charter of the United Nations and Statute of the International Court of Justice. United Nations Department of Public Information. DPI/511 - 93243 - April 1994 - The World Commission on Environment and Development, Our Common Future. (Oxford: Oxford University Press, 1987.) 3.The World Bank. 1994. World Development Report. (Oxford: Oxford University Press.) pp. 162 - 163. 4.There have been a number of recent proposals which discuss the need for reforms in the United Nations system within a particular issue area. Our Common Future, the report of The World Commission on Environment and Development, for example, suggested a number of changes, such as the creation of a special UN "Board for Sustainable Development" to coordinate UN action in promoting development while protecting the environment. Likewise, the report of The Brandt Commission, Common Crisis North-South: Co-operation for World Recovery, makes suggestions for reform in the critical area of finance, trade and energy, as they affect North-South imbalances. The Brandt Commission, Common Crisis North-South: Co-operation for World Recovery. (London: Pan Books, 1983.) The literature proposing widespread changes in the United Nations is also voluminous and continues to grow, especially in anticipation of the 50th anniversary of the United Nations. The first major and serious reassessments of the United Nations began in the 1950s, in anticipation of the 10th anniversary of the Charter. In this regard the publication in 1958 of World Peace Through World Law by Louis B. Sohn and Grenville Clark, which was among the first solid proposals to suggest eliminating the veto power, must be considered a Grenville Clark, and Louis B. Sohn, World Peace Through World Law. (Cambridge, Mass.: Harvard University Press, 1966.) More recent proposals range from The Stockholm Initiative, which offers a generalist vision of what might be done to strengthen the United Nations, to Harold Stassen's recent United Nations: a Working Paper for Restructuring, which gives an article-by-article proposal for rewriting the UN Charter. Benjamin Ferencz's latest book, New Legal Foundations for Global Survival, offers a series of hard-headed and legal-minded suggestions for reform based on the premise that nations, peoples and individuals must be free to pursue their destinies in whatever way they may see fit - providing it does not jeopardize or destroy the fundamental human rights of others to live in peace and dignity. The Stockholm Initiative on Global Security and Governance 1991. Common Responsibility in the 1990's. (Stockholm: Prime Minister's Office, Stockholm, Sweden.) Harold Stassen, United Nations: A Working Paper for Restructuring. (Minneapolis: Learner Publications Company, 1994.) Benjamin Ferencz, New Legal Foundations for Global Survival. (Oceana Publications, 1994) Richard E. Leakey, and Rodger Lewin, Origins: What new discoveries reveal about the emergence of our species and its possible future. (New York: Dutton, 1977.) 5.The Commission on Global Governance, Our Global Neighborhood. (New York: Oxford University Press, 1995.) 6.Many thinkers have recognized the reality of oneness and understood its implications for the development of human society, including paleontologist Richard Leaky: "We are one species, one people. Every individual on this earth is a member of 'homo sapiens sapiens', and the geographical variations we see among peoples are simply biological nuances on the basic theme. The human capacity for culture permits its elaboration in widely different and colorful ways. The often very deep differences between those cultures should not be seen as divisions between people. Instead, cultures should be interpreted for what they really are: the ultimate declaration of belonging to the human species." In general terms, the writings of Shoghi Effendi offer a thorough and extended exposition on the concept of the oneness of humanity. A brief summary of the concept, as Bahá'ís view it, can be found in The World Order of Bahá'u'lláh. Shoghi Effendi, The World Order of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1938.) pp. 42-43. The Report of the Commission on Global Governance, Our Global Neighborhood. (New York: Oxford University Press. 1995.) p.351. E. F. Schumacher, Small is Beautiful: Economics as if People Mattered. (New York: Harper and Row, 1973.) p. 65. 7.We are not alone in making this proposal. The Commission on Global Governance writes in Our Global Neighborhood: "Our recommendation is that the General Assembly should agree to hold a World Conference on Governance in 1998, with its decisions to be ratified and put into effect by 2000." 8.Two commonly used maxims illustrate this principle. "Small is beautiful," a maxim coined in the early '70s as an economic principle, applies equally to governance. Schumacher explains: "In the affairs of men, there always appears to be a need for at least two things simultaneously, which, on the face of it, seem to be incompatible and to exclude one another. We always need both freedom and order. We need the freedom of lots and lots of small, autonomous unities, and, at the same time, the orderliness of large-scale, possibly global, unity and coordination." "Think globally, act locally," a slogan promoted by environmental and community development activists, captures a perspective in which the need for overall global coordination is carefully balanced against the need for local and national autonomy. Shoghi Effendi, The World Order of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1974.) pp. 41-42. Shoghi Effendi, The World Order of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1974.) p. 203. 9."Far from aiming at the subversion of the existing foundations of society... [a system of world governance] seeks to broaden its basis, to remold its institutions in a manner consonant with the needs of an ever-changing world. It can conflict with no legitimate allegiances, nor can it undermine essential loyalties. Its purpose is neither to stifle the flame of a sane and intelligent patriotism in men's hearts, nor to abolish the system of national autonomy so essential if the evils of excessive centralization are to be avoided. It does not ignore, nor does it attempt to suppress, the diversity of ethnical origins, of climate, of history, of language and tradition, of thought and habit, that differentiate the peoples and nations of the world. It calls for a wider loyalty, for a larger aspiration than any that has animated the human race. It insists upon the subordination of national impulses and interests to the imperative claims of a unified world. It repudiates excessive centralization on one hand, and disclaims all attempts at uniformity on the other." 10.Writing in the 1930s, Shoghi Effendi, who then led the worldwide Bahá'í community, sketched out some of the functions and responsibilities for a future world legislature. Among other things, he wrote: "a world legislature, whose members will, as trustees of the whole of mankind... enact such laws as shall be required to regulate the life, satisfy the needs and adjust the relationships of all races and peoples." This view is shared by such scholars as Jan Tinbergen, winner of the 1969 Nobel prize for Economics, who stated, "Mankind's problems can no longer be solved by national governments. What is needed is a World Government. This can best be achieved by strengthening the United Nations system." 11. 12. 13. 14. 15. 16. 17. United Nations Development Programme (UNDP). Human Development Report 1994. Global Governance for the 21st Century. (New York: Oxford University Press.) p.88. Bahá'u'lláh, The Kitáb-i-Aqdas. Translated by Shoghi Effendi and a Committee at the Bahá'í World Centre. (Haifa: Bahá'í World Centre, 1992.) 'Abdu'l-Bahá, The Secret of Divine Civilization. Trans. Marzieh Gail. (Wilmette, Ill.: Bahá'í Publishing Trust. 1957.) pp. 64-65. Karen W. Arenson, "Charitable Giving Rose 3.6% in 1994, Philanthropy Trust Says," The New York Times, Thursday, 25 May 1995, sec.A, p.22. Shoghi Effendi, Directives of the Guardian. (Wilmette, Ill.: Bahá'í Publishing Trust.) p.39. 11.Bahá'í International Community. Proposals to the United Nations for Charter Revision. May 23, 1955. 12.Throughout His writings, Bahá'u'lláh consistently uses the terms "order", "world order" and "new world order" to describe the ongoing and momentous series of changes in the political, social and religious life of the world. In the late 1860s, He wrote: "The world's equilibrium hath been upset through the vibrating influence of this most great, this new World Order. Mankind's ordered life hath been revolutionized through the agency of this unique, this wondrous System - the like of which mortal eyes have never witnessed." 13.'Abdu'l-Bahá, The Secret of Divine Civilization. Trans. Marzieh Gail. (Wilmette, Ill.: Bahá'í Publishing Trust. 1957.) p. 24. 14.United Nations Research Institute for Social Development (UNRISD), States of Disarray: The Social Effects of Globalization. (London: KPC Group. 1995) pp. 106-109. 15.There are many ways that such a Commission, or even the World Legislature itself, might go about determining fair and just borders for all nations. But as daunting as the task may seem, it is an important part of the process of building a new order. Wrote 'Abdu'l-Bahá: "True civilization will unfurl its banner in the midmost heart of the world whenever a certain number of its distinguished and high-minded sovereigns -- the shining exemplars of devotion and determination -- shall, for the good and happiness of all mankind, arise, with firm resolve and clear vision, to establish the Cause of Universal Peace. They must make the Cause of Peace the object of general consultation, and seek by every means in their power to establish a Union of the nations of the world. They must conclude a binding treaty and establish a covenant, the provisions of which shall be sound, inviolable and definite. They must proclaim it to all the world and obtain for it the sanction of all the human race. This supreme and noble undertaking -- the real source of the peace and well-being of all the world -- should be regarded as sacred by all that dwell on earth. All the forces of humanity must be mobilized to ensure the stability and permanence of this Most Great Covenant. In this all-embracing Pact the limits and frontiers of each and every nation should be clearly fixed, the principles underlying the relations of governments towards one another definitely laid down, and all international agreements and obligations ascertained. In like manner, the size of the armaments of every government should be strictly limited, for if the preparations for war and the military forces of any nation should be allowed to increase, they will arouse the suspicion of others. The fundamental principle underlying this solemn Pact should be so fixed that if any government later violate any one of its provisions, all the governments on earth should arise to reduce it to utter submission, nay the human race as a whole should resolve, with every power at its disposal, to destroy that government. Should this greatest of all remedies be applied to the sick body of the world, it will assuredly recover from its ills and will remain eternally safe and secure." 16.According to a recent article in The New York Times, charitable giving in the United States in 1994 rose by 3.6 percent to $130 billion. 17."Regarding the whole question of an International Language.... We, as Bahá'ís, are very anxious to see a universal auxiliary tongue adopted as soon as possible; we are not the protagonists of any one language to fill this post. If the governments of the world agree on an existing language, or a constructed, new tongue, to be used internationally, we would heartily support it because we desire to see this step in the unification of the human race take place as soon as possible." In making this proposal, we wish to call attention to the term "auxiliary." The Bahá'í teachings value and promote cultural diversity, not uniformity. At this point in history, then, we do not envision imposing a single language worldwide. Rather, what we imagine is that peoples and nations would keep their own local and national languages -- while at the same time be encouraged to learn a universal language. Certainly such a universal language should ultimately be taught, as a required subject, in all of the world's schools. But this should in no way detract from legitimate expressions of national and local linguistic and cultural diversity. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. Shoghi Effendi, trans., Gleanings from the Writings of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1983.) p.250. United Nations Development Programme (UNDP). Human Development Report 1994. A Tax on International Currency Transactions. (New York: Oxford University Press.) p.70. Shoghi Effendi, trans. Gleanings from the Writings of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1976.) p.254. Grenville Clark and Louis B. Sohn, World Peace Through World Law. (Cambridge, Mass.: Harvard University Press, 1966.) Keith Hindell, "Reform of the United Nations?" in The World Today: Journal of the Royal Institute of International Affairs. (United Kingdom, Feb. 1992.) Vol. 48, No. 2. pp.30-33. John Logue, "New World Order Means Reformed U.N.", World Federalist News, July 1992. Benjamin B. Ferencz and Ken Keyes Jr., Planethood: The Key to Your Future. (Coos Bay, Oregon: Love Line Books. 1991.) Boutros-Ghali, Boutros. 1992. An Agenda for Peace: Peace-making and Peace-Keeping. Report of the Secretary-General Pursuant to the Statement Adopted by the Summit Meeting of the Security Council, January 31, New York: United Nations. Selections from the Writings of 'Abdu'l-Bahá. Compiled by the Research Department of the Universal House of Justice. Translated by a Committee at the Bahá'í World Centre and by Marzieh Gail. (Great Britain: W & J Mackay Ltd. 1978.) pp. 306-307. Europa World Year Book 1994. Vol.I. International Court of Justice. p.22. 18."The day is approaching when all the peoples of the world will have adopted one universal language and one common script," wrote Bahá'u'lláh in the late-1800s. "When this is achieved, to whatsoever city a man may journey, it shall be as if he were entering his own home." 19.In a "special contribution" to the 1994 Human Development Report, James Tobin, winner of the 1981 Nobel Prize for Economics, observes that "a permanent single currency" would eliminate much if not all of the turbulence currently associated with the huge amount of currency speculation on world markets today. Observing that such a single world currency is probably a long way off, he proposes as an interim measure an "international uniform tax" on spot transactions in foreign exchange. 20.The principle of collective security was put forth by Bahá'u'lláh over a century ago in letters to the kings and rulers of the world: "Be united, O kings of the earth, for thereby will the tempest of discord be stilled amongst you, and your peoples find rest, if ye be of them that comprehend. Should anyone among you take up arms against another, rise ye all against him, for this is naught but manifest justice." 21.The Report of the Independent Working Group on the Future of the United Nations. The United Nations in its Second Half-Century. (Yale University Press Service, 1995.) p. 16. 22.Glenview Foundation, The Stassen Draft Charter for a New United Nations to Emerge from the Original, to Serve World Peace and Progress for the Next Forty Years. (Philadelphia: Glenview Foundation. 1985.) 23.This is not to say that steps to ban such weapons should await the full development and deployment of such a Force. We wholeheartedly support current steps to renew the Treaty on the Nonproliferation of Nuclear Weapons and to firmly establish a comprehensive test ban, as well as any further efforts to eliminate nuclear, chemical and/or biological weapons. Likewise, stronger efforts must be made to restrict and control conventional weapons such as land mines, which kill indiscriminately. 24.Mahbub ul Haq, 1994. Senior Advisor to UNDP Administrator. Team Leader of the Group that prepares the UNDP annual Human Development Reports which have brought, in recent years, fresh insights to development theory and practice, including a new concept on human security. 25.Erskine Childers, ed. Challenges to the United Nations: Building a Safer World. (New York: St. Martin's Press. 1994.) pp.21-25. 26.John Huddleston, The Search for a Just Society. (Kidlington, Oxford: George Ronald. 1989.) 27.About 75 years ago 'Abdu'l-Bahá offered the following suggestions for a future world court: "the national assemblies of each country and nation -- that is to say parliaments -- should elect two or three persons who are the choicest of that nation, and are well informed concerning international laws and the relations between governments and aware of the essential needs of the world of humanity in this day. The number of these representatives should be in proportion to the number of inhabitants of that country. The election of these souls who are chosen by the national assembly, that is, the parliament, must be confirmed by the upper house, the congress and the cabinet and also by the president or monarch so these persons may be the elected ones of all the nation and the government. The Supreme Tribunal will be composed of these people, and all mankind will thus have a share therein, for every one of these delegates is fully representative of his nation. When the Supreme Tribunal gives a ruling on any international question, either unanimously or by majority rule, there will no longer be any pretext for the plaintiff or ground of objection for the defendant. In case any of the governments or nations, in the execution of the irrefutable decision of the Supreme Tribunal, be negligent or dilatory, the rest of the nations will rise up against it, because all the governments and nations of the world are the supporters of this Supreme Tribunal. Consider what a firm foundation this is! But by a limited and restricted League the purpose will not be realized as it ought and should." 28.At the present time, for example, the Court's jurisdiction is limited to 1) cases which the parties refer to it jointly by special agreement, 2) matters concerning a treaty or convention in force which provides for reference to the Court, and 3) specified classes of legal disputes between States for which they have recognized the jurisdiction of the Court as compulsory. 29.Shoghi Effendi, trans. Gleanings from the Writings of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1983.) p.260. "The primary most urgent requirement is the promotion of education. It is inconceivable that any nation should achieve prosperity and success unless this paramount, this fundamental concern is carried forward. The principal reason for the decline and fall of peoples is ignorance. Today the mass of the people are uninformed even as to ordinary affairs, how much less do they grasp the core of the important problems and complex needs of the time." 'Abdu'l-Bahá. The Secret of Divine Civilization. Trans. Marzieh Gail. (Wilmette, Ill.: Bahá'í Publishing Trust. 1957.) p.109. "This same difference is noticeable among animals; some have been domesticated, educated, others left wild. The proof is clear that the world of nature is imperfect, the world of education perfect. That is to say, man is rescued from the exigencies of nature by training and culture; consequently, education is necessary, obligatory. But education is of various kinds. There is a training and development of the physical body which ensures strength and growth. There is intellectual education or mental training for which schools and colleges are founded. The third kind of education is that of the spirit. Through the breaths of the Holy Spirit man is uplifted into the world of moralities and illumined by the lights of divine bestowals. The moral world is only attained through the effulgence of the Sun of Reality and the quickening life of the divine spirit." 30. 31. 32. 33. 'Abdu'l-Bahá, in a Talk delivered in St. Paul on 20 September 1912. The Promulgation of Universal Peace. p.329-330. 30.Governments and their partners must bear in mind that material equality is neither achievable nor desirable. Absolute equality is a chimera. At various points along the way, there will nevertheless be the necessity for the redistribution of some of the world's wealth. For, indeed, it is becoming increasingly obvious that unbridled capitalism does not provide the answer either. Some regulation and redistribution is necessary to promote material justice. In this regard, a tax on income is, in principle, one of the fairest and most equitable means. There must also be a role for the voluntary sharing of wealth -- both at an individual and an institutional level. Equal opportunities for economic advancement and progress, however, must be woven into the very fabric of the new order. Ultimately, the most important regulation on any economic system is the moral regulation that begins in the hearts and minds of people. 31.The Establishment of the Global Environment Facility (GEF) is a commendable first step in the right direction and may be useful in the long run, as one of the tools that could be the basis for funding Agenda 21, if its operational scale is enlarged and its mandate redefined. 32.World Conference on Human Rights. Vienna Declaration and Programme of Action. 14-25 June 1993. Vienna-Austria. 33.A further elaboration of this concept can be found in The Prosperity of Humankind, a statement of the Bahá'í International Community, Office of Public Information, published in February 1995: "The activity most intimately linked to the consciousness that distinguishes human nature is the individual's exploration of reality for himself or herself. The freedom to investigate the purpose of existence and to develop the endowments of human nature that make it achievable requires protection. Human beings must be free to know. That such freedom is often abused and such abuse grossly encouraged by features of contemporary society does not detract in any degree from the validity of the impulse itself. "It is this distinguishing impulse of human consciousness that provides the moral imperative for the enunciation of many of the rights enshrined in the Universal Declaration and the related Covenants. Universal education, freedom of movement, access to information, and the opportunity to participate in political life are all aspects of its operation that require explicit guarantee by the international community. The same is true of freedom of thought and belief, including religious liberty, along with the right to hold opinions and express these opinions appropriately. "Since the body of humankind is one and indivisible, each member of the race is born into the world as a trust of the whole. This trusteeship constitutes the moral foundation of most of the other rights -- principally economic and social -- which the instruments of the United Nations are attempting similarly to define. The security of the family and the home, the ownership of property, and the right to privacy are all implied in such a trusteeship. The obligations on the part of the community extend to the provision of employment, mental and physical health care, social security, fair wages, rest and recreation, and a host of other reasonable expectations on the part of the individual members of society. "The principle of collective trusteeship creates also the right of every person to expect that those cultural conditions essential to his or her identity enjoy the protection of national and international law. Much like the role played by the gene pool in the biological life of humankind and its environment, the immense wealth of cultural diversity achieved over thousands of years is vital to the social and economic development of a human race experiencing its collective coming-of-age. It represents a heritage that must be permitted to bear its fruit in a global civilization. On the one hand, cultural expressions need to be protected from suffocation by the materialistic influences currently holding sway. On the other, cultures must be enabled to interact with one another in ever-changing patterns of civilization, free of manipulation for partisan political ends." 34. 35. 36. 37. 38. Bahá'í International Community, Office of Public Information, The Prosperity of Humankind. (Haifa: Bahá'í World Centre. 1995.) 'Abdu'l-Bahá, The Promulgation of Universal Peace: Talks Delivered by 'Abdu'l-Bahá during His Visit to the United States and Canada in 1912. Comp. Howard MacNutt. (Wilmette, Ill.: Bahá'í Publishing Trust. 1982.) p.157. 'Abdu'l-Bahá, The Promulgation of Universal Peace. Comp. Howard MacNutt. (Wilmette, Ill.: Bahá'í Publishing Trust. 1982.) pp.174-175. 'Abdu'l-Bahá, The Promulgation of Universal Peace. (Wilmette, Ill.: Bahá'í Publishing Trust. 1982.) p.77. 'Abdu'l-Bahá, quoted in John E. Esslemont, Bahá'u'lláh and the New Era, p. 156., 4th rev. ed., 1976, Wilmette: Bahá'í Books, published by Pyramid Publications for Bahá'í Publishing Trust. 34.Ultimately, respect for human rights must begin in the family: "Compare the nations of the world to the members of a family. A family is a nation in miniature. Simply enlarge the circle of the household, and you have the nation. Enlarge the circle of nations, and you have all humanity. The conditions surrounding the family surround the nation. The happenings in the family are the happenings in the life of the nation. Would it add to the progress and advancement of a family if dissensions should arise among its members, all fighting, pillaging each other, jealous and revengeful of injury, seeking selfish advantage? Nay, this would be the cause of the effacement of progress and advancement. So it is in the great family of nations, for nations are but an aggregate of families. Therefore, as strife and dissension destroy a family and prevent its progress, so nations are destroyed and advancement hindered." 35."When all mankind shall receive the same opportunity of education and the equality of men and women be realized, the foundations of war will be utterly destroyed. Without equality this will be impossible because all differences and distinction are conducive to discord and strife. Equality between men and women is conducive to the abolition of warfare for the reason that women will never be willing to sanction it. Mothers will not give their sons as sacrifices upon the battlefield after twenty years of anxiety and loving devotion in rearing them from infancy, no matter what cause they are called upon to defend. There is no doubt that when women obtain equality of rights, war will entirely cease among mankind." 36."Let it be known once more that until woman and man recognize and realize equality, social and political progress here or anywhere will not be possible. For the world of humanity consists of two parts or members: one is woman; the other is man. Until these two members are equal in strength, the oneness of humanity cannot be established, and the happiness and felicity of mankind will not be a reality. God willing, this is to be so." From a Talk by 'Abdu'l-Bahá to Federation of Women's Clubs, Chicago, Illinois on 2 May 1912. 37."The world in the past has been ruled by force, and man has dominated over woman by reason of his more forceful and aggressive qualities both of body and mind. But the balance is already shifting -- force is losing its weight and mental alertness, intuition, and the spiritual qualities of love and service, in which woman is strong, are gaining ascendancy. Hence the new age will be an age less masculine, and more permeated with the feminine ideals -- or, to speak more exactly, will be an age in which the masculine and feminine elements of civilization will be more evenly balanced." 38.This principle, that women and girls should receive priority over men and boys in access to education, has been a long-standing principle in the Bahá'í teachings. Speaking in 1912, 'Abdu'l-Bahá said: "In proclaiming the oneness of mankind [Bahá'u'lláh] taught that men and women are equal in the sight of God and that there is no distinction to be made between them. The only difference between them now is due to lack of education and training. If woman is given equal opportunity of education, distinction and estimate of inferiority will disappear.... Furthermore, the education of women is of greater importance than the education of men, for they are the mothers of the race, and mothers rear the children. The first teachers of children are the mothers. Therefore, they must be capably trained in order to educate both sons and daughters. There are many provisions in the words of Bahá'u'lláh in regard to this. "He promulgated the adoption of the same course of education for man and woman. Daughters and sons must follow the same curriculum of study, thereby promoting unity of the sexes." 39. 40. 41. 42. 43. 44. 'Abdu'l-Bahá, The Promulgation of Universal Peace. Comp. Howard MacNutt. (Wilmette, Ill.: Bahá'í Publishing Trust. 1982.) pp.174-175. 39.Lawrence H. Summers, Vice President & Chief Economist for the World Bank, Investing in All the People. 1992. Also, USAID. 1989. Technical Reports in Gender and Development. Making the Case for the Gender Variable: Women and the Wealth and Well-being of Nations. Office of Women in Development. 40.Selections from the Writings of 'Abdu'l-Bahá. Compiled by the Research Department of the Universal House of Justice. Translated by a Committee at the Bahá'í World Centre and by Marzieh Gail. (Great Britain: W & J. Mackay Ltd. 1978.) p.302. 41.The Nairobi Forward-Looking Strategies for the Advancement of Women. As adopted by the World Conference to Review and Appraise the Achievements of the United Nations Decade for Women: Equality, Development and Peace, Nairobi, Kenya, 15-26 July 1985. 42.Selections from the Writings of 'Abdu'l-Bahá. Compiled by the Research Department of the Universal House of Justice. Translated by a Committee at the Bahá'í World Centre and by Marzieh Gail. (Great Britain: W & J. Mackay Ltd. 1978.) p.303. 43.The interfaith declaration entitled "Towards a Global Ethic," which was produced by an assembly of religious and spiritual leaders from virtually every major world religion and spiritual movement at the 1993 Parliament of the World's Religions in Chicago, suggests that it is indeed possible for the world's religions to find much common ground in this regard. The declaration states: "We affirm that a common set of core values is found in the teachings of the religions, and that these form the basis of a global ethic... There already exist ancient guidelines for human behavior which are found in the teachings of the religions of the world and which are the condition for a sustainable world order." 44.The Golden Rule, the teaching that we should treat others as we ourselves would wish to be treated, is an ethic variously repeated in all the great religions: Buddhism: "Hurt not others in ways that you yourself would find hurtful." Udana-Varqa, 5:18. Zoroastrianism: "That nature only is good when it shall not do unto another whatever is not good for its own self." Dadistan-i Dinik, 94:5. Judaism: "What is hateful to you, do not to your fellow men. That is the entire Law, all the rest is commentary." The Talmud, Shabbat, 31a. Hinduism: "This is the sum of all true righteousness: deal with others as thou wouldst thyself be dealt by. Do nothing to thy neighbour which thou wouldst not have him do to thee after." The Mahabharata. Christianity: "As ye would that men should do to you, do ye also to them likewise." Luke 6:31. Islam: "No one of you is a believer until he desires for his brother that which he desires for himself." Sunnah. Taoism: The good man "ought to pity the malignant tendencies of others; to regard their gains as if they were his own, and their losses in the same way." The Thai-Shang. Confucianism: "Surely it is the maxim of loving-kindness: Do not unto others that you would not have them do unto you." Analects, XV, 23 Bahá'í Faith: "He should not wish for others that which he doth not wish for himself, nor promise that which he doth not fulfill." Gleanings. 45. 46. 47. 48. 45.Shoghi Effendi, The World Order of Bahá'u'lláh. (Wilmette, Ill.: Bahá'í Publishing Trust. 1938.) p. 202. 46.Bahá'u'lláh. The Proclamation of Bahá'u'lláh. (Haifa: Bahá'í World Centre. 1978.) p.113. 47.Bahá'u'lláh, Tablets of Bahá'u'lláh. Compiled by the Research Department of the Universal House of Justice. Translated by Habib Taherzadeh with the assistance of a Committee at the Bahá'í World Centre. (Haifa: Bahá'í World Centre. 1982.) p.167. 48.The Commission on Global Governance writes: "As the world faces the need for enlightened responses to the challenges that arise on the eve of the new century, we are concerned at the lack of leadership over a wide spectrum of human affairs. At national, regional, and international levels, within communities and in international organizations, in governments and in non-governmental bodies, the world needs credible and sustained leadership. "It needs leadership that is proactive, not simply reactive, that is inspired, not simply functional, that looks to the longer term and future generations for whom the present is held in trust. It needs leaders made strong by vision, sustained by ethics, and revealed by political courage that looks beyond the next election. "This cannot be leadership confined within domestic walls. It must reach beyond country, race, religion, culture, language, life-style. It must embrace a wider human constituency, be infused with a sense of caring for others, a sense of responsibility to the Report of the Commission on Global Governance, Our Global Neighborhood. (New York: Oxford University Press. 1995.) p.353. 49.Gleanings from the Writings of Bahá'u'lláh. Translated by Shoghi Effendi. (Wilmette, Ill.: Bahá'í Publishing Trust. 1976.) p. 7.
209,373
Meanwhile, what could girls at home do, but watch and wait and make home as pretty as possible, and, by the aid of books and pictures, reflect as much light from a larger world into their lives as might be. On Henry’s going away, the three girls had promptly bespoken the reversion of his study as a little sitting-room for themselves. Here they concentrated their books, and some few pictures that appealed to tastes in revolt against Atlantic liners, but not yet developed to the appreciation of those true classics of art—to which indeed they had yet to be introduced. Such half-way masters as Leighton, Alma-Tadema, Sant, and Dicksee were as yet to them something of what Rossetti and Burne-Jones, and certain old Italian masters, were soon to become. In books, they had already learnt from Henry a truer, or at all events a more strenuous, taste; and they would grapple manfully with Carlyle and Browning, and presently Meredith, long before their lives had use or understanding for such tremendous nourishment. One evening, as they were all three sitting cosily in Henry’s study,—as they still faithfully called it,—Esther was reading “Pride and Prejudice” aloud, while Dot and Mat busied themselves respectively with “macrame” work and a tea-cosy against a coming bazaar. Esther’s tasks in the house were somewhat illustrated by her part in the trio this evening. Her energies were mainly devoted to “the higher nights” of housekeeping, to the aesthetic activities of the home,—arranging flowers, dusting vases and pictures, and so on,—and the lightness of these employments was, it is to be admitted, an occasionally raised grievance among the sisters. To Dot and Mat fell much more arduous and manual spheres of labour. Yet all were none the less grateful for the decorative innovations which Esther, acting on occasional hints from her friend Myrtilla Williamson, was able to make; and if it were true that she hardly took her fair share of bed-making and pastry-cooking, it was equally undeniable that to her was due the introduction of Liberty silk curtains and cushions in two or three rooms. She too—alas, for the mistakes of young taste!—had also introduced painted tambourines, and swathed the lamps in wonderful turbans of puffed tissue paper. Was she to receive no credit for these services? Then it was she who had dared to do battle with her mother’s somewhat old-fashioned taste in dress; and whenever the Mesurier sisters came out in something specially pretty or fashionable, it was due to Esther.
157,795
Pdf Image To Text Download 16 Often, scanned documents are stored as a raster image in a large PDF document. . After running this script, the OCR text should be contained in book.txt . Insert scanned text or images into . Scan an image into Word. . Word will open a dialog box confirming that it is going to attempt to import the text of the PDF file. Right click the image, choose Wrap Text>More Layout Options, and the following screen appears: . If your text is moved and rearranged in your new PDF, . Download PDF is not rendering the complete list of data from ngFor . I have a problem with selecting whole text in PDF page. . newest pdf questions feed . Download all the pdf icons you need. Choose between 1074 pdf icons in both vector SVG and PNG format. medical emergencies dental office malamed pdf 12 pdf editor mac download 854 james surowiecki the wisdom of crowds epub 16 unsafe at any speed pdf 14 The Sunday Sessions: Philip Larkin reading his poetry free 104 the cartel 5 epub download 12 malayalam magazine fire pdf 22 Apple TV For Dummies downloads 12 jon bentley programming pearls 12 atp tennis rankings pdf 12
19,975
Alfred P. Murrah Building in downtown Oklahoma City 1990 - Employee awards program is instituted to recognize outstanding service. 1991 - Information Services Division is created as the fourth division within the OSBI. Its purpose is to handle the increased demand for information by law enforcement and the public. 1991 - Construction begins on a new Eastern Regional Laboratory and Investigative Office in McAlester. 1991 - The Special Investigations Unit is created to investigate public corruption, government fraud, and other white collar cases. 1991 - Senate Bill 386 authorizes the establishment of a DNA analysis unit with the OSBI Central Laboratory. 1992 - 8,000 square feet is renovated at OSBI Headquarters to make way for the new Automated Fingerprint Identification System (AFIS). 1992 - Construction begins on a new Southwest Regional Laboratory and Investigative Office in Lawton. 1993 - The Criminal Information Unit expands its role to become the state clearing house for information on missing children. 1993 - The Special Investigations Unit completes its 14-month probe into the 1990 campaign contributions of Governor David Walters. Unlike the previous investigation of then Governor Hall, the Walters investigation proceeds without any OSBI employees losing their jobs. The OSBI Commission's purpose as an insulator to the bureau from political influence and pressure is solidified. 1994 - OSBI Agents are equipped with laptop computers to aid in report writing, case management, and other investigative functions. 1994 - In May, installation is completed on the OSBI's multimillion dollar Automated Fingerprint Identification Unit. This technological advancement provides the OSBI with a faster response time in identifying latent fingerprints found at crimes where unidentified prints are found. The system was formally dedicated in the memory of Tracey Neilson, who was stabbed to death in her Moore apartment on her 21st birthday in 1981. Her killer has never been found. Before the acquisition of the AFIS system, the OSBI could only search for a latent match if the suspect's name was known. Now, all local law enforcement need to provide is a latent print, or partial print, and the OSBI can search its entire database of 4.5 million fingerprints within minutes. Although a latent fingerprint expert is still needed to make the actual match, the AFIS system can narrow down the search to as few as ten possible suspects. 1994 - The OSBI Central Laboratory begins accepting cases in its DNA Profiling Section. 1995 - Passage of the Oklahoma Self-Defense Act authorizes the OSBI to license eligible Oklahomans who wish to carry a concealed weapon. During the first year, more than 13,000 applications are processed by the bureau. 1995 - April 19th, twenty minutes after a bomb ripped through the heart of downtown Oklahoma City, and hours before anyone knew exactly what had happened, OSBI Director A. DeWade Langley sends out a request for all available OSBI agents to respond to the scene at the Alfred P. Murrah Building. Forty agents from across the state respond. That evening, agents man phones at the Mayor's office, taking calls and leads from anyone who had been inside the building or near it at the time of the blast. The goals are to find out if anyone saw or heard anything unusual before the bomb exploded and to account for those people who were or were not in the building when the bomb exploded. These same agents field numerous leads until the Federal Bureau of Investigation is able to set up a command post. This assignment lasts more than three weeks. OSBI Laboratory employees are also called out to aid in the collection of crime scene evidence and to take crime scene photos. Criminalists keep the Central Lab open late to allow Alcohol, Tobacco and Firearms' agents to examine the collected evidence. OSBI Latent Fingerprint Technicians had the difficult task of identifying many of the children who died in the bombing. While most adult bombing victims were identified by dental records, many of the children were not old enough to have such records. They had to be identified by fingerprints. Bureau employees had to go to the home of these children to dust toys and other belongings. This method helped identify 12 of the 19 children who died in the blast. Seventy-three OSBI employees worked directly on the bombing case. This agency is proud of their professionalism and their dedication to furthering the agency's mission, especially in such a difficult case. 1995 - Three year old Ryan Aubrey Luke dies, and OSBI Agents investigate the murder. The crime and subsequent public outcry spawn the "Ryan Luke Bill" to protect Oklahoma children. 1996 - The Criminal Intelligence Unit is statutorily created and is authorized to collect, analyze, and disseminate intelligence information to law enforcement for use of criminal investigations and crime prevention. 1996 - The OSBI Central Laboratory is authorized to begin collecting the DNA profiles of all persons convicted of certain violent crimes in the state. 1997 - The Firearms and Toolmarks Unit of the OSBI Laboratory installs a new electronic database and image capture system. "Drugfire" is designed to allow firearms examiners to enter, store, search, retrieve, and share information from fired casings and bullets. 1998 - "The Shadow," a new tracking device, is unveiled by the Investigative Services Division. The new tool can be used to track a targeted suspect vehicle within 75 yards of its exact location. 1999 - A new DNA profiling technique called PCR-STR is being used in the Criminalistic Services Division. The new technique is automated and not as labor intensive. It can run tests on biological samples in half an hour or less. 1998 - The OSBI joins the Metro Fugitive Apprehension Task Force which is designed to track and arrest fugitives in the Oklahoma City metro and around the state. 1999 - Construction is completed on the Northeastern Regional Laboratory and Investigative Offices in Tahlequah. 1999 - The OSBI goes online with its website offering agency information, job postings, and forms for Criminal History Records requests and the Oklahoma Self-Defense Act. 1999 - Two Agents complete training in computer forensics. 1999 - Work begins on a multimillion dollar computer upgrade of AFIS. 1999 - Eastern Oklahoma is outraged when an 80 year old wheelchair bound man and his 75 year old wife are murdered in their rural McIntosh County home. Three OSBI agents, two OSBI serologists, and two OSBI fingerprint experts investigate the case. The suspects are charged within three days.
260,116
|This article needs additional citations for verification. (April 2010)| The front page of MK (PDF ver.) on November 27, 2008. Moskovskij Komsomolets (Russian: Московский комсомолец) is a Moscow-based daily newspaper with a circulation approaching one million, covering general news. Founded in 1919, it is now regarded as publishing sensational or provocative items on Russian politics and society. MK is also known as host for Russia's oldest hit parade - the Zvukovaya Dorozhka (Sound Track, in Russian). It has been published monthly since 1977 and features both Russian and international acts (in Soviet times, these were mostly from the Eastern Bloc). - "Moskovskij Komsomolets". Mondo Times. Retrieved 2009-10-01. - Official website (Russian) |This Russian newspaper-related article is a stub. You can help Wikipedia by expanding it.|
179,436
The Singularity Hub shows some 19th Century French Postcards (relax/sorry, nothing risqué) that depicted life in the year 2000. I’ve seen a couple of these previously (the blog site Paleofuture posted a few of them several years ago), but Singularity Hub shows a more extensive set, along with comments about how accurate some of them seem to have been. Robotic machines feature frequently. The postcards were created after, and presumably inspired by, some of Jules Verne’s stories. The cards (originally 50 in total) weren’t apparently distributed – they were intended to be included as inserts in either some toys or cigarette packets, according to Isaac Asimov who rediscovered them. One of the striking things about the postcards (and other attempts at sketching the future) is not the accuracy (or lack thereof) of the predictions, but how the environment and clothing in the pictures usually remains unchanged. So not a fancy Roomba-like vacuum cleaner, just a semi- autonomous good old fashioned scrubbing brush (wireless not yet invented). And 19th Century clothing and parquet flooring. That illustrates some of the traps in foresighting – extrapolating from the current situation, and focussing on the technology rather than also considering how the environment in which it will sit will also change. The postcard of the school of the future is also a delight – not quite what Google has in mind, I hope, for digitising books. Or how National Standards will play out. Most of the postcards appear optimistic about the future. Not unsurprising, given Jules Verne’s techno-enthusiasm. These days popular culture (or at least things that end up in the cinema) tends to have a more pessimistic future outlook. Paleofuture also shows how some US children in 1976 imagined what 2076 would be like. If my drawing was any good, I’d think about doing some postcards showing “solutions” for the National Science Challenges. Maybe some schools, and others, may like to give that a go to help inspire creativity in framing what the biggest issues facing NZ are and potential ways of overcoming them.
249,474
A librarian at University College London has discovered a previously unknown manuscript version of a poem by Lord Byron during a routine cataloguing session. The 12-line poem was inscribed in the front of a copy of an 1810 edition of The Pleasures of Memory by Samuel Rogers, which had been given to the poet by the author. The book came to UCL as part of a collection of the Rogers' family papers, that was donated to the college in 1956. Rogers had inscribed his book to "The Right Hon.ble The Lord Byron, from his obliged & faithful friend The Author", but the book was returned to him with the further inscription "Afterwards returned by Lord Byron to Mr. Rogers with the lines written on the other side." On the verso is a poem beginning "Absent or present still to thee" in Byron's hand. It is signed with Byron's name written in Greek characters, and dated April 19th 1812. The poem was later published in a volume of collected poems in 1816, but no autograph manuscript of it was known until this discovery. The association between Byron and Rogers is well-documented. Rogers was a rich patron of the arts who hosted a literary salon in London from 1793, and entertained writers, artists and actors. He also spent time with Byron and Shelley in Italy. While Byron praised the "wonderful" elegance of The Pleasures of Memory, however, he later turned against Rogers and lampooned him bitterly. Susan Stead, Rare Books librarian at UCL was working her way through the books in the library's Strong Room in order to add them to the online catalogue when she came across her find. "My first reaction was 'ooh, isn't that nice!'" said Stead. "I thought it would be quite a find if it was genuine, so I put out a message on some rare books online mailing lists and was given advice about the experts I should contact. I sent them scans of the inscriptions and they confirmed that there is no question that it is genuine". Coincidentally, Stead also discovered a rare Shelley manuscript in the library earlier last year. The Byron find will remain in the collection, where it will be available for consultation by researchers. According to Dr Carl Thompson, a Byron expert at Nottingham Trent University, however, the value of the discovery may be more economic than scholarly as it is already common knowledge that Byron and Rogers were friends. "Anything in Byron's handwriting commands a good price, especially a manuscript of a poem, but I'm not sure it adds that much to our knowledge of Byron and his social milieu," he commented. "It's interesting that it's signed in Greek characters - I guess that's Byron trading on his reputation as a considerable traveller, a 'Levant Lunatic' as he put it. "It's always interesting to have these things come to light, even if ultimately it probably doesn't add that much to our knowledge of Byron and his milieu." LINES WRITTEN ON A BLANK LEAF OF 'THE PLEASURES OF MEMORY' Absent or present, still to thee, My friend, what magic spells belong! As all can tell, who share, like me, In turn thy converse and thy song. a But when the dreaded hour shall come By Friendship ever deem'd too nigh, And 'MEMORY' o'er her Druid's tomb Shall weep that aught of thee can die, How fondly will she then repay Thy homage offer'd at her shrine, to And blend, while ages roll away, Her name immortally with thine!
86,652
Even though the most famous underwater city of all, Atlantis, is probably a myth, there are a number of well-known submerged metropolises around the world. Some of these cities are well known to history, while others are mysterious and unexplained. For most of human history, these communities were lost to view, but today diving equipment, robots, submarines, and underwater cameras bring them back to life. Today archeologists, tourists, historians, and others can visit and explore underwater cities much as they explore ruins or abandoned communities. Every day more and more underwater cities are giving up their treasures. Here is a documentary named "Sunken Civilizations: Secrets of Lost Cities Underwater", from which you can visit some amazing underwater cities with the divers. Nine Famous Underwater Cities Nobody knows what the real name of this community is because it sank into the waters off the southern tip of Greece's Peloponnese peninsula 5,000 years ago. Pavlopetri, or Peter and Paul's stone, is the modern name for the inlet where the ruins are submerged. The ruins were discovered in 1967 and were found to contain an almost complete community, including streets and tombs. Nobody knows who built the town. It was originally assumed to be part of the Mycenaean civilization, but archeologists now believe it is older and possibly Minoan in origin. Historians think Pavlopetri might have been destroyed by an earthquake that destroyed the Minoan civilization on Crete around 1000 BCE. Port Royal, Jamaica The city at the mouth of Kingston Harbor was once a famous base for pirates and privateers. The pirates used Port Royal as a base to raid the treasure ships of the famed Spanish Main. At one time pirates from all over the world gathered in the city under the protection of the notorious British governor and pirate Sir Henry Morgan. At its height in the late 17th Century, Port Royal contained four forts and 2,000 buildings. Famous visitors included notorious pirates like Calico Jack, Charles Vane, and Blackbeard. Most of Port Royal sank beneath the Caribbean in an earthquake in 1692. The city sank because the silt it was built on gave way during the earthquake. Modern archeologists have discovered that much of the city, including pirates' taverns, docks, and ships are still preserved under Kingston Harbor. This ancient city was considered a myth until divers discovered ruins off the coast of the Indian state of Gujarat in 2000. The Hindus believe that Dwarka was built by Lord Krishna and once contained 70,000 palaces. Researchers from India's National Institute of Ocean Technology found the ruins in the Gulf of Khamabhat. Nobody knows who built the cities submerged in the Arabian Sea. The ruins could be some of the oldest in the world: carbon dating has revealed that wood dredged from the site dates to around 7400 BCE, or around 9,000 years ago, predating any known civilization. It is not known how or why the city sank, but scientists believe the Arabian Sea was 100 meters lower than its current level as recently as 2,000 years ago. The Pyramid of Yonaguni or Yonaguni Monument, Japan Like Dwarka, the submerged pyramid off the Japanese island of Yonaguni has created controversy. Divers discovered the "pyramid" with staircase-like terraces in 1986. Since then some scientists have labeled it a rock formation, but Masaaki Kimura, a seismology professor, believes that it was built between 2,000 and 3,000 years ago. That means it predates any known Japanese civilization if it really is manmade. The design of the pyramid is similar to those found in Mexico and Central America. The pyramid is very mysterious because there are no other underwater structures in the area. Lion City, China Even though this city is over 1,400 years old, it has only been submerged for less than 60 years. Lion City was flooded in 1959 when the Chinese government built a hydroelectric dam on the Xin'an River and created Qiandao Lake. The city, also called Shi Cheng, dates to 621 AD. Lion City is now popular with divers because it has been shown to be largely intact. Shi Cheng is a fairly large city with over 265 arches and five towers on the walls around the city. Another submerged city under Qiandao Lake is believed to be even older: He Cheng might date back the Dong Han Dynasty, which ruled from 25 to 200 AD. Heracleion or Thonis This submerged city could be one of the world's oldest cities. It might date as far back as 1200 BC. At one point, Heracleion was Ancient Egypt's main port, while today it is submerged in the harbor of modern day Alexandria. The city features in many legends: Hercules was supposed to have visited the city and gave it its Greek name, and Helen of Troy may have also dropped in for a visit. Heracleion was built on islands in the Nile Delta. It probably sank in the third or fourth century BC because the river washed away the silt it was built upon. At one time scientists thought that Heracleion and Thonis were separate cities. Historians only realized they were the same place when divers located the city in 2000. The Temple Under Lake Titicaca, Peru The world's highest submerged city might lay beneath the waters of Lake Titicaca on the Peruvian-Bolivian border, the world's highest lake in elevation. Lake Titicaca is 12,507 feet in elevation, and it is the largest lake in South America. Archeologists located the temple in 2000 after following a submerged road. The 200-meter-tall temple is thought to be 1,000 to 1,500 years old. It probably predates the Inca Civilization and may have been built by a people called the Tiahuanaco people. Its discovery seems to confirm Inca legends that their civilization began on the lake. It is not known why the temple sank or if there are more submerged buildings in the area. Villa Epecuen, Argentina This Argentine town might be the world's newest submerged city. During the 1970s it was a thriving community with 5,000 residents and 300 businesses. It sank beneath the bodies of a lake called Lago Epecuen in the late 1980s and early 1990s. Recently the waters have receded, revealing a ghostly landscape that includes playgrounds, trees, utility poles, and dozens of houses. Today there's only one resident named Pablo Novak, a former resident who moved back after the water started to recede in 2009. Ontario's Lost Villages You don't have to travel far to find submerged communities—simply go to Ontario near the New York border. Ten small Canadian villages disappeared beneath the water when the Saint Lawrence Seaway was built in the late 1950s. Some structures from the towns were moved to Ault Park and an Upper Canada Village to serve as monuments when the area was flooded. The flooded region in the townships of Cornwall and Osnabruck include a portion of the Cornwall Canal. Sidewalks and building foundations can be seen from the shore. The flooded area also includes Crysler's Farm, where a major battle between American and British-Canadian forces was fought during the War of 1812.
42,229
Call someone an iconoclast today and you’re most likely thinking she’s a rebel, a non-conformist, an individualist. But back in 8th-century Byzantium, you would have meant something quite different. Derived from the Greek word for image-breaker, an iconoclast was someone who believed that religious icons were idolatrous. “From 726 to 843, the veneration of icons was officially banned in Orthodox worship,” explains Alicia Walker ’94, an assistant professor of History of Art at Bryn Mawr, “and Byzantine Iconoclasm spurred theological reflection on the corporeal versus spiritual nature of Christ and the saints.” A specialist in gender issues in the art and material culture of Byzantium, Walker is particularly interested in the impact of these religious debates on Byzantine attitudes about human bodies, especially women’s bodies. For her current project, Christian Bodies, Pagan Images: Women, Beauty, and Morality in Medieval Byzantium, she has received a Charles A. Ryskamp Research Fellowship, awarded annually by the American Council of Learned Societies. “Prior to Iconoclasm,” explains Walker, “women affiliated themselves with pagan goddesses in direct ways, for example, by wearing jewelry and clothing decorated with images of Athena or Aphrodite.” But after the Iconoclastic period, pagan goddesses and other female figures continued to appear in works of art, but not on objects worn by Christian women. In looking at the transformations in Byzantine conceptions of the female body and attitudes toward adornment, Walker aims to shed light on how both Christian and Classical traditions contributed to the regulation of women’s corporeal morality and the formation of female selfhood in medieval Byzantium. The Charles A. Ryskamp Fellowship, funded by The Andrew W. Mellon Foundation, supports scholars embarking on ambitious, large-scale research projects at critical stages in their academic careers. Since 2002, Ryskamp Fellowships have supported early-career professors in the humanities whose scholarly contributions have advanced their fields and who have well-designed plans for new research. Interested in Walker’s research? Read more here.
176,313
1. An iron block, usually with a steel face, upon which metals are hammered and shaped. 2. Anything resembling an anvil in shape or use. (Science: anatomy) Specifically, the incus. See incus. To be on the anvil, to be in a state of discussion, formation, or preparation, as when a scheme or measure is forming, but not matured. Origin: oe. Anvelt, anfelt, anefelt, as. Anfilt, onfilt; of uncertain origin; cf. OHG. Anafalz, D. Aanbeld.
279,922
ALLEGAN COUNTY, MI — A West Michigan township might be freed from certain obligations under the federal Voting Rights Act of 1965 after the Supreme Court on Tuesday struck down a key part of the law. Allegan County's Clyde Township, just south of Fennville, is one of only two Michigan townships bound by the landmark VRA to clear any election changes through federal authorities. The other is Buena Vista Township, near Saginaw. In a 5-4 decision along ideological lines, the Supreme Court found Section 4 of the VRA to be unconstitutional. That section creates a formula deciding which states, counties and other locations must submit tweaks to election processes through federal authorities. It therefore is used to pinpoint where Section 5 of the VRA is implemented. That part, which stood under the ruling, prohibits certain locations from changing election practices without federal preclearance. In his majority opinion, Chief Justice John Roberts found Congress relied on 40-year-old data when it last approved the VRA in 2006. Roberts argued, then, that the law did not reflect racial progress over the last several decades. Clyde Township, whose population was 2,084 as of the 2010 Census, was added to the VRA's preclearance list in the 1970s because of a high concentration of Hispanic residents. Unlike other locations covered by the VRA — notably, Southern States — there was no history of racial discrimination at the polls in Clyde Township. The township has in the past been burdened by extra costs incurred by the VRA's mandates, like having to print bilingual ballots despite low demand for them. Likewise, officials have had to gain federal approval before officially redrawing county commission districts and the like because of the VRA. Messages were left seeking comment from the township's supervisor and clerk on what, if any, implications might result from the Supreme Court's ruling. John Allen, a partner in the Grand Rapids-based Varnum Law firm's Kalamazoo office, said the ruling very likely could void Clyde Township's obligations under the VRA. He noted the court's ruling leaves the door open for Congress to use up-to-date data to prove race-based discrimination during elections occurs, which could mean amended guidelines in the future. Other commentators have noted, though, that a seemingly ever-gridlocked Congress likely would not agree any time soon to changes to the law. But "for the time being," Allen said, Clyde Township officials "wouldn't have to get approval to move a polling place" or similar requirement under the VRA. "I think some people regarded (the VRA) to be something of a political football, and battling between both candidates and parties to see if they could prevent changes being made, for instance, with redistricting of congressional districts or legislative offices," Allen said. "I think that is where the tension came up about whether this act had really outlived its intended purpose." Justices considered to be in the court's liberal wing all voted against striking down the VRA, and issued a dissenting opinion that questioned the majority's rationale. Writing for the dissent, Justice Ruth Bader Ginsburg wryly noted the court's finding that the VRA had successfully staved off discrimination was its very reason for invalidating the statute. "The Voting Rights Act of 1965 has worked to combat voting discrimination where other remedies had been tried and failed," Ginsburg wrote in her opinion.
291,570
Wednesday, July 28, 2010 From the San Francisco Chronicle: Fingerprints and DNA evidence are often not collected, Police Chief George Gascón said. To do so, a separate crime scene technician has to be called out, which could stretch into the next day. "When the police get there, you've been waiting for three, four, five hours," Gascón said. "By this time, you're really fit to be tied." That's all supposed to change under a pioneering and controversial test program included in the city's new budget that will use civilian investigators to respond to nonviolent crimes like burglaries or car break-ins, freeing up police officers to focus on crimes in progress or dangerous offenders.
288,161
[kwlug-disc] Using 4096-bit RSA for keysigning party (NOT defaults) cdfrey at foursquare.net Sat Sep 11 17:14:17 EDT 2010 On Sat, Sep 11, 2010 at 01:34:21PM -0400, Denver Gingerich wrote: > Unfortunately, they might not be. ?On most distros released before > about May 2009 (and probably more), the default GnuPG settings will > give you a 1024-bit DSA key, which is quite vulnerable to attacks due > to its reliance on SHA-1: As another person in private has mentioned, I think considering SHA-1 to be "quite vulnerable" to be overstating it. When I first heard of the SHA-1 issue, I was concerned too, but as far as I know there have been no actual collisions found in the wild. It has just been proven that collisions will be easier to find than first thought. > As recommended in the above article, users should select RSA and I > would personally recommend using the maximum key size of 4096 bits. > So please do NOT use the defaults and instead choose 4096-bit RSA. > This will give us a much stronger web of trust. I would encourage anyone to use a larger key size if they choose. The first key in the pair is used for signing, while the second one is used for encryption. The web of trust relies on the signing key. Unfortunately, some versions of GPG don't make it easy to create a signing key larger than 1024 bits. For example, if you are using gpg 1.4.9, the defaults give you a 1024 bit signing key and a 2048 bit encryption key. I don't seen an option to create an RSA/RSA pair, either. On 1.4.10, the bit sizes seem to be the same for both, defaulting to RSA for both keys, with 2048 bits. And practically speaking, 2048 bits is pretty danged good. :-) > > ? ? ?gpg --fingerprint dc6371d5 > > ? ? ?pub 1024D/DC6371D5 2006-12-02 [expires: 2011-12-01] > > ? ? ?Key fingerprint = 7D71 47F2 3F61 B0E1 5F3C 68A4 819A 39D8 DC63 > > 71D5 > > ? ? ?uid Chris Frey (cube) > > ? ? ?sub 4096g/C2855553 2006-12-02 [expires: 2011-12-01] > I hate to break it to Chris, but his key is one of the potentially > vulnerable. ?"pub 1024D" means 1024-bit DSA. ?I would especially > recommend that Chris generate a new key before the meeting, being the > keymaster and all. I've had this key for a while now, so it might be worth changing anyhow. I don't think it is worth a panic yet. It is good you brought this up, though, because my next key, whenever I do create it, should have a larger key. :-) Thanks for the heads-up! More information about the kwlug-disc
289,102
SQL reporting software allows companies and organization to get better understanding of entire business. Companies can share their visualized report in meaningful dashboards and create automated reports using this reporting tool. They can easily explore, analyze and report with just few clicks with the help of this tool. With the help of SQL reporting tool, you can make a most meaningful report with the help of pie charts, line charts and bar graphs to determine trends and relationship between data. So let’s discuss the most popular SQL reporting tools. Popular SQL Reporting Tools It is an open source software project that provides BIRT technology platform to form data visualizations and reports that embed rich client and web application that are based on Java and Java EE. It is a top-level software project within the Eclipse Foundation. Pentaho not only used for reporting purpose but it is also used for data mining for predictive analytics applications. Bells and whistles are needed to move to the Enterprise Edition of Pentaho. ReportServer is an open source server that gives quite scalable and flexible open source reporting and dashboard environment. This server supports various tools such as JasperReports, SAP Crystal Reports reporting engines and Eclipse Birt and also have its own ad-hoc oriented reporting tools. In this tool, huge collection of open source software are brought together to create a wide business intelligence capability. SpagoBI also covers other domains such as BPM and data mining. JasperReports is a stand-alone reporting server to provide reporting and analytics that can be embedded into a web or mobile application. It is operated as central information for the enterprise to provide critical information on a real-time or scheduled basis to the mobile device, printer, browser, or email inbox in different file formats It is free reporting tool that gives free open source utilities to provide report creation by using different types of database platforms. It supports the scheduling of NextReports and Jasper reports and delivers reports through E-mail, FTP, Windows Share and SSH. With the help of SQL reporting software and web based reporting tool, you can create and understand report very easily and quickly with minimal IT involvement. So choose the best tool to increase the ROI of your BI project and to deliver high quality product to the clients. This article includes information on SQL reporting software and web based reporting tools. Read more to find out some popular SQL reporting tools.
311,567
On November 3rd, the president of the United States spoke at the Hotel Lowry in St. Paul, Minnesota, in what was billed repeatedly as a bi-partisan address. The president ridiculed reactionaries in Congress who he claimed represented the wealthy and the powerful, and whose “theory seems to be that if these groups are prosperous, they will pass along some of their prosperity to the rest of us.” The president drew a direct line between prosperity and increased “fairness” in the distribution of wealth: “We know that the country will achieve economic stability and progress only if the benefits of our production are widely distributed among all its citizens.” The president then laid out an ambitious agenda focused on creating jobs, improving education, expanding health care, and ensuring equal rights for all. Addressing his opponents in Congress, the president said “[t]here are people who contend that . . . programs for the general welfare will cost too much,” but argued “[t]he expenditures which we make today for the education, health, and security of our citizens are investments in the future of our country . . . .” Giving a specific, and favorite, example, the president argued that government investments in the areas of energy are “good investments in the future of this great country.” Building on the meme about great countries doing great national projects, he praised the Louisiana Purchase, which brought Minnesota into the Union, and compared congressional critics of his past and proposed spending to those who argued President Jefferson should not have been allowed to borrow to buy “Louisiana” from Napoleon. The speech was given on November 3, 1949, and the president was Harry Truman. But it could just as easily have come from the mouth of our current president, despite the fact that President Obama’s December 2011 speech in Osawatomie, Kansas was allegedly invoking President Teddy Roosevelt. In fact, we could play a game – call it, “Harry or Barry?” (as the president was called for most of his life) – to see how little has changed since 1949:
31,585
I. Einstein on technology: It has become appallingly obvious that our technology has exceeded our humanity. Technological progress is like an axe in the hands of a pathological criminal. Technology is so much fun but we can drown in our technology. The fog of information can drive out knowledge. More and more Americans feel threatened by runaway technology, by large-scale organization, by overcrowding. More and more Americans are appalled by the ravages of industrial progress, by the defacement of nature, by man-made ugliness. If our society continues at its present rate to become less livable as it becomes more affluent, we promise all to end up in sumptuous misery. The rational mind is a faithful servant and the intuitive mind is a sacred gift. We have created a society that honors the servant and has forgotten the gift. If we continue to develop our technology without wisdom or prudence, our servant may prove to be our executioner. The most exciting breakthroughs of the 21st century will not occur because of technology but because of an expanding concept of what it means to be human. The most important and urgent problems of the technology of today are no longer the satisfactions of primary needs or of archetypal wishes, but the reparation of the evils and damages by technology of yesterday. The future masters of technology will have to be light-hearted and intelligent. The machine easily masters the grim and the dumb. We cannot solve our problems with the same thinking we used when we created them. - What does he say is wrong with technology? Technology does a lot of good. II. Nazis, The McDonalds Smile, And Five Cent Empathy II. Nazis, The McDonalds Smile, And Five Cent Empathy - It brings with it the myth that only the part of the world that can be used by technology is real. - What do you mean by myth? - A late nineteenth century philosopher called myth a story relating the visible to the invisible. Actually it is a relation between a visible world described technically, with defined parts observed to be in regular relation to each other, to other aspects of human experience not describable in those terms. - You're saying a myth already involves technology? - Yes. Mumford in our own times said the first technology was in the organization of people into specialized roles 5000 years ago in the ancient empires of the Middle East. The non-technical part of the story was that making things was good in itself because it was for the god, gods, or pharaoh. - I don't get it. Why should we care about the pharaoh or the gods? - And why should we believe it is always good to do things better, larger, faster? To whose benefit is it? Merely having the idea itself of the infinite seemingly has value for us. Embody the idea of infinite technical progress in a human form, and you have your explanation of the role played by gods and pharaohs. They are place-holders for the infinite. - Why do we need the idea of the infinite? - At the end of World War I the French poet Paul Valery wrote an essay (Crisis Of The Mind) in which he defined our society as a combination of unbounded, "infinite" mysticism and logical, skeptical investigation. He said we were reaching a crisis because our technology had spread to the entire world. Even the practice of arts did not stop Germany from becoming the foremost example of the negative effects of technology, a paradox that would become even more apparent the second time around in World War II. The spread of technology was doing something to the Western techniques of mysticism and skeptical investigation that was skewing the results towards destruction rather than creation. Do you know the cause? - No. Do you? What did Valery say? - That we'd made the mistake of letting our unique creative force become proportional to the mass practice of technology, with the result we were being overwhelmed. We we the victim of our "intellectual physics". In one concluding sentence he said our saving would be in studying how the individual, not the group, could resist this progress. - So what can an individual do? - We have to study the relation of ideas to technology, come to understand clearly what is going on. Learn the intellectual physics. - And you I suppose are into intellectual physics. What have you learned? - The reason the Nazis loved art is that art had been made the means to the end of technical advancement. - In a technical organization each person has to stay in role and respond as specified to other role players, everyone must follow the script. No one is allowed to respond for their own reasons, in accord with their particular personal experience for the sake of their own personal goals. But imagine each in his professional role is allowed, or rather ordered, to smile. - Like at McDonalds. - For example. Everyone involved might feel better as a result, despite the artificial nature of the situation, the mere suggestion that we be good spirited which the imitation smile produces might do some good. But not much, because acting on what the smile suggests is blocked by the rules of employment. - The McDonalds smile is like the Nazis "sensitivity" to art. - Yes. An article published today in the Harvard Business Review says it succinctly: previously it was fashionable to appear unfeeling, now it is fashionable to appear kind; if you want to sell more of your products you therefore have to associate your product with the appearance of kindness. - The expression of emotion is used as part of the machine. But how? - As the new "god", the unseen part of the world, our inner selves, that myth puts in relation to the seen, the part manipulated by our technology. - So you are describing a technology of myth? - As good a definition of propaganda as I have ever heard. - Still, it's weird. Why do we need myth at all? - Because technology only expresses one side to our nature. - But why should it exclude the other sides? - Because as it did in its beginning it still tends to make human beings into parts of a machine. - But why? - Because once people take on different vocations, they decide not simply to exchange what they make for what others make, but to adapt themselves to others so they can exchange better. Better means more regularly. - They study a technology of exchange. - Yes. And the more someone acts for the sake of pleasing others, the less he acts for the sake of getting what he has learned is good for himself. This movement from acting entirely for reasons drawn from one's own experience, to doing what others ask because it will make acting with others more regular, is what accounts for the myth, for what the myth tells a story about: a known world of describable transaction, and an unknown, unseen world. - Why don't other people say this, if this is true? - Other people do say it. Rousseau in the 18th century, Plato in the 5th century BC. - What did Plato say exactly? - Knowing a myth of technology was inevitable the way things were going, and had to go, he wrote that myth himself, with the greatest possible technical skill he could draw upon. - What did he hope to achieve? - What else than to show as clearly as possible the parts of human nature left out. - But you said, talking about the Nazis and the Mcdonalds smile, they weren't left out. - They are left out of possibility for individual application. The server at McDonalds can't easily make friends with the customer, the Nazi soldier celebrating transcending human limitations listening to the music of Beethoven uses transcendence not to become an artist himself but to overcome his private resistance to carrying out the murders he is ordered to perform. - If Plato showed as clearly as possible the parts of human nature left out of a technological society how come no one except you and Rousseau sees this clear demonstration? - Others have seen it. - In recent times, Leo Strauss, his student Alan Bloom. Plato's medieval interpreters, both Christian and Arab understood. Renaissance artists understood. The Romans didn't understand, just as we in our times don't understand. - Why is that? - Because specialization of roles had progressed too far for mysticism to be the product of the technology of an individual's life, his own experience and judgement, for technology to be means to the end of having the mystical experience of beauty, a private story that cannot be made general in myth. - My generation is trying to change, we don't want to believe in myths. We value community. - How do you value community? On the way here I saw a fellow at a folding table he'd set up on a street corner with a sign that said "Empathy, 5 cents". I went over, and do you know what? I didn't feel any sympathy with this guy, not with the hard way he was looking me. - You didn't give him a chance. - I did. Asked him why he was doing this. He said he was giving something back to the community, was showing not everything was for money. - But that's good. - No it's not! It's just another myth. More McDonalds Smiles, Nazi art. - That's ridiculous! - Ridiculous? How is the supposed empathy he is giving going to be the product of either his or his customer's self reflection, self correction, and study of individual experience? I could see in his eyes he didn't like me, that was his experience as an individual, though in words he was expressing unanimity and good will to all. - He didn't like you because you were challenging him. - Yes. Challenging his community that was based on nothing but intention, that was, as I've been saying, as isolated as the McDonald's smile and as meaningless as the Harvard Business Reviews' advice there's money to be made being nice. - Then what is to be done? - We need to know the intellectual physics, how technology creates the myth of technology. - And the myth of technology leads us to want more technology. - Yes. We need to know how that machine works. - The machine of how what we do makes what we think? - And then what? - When we know how it works we can change how it works. - We'll have a technology. Don't we have it, at least a little? - We haven't as far as I know made any progress since Plato laid out the problem clearly in The Republic. - So you think that at this late moment in history we can finally make that beginning? - Would you prefer we don't try? III. From Paul Valéry's Crisis of the Mind: And so the scales that used to tip in our favor, although we appeared the lighter, are beginning to lift us gently, as though we had stupidly shifted to the other side the mysterious excess that was ours. We have foolishly made force proportional to mass! This coming phenomenon, moreover, may be connected with another to be found in every nation: I mean the diffusion of culture, and its acquisition by ever larger categories of individuals. An attempt to predict the consequences of such diffusion, or to find whether it will or not inevitably bring on decadence, would be a delightfully complicated problem in intellectual physics. IV. You Have To Have A Story - What changed in the past few years? - Not me, not the way I lived. The world changed. Everyone tells me I have to meet the world half way, I have to expect good and it will come. - You don't think they're right? - I tell them I expected good would come, and it came. For a long time I had good luck. And then I expected good and it didn't come. How do they explain that? - What do they say? - They laugh. - Sorry, I'm laughing too. - Go right ahead. A story began the moment the rule stopped working, and I love stories. - What's the story? - My story? I made an attempt to figure out what had happened and what to do about it. - And? What did you figure out? - I told a story of how developing technological society had expanded into all the unoccupied corners I had worked my life into, and I got squeezed out. And I'd had such a low opinion of that organization I was taken by surprise. I thought that if I wanted I could, once I got tired of being out, slip back in unnoticed. That turned out not to be true: I was spotted from a distance and blocked before I took more than a step. Do you know what I think? How I was identified so easily? - No. How? - By my stories. - Is there something special about your stories? - No. But having a story at all has become special and undesirable. - Why? And I don't agree. People still have stories and still like telling them. - What is opposite to having a story? - No, far from it. The opposite to having a story is excitement and ecstasy. Pornographic and mystical excitement and ecstasy. - Are you saying there is nothing remarkable or moving in ecstasy and sex? - I'm saying that there should be a personal, non quantifiable story leading up to the remarkable and moving experience. - Should be for what? - For you not be be caught up in the technological myth. - Tell me again: what is the technological myth? - To be always doing. Doing more, better, faster, more often. All that happens when we are still - perception of beauty, truth, good - is left out. - But pornography and mysticism are not actions, are they? - No. They are a special kind of perception. - What kind? - The kind that is quantifiable, measurable. That we can learn to do better, more often, and quicker. - I don't follow. - I mean something straightforward: pornographic objects are meant to arouse quickly, and accomplish this by extremes of quantity in measurements of immediately visible, repeatedly seen shapes. Access to mystical experience can be practiced so it can be more lasting, reached quicker and more often. - There is a technology to having these experiences, pornographic and mystical. - People looking for pornographic and mystical experiences have a kind of story that ties them to the technological world. So? - So pornography and mystical exercise increase the influence and pervasiveness of technology in society. When people are tied closer into the technological emphasis on doing they more easily forget what they are not doing, forget the possibility of good feeling in the world not tied to quantity and speed and efficiency. Forget the experience of beauty. - That's why you called the worship of speed and quantity and efficiency in the technological myth a "place holder" for the infinite? Because it was without beauty? - Yes. Someone caught up in an organized world gets out of practice learning how to see individuals, reflect on one's own private experience. It is easier to step from the lack of individual practice in technological society to the lack of individual practice of pornography and mystical exercises. That ease or efficiency is part of the technological myth authorizes such a move. - Having a real story is not easy. - In both respects: not easy to have a story at all, and any story worth having is not going to be easy. Continued At: Machines & Consciousness
162,932
This post is largely in response to Bill’s questions about drum mic’ing in the vocal mic shootout post. Hopefully this can be another discussion starter because there are a lot of varying opinions on how best to handle drums. Here is Bill’s original comment: Hey, while we’re talking about comparing mics, I’d love to hear your thoughts on drum mics too. North Point, by far, has the best sounding drums I’ve ever heard live. I was wondering what you recommend??? How important is it to have the top AND bottom of a snare miced? And how important is it to have a mic inside the kick drums and one pointed at the sound port? Finally, how about EQ’s and dynamics? Are there any secrets you can share??? Just an idea for a future post when you get time! Thanks for the kind words on the drum sounds, Bill. First off, good drum sounds start with good sounding drums. Our kits aren’t the best sounding kits in the world, but they’re good, taken care of, and kept in tune and that can make all the difference. On occasion we’ll bring in a different kit such as the one pictured from Drive, but that gets done more because we can than out of need. It also helps that our drummers all bring their own snare drums that tend to be great sounding drums. Then, of course, there is a whole lot of drum sound that comes from a drummer’s hands. An unfortunate small number of folks really understand this, but there is a ton of tone in the way those drums get hit. Once the kit is in good shape, mic placement on drums is HUGE. Changing the angle on a snare mic a centimeter or two can make a big difference. The center of the drum can give you more attack/crack, but going for something just outside the center can give you more tone. Positioning the mic higher so that it’s aimed more “down” at the drum can give you more crack and tone, but it can also give you more ring. Bringing the mic lower to be almost parallel to the drum head can help with ring and hat bleed and fatten things up a bit, but you can lose some of that crack doing this. Always remember proximity effect from directional mics when you’re mic’ing drums; the closer the mic, the more proximity effect. When we bring a snare mic almost parallel to the drum head, it’s getting closer to the source and bumping that proximity effect which leads to fatter snare, but the position makes it hard to get an angle with the right crack and tone. It’s all about compromise to get the best overall position for what we need, and you need to move the mic around to find what’s best. I don’t get super hung up on this because I have a general idea of where I want to point a mic to start, and if something’s not working I’ll go move it. Now apply that to all the drums. I started learning how to mic drums when I was a studio intern; my boss would talk to me on a pair of headphones in the studio while I moved a mic as the drummer played until it was in the spot he wanted. It has just been years of playing around that got me to the point where I know when I need to move a mic vs. do something on the channel. Last Wednesday I went up during rehearsal and nudged the snare mic a hair and our drummer gave me a thumbs up from the immediate results he got in his ears. Mic placement on drums is a skill that everyone needs to learn if they want to get good drum sounds. Going back to Bill’s questions. I don’t think a bottom snare mic is essential. We have one, and I do use it. However, here’s my take on snare drums. I’ve never seen anybody stand under a snare and listen to it in a performance situation. I don’t remember ever seeing a drummer work on how his drums sounded from the bottom; they get the heads in tune, but that’s not where they listen to the final results or spend most of their time. Anytime someone wants to listen to a snare drum, their ears are generally above the drum so I tend to go with that as a reference. All that being said, there can definitely be some advantages to having a mic on the bottom. I like the bottom mic for more detail stuff where I really need to bring out the sound of the snares. I also like having it because I know if the top mic dies, I still have a mic on the snare. BUT the bulk of what I’m going for from a close mic on the snare is the top mic to the degree that there are weeks where I don’t ever use a bottom mic. Here’s my take on kick drums. Modern rock and roll kick drum sounds can’t be done by the majority of engineers without a mic inside the kick drum. It’s not impossible, but I highly doubt most guys could do it especially in a guerilla mixing situation. I’m not a fan of the one mic in and one mic out either. The outside mic–sometimes seen just outside the port–tends to lack any definition for me and ends up being just a whooooomph instead of a tight kick sound. I like taking that mic and putting it a bit in the hole instead. The kick mic’ing we’re doing is largely adopted from Chris Briley because I loved the way it worked when I came down here. We use 2 mics: Beta 91 and Sennheiser e902. The 91 gets used more for attack and the 902 is thump. 91 is positioned close to the non-beater head, centered in the drum on top of the pillow; too close can seem to get real clicky. 902 goes maybe 1/4 to 1/3 to 1/2 way in aimed at the beater head somewhere between the center and outside of the head; just not too far in is my rule. Remember the positioning with the snare mic now; center gets more of the attack which in this case can be click which we don’t need as much of because the 91 does that so well. Each mic gets EQ’ed to accentuate its strengths, although, I probably lean on the 902 for more of the sound. A nice advantage to the 2 mic situation with those mics EQ’ed for different stuff is we have a quick way to re-EQ the kick drum on the fly for changing stylistically diverse material. Another cool thing with the kick drum is we add weight to the bottom of it–maybe ten to twenty pounds. Buford Jones taught us this, and it can really help with making it punchy. I have a couple of dumbells in one kick and a couple of old mic stand bases in the other on top of the pillows. As far as EQ. This all really comes down to the drums, but here are sort of general ballpark areas I’ll give our volunteers who are learning how to dial things in. 400 Hz area is the boxiness. 2-5k is attack. 100-200 Hz on the snare can help thicken it up. 80-125 on the kick is more of a “head” thing, the chest thump is much lower like 50 Hz. Again these are ballpark starting points and not where you should just arbitrarily set your EQ. Dustin Whitt, audio director at Buckhead, taught me a little trick using Smaart to help find frequencies. Turn off all your processing on a drum channel and watch the spectrograph. The area with the most “heat” will probably be the fundamental of the drum. Now you can go after that or more easily find some harmonics. As for dynamics, be careful. I don’t do much on the individual channels. I might do a whole post on compression one of these days, but here’s just stuff to think about. Slower attack times can fatten things up. Faster attack times can accentuate the transient/crack. I often try and go as slow as possible without losing any detail stuff. I don’t do hard gates right now. I tend to use expanders with a frequency specific key taking things down maybe 6-12 dB when the drums aren’t being played, and I ONLY use them on the toms. Every once in a while I’ll stick one on the kick if it’s feeding back. Another thing I’ll do with dynamics is something called parallel compression where I basically double-bus my drums(no cymbals) to the master bus and a group that is also routed to the master bus. The group gets compressed a few dB(maybe 3-4 dB) and slid up into the mix to taste. Attack on that comp is as slow as I feel comfortable with and the release is generally more on the mid to fast-ish side, although I go back and forth here depending on mood. This can add punch and help the drums cut without giving the impression that the drums are squashed, BUT if the compressed group overtakes the original drums in the mix you can get into trouble if you’re not careful. As for any secrets, I don’t have any because I stole everything from other engineers. But here’s one that is different for a lot of live guys. I personally really like using the Rode NT4 as a stereo overhead and relying on it for a lot of the drum sound and not just cymbals. I also am still delaying all my close mics back to the overhead which can be subtle some weeks and huge others; maybe someday I’ll demonstrate the difference this makes. For me, it can really help maintain my snare tone if I push the overheads which I like to do as much as I can. When I mix in our studio on Sundays, I always start my drum mixes with the overheads and the kick. Here’s some inside information on our ride mic. The ride mic is more for “looks”. It gets used on occasion if there’s something the overheads aren’t picking up, but that mic is really there to have an extra channel available in case we add another tom or snare drum. One last thing about our drums. I think a big advantage we have for drum sounds is the size of our rooms. Our rooms are big enough that we can/need to drive the drums in the PA up and over what’s coming off the stage. This gives us a lot of control on the drum sound. I’ll wrap this up with a quick rundown on what mics we’re using right now: - Kick: Sennheiser e902, Shure Beta91, but sometimes a single AT AE2500(I like this on Country tunes…) - Snare: Shure Beta57 (top), Shure SM57 (bottom) - Hat: who really cares cuz…but if you do, it’s probably an Audix ADX51 - Toms: Sennheiser 421’s or Shure KSM44’s - Ride: Probably the same as the hat or a Shure SM81 - Overhead: Rode NT4, but sometimes Shure KSM44’s or KSM32’s–I also like AKG 451’s sometimes, but I don’t own any… Need a FOH Engineer? Need assistance with your PA or other audio gear? Are you trying to figure out how to take your team's audio game to the next level? I'd love to connect to help find a solution for you. Click here to drop me a line, and I'll be happy to get in touch with you.
72,099
Google: Made in the USA? By JOEL HANS, Managing Editor, Manufacturing.net At Google’s June 27 to 29 Google I/O conference in San Francisco, CA, the Internet’s biggest success story introduced a new version of its immensely popular Android mobile operating system, a tablet and a strange media streaming device for the living room: The Nexus Q. The last of those wasn’t given much fanfare, mostly because it’s a niche device that will only appeal to those already fully invested in Google’s content ecosystem. On top of that, it’s not cheap — $299 is a lot to ask for a device that streams content to one’s TV. At the same time, it has a gorgeous, unique design, with a sphere shape bisected by a ring of glowing lights. It looks downright futuristic. Initial reports and reviews were tepid, but then reporters at the The New York Times started to notice some interesting branding on the device’s back: “Designed and Manufactured in the USA” For a technology/gadget company, the “designed” part of the equation is nothing new. All the major electronics firms — think Apple, Dell, HP and more — largely design their products in America. Apple has proudly printed “Designed by Apple in California” on its packages for nearly a decade. This country has scores of talented industrial designers and engineers, and as a result of that, we design some fantastic-looking gadgets. Unfortunately, most of them are made overseas. And that distinction — the “manufactured” part on the Nexus Q’s back — is pretty much the only thing that makes the device interesting. After fielding some questions, Google acknowledged that the device is assembled at a plant somewhere in the San Jose area. While it’s certain that the device is not entirely American-made, it’s a bold statement amid increasing pressure on the likes of Apple over the labor conditions of various partner plants across Asia — China in particular. The Times reports Andy Rubin, who leads Android’s development, as saying, “We’ve been absent for so long, we decided, ‘Why don’t we try it and see what happens?’” That experiment, of course, has come with a price. The Nexus Q is most certainly more expensive than its direct competition largely, in part, because it was manufactured in the U.S. It’s no secret that labor costs are higher here than they are in China, but the mathematics of manufacturing in America versus abroad are changing quickly. With increased transportation costs, more complex regulatory and tax structures, and the problem of separating design from manufacturing, more companies are starting to realize that American manufacturing can be cost-effective. Perhaps Google started to see the real dollar effects of those shifts. That could have been the genesis for Google’s decision, but there are a few other determining factors as well. For now, here’s what we know about the Nexus Q and its “made in America” claims: It’s assembled in San Jose, CA, but the plant’s actual location is still unknown or undisclosed. Google is contracting out the manufacturing process to another company, which is the right decision, since Google likely doesn’t have the logistical and physical assets in place to have its own manufacturing operations. In fact, it’s becoming a more popular arrangement for companies producing high-tech or difficult-to-make items. It’s allowed many manufacturers to maintain a similar structure to their offshored assets while keeping production nearby. Speaking of which … It’s built 15 minutes from Google’s headquarters. According to the Times, Google’s Rubin spoke at length about the benefits of having the Nexus Q manufacturing close to where Google’s engineers live and work. This has, in recent years, been one of the main drivers for the reshoring movement — American manufacturers are starting to realize that it’s significantly easier to drive down to the plant in a matter of minutes instead of a day-long flight over the Pacific. And if a drive is still out of the question, there are a lot less barriers to getting someone on the phone, both in terms of time zones and languages. Joe Britt, Google’s engineering director, spoke at length to reporters at Wired, and lamented over how difficult manufacturing in China can be. He said, “Unless you’ve got somebody on the ground, constantly monitoring every aspect, it’s really hard to guarantee quality. You’re trusting someone 6,000 miles away.” At the same time, Britt said that the main driver for manufacturing the Nexus Q here in the States was the need to rapidly prototype the device and alter the production line accordingly. He said, “We have a manufacturing run where units made in the afternoon end up in the homes of trial users that night.” It’s “not a crusade.” While many might assume that the Nexus Q is some shot across Apple’s bow for all the heat it’s taken in the press lately for the working conditions at its partner manufacturing locations in Asia, I don’t see it that way. I see it as an experiment, and when it comes to subjects for a “made-in-America” testing ground, it doesn’t get much better than the Nexus Q, mostly because it’s not going to move all that many units. Most importantly, this gives Google the leeway to fail. They wouldn’t have that option with a smartphone. Some (but not all) parts are sourced from American plants. In a breakdown of the Nexus Q, Wired reported that the die-cast zinc base was made by a Wisconsin-based rifle maker, and that others have likely origins in the U.S. Other pieces, such as the PCBs, are emblazoned with “Android” and “Google” labels, but any markings indicating origins aren’t visible. It’s certainly not out of the question that Google would have PCB partners in either Asia or America adorn these pieces with its trademarks, so it’s impossible to say one way or another. This image from Wired clearly shows a connector module that’s made in Thailand, which dispels the hope some had that the Nexus Q was completely sourced and made in America. iFixit has a great “teardown” of the Nexus Q on its site, in which the company’s gone to great lengths to determine the possible locations of the individual parts in the device. Here is a glimpse at some of the more traceable parts, according to iFixit. To make the American-sourced parts a little easier to spot, I’ve added my own emphasis when applicable: - OMRON EE-SX1131 Photomicrosensor (manufactured in either Santa Clara, CA or Schaumburg, IL). - Atmel ATMEGA328P (manufactured in Colorado Springs, CO or Nantes, France). - NXP Semiconductors 44501 Near-Field Communications Controller (manufactured in Germany, China, UK, Netherlands or Singapore). - TXC 8.00 MHz Crystal Quartz Oscillator (manufactured in Taoyuan, Taiwan or Zhejiang, China). - Samsung KLMAG4FEJA-A002 16 GB moviNAND Flash Memory (manufactured in Hwaseong, South Korea, or Austin, TX). - SMSC LAN95000A Hi-Speed USB 2.0 to 10/100 Ethernet Controller (manufactured in North America, Taiwan, Japan, Korea, China, India or Europe). - Murata KM10L3002 (manufactured in Japan, China or Taiwan). - SMSC USB3320C Highly Integrated Full Featured Hi-Speed USB 2.0 ULPI Transceiver (manufactured in North America, Taiwan, Japan, Korea, China, India or Europe). - Texas Instruments 6030B1A4 integrated power management (manufactured in USA, Germany, China, Japan or the Philippines). - PulseJack J0011D0NL (manufactured in China). - Toshiba TX147APL (manufactured in Japan). Manufactured or Assembled? The global sourcing map for the Nexus Q does put into question Google’s bold statement of being “manufactured” in the U.S. In reality, its production has more in common with a global automaker who ships in parts from around the world and completes the final assembly somewhere in America, but that’s the nature of the electronics industry today. I would wager that a fully U.S.-made product like the Nexus Q is simply impossible — much of the chipset production completely vacated our shores for “cheaper” pastures decades ago. I wouldn’t fault Google for a moment in the manufactured vs. assembled argument. Truly, its effort to bring as much production to theU.S.as possible is commendable and is a step in the right direction for the economy as a whole. I hope that the Nexus Q experiment turns out to be a success, if only so that the company can approach American production with more depth. I simply don’t buy the idea that it’s impossible to make electronics in America at a competitive price. Perhaps the world’s biggest advertising company will finally show us the way. What’s your take? Please feel free to email me at firstname.lastname@example.org or comment below!
196,200
Over the past few days, the BBC has been ranting about what writer Matthew Engel called “ugly and pointless” ways American usage differs from British English. They even collected a list of 50 American words and expressions that Brits find annoying, irritating, and even infuriating. It includes things like: “Can I get a … ” (as a way to ask for something) “24/7” (to say 24 hours a day, 7 days a week) “Going forward” (to mean from now on) “Bi-weekly” (to say once every two weeks) There have been plenty of responses to the list, both from people who support the annoyed Brits, and those who defend the Americans. Whichever side you fall on, these are some great examples of the (often unexpected) ways British and American English are different.
266,847
This January’s International Electronics Recycling Congress in the Austrian city of Salzburg was held against the backdrop of the revision of the EU’s Directive on Waste Electrical and Electronic Equipment (WEEE), on which the European Parliament voted positively a few days later. Higher collection rates and prevention of illegal exports are among the main thrusts of the new policy document. The philosophy behind the goal of creating a Recycling Society within Europe was addressed by one of the keynote speakers, Julio Garcia Burgues, Director of the Waste Management Unit of the European Commission. ‘Today, Europe faces a dual challenge: first, stimulating the growth needed to provide jobs and well-being to citizens; secondly, ensuring that growth leads to a sustainable future. To tackle these challenges and turn them into opportunities, our economy will require a fundamental transformation within one generation,’ he said E-waste still growing Each year in the EU, some 2.7 billion tonnes of waste is thrown away. On average, only 40% of municipal waste is re-used or recycled; the rest goes to landfill or incineration. According to a study published in mid-January by the European Commission, full implementation of EU waste legislation would save Euro 72 billion a year (US$ 93.7 billion) and create over 400 000 jobs by the year 2020. E-waste generation is still increasing: electrical and electronic waste is expected to increase by roughly 11% between 2008 and 2014. And this is one of the waste streams with the greatest value in terms of recycling: not only gold, silver and copper but also rare earths are contained in significant volumes within e-waste. The EU’s WEEE Directive was adopted 10 years ago to address these challenges ‘and its implementation has clearly been a success’, Mr Burgues noted. ‘The current annual collection target is 4 kg per capita. This means that, with 500 million people living in the EU, every year around two million tonnes of e-waste have to be collected, properly treated, and made available for material recovery. Although some member states are lagging behind, many others are already well above the WEEE collection target.’ WEEE Directive recast Addressing the recast of the WEEE Directive that, at the time of the IERC, was about to be adopted, Mr Burgues called it ‘a true milestone in our road to an efficient Recycling Society’. He highlighted some of the main changes in the new legislation. ‘First, the new directive has a much higher level of ambition. Seven years after the entry into force of the directive, an amount equivalent to 85% of e-waste annually generated in the 27 member states will have to be properly collected, treated and recycled. In total volume, this means about 10 million tonnes per year of e-waste - a 500% increase from the current target.’ According to Mr Burgues, prevention of illegal exports of e-waste is one of the key objectives of the new directive. ‘The burden of proof to show that exports of used equipment are not just waste will be shifted to the exporters themselves,’ he noted. ‘This should make the enforcement work of customs officers much easier.’ The new version of the WEEE Directive demands that all EU member states must increase their collection of e-waste, regardless of whether they already meet the current flat-rate target of 4 kg per person per year. By 2016, most will have to collect 45 tonnes of e-waste for every 100 tonnes of e-goods put on the market three years previously. By 2019, this must rise to a rate of 65%, or alternatively they can collect a comparable figure of 85% of e-waste generated. The 11th International Electronics Recycling Congress IERC 2012, organized by Swiss company ICM AG took place in Salzburg, Austria from January 18 - 20, 2012 and attracted a record attendance of more than 475 delegates from 35 countries. In addition, the event drew 56 exhibitors to the parallel trade show - including equipment manufacturers and service providers. Over the years, IERC has become the international platform for discussion of the latest developments and challenges relating to worldwide waste electrical and electronic equipment (WEEE). The 12th International Electronics Recycling Congress IERC 2013 will take place from January 16 - 18, 2013 in Salzburg, Austria. HomeGo back home
301,207
The housewife and the chickpea The tale of the housewife and the chickpea in Rumi's Masnawi is redolent with meanings.india Updated: Jan 15, 2007 17:20 IST On January 14 and 15 the world commemorates Jalaluddin Rumi’s literary contributions to world peace. UNESCO has designated 2007 as the year of Maulana Jalaluddin Rumi, in order to promote his ideas of love, peace, tolerance and inter-faith harmony. The Masnawi by Rumi is a massive poem also referred to as the "Quran in Persian". It consists of mystical tales that are rich in metaphor and meaning and shed light on every aspect of human life and provide spiritual guidance. The images and symbols are taken from everyday life. Interestingly, some tales are remarkably similar to the tales in the Panchatantra. For instance the meaning behind the tale of the chickpea in the pot is profound. There is a ‘conversation’ between the chickpea that bubbles and boils in the pot and the housewife who smashes it and stirs it. The housewife tells that the chick pea, which is boiling and breaking, is the preparation of the soul to meet God. But the chick pea has various subtle hidden meanings too, as the housewife talks to it about its journey from the sun, cloud and stars till it has become a soul, act, speech and thought. One cannot help but observe the marked resemblance between these beliefs about the enlightenment of the soul with those in other religions of the world. All religions are based on a belief in the immortality of the soul and the transience of the human body and Rumi brings to us the essence of Sufism through the housewife - a symbol of an evolved soul talking about her enlightenment thus. "In the inanimate state I used to say ‘you are running to and fro in order to obtain knowledge and spiritual truths. Through this double boiling, I graduated from the strength of the senses to become spirit and finally your teacher’." Through his writings Rumi tells us that the way to God or spiritual perfection can be gained through perfection of the self and by living in harmony with others because the universe is itself a reflection of God.
101,757
Below is the text of the speech made by David Cameron, the Prime Minister, at the World Economic Forum at Davos on 24th January 2014. The key challenge for politicians and business leaders in Europe is how we make a success of globalisation. For years the West has been written off. People say that we are facing some sort of inevitable decline. They say we can’t make anything anymore. Whether it’s the shift from manufacturing to services, or the transfer from manual jobs to machines, the end point is the same dystopian vision; the East wins while the West loses; and the workers lose while the machines win. I don’t believe it has to be this way. Of course, we cannot be starry eyed about globalisation – it presents huge challenges as our economies and societies try to adapt. But neither should we take this pessimistic view. If we engage in the right way, if we get the fundamentals of our economies right, sort out our debts, maximise our competitiveness and build on our strengths, then globalisation offers our businesses the chance to win new contracts to export into markets that were previously closed and create jobs fulfilling the demands of new consumers thousands of miles away. Indeed if we make the right decisions, we may also see more of what has been a small but discernible trend where some jobs that were once offshored are coming back from East to West. And it is this that I want to talk about today. All of this is about the same purpose. Securing sustainable, well-paid jobs. Giving people pride in using their skills. Offering workers a chance to make world-beating products. Bringing more of the benefits of globalisation home and ensuring those benefits are felt by hard-working people in terms of security, stability and peace of mind. Let me start with what we are doing in Britain. We have set out a long-term economic plan to secure our country’s economic future. It has 5 parts. First, getting the fundamentals right – cutting the deficit so we deal with our debts, safeguarding our economy for the long-term and keeping mortgage rates low. Second, reducing taxes to help hard-working people become more financially secure. Third, capping welfare and reducing immigration so our economy delivers for people who want to work hard and play by the rules. Fourth, delivering the best schools and skills for young people so the next generation can be best placed to win the jobs of the future. And fifth, driving job creation by backing small business and enterprise with better infrastructure and lower jobs taxes. Each part of this plan is already producing results. The deficit we inherited was the biggest in our post war history – but already it’s down by a third. Our economy is growing. Just this week, the IMF upgraded its growth forecasts for Britain by more than any other G7 country and we have also seen the largest quarterly increase in employment since records began. There are now more than 1.6 million new private sector jobs since early 2010 – and around 400,000 more small businesses. We’ve cut taxes for over 25 million people, reformed welfare so that it pays to work and created more apprenticeships than at any time in our history. And we’ve taken unprecedented steps to back enterprise; scrapping £1.2 billion of red tape – including pushing for the removal of the most problematic EU regulations and investing billions in our infrastructure – in roads, rail and what is set to become the best superfast broadband network in Europe. Ernst and Young now say Britain is the best place in Europe for new entrepreneurs. This has not come automatically; it is because we have chosen to build our long-term economic plan on Britain’s great strengths. We have chosen to play to our strengths as an open, trading economy, championing the vital EU trade deals with America, Canada and Asia that can add millions of jobs to our economies and billions of pounds to the value of our businesses. Rather than trying to pull up the drawbridge and shut ourselves off from globalisation, we have chosen to embrace foreign investment. We are proud of the Indian investment in Jaguar Land Rover, proud that Emirates invested in a new stadium for Arsenal and Etihad have invested in Manchester City. And we are proud that in the first half of last year the UK became the world’s largest recipient of inward foreign direct investment. We have made choices. Difficult choices. In a time of austerity we have chosen to maintain our spending on science and innovation. And we have chosen to cut business taxes. Corporation tax will soon be as low as 20%, the lowest in the G7 and as low as 10% for companies that turn innovation into manufacturing. This is the country that is so committed to cutting burdens on business, that no government Minister – not even me as Prime Minister – can propose a new regulation that affects business without getting rid of 2 others in return. This is Britain. Open, pioneering, creative, innovative – and ready for your investment. Britain also has the chance to become something else. Let me explain. In recent years there has been a practice of offshoring where companies move production facilities to low cost countries. We’ve all seen it. We all know it’s true. And it will continue. But there is now an opportunity for the reverse: there is now an opportunity for some of those jobs to come back. A recent survey of small and medium sized businesses found that more than 1 in 10 has brought back to Britain some production in the past year. More than double the proportion sending production in the opposite direction. From food processing to fashion, from cars to computer-makers. It’s not just one sector; it’s across all sectors of the economy. The food manufacturer Symingtons is moving its factory from China to Leeds. Hornby the model train manufacturer is bringing some of its manufacturing from India to Britain. Raspberry Pi computers have shipped production to Wales. A company I visited yesterday morning – Vent-Axia – has shipped jobs from China to Crawley. Jaeger, the fashion brand, stopped manufacturing in the UK 15 years ago but is now bringing as much as 10 per cent back to Britain. Take cars. Britain now exports more cars than it imports and based on this success, the automotive industry has indicated it could yet return £3 billion of supply contracts. But we are not just seeing these trends and opportunities in Britain. A survey of major US-based manufacturing companies found that more than a third were planning or actively considering shifting production facilities from China to America. While one recent forecast suggests millions of jobs could be available for re-shoring globally. To win these jobs we need to understand what is driving these changes. Part of the story is about rising costs in the emerging markets, a natural consequence of these economies developing and their people becoming wealthier. Senior pay in China now matches or exceeds pay in America and Europe while rising oil prices and complex supply chains are increasing transport costs too. At the same time, there are a number of factors pulling companies back home. Some companies are choosing to locate production nearer to their consumer markets in the West. By shortening their supply chains, they can develop new products and react more quickly to changing consumer demand. More customisation. More personalization. Better and faster customer service. For example, you’re inspired by a new trend on the London catwalk and want to make a new product available in days not weeks. A shorter supply chain will help. So will new technologies like 3-D printing – where you can personalise a design and print in hours rather than choose from a more limited range of pre-designed goods and ship in weeks. There is no doubt that when it comes to re-shoring in the US, one of the most important factors has been the development of shale gas, which is flooring US energy prices with billions of dollars of energy cost savings predicted over the next decade. Taken together, I believe these trends have the ability to be a fresh driver of growth in Europe too. I want Britain to seize these opportunities. I think there is a chance for Britain to become the “Re-Shore Nation”. For years we have had UKTI out there helping our businesses to export and encouraging inward investment. Now I want to give that same dedicated specific support to helping businesses re-shore. So we are setting up a one stop shop to help businesses capitalise on the opportunities of re-shoring. Much as Britain can be the “Re-shore nation”, so Europe can benefit from this too. But only if we act now to make re-shoring as attractive as possible. As much as there is an opportunity, we have to be careful not to misrepresent it. So, let me be clear on 3 things I’m not saying. First, I’m not saying there is a finite number of jobs in the world and that our success depends on some kind of tug of war to win them back at the expense of the East. That completely misunderstands the nature of what is going on; and how economies work. Growth and dynamism means that new jobs are continually being created and re-created. So our gain is not their loss: rather their gain is our gain. Second, I’m not saying that re-shoring is going to bring back all the jobs that were off-shored in the first place. We have to keep the scale of this development in proportion. So far most of the firms involved are mainly bringing back production destined for markets in the West. Some companies will continue to off-shore more than they bring back and much of what these firms have moved overseas will remain there, if not in China then in other low-cost Asian economies like Indonesia and Vietnam. Third, I am not saying that our economic success depends on winning some kind of race to the bottom nor should we be engaged in one. Getting decent, well-paid jobs at every level is what we are aiming for. And I believe that’s what we can get…and that re-shoring can help. When mobile network company EE recently decided to move 300 call centre jobs from the Philippines to Northern Ireland, they didn’t do it because wages were lower. They did it because productivity was higher and because the company decided it would be more successful by having a more local call centre for its customers. And as they make this move, they aren’t just creating jobs for telephone operators. They are creating jobs for managers, lawyers and technicians too. So what I am saying is this. Right now, economies in Europe have a unique opportunity to accelerate this new trend of jobs coming back home. And we should be confident that we can do this. As we do so, we should never forget one of our most important strengths. We should never undersell the core values of our liberal democracy; the rule of law, the freedom of speech and freedom of the media, property rights and accountable institutions, all vital foundations for long-term stability and commercial success. But for re-shoring to happen we need to build on those foundations. That means settling once and for all 2 key arguments that risk undermining our competitiveness. First, on the overall business environment. And second, on the need for cheap and predictable sources of energy. Let me briefly take each of these in turn. All of us here in Davos know what it is that businesses need if they are to choose to locate in Europe. Macroeconomic stability. European economies with their debts and deficits under control. Strong finance – like that provided by the City of London. Consistent support for free trade – especially the vital trade deal with the US. And above all, we need an unashamedly pro-business regulatory environment – with labour market flexibility, low jobs taxes and a willingness to pave the way for new business and new business models. These are the issues our Business Task Force highlighted in their recent report – a report 7 European leaders supported late last year in Brussels. We are making progress in the battle for an enterprise-friendly Europe. The Eurozone crisis has focused governments on the need for structural reform. The accession to the EU of countries that experienced state socialism and the progress of sensible pro-enterprise governments. All these things have helped. But the fight is not yet won. There are still people who think that the key to success is ever greater social protections and more regulations. Some in the European Commission seem to think that if they’re not producing new regulations they’re somehow not doing their job. And that removing existing regulations is somehow an act of self-harm. While many in the European Parliament are tempted to gold plate every piece of legislation. Let’s be clear. We don’t protect workers by piling on the regulations and directives to such an extent that they become unemployable. We have to maintain the flexibility for companies to grow and expand. Incredibly complex and overwritten directives that take this flexibility away, that make life difficult for temporary workers, or that stop firms moving people between plants just mean that companies who want to re-shore will re-shore somewhere else. By contrast, where countries are embracing reform, new jobs are flowing. In the UK, BT moved 1,200 jobs back because of flexibility from the unions. Last year Nissan said it will invest 130 million Euros in its Barcelona plant – mainly because Spanish unions agreed to recast working conditions and allow more flexible arrangements. Ford, Renault and Volkswagen are similarly keen to take advantage of greater flexibility in Europe, especially southern Europe. It would be madness to stand in their way. The same is true of energy. To relocate in Europe, businesses will be encouraged by cheap and predictable sources of energy. Yes, we need renewables – these are a vital part of our future. That’s why Britain had made itself one of the best places for green investment anywhere in the world, with the world’s first dedicated green investment bank and the largest offshore wind market in the world. We need nuclear as part of that energy mix too. And I’m delighted that in Britain last year we agreed the first new nuclear build for a generation with £16 billion of investment and 25,000 new jobs. That will ensure safety of energy supplies. But we also need to explore the opportunity represented by shale gas. Now I understand the concerns some people have. We need the right regulations – such as ensuring that well casings are set at the right depths with tight seals. And governments need to reassure people that nothing would go ahead if there were environmental dangers. But if this is done properly, shale gas can actually have lower emissions than imported gas. This week’s announcements from the European Union represent important progress but there is still a way to go in really embracing this opportunity. We should be clear that if the European Union or its member states impose burdensome, unjustified or premature regulatory burdens on shale gas exploration in Europe investors will quickly head elsewhere. Oil and gas will still be plentifully produced, but Europe will be dry. Just look at what shale gas has done for America – for American firms and American jobs. It has reduced industrial gas prices in America to about one quarter of those in Europe and it’s set to create a million more manufacturing jobs as firms build new factories. A recent study suggests that US GDP is going to be to on average close to half a trillion dollars higher every year between 2008 and 2035 because of shale. The Confederation of British Industry and Business Europe are coming together to launch a “Blueprint for Industrial Competitiveness”. Their message is clear. Act now to seize the opportunities of re-shoring. Deal with our debts. Roll back the unnecessary regulation. And embrace the opportunities of shale gas. Business is making the case. Please don’t hold back in telling Europe’s governments what we need to do. European countries face a choice. If we act now we can ensure our businesses, our peoples and our societies can benefit from the next phases of globalisation. The security, stability and peace of mind that those we serve yearn for can only be delivered by facing the difficult choices. We must not fail them.
288,107
A new “pain in the neck” by Jerrold M. Gorski, MD A breakthrough in the evaluation and treatment of chronic neck pain and whiplash-associated disorders I promised that AAOS Now would give AAOS members a place to “sound off,” just as Dr. Gorski is doing in this column. Readers are welcome to respond, comment, or critize, as long as you remember that AAOS Now is a “member” publication—not a scientific, peer-reviewed journal. Whether you think Dr. Gorski is ahead of his time or way off base, if there is referred pain from the neck to the shoulder, then I guess it is possible to have referred pain from the shoulder to the neck. (Some nerves, like the median nerve at the wrist, can “go uphill” [proximal pain].) As I recall, I was one of those who said total hips would not work! Not long after the introduction of the Model T, the term “whiplash” was coined. In the decades since, researchers have never been able to prove the existence of the condition, which affects millions of unhappy patients. Chronic neck pain and whiplash-associated disorders continue to cost up to $20 billion annually, without any hope for a cure…perhaps until now. Whiplash is not a favorite subject of orthopaedic surgeons, principally because a pathologic lesion has never been found in the neck. We can understand the whiplash mechanism resulting from acceleration/deceleration forces acting on the head and neck in a rear-end collision. We note that the number of whiplash claims continues to increase, despite modern head restraints, seat belts, and airbags. We are disappointed and perplexed when patients don’t improve after surgery. Without a defined neck lesion, we frequently defer the treatment of these patients to others. Every conceivable anatomic structure in the neck has been repeatedly scrutinized for the whiplash lesion and it just doesn’t exist—in the neck. I think whiplash exists, and this is my hypothesis: No pathologic lesion has been found in the neck because whiplash—and most intractable chronic neck pain—is due to a shoulder problem. The pathologic lesion is asymptomatic shoulder impingement that presents as “neck” pain. In other words, whiplash is a shoulder—not a neck—condition! More than semantics The first problem with whiplash and chronic neck pain is largely semantic. The most common “neck” pain is not in the neck, but in the upper back between the neck and the shoulder, and frequently over the supraspinatus muscle. Pain in the upper back may also be ascribed to trapezius spasms, trigger points, thoracic outlet syndrome, and fibromyalgia. When I see a patient with neck pain localized to the supraspinatus muscle in the upper back, I consider a new referred pain syndrome I call the Referred Shoulder Impingement Syndrome (RSIS), which I first described in the Journal of Bone and Joint Surgery in 2003.1 Patients with whiplash, whiplash-associated disorders, or intractable chronic neck pain frequently have pain here, which my physician’s assistant has named the “G-spot” in my honor. The second problem is that the shoulder is asymptomatic for many of these patients, and they may deny any shoulder problems. Yamaguchi has recently and definitively shown that shoulder impingement has both asymptomatic and symptomatic presentations.2 He estimates that up to 17 million people have asymptomatic shoulder impingement, and I believe that many of them actually have RSIS, or neck pain referred from the shoulder. Muddu3 and Chauhan4 have separately shown that the symptomatic shoulder impingement is associated with whiplash (“shoulder whiplash”), even suggesting this as a distinct clinical entity. My own research indicates that asymptomatic shoulder impingement is not only associated with, but frequently is, the underlying etiology in chronic neck pain and whiplash-associated disorders. Fig. 1 The pseudocyst under the greater tuberosity of the humerus (arrow.) Leaching out of minerals gives the radiolucent X-ray appearance. It is not a cystic lesion, and it should not be biopsied. What’s behind it? The pathophysiology of RSIS is largely speculative at this time. MacNab has histologically described the absence of pain fibers in impinged rotator cuff tissue, which may best explain the absence of shoulder complaints in the asymptomatic group.5 This finding is important and somewhat analogous to pressure sores. In chronic impingement, sustained pressure on the blood vessels and nerves of the rotator cuff causes them to become painless and asymptomatic in the shoulder. I believe that the neck pain is due to pain and spasm in the adjoining supraspinatus muscle. When the shoulder hurts, the cuff is symptomatic, and perhaps some pain fibers are still present or the bursal tissues are painfully involved. Don’t be surprised if you find yourself checking for RSIS in your own upper back; everyone seems to have this “neck” ache from time to time. The pain is ususally rated at about 3 on a visual analogue scale, on which 10 is maximum pain. For most people, it’s an annoying ache rather than a severe pain; for others, it is sometimes very severe. I think the associated limited neck motion may result from a compensatory reaction by the muscles around the supraspinatus. When patients bob their heads after a shoulder injection—I call it the “head dancing sign”—it is due to the immediate lessening of “neck” pain and spasm. It’s a great prognostic sign. Don’t sleep on it How does an insensated rotator cuff from sustained pressure or impingement develop without the patient’s being aware of it? The chronicity of the impingement is anecdotally correlated with a common sleep position in which the shoulder remains in the overhead position for prolonged periods “under the pillow.” Although my workers compensation patients deny it, everyone seems to sleep this way. I think this may also be the cause of the nightly sleep disturbances, tossing, turning, and the early morning complaints frequently reported by patients as having “slept funny” on their necks! I think every physician (and throwing/swimming coaches) should recommend avoiding this sleep position. We need much more research on the effect of sleep positions, but you can check it out for yourself tonight. In my opinion, an acute shoulder injury commonly occurs in a car accident, especially if the driver continues to hold the steering wheel. It likely represents an acute injury to a chronically impinged shoulder if the patient habitually sleeps with the arm in the overhead position. Furthermore, both the shoulder and neck are likely to be injured in any given accident, and the neck may be whipped back and forth, producing a soft-tissue sprain. In other words, the shoulder impingement likely accompanies a concomitant neck sprain. The neck sprain may subside, leaving the supraspinatus ache in the neck. This is aggravated when the patient sleeps with the arm overhead, resulting in persistent pain. Making the diagnosis If your patient winces with the arm overhead and complains of neck pain, suspect RSIS and consider a shoulder injection. In addition to using standard clinical diagnostic tests, the Neer impingement sign, and the Neer injection test to diagnose shoulder impingement, specific radiographic findings have proven essential, especially when the shoulder is asymptomatic. I believe that the radiographic finding of a pseudocyst in the proximal humerus is one key to the diagnosis (Fig. 1 on page 27). Its presence may give you enough reason to try injecting an asymptomatic shoulder. The triad of a positive referred Neer sign (pain in the upper back with forward elevation of the shoulder), the radiographic pseudocyst, and the positive Neer injection test (relief of neck pain after a shoulder injection) can be used to diagnose RSIS. The pseudocyst is real The pseudocyst has been known since Codman’s day, but is rarely recognized and can only be understood along with RSIS. It is usually considered a normal variant or positional anomaly, and its presence is ignored, which is perhaps good considering its similarlity in appearance to a malignancy. But don’t biopsy this lesion! Because I often see the pseudocyst immediately after a motor vehicle accident, I believe it is present as an asymptomatic condition even before the accident. Pseudocysts are so common that I have extrapolated that RSIS is also common. I think the pseudocyst is very real. It is not a cystic hole, but trabecular atrophy. I hypothesize that it results from increased retrograde blood circulation to the insertion of the rotator cuff into the greater tuberosity. When the rotator cuff is chronically impinged or traumatized, it becomes inflamed, edematous, and hyperemic. The increased blood flow causes demineralization and a radiolucent appearance on X-rays. Although an X-ray isn’t necessary to diagnose symptomatic shoulder impingement, it has helped me to make the diagnosis when the shoulder is asymptomatic. If you find a pseudocyst in a patient who has chronic neck pain and an equivocally positive Neer sign, go ahead and inject the subacromial space with cortisone and lidocaine. I strongly recommend three injections over a period of 6 weeks to reliably relieve pain by 90 percent or more. Do not give just one injection and then operate when the symptoms recur, as I used to do. The use of three injections has been uncomplicated and will prevent the need for shoulder surgery. Physical therapy has not been required. With this course of treatment, you will have very happy patients, especially if they suffered “whiplash” for years before being accurately diagnosed. Interestingly, one quarter of the patients I see have bilateral complaints, probably from sleeping with both arms overhead. Whether patients have unilateral or bilateral pain, advise them to avoid the overhead impingement position, especially while they are asleep. Prescribe a shoulder immobilizer to use at night, and ask if it is still on in the morning. Ahead of my time? It may appear oxymoronic to describe an aysmptomatic pain syndrome, and preposterous to propose both a pathologic lesion in the shoulder and shoulder treatment for neck pain and whiplash. Describing a new clinical entity in this contentious milieu is an uncertain and challenging process. As a pioneer of the anatomic medullary locking prosthesis and the S-ROM hip prosthesis under Charles A. Engh Sr., MD, and as an investigator who attempted to study bone morphogenic proteins in 1983—years before their use became accepted—I am well aware of how much time new hypotheses need to be tested, understood, and accepted. I expect that it will take a very long time for this new referred pain syndrome to be accepted as a “cure for whiplash” and chronic neck pain. But please don’t wait too long to try this; I predict that you and your patients will be amazed. Jerrold M. Gorski, MD, is in private practice in Mineola, N.Y. He welcomes your feedback at firstname.lastname@example.org or through his Web site, www.gorskimd.com. Links to the studies cited in this article can be found online at www.aaos.org/now. - Gorski JM, Schwartz LH. Shoulder impingement presenting as neck pain. J Bone Joint Surg Am. 2003 Apr;85-A(4):635-8. - Yamaguchi K, Ditsios K, Middleton WD, Hildebolt CF, Galatz LM, Teefey SA. The demographic and morphological features of rotator cuff disease. A comparison of asymptomatic and symptomatic shoulders. J Bone Joint Surg Am. 2006 Aug;88(8):1699-704. - Muddu BN, Umaar R, Kim WY, Zenios M, Brett I, Sharma Y. Whiplash injury of the shoulder: is it a distinct clinical entity? Acta Orthop Belg. 2005 Aug;71(4):385-7. - Chauhan SK, Peckham T, Turner R. Impingement syndrome associated with whiplash injury. J Bone Joint Surg Br. 2003 Apr;85(3):408-10. - Macnab I, McCulloch J. Neck Ache and Shoulder Pain. Williams and Wilkens Co: Baltimore: 1983. p. 318-319. August 2007 AAOS Now Search AAOS Now - AAOS Now - Current Issue - AAOS Now ePub Edition - Editorial Information - Writers' Guidelines (To view in Chrome download Google add-in for RSS feeds) - Twitter Feed - News in 10 - The Annual Meeting Daily Edition of the AAOS NOW in Las Vegas Eeric Truumees, MD E-mail the Editor Volume 9, Number 5 - Cover Story - Clinical News & Views - Research & Quality - Managing Your Practice - Your AAOS
231,447
America has made big changes in election law since the ratification of the U.S. Constitution, most notably ensuring the right to vote for male citizens of any race with the 15th Amendment and for women citizens with the 19th Amendment. But a couple of election traditions still persist today: the selection of the U.S. President by the Electoral College and holding elections on a Tuesday in November. The Well spoke with Sarah Treul, Bowman and Gordon Gray Term Professor of political science in the College of Arts & Sciences, to find out how these two practices came about and if they are still relevant today. In 2000 and 2016, the presidential candidates who won the national popular vote did not become president because neither won the Electoral College. Why do we have an Electoral College? One reason is that the Founding Fathers really believed that “ordinary Americans” — and at this time, they were talking about white men who owned property, who were the only voters — would lack sufficient information to choose the best presidential candidate. Some would say the Founding Fathers thought this group didn’t have the intelligence for making these decisions. The Electoral College is about taking the power out of the hands of ordinary people and putting it in the hands of the elites — which the Founding Fathers were themselves. Another reason is the tradeoff of balancing what large states wanted and what smaller population states wanted. How does the Electoral College work? It’s made up of 538 electors who cast their ballots on the Monday after the second Wednesday in December. They’re the ones who are officially determining the next president and also the vice president. Every state automatically gets two electors, for the two Senate seats, and then you get the number of representatives that you have as well. The District of Columbia also gets three. Currently, 48 of the 50 states have a winner-take-all rule for electors — whichever candidate wins that state’s popular vote gets all its electoral votes. You need a majority to win, which is 270. Who benefits from the Electoral College? The advantage in the Electoral College goes to smaller population states and to swing states, especially ones with a substantial number of votes up for grabs — like North Carolina. We have a lot to say, and that means that the candidates pay attention to North Carolina. Our votes matter now in a way that they wouldn’t in a national popular vote. What would it take to get rid of the Electoral College? The primary way would be to have a Constitutional amendment. The amendment would not only have to abolish the Electoral College, but it would also have to provide an alternative. Currently, there’s nothing that says we have a right to elect our president. When you vote now, you are actually not voting for a presidential candidate. You are voting for an elector. For a Constitutional amendment, you would need three-fourths of the states to ratify. And when you think of all the small states and swing states that certainly would not benefit from a national popular vote, that’s going to be a really hard threshold. What is the National Popular Vote Interstate Compact and how would it affect the Electoral College? The idea is that you get enough states, through their state legislatures and their governors, to sign this compact agreeing that all their electors would vote for the winner of the national popular vote, not just the vote in their state. It would take a majority of the electoral votes to make that happen. [Note: So far, 15 states and the District of Columbia have approved the compact — 196 of the 270 electoral votes needed to pass.] Why do we vote on a Tuesday in November? At first, the process for voting was incredibly chaotic. States were allowed to hold the election whenever they wanted. So back in 1845, Congress decided to streamline the process by picking a national election day. [Because so many citizens were farmers,] November became their default because it came right after harvest. They picked Tuesday because of the traveling time it took to go vote in this era. They didn’t want it to interfere with Sunday and going to church, so the weekend and Monday were out. With a Tuesday election, people could leave on Monday, get to their voting location on Tuesday and return on Wednesday. Who benefits from Tuesday voting? The people who find it easier to vote on a Tuesday are more educated, have a higher income and often are older. These are also indicators of who votes. Tuesday voting is a struggle for people who are punching in and out at a factory job or who have childcare concerns. What would it take to change Tuesday voting? Many democracies have elections on the weekend, or they make election day a holiday, and that does seem to help turnout. The more we can expand opportunities to vote, the better for democracy. But this is something that only Congress has the power to change. Absent of Congress doing this, many states have expanded early voting, vote by mail options and different ways to extend voting beyond just that Tuesday. What day would you pick for Election Day? I would make Election Day a holiday, and I would put it on a Wednesday so it wouldn’t become a long weekend for a barbecue or a trip to the beach. Then the holiday would really be about voting and civic participation and doing your duty as a citizen of the United States. Read more election stories from The Well:
132,028
A Quartet of Drawings Have students work in pairs. Give each student one of the lists of words below and explain that each list has one word with each of these prefixes: cent-, hexa-, milli-, and quadr-. Tell students to hide their lists from their partners. Then ask them to look up their listed words in a class dictionary and draw a picture of the object named by each word. Have partners exchange drawings and label each one with the name of the object illustrated and its definition. Let students refer again to a class dictionary if necessary.
59,321
Also indexed as:Piles The itching and burning caused by hemorrhoids can make it difficult to sit still. How can you ease the discomfort and fight flare-ups? According to research or other evidence, the following self-care steps may be helpful. The right diet is the key to managing many diseases and to improving general quality of life. For this condition, scientific research has found benefit in the following healthy eating tips. |Choose foods with fiber ||Eat more whole grains, bran, and vegetables, or take fiber supplements such as psyllium—along with plenty of fluids—to ease the passage of stools. Copyright © 2016 Healthnotes, Inc. All rights reserved. www.healthnotes.com Learn more about Healthnotes, the company. The information presented by Healthnotes is for informational purposes only. It is based on scientific studies (human, animal, or in vitro), clinical experience, or traditional usage as cited in each article. The results reported may not necessarily occur in all individuals. Self-treatment is not recommended for life-threatening conditions that require medical treatment under a doctor's care. For many of the conditions discussed, treatment with prescription or over the counter medication is also available. Consult your doctor, practitioner, and/or pharmacist for any health problem and before using any supplements or before making any changes in prescribed medications. Information expires June 2017.
55,230
5 Hidden Dangers in Your Home Learn about the five most dangerous toxins commonly found in homes. In-House Health Threats Sometimes, the biggest dangers to your health are the ones you can’t see. Discover five potentially harmful problems that threaten a healthy home and tips on how to protect against them. Click "next" to learn more. Salmonella and E. Coli These two forms of bacteria can affect the intestinal tract, causing symptoms ranging from diarrhea to life-threatening dehydration. Humans are most often infected with salmonella after eating or handling contaminated raw foods, such as beef, poultry, eggs, fruits, and vegetables. Salmonella contamination can occur during harvesting, butchering, or preparation. E. coli infection may occur when you accidentally eat contaminated foods that weren’t properly cooked or cleaned. Solution to Salmonella and E.Coli Before handling food, wash your hands thoroughly. Use two cutting boards if possible—one for fruits and vegetables and another for raw meat. Keep raw meat, seafood, and poultry separated from other refrigerated foods. Clean with hot soapy water all utensils and plates that previously held raw meat before using again. Cook all meats, especially pork and poultry, to safe temperatures. This flavorless, odorless gas gives no warning before making you very sick (think flu-like symptoms) and can even cause death. Each year, approximately 500 people die from this "silent" killer, according to the Centers for Disease Control and Prevention (CDC). Contamination usually occurs when an organic fuel is burned without proper ventilation. Common sources of carbon monoxide include kerosene and gas space heaters, gas water heaters, wood stoves, fireplaces, automobile exhaust, and tobacco smoke. Solution to Carbon Monoxide Have a qualified technician service your heating system, water heater, and other coal, oil, or gas appliances every year. Install a carbon monoxide (CO) detector in your home. Never heat your house with a gas oven or use a gasoline-powered or coal-burning device inside your home. Check out the Best Air-Purifying Plants slideshow to learn which houseplants remove carbon monoxide and other harmful toxins from the air. Exposure to this highly toxic metal has been associated with serious health problems that range from measurable changes in mental development and behavior to nerve disorders and other ailments. Although regulatory standards by the U.S. Consumer Product Safety Commission (CPSC) have minimized or eliminated lead in consumer products since 1978, it remains in homes that haven’t been updated. Lead-based paints in older homes, household dust, drinking water (if you have lead pipes), and contaminated soil are the major sources of lead exposure. Solution to Lead in the House Test your home and water for lead—especially if the structure was built before 1978. You can buy a lead home test kit, consult an environmental lab or organization, or hire a licensed risk assessor. A certified lead paint removal company can remove lead paint. If you have lead pipes, never use hot water from the tap for drinking or making baby formula. Hot water causes more lead to seep from the pipes. Above all, have your child tested for lead. These microscopic living organisms grow where moisture, oxygen, and organic material are present. You can expect to find mold in practically any damp area in your home with poor ventilation. Exposure to mold spores can cause nasal and sinus congestion, chronic cough, and eye irritation. According to the Mayo Clinic, it may also trigger asthma attacks and lung infections for those with chronic respiratory disease. Solution to Mold in the House Use a non-ammonia cleaner or dishwashing soap and water to remove mold. Wear gloves, long sleeves, pants, eye protectors, and a respirator to protect yourself from spores. After cleaning the mold, use a HEPA (high efficiency particulate absorbing) vacuum or air cleaner to eliminate mold spores from the air. For large areas, hire a professional cleaner. Discard carpet, drywall, insulation, and other items if they have been wet for more than two days. Insect repellant, weed killers, flea and tick shampoo, and roach sprays and baits are just a few of the pesticides you’ll find in your home. There are other "hidden" dangerous chemicals in products such as mothballs, wallpaper, and pressure-treated wood. If used in the wrong way or stored improperly, pesticides can be dangerous to your health, causing nerve damage, breathing problems, and more. According to the World Health Organization (WHO), household pesticides are one of the leading causes of childhood poisonings. Solution to Pesticides Only use these products according to instructions on the label. Keep all household pesticides in a locked cabinet and out of reach of children. Protect yourself from direct exposure and never eat or drink while using them. Be sure to wash your hands thoroughly after working with poisonous products. Fighting these five toxins is a great start to making your home a safer, healthier, and happier place. Here are some more ways you can improve the cleanliness of your living space:
278,453
The strategy is guided by a vision of A Healthy City for All: a city where together we are creating and continually improving the conditions that enable all of us to enjoy the highest level of health and well-being possible. Health is about much more than just physical health or treatment in the health care system; it is about the social determinants that shape well-being in a broader sense. The three focus areas below describe the holistic framework that informs the Healthy City Strategy. The Strategy is intended to engage all residents and all sectors of our community in taking action to build toward a Healthy City for All. Our health and well-being begins with basic needs – clothing, shelter, food, transportation, and employment. We need ways to express ourselves, to be safe and included, supportive services, and to learn and grow. Community connections build a healthy city – working together makes us resilient and sustainable, we enjoy better health when we connect with our neighbours and are engaged in our communities. Ecologically, economically, and socially sustainable environments directly impact our physical and mental health – the built environment, networks of movement, natural spaces, biodiversity, and freedom from pollution are key to building a healthy city. Recent developments and news Read updates on this project, and learn more about the progress. Select 'Show more' to keep reading. Read and download documents and fact sheets related to this project. Select 'Show more' to keep reading. Activities to date and next steps See the timeline for this project, where we have come from, and where we are going. Select 'Show more' to keep reading. Read about the work leading up to this Healthy City Strategy. Select 'Show more' to get the details. What do we need to be healthy and well? Watch this 2 minute video to find out.
235,612
Matt Potter 7:30 a.m., April 27 San Onofre still costing customers, Del Mar calls for public meetings on nuclear plant's woes Turmoil continues surrounding the shuttered San Onofre Nuclear Generating Station in northern San Diego County. Earlier this week, the city of Del Mar passed a resolution calling for a public Nuclear Regulatory Commission hearing on the plant’s licensing. The resolution was adopted after hearing “nearly a dozen heartfelt pleas from citizens to take a stand on the issue,” as well as a report from a plant official regarding the failure of the plant’s steam generators and subsequent radiation release, the Del Mar Times reports. A Commission meeting regarding the plant is currently scheduled for the evening of October 9, though it will take place in Dana Point, out of reach of many San Diegans though within 15 miles of the facility. The meeting is scheduled to include a discussion of the problems that have plagued the plant (which go beyond the failed generators, some of which are detailed here, here, here, and here), and will feature a public question-and-answer session. U-T San Diego, meanwhile, reports that San Diego Gas & Electric customers have paid $185 million so far this year for the plant’s operation, despite its not having generated any power since late January. Included in the total is an 8.4% rate of return for the company, whose parent Sempra Energy has a 20 percent stake in the plant. More like this: - San Onofre closed permanently, says plant operator — June 7, 2013 - Calls for public hearings on San Onofre grow, fears about summer power supply may be exaggerated — April 24, 2013 - Public meeting scheduled on San Onofre restart plan — Jan. 23, 2013 - Public Utilities Commission set to open San Onofre probe — Oct. 17, 2012 - NRC Not Receptive to San Onofre Reactivation Proposal — May 8, 2012
225,314
Senior Economist David Littmann is heavily cited in a Detroit News story today about Michigan’s declining unemployment rate. “Signs are trending upward at this point at a relatively slower pace than in the first quarter,” Littmann said of the announcement that unemployment in the state fell in April from 8.5 percent to 8.3 percent. “We’ll get some improvement with some of the reductions in gasoline prices to restore a little bit of purchasing power, but the great uncertainties are still out there getting worse.” Littmann said things such as the federal overspending crisis and Obamacare will “create chaos for the national economy,” which could impact Michigan. “Those two industries in particular are the ones to watch for some degree of economic improvement over the next six months,” Littmann said of automobile sales and home sales.
271,090
William James Müller (1812-45). Oil on canvas 24 x 29 inches “Müller was the son of a German-born museum director in Bristol. He was one of the most gifted painters in the Constable-Bonnington tradition. It was not late in his short life, in 1848, that he traveled to Greece and Egypt, reaching Asia Minor in 1841. This Eastern influence led to a late flowering of glorious color and tapped a deep vein of Romanticism in his work. Our picture is from this period” (Maas catalogue).
245,378
In France today, April 1st is called Poisson d'Avril, which means April Fish. Children tape paper fish to their friends' backs and when the young "fool" finds out, the prankster yells "Poisson d'Avril!" In England, tricks can only be played in the morning. If a trick is played on you, you are a "noodle." In Scotland, you are called an "April gowk," which is another name for a cuckoo bird. In Portugal, April Fools' is celebrated on the Sunday and Monday before Lent. Pranksters usually throw flour at their friends. I Love holidays that span countries and interpretations that range so widely. And here in America I was thrilled to be a target of some advertising pranks today. This one above truly made me LOL! I really sat there for a moment thinking about the marketing, the round tables, and the demographic that they were trying to appeal to, before clicking and seeing that I was made a FOOl of. Well done Benefit! Were you a fool today? Any good jokes or pranks? Ohh...and Have you noticed? To the left there... Sponsors! It's not a trick...those are some super duper fab and talented gals! Go and visit them...make some new friends!
265,064
Dublin High School AP (Advanced Placement) Program What is an Advanced Placement Program (better known as AP)? “Advanced Placement Program” is a registered trademark of the College Board (the College Board is a non-profit association founded in 1900 comprised of over 5,700 school, colleges, universities and other educational organizations). Dublin High School’s AP (Advanced Placement) results are available here. High schools offering College Board Advanced Placement Programs (such as Dublin High School) provide students with the opportunity to take college-level courses during high school. The Course Descriptions of Advanced Placement courses are defined by the College Board and are standardized – as are the Advanced Placement (AP) exams. High schools offering an Advanced Placement Program are subject to AP Course Audits to ensure consistency of subject matter from school to school (“The subject-specific AP Course Audit specifies the curricular and resource requirements that must be met in order to receive authorization to use the ‘AP’ designation for a course.”). Offering an Advanced Placement (AP) Program is a financial investment for school boards, requiring additional teacher training and materials. Students are encouraged to work closely with their high school counselors to map out a multi-year plan that includes advanced courses, athletics and/or performing & visual arts, extracurricular clubs and community service to build a portfolio of experiences for college acceptance. Many students are attracted to Advanced Placement courses because of the GPA boost (Advanced Placement courses can provide a 1.o GPA boost for equivalent grades C or above). This is how students are able to achieve a GPA above “4″. While it varies from college to college, Advanced Placement (AP) courses can result in college credit. Most important, taking an Advanced Placement (AP) class provides a more rigorous, rich and thorough examination of the subject matter and a taste of college-level work. Most colleges and universities take into account the level of difficulty of the courses taken by applicants – and the most competitive colleges prefer students who push themselves to take advanced classes. It is possible for students to take AP exams without having taken an approved AP course (this is most common in schools that do not offer an Advanced Placement Program, a specific AP course or for home schooled students). Students in this situation will need to work with their high school counselor or home school lead to pursue an independent study program suitable to prepare him/her for the AP exam. Dublin High School Seniors on Advanced Placement (AP) Courses For middle and high school students concerned that Advanced Placement (AP) courses will turn school into an academic-only experience, take a moment to hear two motivated and multi-faceted Dublin High School Class of 2010 seniors talk about how Advanced Placement (AP) courses have enriched their high school experience – how AP courses have helped lead to admission into Stanford and UC Berkeley – how AP courses have led to majors such as electrical engineering, renewable energy engineering and biological science. What Advanced Placement courses did the Class of 2010 find the most difficult? AP Physics and AP Calculus were popular answers along with AP Chemistry and AP European History. And what were the favorite courses among these Class of 2010 seniors? Many of the same AP courses – hard doesn’t always mean “not fun”. Among the AP favorites were AP Chemistry, AP Statistics and AP English Language and Composition. The message from the Class of 2010 to their peers is this – challenge yourself and take advantage of the opportunities offered by Dublin High School (both academic and non-academic). Dublin High School’s Advanced Placement (AP) Program Dublin High School Counselor and Advanced Placement (AP) Coordinator Caroline Rubio provides an overview of Dublin High School’s Advanced Placement (AP) Program in a presentation to the Dublin Unified School District (DUSD): Dublin High School offers 23 Advanced Placement (AP), Advanced and Honors courses for Dublin students (more information available here). Advanced Placement (AP) or International Baccalaureate (IB)? Some schools offer International Baccalaureate (IB) programs. Like Advanced Placement (AP), IB is a registered trademark of a non-profit organization with a set curriculum and standardized courses / exams. International Baccalaureate (IB) programs are “designed through an international cooperative effort and is based in Geneva, Switzerland”. According to the U.S. Department of State “AP courses are accepted at virtually all U.S. colleges and universities, while the IB program has more limited acceptance within the U.S.” Establishing an International Baccalaureate (IB) program is a more significant investment and takes longer vs. an Advanced Placement (AP) program – and as a result there are significantly fewer schools in the U.S. currently offering IB programs. In the Tri-Valley, every public high school (excepting continuation schools) offers an Advanced Placement Program. Only Quarry Lane School (a private K-12 school located near Dublin Ranch) currently offers an International Baccalaureate program as well as Advanced Placement courses. Advanced Placement (AP) Exams and Awards In addition to receiving a traditional grade that counts towards an overall GPA, students taking Advanced Placement (AP) courses are also expected to take Advanced Placement (AP) exams. A fee is required to take an AP exam (the fee is significantly reduced for low income students). AP exams are a combination of multiple choice and written responses and, like the SAT (also created by the College Board), have many self-help books and test prep courses available. Advanced Placement (AP) exams are not graded on an A-F scale, but rather on a 5-point scale, with 3 being a minimum bar for most competitive colleges (and 4s / 5s usually providing an advantage in college acceptance): - 5 Extremely well qualified - 4 Well qualified - 3 Qualified - 2 Possibly qualified - 1 No recommendation (No recommendation to receive college credit or advanced placement) The College Board offers a wide range of non-monetary AP Scholar Awards based on the number of AP classes taken and exam results – from an AP Scholar (three exams or more taken each with a score of 3 or higher) to a National AP Scholar (for students in the US “who receive an average score of at least 4 on all AP Exams taken, and scores of 4 or higher on eight or more of these exams”). Full details are available here. Dublin High School had 50 students achieving an AP Scholar Award or above (including one National AP Scholar) in 2008-9, as per the Dublin High School Advanced Placement Overview video included above. Advanced Placement (AP) – The Bottom Line According to College Board-sponsored research, Advanced Placement (AP) students are “more likely to graduate from college in four years” and have an advantage when qualifying for scholarships because “31 percent of colleges and universities look at AP experience when determining scholarships” (full research available here). Scholarships.com offers six reasons for why to consider taking Advanced Placement (AP) courses. The most important steps to take when deciding if Advanced Placement (AP) courses are right for you or your child are to schedule time to meet with your high school guidance counselor to build a college preparation plan and to talk to students who have successfully completed Advanced Placement (AP) courses.
168,484
Updated Nov 2011. Check out my latest book on Optimizing SQL Statements for more information. MySQL 5.6.2 also now provides an EXPLAIN syntax for UPDATE and DELETE statements natively. While most people look at performance optimizations for SELECT statements, UPDATE and DELETE statements are often overlooked. These can benefit from the principles of analyzing the Query Execution Plan (QEP). You can only run an EXPLAIN on a SELECT statement, however it’s possible to rewrite an UPDATE or DELETE statement to perform like a SELECT statement. To optimize an UPDATE, look at the WHERE clause. If you are using the PRIMARY KEY, no further analysis is necessary. If you are not, it is of benefit to rewrite your UPDATE statement as a SELECT statement and obtain a QEP as previously detailed to ensure optimal indexes are used. For example: UPDATE t SET c1 = ‘x’, c2 = ‘y’, c3 = 100 WHERE c1 = ‘x’ AND d = CURDATE() You can rewrite this UPDATE statement as a SELECT statement for using EXPLAIN: EXPLAIN SELECT c1, c2, c3 FROM t WHERE c1 = ‘x’ AND d = CURDATE() You should now apply the same principles as you would when optimizing SELECT statements.
262,805
There is no escaping the so called "Horse Meat Scandal" which has played out in the media over the past few weeks. Causing shock, disgust, outrage and panic, here we sum up briefly why it happened and what we can do about it. Why did it happen? You may have recently read or heard about renewed concern over the levels of arsenic in rice and rice-based products. A recent report by the American Food & Drug Administration (FDA) has found that the levels of arsenic in rice and rice products appears to be much higher than initially thought and that these levels could potentially be harmful to your health. So should you be concerned? Well first off, arsenic exists in nature, in water, food, air, rock and soil so levels found in our food, bar pesticides containing arsenic, are not strictly linked to human activity and farming practices. There are two forms of arsenic, organic and inorganic and it is the latter which is of most concern as inorganic arsenic is a known carcinogen and ingestion may increase the risk of certain cancers. Rice is of particular concern as it is grown in flooded conditions and exposed not only to the arsenic in the soil and air but also to high levels in the water. The human body is remarkably adept at coping with certain toxins which occur naturally in the foods we eat, but this is of course providing your diet is balanced and you don't consume excessive amounts of any one food - yes, you guessed it, it's all about the proverbial "Moderation". In 2010, approximately 10 million adults in the UK were smokers and around 60,000 cases of cancer could be attributed to tobacco smoke. Smoking is the leading cause of lung cancer and is the UK’s biggest cause of preventable illness and early death (Cancer Research UK). Unfortunately the harmful effects of smoking are not just limited to the lungs as ‘the filthy habit’ also has a serious detrimental effect on your nutritional status. The links may not be very apparent but long-term smoking can prevent you from utilising vital cancer-fighting nutrients, rob you of precious vitamins and put you at risk of other diet-related illnesses such as osteoporosis. So just what is at stake? Firstly, inhaling cigarette smoke introduces a plethora of chemicals into the body with each puff and at least 50 of these chemicals are known to cause cancer such as benzene, which is also used as a petrol additive, formaldehyde, which is used to embalm dead bodies, Ammonia, often found in toilet cleaner and the highly addictive nicotine which is often used in insecticides and poisons. These substances put enormous stress on the body and increase levels of substances known as free-radicals. As the name suggests, free-radicals are a tad unruly and, once inside the body, can cause a serious amount of damage to your cells and tissues. Now, your body produces its own free-radicals through the various cellular functions that take place every day and these ordinarily aren’t a problem thanks to some house-keeping substances called anti-oxidants which effectively neutralise the free-radicals before they can do any serious damage. Smoking however, increases the level of free-radicals far beyond what the antioxidants can neutralise and this is when we start to see more serious health problems. Your diet and the foods you eat are your lifeline to a ready supply of antioxidants which can help combat the damage caused by free-radicals and one such antioxidant which goes by another name is Vitamin C, or ascorbic acid. Vitamin C plays a critical role in maintaining a strong immune system, helping tissue repair and wound healing and helps you absorb iron from your diet. It also plays a key part in maintaining healthy bones, teeth and gums. If you smoke however, you have a much greater need for vitamin C and its antioxidant powers.The real issue here though is that smoking causes free-radical damage whilst simultaneously robbing the body of the vitamin C needed to neutralise it. In other words, smoking causes the problem AND takes away the solution. So far this week we've looked at migraine, what it is, who suffers from it and why; migraine and food and the simple dietary tricks you can use to keep migraines at bay and migraine and nutritional supplements where we looked at which supplements really can help you manage migraine attacks. Today, in our final article on migraine we're looking at the lesser known tips and tricks you can use every day to prevent migraines from occurring. Evidence suggests that moderate levels of exercise may help to reduce the frequency and intensity of migraine. Physical activities such as jogging, swimming, dancing, cycling or even walking briskly can reduce the severity of migraines as exercising causes your body to produce its own natural painkillers called endorphins and chemicals called enkephalins which act as an anti-depressant. Add to this the overall benefits of exercising for your general health and you have a real reason to get active! It may not seem that important but ensuring you eat regularly is incredibly important in preventing migraines. Going too long without food or skipping a meal causes your blood sugars to drop to very low levels (Hypoglycemia) causing symptoms such as yawning, sweating, irritability, tiredness, headaches - and migraine. If you are prone to nausea or vomiting when you have a migraine, skipping meals and allowing your blood sugar levels to drop can make these symptoms worse. Where possible, try to stick to a manageable daily routine and eat regularly, and at the same time each day. Ideally you shouldn’t go any longer than 2-3 hours without food. Avoid eating sugary foods, cakes, biscuits, pastries etc. (even if you crave them) and go for unrefined wholegrain breads, brown or red rice, pasta, fruits and vegetables. Eating slightly more protein such as lean white or red meats, beans, pulses and nuts may also help. So far this week we've looked at Migraine, what it is, and why people suffer from it and Migraine & Food and the simple dietary tweaks that can make a big difference to sufferers. Today we're looking at the role nutritional supplements can take in the treatment and management of migraine alongside those dietary changes we've already looked at. Ordinarily I’d prefer to avoid nutritional supplements in favour of tackling health issues with food but there are a few instances where they may be a useful addition to dietary changes. In the case of migraine, research suggests that supplementing your diet with certain nutrients may help prevent or reduce the severity of attacks and lessen your dependency on prescription medication. Remember though, that everyone is different and what works for one person may not work for another and that supplements are just that; a supplement to a healthy diet and are no substitute for food. There is growing evidence to suggest that the brains of people who suffer from migraine are severely deficient in the mineral magnesium, especially those who suffer from migraine with aura (visual disturbances). This can, to some extent, be overcome by taking a magnesium supplement each day. The most suitable dose, as reported by the Migraine Trust, is 600mg daily of magnesium dicitrate. There are various forms of magnesium such as magnesium sulphate, magnesium oxide and magnesium hydroxide, all of which can have laxative effects but magnesium dicitrate and magnesium citrate appear to be better tolerated by most people. If you decide to take a magnesium supplement it may be wise to start with a low dose and gradually increase to 600mg to avoid any unwanted effects. Taking the supplement with food can also help to minimise its laxative effects. Yesterday we took a look at what migraine is, its symptoms and its causes and today we'll be looking at how you can take control of them without having to rely too heavily on painkillers and prescription medicines by making some pretty easy changes to your diet and the foods you eat. It may seem a little far fetched to think that food could have any kind of influence on something as strong as a migraine but evidence suggests there are a number of things you can do to lessen the severity of migraines, reduce how often they happen, or even stop them completely, and of course an added benefit of these measures is that you’ll be spared from many of the side-effects of over-the-counter and prescription medications. You’ve probably heard many people say their migraines are triggered by certain foods and for some people the link between eating a food and then having to run to a darkened room to wait out the pain is very clear but for others, identifying foods which might cause a migraine can become an obsession of a lifetime. In actuality you may never really determine what foods trigger your migraine (if any) as only thirty percent of sufferers do and frantically obsessing over food in this way can actually bring about the very headache you’re trying to avoid. Everybody’s different and experiences migraine in a different way but some foods are more commonly incriminated in migraine and those foods are listed below. There is however an upside - and fortunately it’s quite a big one as there are plenty of foods which can help prevent migraines from occurring in the first place. Today marks the start of Migraine Awareness Week 2012. More prevalent than diabetes, epilepsy and asthma combined, migraine affects over 8 million people in the UK and brings excruciating pain to 190,000 sufferers every day. For most people the only solution when a migraine attack occurs is prescription painkillers but over the course of the week we’ll be looking at foods, nutrients and lifestyle changes which can help to prevent migraine, or maybe even stop them altogether. Hopefully, unlike me, you’ve never experienced that moment of sheer dread and panic when you lose your peripheral vision, people’s faces seem to mysteriously disappear and everything around you is replaced with a curtain of zigzags and sparkly dots. It may sound like a drug-induced high but a salute to the psychedelic 60’s this isn’t - for an unlucky few this is the precursor to a migraine. What is Migraine? Migraine is a pretty complicated neurological condition which affects around 15% of adults in the UK. Unlike mild headaches which many people experience, migraine is accompanied by some particularly distinct symptoms which are often quite severe and can include Only about a third of migraine sufferers experience the disturbed (zigzag) vision before the headache and this is known as migraine with aura. If your vision is badly affected make sure you take yourself out of harms way by pulling over if you’re driving for example. Everyone experiences migraines differently and with varying severity. Some people may suffer a migraine several times a week while others may go months or even years without an attack.
278,226
The people of Gaza are the architects of their own misery. Having voted Hamas into power eight years ago, they alone are to blame for the dizzying body count in that unpeaceable land. Some argue that the civilians, including dozens of children, killed in the Israeli bombardment are less collateral damage than the bloody consequences of voting for a radical Islamist group bent on the destruction of Israel. As in 2006, 2008 and 2012, the Israeli government and scads of hawkish commentators alike have parroted this blinkered view that in voting for Hamas, Gazans are victims of their own anti-Israel hatred. In 2005, Hamas won a foothold in municipal elections; shortly before the legislative elections the following year, acting Israeli prime minister Ehud Olmert warned Gazans not to “choose again the extremists who have led them from tragedy to tragedy and to sorrowful lives.” Because they voted for Hamas, tragedy and sorrow inevitably followed. One reaps what one sows. At best, the sentiment is incomplete; at worst, it is a wholly cynical justification to “bring the Gaza Strip back to the stone age,” as one widely read Israeli daily put it recently. Yes, Hamas is a hateful and violent organization whose charter calls for the destruction of Israel. Its claims that Jews were behind the French Revolution and both world wars, not to mention the Rotary Club, would look out of place with all but the most fevered anti-Semites. But this isn’t why Palestinians voted for Hamas. Rather, Hamas positioned itself as a slayer of corruption, not Zionism. For this, we can thank Fatah, the long-serving linchpin of the PLO movement, and the poisonous legacy of its founder and longtime leader, Yasser Arafat. By the time Hamas presented its candidates in the 2006 legislative elections, the Fatah party’s transformation from righteous liberation force to Palestine’s corrupted status quo was long complete. Under Arafat, who died in 2004, Fatah controlled just about every aspect of life in Gaza and the West Bank. Part Che Guevara, part Mother Theresa, Arafat was a living revolutionary who lived modestly, never doffing his beloved kaffiyeh, while demonstrating his limitless generosity by doling out cash from an aide’s ready briefcase to anyone who asked. All the while, Arafat kept a jealous grip around the purse strings of his beloved (and imagined) Palestine. Every import, from flour to gasoline, passed through the weave of his fingers, with Palestinians typically paying double, or even triple, for life’s necessities as a result. A 2003 International Monetary Fund audit suggested he skimmed $900 million from the Palestinian Authority between 1995 and 2000 alone. This stubbly and unkempt little man “used the money that he stole to buy influence, to provoke or diffuse conspiracies, to pay gunmen, and to collect hangers-on the way other men collect stamps or butterflies,” David Samuels wrote in a 2005 profile of Arafat. He died with billions spread out in bank accounts around the world, and his status as a darling of the left intact. Not surprisingly, Palestinians were eager to see the end of Fatah’s legacy of institutionalized corruption—and Hamas was happy to oblige. Under Arafat, Hamas was the wartime equivalent of a useful idiot. He would “allow” Hamas to attack Israel, only to crack down on the group afterward, in the interests of diplomacy, if not plausible deniability. Yet Hamas’s anti-corruption platform gave the group the legitimacy its artisanal bombs never could. Like Hezbollah in Lebanon, Hamas provided welfare and medical care to much of the West Bank and Gaza—services often only available to Arafat’s coterie. At the same time, Hamas dropped its call for Israel’s destruction and teased out the possibility of a peace treaty with its hated neighbour to the east. Having suffered at the hands of Fatah, Gazans quite naturally chose to vote the bums out. The rest is bloody history. Contrary to the view of many commentators, most Palestinians want a peaceful solution to the current crisis. A Washington Institute poll, conducted just as the current tensions were ramping up, suggests that 70 per cent of Gazans support the continued ceasefire with Israel. Nearly 60 per cent of Gazans said the Fatah-Hamas unity government should renounce violence against Israel—if only because the overwhelming majority wants jobs there. The Washington Institute poll further suggests that 66 per cent of Gazans see “corruption by Palestinians government officials” as a major problem. This juiciest of ironies is reflected by the facts on the ground: According to several news reports, former (and formerly penniless) Hamas prime minister Ismail Haniyeh recently purchased a $4-million seaside estate, among other properties, thanks largely to the black-market sale of subsidized fuel and a tax on goods flowing through the clandestine tunnels between Egypt and Gaza. Bombarded and shell-shocked by yet another outsized military operation, it can hardly be comforting for Gazans to see how, for Hamas, Yasser Arafat seems less bogeyman than role model.
282,193
This Day, the Eighth Day of July Saint Elizabeth, widow, queen of Portugal. Being renowned for virtues and miracles, she was numbered among the saints by Urban VIII. In Asia Minor, the Saints Aquila and his wife Priscilla, of whom mention is made in the Acts of the Apostles. At Porto, fifty holy soldiers, martyrs, who were led to the faith by the martyrdom of Saint Bonosa, and baptized by the blessed Pope Felix. They were put to death in the persecution of Aurelian. In Palestine, in the reign of Diocletian, Saint Procopius, martyr, who was brought from Scythopolis to Caesarea, and upon his first resolute answer was beheaded by the judge Fabian. At Constantinople, the holy Abrahamite monks, who resisted the emperor Theophilus by defending the worship of holy images, and suffered matryrdom. At Wurtzburg, in Germany, Saint Kilian, bishop, who was commissioned by the Roman Pontiff to preach the Gospel. After having converted many to Christ, he was put to death with his companions, Colman, a priest, and Totnan, a deacon. At Rome, the blessed Eugenius II, Pope. Having gained a great reputation for sanctity and prudence in his government of the monastery of Saints Vincent and Anastasius, he was raised to the Sovereign Pontificate and ruled over the universal Church with much holiness. Pope Pius IX approved and confirmed the veneration paid to him. At Treves, Saint Auspicius, bishop and confessor. At Spina Lamberti in Emília, Pope Saint Adrian III, famous for his zeal in reconciling the Eastern to the Roman Church, and renowned for his miracles. His body was taken to the monastery of Nonantola and buried with honors in the Church of Saint Sylvester.
220,971
PUCO ruling against solar project is a step in the wrong direction for Ohio's economy and environment. Columbus, OH - In a controversial move today, the Public Utilities Commission of Ohio (PUCO) ruled against AEP Ohio’s proposed Turning Point Solar project, stating that the utility and project developers did not demonstrate a need for the project. “This ruling is a slap in the face to clean energy, new jobs, and Southeast Ohio” said Brian Kaiser, Director of Green Jobs & Innovation at the Ohio Environmental Council. “This solar project will add hundreds of jobs in a part of the state devastated by decades of economic decline. “Let’s be clear, by rejecting the Turning Point solar project, the PUCO and this Administration is turning its back on an innovative project that will expand the footprint of Ohio’s clean energy economy,” continued Kaiser. The Turning Point solar project aims to be the largest solar array east of the Rocky Mountains. The transformative 50 MW project would be built on reclaimed strip mine land in Noble County, maximizing the economic potential of thousands of acres of fallow strip mine lands. Turning Point projected more than 100 jobs during each of the three-year installation phases. Importantly, the project also served as a magnet for additional investment and job growth. Isofoton, a Spanish solar manufacturer recently established its North American manufacturing facility in Napoleon, Ohio, because of the Turning Point project. While the PUCO ruling is a major setback, the Ohio Environmental Council remains optimistic about the future of Ohio's clean energy economy and hopeful that the Turning Point project can yet move forward. The mission of the Ohio Environmental Council (OEC) is to secure healthy air, land, and water for all who call Ohio home. The OEC is Ohio’s leading advocate for fresh air, clean water, and sustainable land use. The OEC has a 40-year history of innovation, pragmatism, and success. Using legislative initiatives, legal action, scientific principles, and statewide partnerships, we secure a healthier environment for Ohio’s families and communities.
114,994
Among Korean garments, the women's costume, which consists of chima (skirt) and jogori (blouse) and has a long history, is particularly graceful and beautiful. It is a costume with a typical Korean flavour. The appearance of women wearing chima and jogori of a graceful and soft same colour agreeable to the modern aesthetic sense, or in long chima and jogori with pleasing fringes of the same colour as that of the chima is in fine harmony with the natural environment. They are evocative of the fairies in the heavens. Korean women's costume is characterized by harmony between white and black colours. Korean women enjoy wearing white jogori and black chima, which harmonize and give the impression of vividness, neatness and gracefulness. The Korean national costume is generally of jade-green, light pink, cream, light green or other light and bright colours. Particularly, white costumes are prevalent. The white clothing is associated with the founder-king of the nation, Tangun (his original name Paktal symbolizes the sun, namely, brightness) and with the national sentiment of being fond of cleanness and purity. In the past, ethics strictly ordained that white clothes should be worn during periods of mourning and at memorial services. Thus white costume became to symbolize the Korean nation. Hence the Korean nation came to be called the "white-clad folk" or "white-clad nation". The collar and strings of the Korean women's jogori are important parts symbolic of the Korean costume. The collar attached to the band surrounding the neck is made of white cloth. It is the first thing to attract the eye and stresses the impression of neatness and vividness of jogori. The collars of jogori of any colour are always made with white cloth. The two long cloth strings are designed for adjusting jogori. They bring the peculiar form of the Korean costume into relief. They rustle rhythmically at any slight movement or in a breeze. When Korean women feel shy, worried or distressed, they often fiddle with the strings, which cover up their awkward movements unaffectedly. The strings not only serve the purpose of fastening jogori and as ornaments but also help women behave and maintain their posture in a natural manner in their daily lives. Notable among ornaments is the ornamental dagger worn by men. The beautifully ornamented dagger was used for protection as well as for ordinary, practical purposes. In olden times the ornamental dagger was given as a wedding gift or on the attainment of adulthood, out of wishes for happiness of the man concerned or for his protection from all kinds of misfortune. Comrade Kim Jong Il said that the many triplets being born these days are a good omen for the prosperity of the country and made it a rule that when multiple births occur ornamental daggers are presented to boy babies and gold rings to girl babies in the name of the country. All parents of triplets and quadruplets are provided with new houses and all the expenses for the upbringing and education of their children are borne by the state.
70,326
Poly dome sheet array - Light & small. - Damp proof, heatproof, cold proof. - Dustproof is done on the Metal Dome, and oxygenation of Metal Dome has been avoided. Dome Array assemblies have become common practice with many membrane switch/circuit manufacturers who are utilising them to help take cost out and speed up assembly times. As the operator places one large dome array in one application instead of each dome individually, production time is reduced dramatically. Quality improvements and benefits can also be enjoyed with the reduction in placement errors and "Double Doming." Dome arrays are also a great way of enhancing the tactile feel of a rubber keymat or simply sticking directly to a pcb with an overlay to create a tactile switch effect. We are able to offer an extensive range of dome array designs from simple single layer PET dome arrays to those requiring spacers and EMI shielding layers. An advantage of dome arrays is the positive feedback a user receives when the front panel assembly is operated. The snap response indicates to the user that a switch closure has occurred, typically used in applications excluding an audio feedback. Widely used in digital products,industry control keypad panel, TV / home appliance remote controll, Security systems etc. Delivery: Within 15-30days after confirming the order
264,500
Gordon Flake, a Korea specialist and executive director of the Mansfield Foundation in Washington, is a regular visitor to South Korea and the Northeast Asia region. As new administrations in Seoul and Tokyo take tentative steps to improve relations following a deterioration of ties last year, Mr. Flake spoke at the Asan Institute for Policy Studies in Seoul on Tuesday about the importance of the bilateral relationship for both countries, the U.S., and security in the region. Following the election of Park Geun-hye as South Korea’s next president late last year, Mr. Flake said that Washington was hopeful the new administration in Seoul would place Korea-Japan relations in an international context rather than get bogged down in two-way spats such as the territorial dispute over the Liancourt Rocks that flared again last year. As South Korea takes a two-year rotating seat on the United Nations Security Council, coordination with Japan on security issues, notably North Korea, remains essential, Mr. Flake said. A fresh attempt to seal a military information sharing agreement between the nations would also be a step forward, he said. That agreement was ditched at the eleventh hour last year because of nationalist sentiment in South Korea. Mr. Flake said he shared concerns held by Seoul about the potential impact on the bilateral relationship because of the hawkish bias of the new government in Tokyo. Any provocative moves by the administration of Japanese Prime Minister Shinzo Abe would likely earn a strong response “by mandate” because of the strength of feeling in South Korea over issues concerning the colonization by Japan of the Korean peninsula, he noted. Such provocations could include moves to revise or revoke statements made by previous Japanese governments accepting responsibility and apologizing for suffering caused by the occupation, or a visit by Mr. Abe to the controversial Yasukuni shrine in Tokyo. Mr. Flake predicted that any such moves would also elicit a response from the U.S. such as high level statement repudiating the move. But he cautioned that South Korea suffers from a tendency to see Japan as a “unitary actor,” with a poor understanding of the nuances and viewpoints within the Japanese administration and public. Japanese nationalism now shouldn’t be mistaken for the militant nationalism of the colonial period, he said. Moreover, while the Japanese media increasingly portray South Korea as a natural partner for Japan, “no-one is making the case (in Korea) for Japan’s importance to Korea,” he said. The U.S.-Korea alliance depends on solid ties with Japan, he said, as does the mutual economic prosperity of the Asian neighbors. One way of looking at the historical disputes between South Korea and Japan are as potholes, he said. Running into them just makes them larger. Better, he said, to expand the size of the road and strengthen the shock-absorbers by increasing the alliance and bolstering ties in other areas. Historical issues are important, but the nations need to consider whether they are the most important factors in the bilateral relationship, he said. Mr. Flake also predicted calls would increase from the U.S. for South Korea to join the Trans-Pacific Partnership, a trade pact involving countries in the Asia-Pacific region that is led by the U.S. While South Korea has been non-committal about joining the TPP because of its extensive existing trade deals, a move to join would likely put pressure on Japan to overcome its own reticence about trade deals and sign up as well. While South Korea doesn’t necessarily need the TPP, it does need an economically vibrant Japan and so signing up to the TPP would be in Seoul’s interest, he said. As it braces for Tokyo to possibly take steps to inflame historical disputes, Mr. Flake said South Korea would do well to recognize that the nation’s economic and security interdependence with Japan make it important to work towards a better understanding and partnership with its neighbor. For the latest news and analysis, follow @WSJAsia
110,198
NASA's push to quiet sonic booms To create cross-country faster-than-sound travel, NASA is aiming to dampen sonic booms generated when planes go supersonic. Sonic booms aren't just cheesy ranged weapons that Guile from Street Fighter uses to defend his epic flat-top. They're the result of an aircraft breaking the sound barrier. And they can be loud enough to deafen E. Honda. The nerve-rattling noise factor has restricted much supersonic travel to the world's oceans, limiting intercontinental flight to sub-Mach speeds. But a series of experiments being conducted by NASA are aimed at enabling a new generation of supersonic crafts that can dampen or even eliminate sonic booms. NASA aerospace engineer Ed Haering today answered reader questions about "what it's like to try to tame a sonic boom," and included images of an F-15B prototype (left) modified with the awesome-looking Unicorn-like "Quiet Spike." The retractable, 24-foot-long spike is mounted to the nose of the aircraft and creates three smaller shockwaves that travel all the way to the ground in parallel instead of building up to a sonic boom. That configuration greatly reduces noise when the aircraft goes Mach 1, or about 760 mph, the speed of sound at sea level. In its bid to tame the sonic boom, NASA has performed ground experiments with names like "SonicBOBS," "SonicBREWS," "LaNCETS," "House VIBES," and even "Low Boom/No Boom." They sound like Dubstep bands, but they entail serious research being done by serious scientists. The Quiet Spike, along with some of the other projects, are proving that aircraft can indeed "mold" soundwaves when breaking the sound barrier. If the experiments are successful, a new generation of supersonic planes could be crisscrossing the country, allowing flights in a fraction of the time they take now. Frequent travelers will welcome the news, if not the fun. Who doesn't want to go supersonic?
28,380
Travesties and Encounters (I doubt if many people -or anyone?- would want to read any part of this website from start to finish. This applies especially to this Travesties and Encounters section, which is meant as something for those who like this sort of thing to dip into.) Tom Stoppard's sparkling play Travesties takes off from the fact that Lenin, James Joyce and the Dadaist Tristan Tzara were all living in Zurich during the First World War. In the play they are in the same room in the Zurich library. When the play starts Lenin is getting very excited in Russian about news of a Revolution in Saint Petersburg while Joyce is dictating to an assistant lines like "Morose delectation...Aquinas tunbelly... Frate Porcospino..." VLADIMIR LENIN JAMES JOYCE TRISTAN TZARA TOM STOPPARD Perhaps few real chance meetings are quite as surreal as this, but ever since seeing Travesties I have been interested to hear about improbable or odd encounters. Ones I hear about often involve philosophers. Some are grim. Some are enjoyable. A number of the accounts to follow could be called gossip. People often think of gossip as a minor vice. That may be right when it is malevolent or involves intrusive invasion of the private lives of unwilling people, or even of the possibly willing "celebrities" of whom we hear too much. But, apart from these cases, gossip should be seen as a minor virtue. A person with no interest in gossip has no interest in stories about other people, and so has a drastically reduced capacity to enjoy and celebrate the wonderful peculiarity and diversity of those around us. WITTGENSTEIN AND HITLER. Among the darker encounters is that Hitler and Wittgenstein (almost exactly the same age, Hitler being six days older than Wittgenstein) were both schoolboys together in the Realschule at Linz in the year 1903-1904. Academically they were two years apart, as Wittgenstein had been advanced a year and Hitler was year behind. As the school had only about 300 students, it is likely that the two were at least aware of each other. In the photograph there is no doubt about the identity of the young Hitler, although the correctness of the one marked as Wittgenstein is disputed. (I think the adult Wittgenstein can be glimpsed in the boy's face, but such judgements are obviously fairly subjective.) In Hitler's discussion in Mein Kampf of the origins of his antisemitism, he mentions a Jewish boy at school. It has been claimed (by Kimberley Cornish in The Jew of Linz) that the boy was Wittgenstein. Hitler mentions the Jewish boy in a way that seems to suggest that he was not an important influence on his antisemitism. Having said that he grew up in a home without antisemitism, Hitler goes on: "Likewise at school I found no occasion which could have led me to change this inherited picture. At the Realschule, to be sure, I did meet one Jewish boy who was treated by all of us with caution, but only because various experiences had led us to doubt his discretion and we did not particularly trust him; but neither I nor the others had any thoughts on the matter". It is hard to assess whether or not this boy was Wittgenstein. It is obviously a possibility. It is easy to imagine Wittgenstein both having and communicating a very low impression of Hitler, and that Hitler would not be charmed by this. Hitler's own account denies that the boy influenced his antisemitism, although his claims about his personal history in Mein Kampf cannot be relied on. Whatever the truth about the claimed identity or the influence, the mere fact of the two knowing each other at school would be worthy of Stoppard's wit were the possible implications not so terrible. THE PHILOSOPHER AS INHUMAN AGONY UNCLE: IMMANUEL KANT RESPONDS TO MARIA VON HERBERT. Immanuel Kant famously made truth-telling always morally obligatory, regardless of consequences: "To be truthful (honest) in all declarations, therefore, is a sacred and absolutely commanding decree of reason, limited by no expediency". Maria von Herbert was an enthusiastically Kantian philosopher, as was her husband. Their house was a centre of Enlightenment discussion and of the propagation of rational Kantian morality. In August 1791, Maria von Herbert wrote a letter to Kant about the consequences of her having told someone she loved the truth that she had concealed from him a previous relationship: As a believer calls to his God, I call to you for help, for comfort, or for counsel to prepare me for death. Your writings prove that there is a future life. But as for this life, I have found nothing at all that could replace the good I have lost, for I loved someone who, in my eyes, encompassed within himself all that is worthwhile, so that I lived only for him, everything else was in comparison just rubbish, cheap trinkets. Well, I have offended this person, because of a long drawn out lie, which I have now disclosed to him, though there was nothing unfavourable to my character in it, I had no vice in my life that needed hiding. The lie was enough though, and his love vanished. As an honourable man, he doesn't refuse me friendship. But that inner feeling that once, unbidden, led us to each other, is no more - oh my heart splinters into a thousand pieces!If I hadn't read so much of your work I would certainly have put an end to my life. But the conclusion I had to draw from your theory stops me -it is wrong for me to die because my life is tormented. Instead I'm supposed to live because of my being. Now put yourself in my place, and either damn me or conmfort me. I've read the metaphysic of morals, and the categorical imperative, and it doesn't help a bit. My reason abandons me just when I need it. Answer me, I implore you -or you won't be acting in accordance with your own imperative... Kant replied in Spring 1792: Your deeply felt letter comes from a heart that must have been created for the sake of virtue and honesty, since it is so receptive to instruction in those qualities. I must do as you ask, namely , put myself in your place, and prescribe for you a pure moral sedative. I do not know whether your relationship is one of marriage or friendship, but it makes no significant difference. For love, be it for one's spouse or for a friend, presupposes the same mutual esteem for the other's character, without which it is no more than perishable sensual delusion. A love like that wants to communicate itself completely, and it expects of its respondent a similar sharing of heart, unweakened by distrustful reticence. That is what the ideal of friendship demands. But there is something in us which puts limits on such frankness, some obstacle to this mutual outpouring of the heart, which makes one keep some part of one's thoughts locked within oneself, even when one is most intimate... We can't expect frankness of people, since everyone fears that to reveal himself completely would be to make himself despised by others. But this lack of frankness, this reticence, is still very different from dishonesty. What the honest but reticent man says is true but not the whole truth. What the dishonest man says is something he knows to be false... a lie. It may be harmless but it is not on that account innocent. It is a serious violation of a duty to oneself; it subverts the dignity of humanity in our own person, and attacks the roots of our thinking. As you see, you have sought counsel from a physician who is no flatterer. I speak for your beloved and present him with arguments that justify his having wavered in his affection for you. Ask yourself whether you reproach yourself for the imprudence of confessing, or for the immorality intrinsic to the lie. If the former, then you regret having doine your duty. And why? Because it has resulted in the loss of your friend's confidence. This regret is not motivated by anything moral, since it is produced by an awareness not of the act itself, but of its consequences. But if your reproach is grounded in a moral judgement of your behaviour, it would be a poor moral physician who would advise you to cast it from your mind. When your change in attitude has been revealed to your beloved, only time will be needed to quench, little by little, the traces of his justified indignation, and to transform his coldness into a more firmly grounded love. If this doesn't happen, then the earlier warmth of his affection was more physical than moral, and would have disappeared anyway -a misfortune which we often encounter in life, and when we do, must meet with composure. For the value of life, insofar as it consists in the enjoyment we get from people, is vastly overrated. Here then, my dear friend, you find the customary divisions of a sermon: instruction, penalty and comfort. Devote yourself to the first two; when they have had their effect, comfort will be found by itself. Maria von Herbert replied in January 1793: Dear and revered sir, Your kindness and your exact understanding of the human heart, encourage me to describe to you, unshrinkingly, the further progress of my soul. The lie was no cloaking of a vice, but a sin of keeping something back out of consideration for the friendship (still veiled by love) that existed then. There was a struggle, I was aware of the honesty friendship demands, and at the same time I could foresee the terribly wounding consequences. Finally I had the strength and revealed the truth to my friend, but so late -and when I told him, the stone in my heart was gone, but his love was torn away in exchange. My friend hardened in his coldness, just as you said in your letter. But then afterwards he changed towards me, and offered me again the most intimate friendship. I'm glad enough about it, for his sake -but I'm not really content, because it's just amusement, it doesn't have any point. My vision is clear now. I feel that a vast emptiness extends inside me, and all around me -so that I almost find my self to be superfluous, unnecessary. Nothing attracts me. I'm tormented by a boredom that makes life intolerable. Don't think me arrogant for saying this, but the demands of morality are too easy for me. I would eagerly do twice as much as they command. They only get their prestige from the attractiveness of sin, and it costs me almost no effort to resist that. I comfort myself with the thought that, since the practice of morality is so bound up with sensuality, it can only count for this world. I can hope that the afterlife won't be yet another life ruled by these few, easy demands of morality, another empty and vegetating life... I don't study the natural sciences or the arts any more, since I don't feel that I'm genius enough to extend them; and for myself, there's no need to know them. I'm indifferent to everything that doesn't bear on the categorical imperative, and my transcendental consciousness -although I'm all done with those thoughts too. You can see, perhaps, why I want only one thing, namely to shorten this pointless life, a life which I am convinced will get neither better nor worse. If you consider that I am still young and that each day interests me only to the extent that it brings me closer to death, you can judge what a great benefactor wou would be if you were to examine this question closely. I ask you, because my conception of morality is silent here, whereas it speaks decisively on all other matters. And if you cannot give me the answer I seek, I beg you to give me something that will get this intolerable emptiness out of my soul. Then I might become a useful part of nature, and, if my health permits, would make a trip to Konigsberg in a few years. I want to ask permission, in advance, to visit you. You must tell me your story then, because I would like to know what kind of life your philosophy has led you to -whether it never seemed to you to be worth the bother to marry, or to give your whole heart to anyone, or to reproduce your likeness. I have an engraved portrait of you by Bause, from Leipzig. I see a profound calm there, and moral depth -but not the astuteness of which the Critique of Pure Reason is proof. And I'm dissatisfied not to be able to look you right in the face. Please fulfill my wish, if it's not too inconvenient. And I need to remind you: if you do me this great favour and take the trouble to answer, please focus on specific details, not on the general points, which I understand, and already understood when I happily studied your works at the side of my friend. You would like him, I'm sure. He is honest, goodhearted, and intelligent -and besides that, fortunate enough to fit this world. I am with deepest respect and truth, Maria Herbert. Kant asked a mutual friend, Erhard, about Maria Herbert, and was told that she had "capsized on the reef of romantic love". In February 1793 he wrote to Elizabeth Motherby, the daughter of one of his friends, enclosing the two letters from Maria Herbert and the one from Erhard. Kant's letter to Elizabeth Motherby read: I have numbered the letters which I have the honour of passing on to you, my dear mademoiselle, according to the dates I received them. The ecstatical little lady didn't think to date them. The third letter, from another source, provides an explanation of the lady's curious mental derangement. A number of expressions refer to writings of mine that she read, and are difficult to understand without an interpreter. You have been so fortunate in your upbringing, that I do not need to commend these letters to you as an example of warning, to guard you against the wanderings of a sublimated fantasy. But they may serve nonetheless to make your perception of that good fortune the more lively. I am, with the greatest respect, my honoured lady's most obedient servant, I Kant. Kant never replied to Maria Herbert's second letter. In 1803 she committed suicide. These letters are extracted from a sensitive and perceptive discussion of what they tell us about Kant's moral philosophy by Rae Langton: Duty and Desolation, Philosophy, 1992. There is a shortened version in Peter Singer (ed.): Ethics, Oxford University Press, 1994. HEGEL LUNCHES WITH GOETHE AND HIS FAMILY. It was lunch at the Goethe's, and Goethe himself was quiet, ... no doubt not to disturb the free speech of his very voluble and logically penetrating guest, who elaborated upon himself in oddly complicated grammatical forms. An entirely novel teminology, a mode of expression mentally overleaping itself, the peculiarly employed philosophical formulas of the ever more animated man in the course of his demonstrations -all this finally reduced Goethe to complete silence without the guest even noticing... One of the others at the meal said afterwards, "I cannot tell whether he is brilliant or mad. He seems to me to be an unclear thinker." Account by Ottilie von Goethe, quoted in Geoffrey Hawthorne: Hegel's Odyssey, London Review of Books, October, 1985. iN 1841, Friedrich Wilhelm Joseph von Schelling was lecturing in Lecture Hall 6 in the University of Berlin. In the audience was Friedrich Engels: "alongside him perched Jacob Burkhardt, the nascent art historian and Renaissance scholar; Michael Bakunin, the future anarchist (who dismissed the lectures as "interesting but rather insignificant"); and the philosopher Soren Kierkegaard, who thought Schelling talked "quite insufferable nonsense"." Tristram Hunt: The Frock-Coated Communist, the Revolutionary Life of Friedrich Engels, Allen Lane, 2009. Those of us who give lectures or classes in philosophy may be a bit saddened, though not entirely surprised, if some of the audience feedback describes the content as "rather insignificant" or "insufferable nonsense". (In the section of this website called Philosophy, Beliefs and Conflicts, my lecture on "The Philosophy and Psychology of a New World Order" has been taken from Youtube. With it have come a couple of splendid examples of comments of this sort.) Even a huge quantity of negative or inane feedback would be a price worth paying to have a class including the people in Schelling's. LONDON PUBS AND THE EARLY DAYS OF COMMUNISM. Lenin worked in Clerkenwell as editor of the revolutionary paper Iskra (The Spark) from 1902 until 1903. The office was at 37a Clerkenwell Green. Stalin, having met Lenin at a 1905 conference in Finland, visited him that year in London, and local legend has it that they used to talk together in the Crown and Anchor pub (now the Crown Tavern) on Clerkenwell Green. It is unlikely that Lenin and Stalin having a drink together would make for a particularly convivial occasion. I would have prefered to eavesdrop on the pub conversations of Marx and Engels. After moving to Primrose Hill in 1870, Engels used to walk over from Regent's Park Road to Marx's house in Maitland Park Villas for their daily talk together. Often their talk would take place on a long walk over Hampstead Heath, and would continue the conversation as they ended by having a drink at Jack Straw's Castle. We do not know for sure what Lenin and Stalin may have discussed at the Crown and Anchor, or what Marx and Engels talked about at Jack Straw's Castle. We do know what was discussed at the second congress of the Communist League at the end of 1847 in the room above the Red Lion pub in Great Windmill Street, Soho. For ten days the League met in this room and argued about their basic principles, ending in victory for the views of Marx and Engels that were to be the basis of the Communist Manifesto. The depictions of Marx in the gargantuan statues erected in Moscow, East Berlin and other parts of the former communist world might suggest an intellectual giant, dedicated only to developing and acting on theories of the dialectic and the class struggle. For such an unremittingly granite thinker and fighter, pubs would have served only as convenient places for political discussion and debate. MARX NEAR THE BOLSHOI THEATRE. MARX AND ENGELS NEAR ALEXANDERPLATZ. But parts of Marx's actual life make a nice contrast to the granite version. One night Marx walked up the Tottenham Court Road with Wilhelm Liebknecht and Edgar Bauer. They planned to have a glass of beer in each of the eighteen pubs between Oxford Street and what is now the Euston Road. In the last pub they got into a drunken row with some Englishmen and had to escape. Then Bauer stumbled over a heap of paving stones and threw one at the gas lantern, smashing the glass. Francis Wheen, in his very lively biography of Marx, quotes Liebknecht's account: "Marx and I did not stay behind, and we broke four or five street lamps -it was, perhaps, two o'clock in the morning and the streets were deserted... But the noise nevertheless attracted the attention of a policeman who with quick resolution gave the signal to his colleagues... The position became critical... We raced ahead, three or four policemen some distance behind us. Marx showed an agility that I should not have attributed to him. And after the wild chase had lasted some minutes, we succeeded in turning into a side street, and there through an alley -a back yard between two streets- whence we came behind the policemen who lost the trail. Now we were safe. They did not have our description and we arrived at our homes without further adventures." STALIN'S PHILOSOPHY TUTOR. Stalin asked his assistant to assemble a library of books for him and he put philosophy first on the list of subjects to be included. He then appointed the philosopher Jan Sten to be his tutor. Sten must have thought that he had a chance of influence not given to any philosopher since Aristotle taught Alexander the Great. He drew up a programme to teach Stalin about Kant, Hegel, Fichte, Schelling, Feuerbach, Plekhanov, Kautsky and F.H.Bradley. In the tutorials, Stalin sometimes asked questions like "What's all this got to do with the class struggle?" or "Who reads all this rubbish in practice?" Despite his impatience, Stalin persevered with the subject enough to think of himself as a philosopher. In 1930 he gave a philosophical lecture to an institute of professors, which is summarized in the minutes: "We have to turn upside down and dig over the whole pile of manure that has accumulated in philosophy and the natural sciences. Everything written by the Deborin group has to be smashed. Sten and Karev can be chucked out. Sten boasts a lot, but he's juist a pupil of Karev's. Sten is a desperate sluggard. All he can do is talk. Karev's got a swelled head and struts about like an inflated bladder. In my view, Deborin is a hopeless case, but he should remain as editor of the journal so we'll have someone to beat. The editorial board will have two fronts, but we'll have the majority." After this philosophy lecture there were questions. Unsurprisingly, they were undemanding. One was, "What should the Institute concentrate on in the area of philosophy?" Stalin replied: "To beat, that is the main issue. To beat on all sides and where there hasn't been any beating before. The Deborinites regard Hegel as an icon. Plekhanov has to be unmasked. He always looked down on Lenin. Even Engels was not right about everything. There is a place in his commentary on the Erfurt Programme about growing into socialism. Bukharin tried to use it. It wouldn't be a bad thing if we could implicate Engels somewhere in Bukharin's writings." It would be a nightmare for any philosophy tutor to give tutorials to Stalin. And a tutor might be depressed at being described as a desperate sluggard by the most famous person he had taught. But things got worse. Jan Sten was later described as a lickspittle of Trotsky and executed. From Humanity, a Moral History of the Twentieth Century. WAR SERVICE: PEREGRINE WORSTHORNE TWICE HOPES TO IMPRESS THE ADMINISTRATION OFFICER OF PHANTOM. Doing his Second World War service in the army, Peregrine Worsthorne -later a distinguished conservative journalist- was assigned to the intelligence organization "Phantom": Back at B Squadron I became friendly with the administration officer, Captain Michael Oakeshott. He seemed to be amused by my company which was very flattering since he was much older and of senior rank. There was also something intriguely different about him... Then there was the matter of my overcoat. Before coming out to Holland I had got my tailor to run me up one in fur, the sole purpose of which, I maintained, was to keep the cold out. Not all my fellow officers agreed... Just when the critics were on the edge of convincing Peter Patrick to ban the garment, Michael Oakeshott successfully intervened on my behalf with a decisive quotation from the Duke of Wellington to the effect that "dandies make the best soldiers". What I had no idea of at the time was that Michael Oakeshott, in civilian life, was already a famous Cambridge philosopher; nor, I think, did anybody else... after dinner in the evening we sometimes had informal debates at which I would try desperately to shine in an effort to show that being bad at map reading did not necessarily make one a complete fool. Although Michael used to giggle joyously he never took part. THE ADMINISTRATION OFFICER, PHANTOM. After the war Peregrine Worsthorne went back as an undergraduate to Cambridge: My only regret was not being able to finish the course of lectures in political philosophy by one M.J. Oakeshott, who turned out to be my old Phantom comrade-in-arms... he had never given me any idea of his true identity during the war. So his appearance on the podium at my first lecture in cap and gown took me completely by surprise. Typically he only giggled when he saw me staring up at him from the front row. Just as he had made no fuss of his academic eminence in the army, so now he made no fuss of it back at Cambridge. After the lecture we went off together to have coffee at the Copper Kettle in King's Parade as if nothing had changed. But it had. Now I was a bit overawed by him, anxious to impress and since what he liked in the young was cheek and arrogance, my new respectfulness was the last thing to give pleasure. A few years later, after my marriage, he became our lodger in London. But by then it was in the company of my wife that he found the zest and exuberance which in the army he had found in mine. Peregrine Worsthorne: Tricks of Memory. WAR SERVICE: CAPTAIN EVELYN WAUGH DESCRIBES HIS COLONEL AT KELBURN CASTLE, GIVING SOME HELP TO LORD GLASGOW. So No. 3 Cmdo were very anxious to be chums with Lord Glasgow so they offered to blow up an old tree stump for him and he was very grateful and he said dont spoil the plantation of young trees near it because that is the apple of my eye and they said no of course not we can blow a tree down so that it falls on a sixpence and Lord Glasgow said goodness you are clever and he asked them all to luncheon for the great explosion. So Col. Durnford-Slater D.S.O. said to his subaltern, have you put enough explosive in the tree. Yes, sir, 75 lbs. Is that enough. Yes sir I worked it out by mathematics it is exactly right. Well better put a bit more. Very good sir. And when Col. D. Slater D.S.O. had had his port he sent for the subaltern and said subaltern better put a bit more explosive in that tree. I don't want to disappoint Lord Glasgow. Very good sir. Then they all went out to see the explosion and Col. D.S. D.S.O. said you will see that tree fall flat at just that angle where it will hurt no young trees and Lord Glasgow said goodness you are clever. So soon they lit the fuse and waited for the explosion and presently the tree, instead of falling quietly sideways, rose 50 feet into the air taking with it 1/2 acre of soil and the whole of the young plantation. And the subaltern said Sir I made a mistake, it should have been 7&1/2 pounds not 75. Lord Glasgow was so upset he walked in dead silence back to his castle and when they came to the turn of the drive in sight of his castle what should they find but that every pane of glass in the building was broken. So Lord Glasgow gave a little cry & ran to hide his emotion in the lavatory and there when he pulled the plug the entire ceiling, loosened by the explosion, fell on his head. This is quite true. Letter to Laura Waugh, 31 May 1942, in Mark Amory (ed.): The Letters of Evelyn Waugh. AIR MARSHALL SIR ARTHUR HARRIS AND THE REV. JOHN COLLINS. In the Second World War, the saturation bombing of German cities was masterminded by Air Marshall Sir Arthur Harris. (In the chapter about this policy in Humanity, a Moral History of the Twentieth Century I agreed with those who see this policy as a war crime.) The moral case for area bombing was contested within Bomber Command itself. The chaplain at Bomber Command Headquarters at High Wycombe was John Collins. (In the 1960s, and by then Canon Collins, he was a well-known leader of the Campaign for Nuclear Disarmament. There is something surreal about John Collins and Sir Arthur Harris having to work together.) John Collins invited the Minister of Aircraft Production, Sir Stafford Cripps, to give a talk on the subject "Is God My co-pilot?". Cripps argued that officers should only send men on bombing raids which they thought were morally as well as militarily justified. Sir Arthur Harris replied by arranging a lecture on "The Ethics of Bombing". This was given by T.D. ("Harry") Weldon. a Fellow in Philosophy at Magdalen College, Oxford. He later wrote a book on Kant and an austere linguistic work on political philosophy. The Vocabulary of Politics. He was Personal Staff Officer to Sir Arthur Harris in Bomber Command and drafted the communications Harris sent to the Cabinet and the Air Ministry. Predictably, his talk was rather different from that given by Cripps. When Weldon had finished, Collins asked whether Weldon had not taken his subject to be "The Bombing of Ethics"? (Sir Arthur Harris comes out of this story with some credit. It is hard to imagine the German equivalents of John Collins and Sir Stafford Cripps using Luftwaffe headquarters for an ethical lecture critical of the German bombing policy. And, if they had, Hermann Goering's response might not have taken the form of a rival lecture by a philosopher.) From Humanity, a Moral History of the Twentieth Century. STUART HAMPSHIRE INTERROGATES ERNST KALTENBRUNNER. Stuart Hampshire was one of the most civilized and fastidious of philosophers. At the Nuremberg trials, Ernst Kaltenbrunner gave an impression of cold brutality extreme even by Nazi standards. (During the trial, where the horrors he was so deeply invoved in were spelt out, he wrote, "No one will find us weak! What a splendid feeling to have lived a life that demanded and found danger and readiness for action".) It would have been fascinating to eavesdrop on Hampshire's conversations with Kaltenbrunner. His own brief account is very reticent. It is reproduced here partly because he indicates the interweaving -too rarely made explicit- of philosophy and personal experience. It therefore began to seem necessary that philosophy should finally abandon its shortcuts and its grandiose claims and should proceed in the tentative problem-solving style of the natural sciences. With this idea the study of the peculiarities of natural languages came to be considered a central part of philosophy. Then came the war, long anticipated. As an intelligence officer in the war for four years I studied the espionage and counter-espionage operations of the Reichssicherheitshauptamt, Himmler's Central Command, which controlled the whole of the SS, including the Gestapo, excluding only the Waffen SS. This experience altogether changed my attitude both to politics and to philosophy, as the full scale of the SS's operations in occupied Europe and in Russia became known, and as the programme announced in Mein Kampf could be studied in action. I interrogated some leading Nazis in captivity at the end of the war, including Heydrich's successor as head of the Reichssicherheitshauptamt, Kaltenbrunner, with whom I talked at length when he was a prisoner with U.S. Army headquarters, and whom I brought to London for further interrogation. I learnt how easy it had been to organise the vast enterprises of torture and of murder, and to enrol willing workers in this field, once all moral barriers had been removed by the authorities. Unmitigated evil and nastiness are as natural, it seemed, in educated human beings as generosity and sympathy: no more, and no less, natural, a fact that was obvious to Shakespeare but not previously evident to me. Stuart Hampshire: Innocence and Experience. T.S. ELIOT READS THE WASTE LAND TO THE ROYAL FAMILY. A.N. Wilson wrote about a lunch with the Queen Mother. She talked about an occasion when, as part of the education of her daughters Princess Elizabeth and Princess Margaret, T.S. Eliot had been invited to read some of his poetry to the Royal Family. She remembered "this rather lugubrious man in a suit, and he read a poem... I think it was called "The Desert". At first the girls got the giggles and then I did and then even the King... Such a gloomy man, looked as though he worked in a bank." T.S. ELIOT ATTENDS A TALK BY BERTRAND RUSSELL. When Mr. Apollinax visited the United States His laughter tinkled among the teacups. I thought of Fragilion, that shy figure among the birch trees, And of Priapus in the shrubbery Gaping at the lady in the swing. In the palace of Mrs. Phlaccus, at Professor Channing-Cheetahs He laughed like an irresponsible foetus. His laughter was submarine and profound Like the old man of the sea's Hidden under coral islands Where worried bodies of drowned men drift down in the green silence, Dropping from fingers of surf. I looked for the head of Mr. Apollinax rolling under a chair Or grinning over a screen With seaweed in its hair. I heard the beat of centaur's hoofs over the hard turf As his dry and passionate talk devoured the afternoon. "He is a charming man"- "But after all what did he mean?" - "His pointed ears... He must be unbalanced."- "There was something he said that I might have challenged." Of dowager Mrs. Phlaccus, and Professor and Mrs. Cheetah I remember a slice of lemon, and a bitten macaroon. PHILOSOPHER KINGS? THE TWO APPROACHES MIGHT BE HARD TO COMBINE: BERTRAND RUSSELL AND KING GEORGE VI. Some years before I gave the Reith Lectures, my old professor and friend and collaborator in Principia Mathematica, A.N. Whitehead, had been given the OM. Now, by the early part of 1950, I had become so respectable in the eyes of the Establishment that it was felt that I, too, should be given the OM. This made me very happy for, though I daresay it would surprise many Englishmen and most of the English Establishment to hear it, I am passionately English, and I treasure an honour bestowed on me by the Head of my country. I had to go to Buckingham Palace for the official bestowal of it. The King was affable, but somewhat embarrassed at having to behave graciously to so queer a fellow, a convict to boot. He remarked, "You have sometimes behaved in a way which would not do if generally adopted". I have been glad ever since that I did not make the reply that sprang to my mind: "Like your brother." But he was thinking of things like my having been a conscientious objector, and I did not feel that I could let this remark pass in silence, so I said, "How a man should behave depends upon his profession. A postman, for instance, should knock at all the doors in a street at which he has letters to deliver, but if anybody else knocked on all the doors, he would be considered a public nuisance." The King, to avoid answering, abruptly changed the subject by asking me whether I knew who was the only man who had both the KG and the OM. I did not know, and he graciously informed me that it was Lord Portal. Bertrand Russell: Autobiography, Volume 2. NIELS BOHR AND CHURCHILL: "WE DID NOT SPEAK THE SAME LANGUAGE". Bohr escaped from occupied Denmark. Because of the threat of a Nazi bomb, he was willing to work on the Manhattan Project. He started to think about the deeper problems of atomic weapons and realized that, since the United States had made the bomb, the Soviet Union would soon follow. The choice was simple: international control or a nuclear arms race. He saw international control as the only safe option... Bohr returned to England, and persuaded the President of the Royal Society, Sir Henry Dale, of the importance of the issue. Dale was among those who persuaded Churchill to see Bohr. Thinking of voluntary abstention from using the bomb, in the interests of future international control, Dale wrote to Churchill: "It is my serious belief that it may be in your power even in the next six months to take decisions which will determine the future course of human history. It is in that belief that I dare to ask you, even now, to give Professor Bohr the opportunity of brief access to you." Privately, Dale expressed the fear that Bohr's "mild, philosophical vagueness of expression and his inarticulate whisper" might mean that he would not get through to "a desperately preoccupied Prime Minister". The meeting was not a success. Lord Cherwell was present and much of the time was taken up with argument between him and Churchill on points irrelevant to Bohr's purpose. According to Bohr's own "very vivid memories" of the interview, recounted to Margaret Gowing, the main point was never reached. "Professor Bohr was unable to bring the Prime Minister's mind to bear on the implications of the bomb or to tell him of his belief that the President himself was giving the subject such serious thought." Churchill disliked the meeting. Bohr asked if he could send a memorandum on the subject to Churchill: The Prime Minister replied that he would always be honoured to receive a letter from Professor Bohr but hoped that it would not be about politics. Bohr came away greatly disappointed at the way the world was apparently governed, with small points exercising a quite irrational influence. "We did not speak the same language," said Bohr afterwards. From Humanity, a Moral History of the Twentieth Century. PHILOSOPHERS ARE NOT ALWAYS SERENE. 1: WITTGENSTEIN REPLIES TO OSCAR WOOD'S UNDERGRADUATE PAPER ON DESCARTES, FOLLOWED BY AN EXCHANGE WITH H.A. PRICHARD. Wittgenstein started his reply (uttered in tones of disgust and disbelief) with the words "Mr. Wood seems to me to have made two points". He then abandoned Mr. Wood and Descartes altogether and started to talk in his own style about what "the cogito" could possibly be thought to mean. At one point he said, "If a man says to me, looking at the sky, "I think it will rain therefore I exist" I do not understand him" upon which a very old philosopher, H.A Prichard... interrupted with "That's all very fine; but what I want to know is, is the cogito a valid argument or not?". Prichard was very deaf, his voice was ancient and querulous, and he had a terrible cough, but he interrupted three or four times. Wittgenstein never once mentioned Descartes, and at one point was provoked into saying that Descartes was of no importance. Prichard's last contribution was, "What Descartes was interested in was far more important than any problem you have addressed this evening", and with that he tottered out. There was considerable embarrassment, as I recorded in my diary, at Prichard's rudeness. It proved to be his last outing. He was dead within a week. Mary Warnock: A Memoir: People and Places. PHILOSOPHERS ARE NOT ALWAYS SERENE. 2: ELIZABETH ANSCOMBE ATTENDS THE CLASSES OF J.L. AUSTIN. Elizabeth attended these classes, I suppose, in part, to observe Austin in action... but also as the champion, or even the spy, of Wittgenstein. In any case she was a troublesome presence and frequently intervened to pour scorn on what was being said. On one particular evening, when she had behaved with notable rudeness, I tried to evade her afterwards by scuttling very fast out of the Magdalen back gates, but she caught up with me as I was struggling with my bicycle lock in Longwall, and hissed "To think that Wittgenstein fathered that bastard". Mary Warnock: A Memoir: People and Places. ACROSS 103 YEARS: SLAVOJ ZIZEK AND G.E. MOORE. When we perceive something as an act of violence, we measure it by a presupposed standard of what the "normal" non-violent situation is -and the highest form of violence is the imposition of this standard with reference to which some events appear as "violent". This is why language itself, the very medium of non-violence, of mutual recognition, involves unconditional violence. In other words, it is language itself which pushes our desire beyond proper limits, transforming it into a "desire that contains the infinite", elevating it into an absolute striving that cannot ever be satisfied. Slavoj Zizek: Violence, Six Sideways Reflections, 2008. My brother has just published a book on Durer. There is a great deal of philosophy in it, which begins with this sentence: "I conceive the human reason to be the antagonist of all forces other than itself". I do wish people wouldn't write such silly things -things, which, one would have thought, it is so perfectly easy to see to be just false. I suppose my brother's philosophy may have some merits; but it seems to me just like all wretched philosophy -vague, and obviously inconsequent, and full of falsehoods. I think its object is to be like a sermon -to make you appreciate good things; and I sometimes wonder whether it is possible to do this without saying what is false. But it does annoy me terribly that people should admire such things -as they do. G.E. Moore: Letter to Leonard Woolf, 1905. VIRGINIA WOOLF VISITS H.A.L. FISHER WHEN HE WAS WARDEN OF NEW COLLEGE. Staying with the Fishers. A queer thing, people who accept conventions. Gives them a certain force. H[erbert] has the organisation behind him. But robs them of character, of vagaries, of depth, warmth, the unexpected. They spin along the grooves. H to some extent anxious to impress his privileged impartial position. Many stories of "when I was in the Cabinet". Yet why not? The odd thing is that when with them one accepts their standards. And whats wrong? So nice, just, equable, humane. But how chill! And over his shoulder I see the rulers; small; but not evil; striving, -a complex impression. Wardens have lived there since 1370 -or so. How can he differ?... Yes, Herbert accepts the current values, only rather intellectualises & refines... Tells stories of Balfour & in the manner of the great man -discreet, nipped, bloodless, like a butler used to the best families. Toils at history of Europe. Is an example. Do their duty by the college. Represent culture, politics, worldly wisdom gilt with letters. Nothing to whizz one off one's perch at New College: all in good taste, & very kind. But Lord to live like that! Virginia Woolf: Diary, 4 December, 1933. PENELOPE FITZGERALD VISITS STEVIE SMITH. In 1969, Penelope Fitzgerald and her daughter Tina went to lunch with Stevie Smith at her house in Palmer's Green. It is hard to know whether it would be more intimidating to be visited (and perhaps described) by Virginia Woolf or by Penelope Fitzgerald: Combination of shrewd business woman, genuine artist, lonely middle-aged woman anxious to please, and mad-woman. House where she had lived for 61 years with her aunt... not changed in all that time... Upstairs, aunt's bedroom just as she left it when she died, freezing cold... Downstairs in the basement, stone sink, ancient stove with stovepipe, might have come out of La Boheme, faint mould... a cupboard with bits of tarnished silver... fluted gilt teacups, Japanese teapots, no lids, nut-crackers, dim cruets; Stevie struggling mysteriously with the lunch, a large tough chicken... There were squares of carpet on the floor -we thought they were samples and she was choosing a new one -they were samples, but she had got them free and was sticking them together to make a carpet. Evidently it was too late for her now to learn to cook; she looked dwarfed by the huge thick plates and forks; she had bought some large white tombstone-like meringues from the local shop; felt distressed by her going to this trouble. Penelope Fitzgerald's typed account of the visit, found inside her copy of Stevie Smith's The Frog Prince, quoted by Hermione Lee, the Guardian, April 3, 2010. THE TWELVE YEAR OLD JOHN BETJEMAN SHOWS HIS POEMS TO A TEACHER. I couldn't see why Shakespeare was admired; I thought myself as good as Campbell now And very nearly up to Longfellow; And so I bound my verse into a book, The Best of Betjeman, and handed it To one who, I was told, liked poetry - The American master, Mr. Eliot. That dear good man, with Prufrock in his head And Sweeney waiting to be agonized, I wonder what he thought? He never says When now we meet, across the port and cheese. He looks the same as then, long, lean and pale, Still with the slow deliberating speech And enigmatic answers. At the time A boy called Jolly said "He thinks they're bad"- But he himself is still too kind to say. John Betjeman: Summoned by Bells. MARCELLE QUINTON HELPS ISAIAH BERLIN PACK HIS TRUNK AND NOTICES HIS KUMQUATS. In 1952 Isaiah Berlin was delivering the Flexner Lectures at Bryn Mawr. He brought letters from Tony and I helped him pack his trunk. On the mantelshelf in his room at the Deanery, which I needed special permission to visit, he had about half a dozen jars full of kumquats in syrup. I eventually found out that he took them out only as far as his fingers could descend into the jar, his great mind not thinking either of decanting or even using a spoon. Marcelle Quinton, in Marcelle and Anthony Quinton: Before We Met. ALAN BENNETT FINDS CONVERSATION EASIER WITH A WORLDLY PHILOSOPHER THAN WITH AN UNWORLDLY ONE. In the evening to the Savile with Mary-Kay for the Hawthornden Prizegiving. I sit between Anthony Quinton and Iris Murdoch and am grateful for the worldliness of one and the unworldliness of the other, Quinton chatting easily and with seeming gusto and also being very funny despite having flown back from Boston that day, while Dame Iris keeps up a constant flow of questions ("Where do you live?" "Do you drive a car?" What colour is it?" "Where have you parked?"). a nice purling stream as she tucks into the Savile's duck, followed by apple sorbet. Alan Bennett: Diaries 1980-1990, in Writing Home IRIS MURDOCH DOES A KINDNESS TO ELIZABETH ANSCOMBE AND GEORG KREISEL. I could record one other cooking experience in Iris's life, and one I still find quite upsetting to remember. It must have taken place about the time I first met her, or perhaps before I met her. Two friends of hers, the strong-minded female philosopher who practised "telegamy", and a mathematical logician of international standing who was a bachelor, had asked to borrow her room for a day while she was absent. The room she then lived in had a gas-ring and wash-basin but not much else, and they required it not for secret sexual congrress but because the mathematician wanted to indulge himself in a culinary experiment. Why they should have required Iris's room for this purpose I still cannot fathom, except that the room was handy and that they knew they could presume on her discretion and her unbounded good nature. (They were right of course, but I still grind my teeth when I think of it, even though they are not my own teeth any more but false ones, a denture.) The experiment was in the manufacture of herring soup, which the mathematician, Viennese but possibly with Baltic origins, swore he was on the verge of perfecting. The philosopher affected not to believe him, and swore in her turn -she was a lady with a strong streak of Puckish humour- that she could never be induced under any circumstances to partake of such a dish, however exquisitely prepared. The very idea of it was repellent to her. So they made what amounted to a bet. The mathematician won the bet. The soup was a triumph: the philosopher capitulated and said that it was so. Indeed she consumed it with relish. When Iris returned a few days later it was to find her room in the most gruesome possible disorder, smelling strongly of fish, and her landlady furious. Other tenants had complained of the noise and the smell. Miss Murdoch's reputation, once immaculate, was now in ruins. In the eyes of the landlady she was, and remained, a fallen woman: one who allowed the most unspeakable orgies to take place in her room, and no doubt participated in them herself. Iris left the house not long after, although its position and amenities had suited her very well. But that was not what upset me when Iris told me the tale, which she did in a tolerant amused way, without a trace of resentment. Indeed she remained, and still does, on the best possible terms with both parties, even though neither attempted an apology for what had taken place, or even seemed to think one might be appropriate. It annoys me intensely that she should still revere them, none the less. But what upset me even more, and for some reason can still go through me like a spear, was that Iris found one of her most treasured possessions lying on the floor of the room, hideously violated. It was a blue silk chiffon scarf which her mother had given her as a special birthday present. Its state when discovered was so repulsive that Iris had no choice but to take it straight out to the dustbin, holding her nose while she did so. The logician had required the finest possible sieve to strain the end product of his masterpiece, and the philosopher, casually opening a drawer, had handed him the scarf. I can still see and imagine the pair, wringing out the last drop. I have only met either of them a few times, but when I do I find it difficult to be more than barely civil. John Bayley, Iris. ELIZABETH ANSCOMBE WAS ALSO A HERO: PRESIDENT TRUMAN'S OXFORD DEGREE. Suppose using the bomb had been the only way of shortening the war. Would it then have been justified? One contribution to this debate was made in 1956, when it was proposed that Oxford University should award an honorary degree to President Truman. Proposals for honorary degrees were always accepted and few university members bothered to vote on them. But on the day Truman was proposed, Congregation was full because there was a controversial proposal to include less Greek New Testament in the Theology degree. One witness described the occasion: "The House was preparing to snooze through the routine business before coming to what was the real reason for their presence, but suddenly and startlingly, Miss Anscombe rose and (after duly seeking the VC's [Vice Chancellor's] permission to speak English) delivered an impassioned speech against the award of an Oxford degree to the "man who pressed the button" of the Bomb. The VC called for a vote: she was in a minority of one." The speech elicited only "the complete silence and impassivity of those present... not the slightest sign of approval or disapproval, not a murmur, not a rustle, not a change of countenance, but only utter impeturbability." Memories of the occasion vary. In a different account, four people voted against the degree, including another philosopher, Philippa Foot. The content of Elizabeth Anscombe's speech is reproduced in a paper she published at the time on "Mr. Truman's Degree". She correctly saw how area bombing had paved the way for the atomic bomb. She accepted that, in the circumstances, dropping the bomb probably saved many lives, but pointed out that the circumstances included the Allies' demand for unconditional surrender and their disregard for Japan's known desire for a negotiated peace. Elizabeth Anscombe's central moral claim was that to kill innocent people as a means to an end is always murder. The state has a right to order killing in a war fought either to protect its own people or to protect others who are treated unjustly. There is no right intentionally to kill innocent people, those who are neither waging the war nor supplying its means. Attacking military targets as carefully as possible may involve unintended but foreseen civilian deaths, and this is not murder. But it is not acceptable to attack where the military objective can only be hit by taking as your target something which includes large numbers of innocent people: "Then you cannot very well say they died by accident. Here your action is murder." Elizabeth Anscombe finished on a rhetorical flourish. She said that she would fear to go to the degree ceremony "in case God's patience suddenly ends". Afterwards Harry Weldon, Air Marshall Harris's former colleague, offered to arrange comprehensive air cover. It is hard to warm to the response of those who heard Miss Anscombe and then voted in a way that left her in such a small minority. Just possibly, each person who voted against her may have had good reasons. But their silence and utter impeturbability now seem extraordinary. Was there too little time for discussion, because of the pressing issue of Greek New Testament in the Theology degree? Did no-one think that this courageous and powerful speech deserved the compliment of rational opposition? Apart from Philippa Foot, where were the philosophers? From Humanity, a Moral History of the Twentieth Century. AYER ALSO WAS A HERO: FREDDIE AYER, NAOMI CAMPBELL AND MIKE TYSON. A woman came into a party in a New York appartment saying that her friend was being assaulted in a bedroom. Freddie Ayer investigated and, finding Mike Tyson forcing himself on the young Naomi Campbell, told him to stop. In A.J. Ayer, Ben Rogers reports the resulting conversation: "Do you know who the fuck I am? I'm the heavyweight champion of the world." Ayer stood his ground. "And I am the former Wykeham Professor of Logic. We are both pre-eminent in our field. I suggest that we talk about this like rational men." Ayer and Tyson began to talk. Naomi Campbell slipped out. FREDDIE AYER AND RICHARD WOLLHEIM VISIT THE SAME LADY. RICHARD WOLLHEIM DESCRIBES THE BALLET OF HIS REMOVAL. The voice on the telephone begged me to come round. There was a man there. He might, he might, be a bore. I left the lodge, walked out into the garden, stepped over the wall of the churchyard, and in two minutes was knocking at the door. The man there, who was perhaps not altogether pleased to see me, was, I quickly realized, no ordinary person. He was in his late thirties, not tall, with dark wavy hair, parted near the centre of his head, which from time to time he combed back -combed back rather than brushed back- with his fingers... But it was the movement, the constant movement, of head, hands, fingers, hair, -the playing with the watch-chain, one bit rubbed against another, the feet going backwards, forwards, shuffling, tapping, turning on his heel and sotto voce a stream of "Yes, yes, yes" -it was this incessant movement, this constant stream of excitement, that so impressed me. It convinced me that I was in the presence of someone quite remarkable, and it was also it that led to a curious misunderstanding. The ballet was in Oxford that week, and I was almost convinced that my hostess had introduced the man as "Freddie Ashton", the dancer, the choreographer, who had made something out of English ballet. Certainly I had, for a start, never seen anyone else in 4 Holywell quite so unoppressed by the heat. The stamina of all that training, I thought. I have no idea what the three of us found to say, but, about half an hour later, as the man was making to go, I followed him into the night air and down two steep steps on to the pavement, when suddenly with a daring balletic movement he leapt round me, jumped back into the house, and slammed the door behind him. I was confirmed in my misunderstanding. Richard Wollheim: Ayer: the Man, the Philosopher, the Teacher, in A. Phillips Griffiths (ed.): A.J. Ayer: Memorial Essays, Cambridge University Press, 1991.
70,316
Barbara Block is Professor of Marine Biology at Stanford University, USA. Over the course of the last decade, she has mapped the seasonal movements of predators in the Pacific and Atlantic Oceans. Her work has lifted the veil of opacity from the oceans: we now see migratory pathways, feeding and spawning grounds, and homecoming gatherings. Although marine animals seemingly have the freedom to go anywhere on earth, Barbara’s work highlights they are creatures of routine, following the same route to arrive at the same spot at the same time every year. Barbara won the Rolex Award for Enterprise in 2012 for using technology to monitor oceanic hotspots, and enabling the public to build a rapport with the animals of the deep. Since oceans are huge expanses, we think we can take as much as we want and there will always be more. In this interview she talks to Janaki Lenin about why we should conserve bluefin tuna and sharks, and the challenges of changing people’s opinions. JL: Why should we be concerned about tunas? BB: Giant tuna, such as bluefin tuna, have a commodity value where a single tuna can sell for tens of thousands of dollars. When wildlife has a high value, it is hard to stop commerce or trade in the species. This is the case for bluefin tuna which is the most sought after member of the tuna family. Bluefin tunas (three species) are in a high-class, luxury market. The rest of the tunas, which includes species such as skipjack and yellowfin tunas, primarily goes into cans. For these species, there is often a bycatch of non-target species such as turtles and sharks. Instead of the target species, the net actually captures top predators in the ecosystem. JL: You were part of the 10-year-long census of Marine Life program which sounds astounding in its ambition. Could you tell me more about it? BB: We tagged 4800 animals, about 75 scientists from many nations working together. We took on the Pacific Ocean, the largest ocean, and asked, “Could we learn how it works from the top predators?” We started with arrows on a map. Do the white sharks go this way? Do the blue whales go that way? Do the tunas go this way? We did a lot of testing of existing and new electronic tag technology. Together as a multinational coalition, we did almost the impossible. We got a glimpse for ten years of how the Pacific Ocean worked. What we discovered was there was a pulsatile movement of the animals according to seasons. Animals you thought would wander everywhere were basically going away and coming home, going away and coming home. The northeast Pacific, which is about the size of the Atlantic Ocean, from Hawaii to coastal California, basically had a repertoire of seasons that the fish and animals were following. None of us had known that. So we learned it was a finely-tuned periodicity much as you’d expect on the plains of Africa in which animals were going through large migrations on a seasonal scale. JL: You also did a Tag-a-Giant campaign. It’s amazing you managed to tag a thousand animals. How do you process data like that? BB: We’ve had a lot of experience handling tags, animals and the large data sets that are generated. In the case of Tag-a-Giant, that’s my favourite project. That’s the project I started with. I was a youngster when we first put computers into tunas in the North Atlantic. We decided early on to put tags internally into the tuna, and have a long stalk that sampled the environment come out of it. The idea was we let the tunas go with tags that said, “We’ll pay you a US $ 1000 if you return our recorder.” Sure enough, 24% of them came back in the Atlantic. We put out about 700 of those tags, but we also put out pop-up satellite tags which didn’t need a fisherman to intervene. And those we got back at 80% level. So together now, we have in the Atlantic, over 30,000 days in the life of tuna. Imagine if we did this to humans, we would find that we have places where we gather at restaurants, foraging stops. A Londoner and an American can be in the same place, say in New York. It’s the same with tuna. We found out where are the lunch stops are that many of the animals come to versus where are the lunch stops that are only one side might come to. We found the tunas were mixing across the ocean but separating back to their spawning grounds. JL: When people see the tuna at the Monterey Aquarium, what do you want them to think about the tuna fishing industry? What do you want them to take away from this experience? BB: I think we have to stop thinking that tuna are just food on our table. We wouldn’t go into Africa and eat the lions, zebras and elephants, in most cases. We are basically doing that in the ocean. We are not looking at wildlife in the ocean as anything but food, and we could leave to our children an ocean without these animals. We have to learn to live sustainably, and potentially raise herbivorous fish that are much more productive; not carnivores, but herbivores that could feed many people. JL: How would you protect something that is so valuable? Just looking at the price of tuna, one appears to be so much more expensive than a tiger. BB: I think it’s hard. Aquaculture to some extent is going to help save the day. Around the globe, there are many projects that are trying to raise tuna. Japan has taken a spectacular lead on the technology, Australia has got an on-land facility. There’s probably 10 facilities being built – one in Taiwan, a couple in Spain, Greece, Israel. It’s like producing gold, if you can do it. I believe there’ll be some breakthroughs there. I’m not saying I’m for farming tuna. If a portion of the market could be met through that type of activity, and done sustainably with good science and sustainable feeds, then it would take the pressure off the wild stocks. I think if the wild stocks are managed correctly, the tuna can be fished sustainably. But it’s a cocaine-of-the-sea type of problem where many people want it and no one’s paying attention to the rules. Pirated tuna is a really big problem. I dream of a new technology. What if we could barcode every tuna that’s landed and keep track of them. What if we could barcode every live elephant, or every live bluefin tuna left on earth so you really could keep track of them. So my dream is really to make a tag, a carcass tag that allows us to keep track of fishery in a more accurate manner from point of landing to market, so we don’t have any pirating. JL: At the 2010 CITES meeting, there was a call for banning bluefin tuna fishing. Some were calling it a point of no return if the voting failed. The voting did fail. Where are we today? BB: In the Atlantic, there is a complex population structure of the Atlantic bluefin tuna that is emerging with genetics. Our lab and many others are doing this work. What’s coming out from this work is that the population near America is much more threatened than the population on the eastern side of the basin, the Mediterranean population. The tagging and genetics show that because the European tuna come over to our waters, they help protect our tuna. If our US or Canadian fishermen catch one of their fish, they don’t kill one of our fish. So we have this complex set of dynamics going on that are critical to capture in the models being used to manage the fishery. The European fish are thought to reproduce quicker, faster, potentially they have a larger and stronger population. Whereas our population that breed off US shores in the Gulf of Mexico of North America is the weak population: the animals take longer to mature, and reach larger body size at maturity. These bluefins are the giants of the ocean, the largest tuna in the sea. Our North American population is extremely low and the eastern Mediterranean population is larger, potentially rebounding quicker (due to lower age to mature), but we’re still not sure. Some say they are coming back after a short letup in fisheries take. The models being run by ICCAT [International Commission for the Conservation of Atlantic Tunas] don’t really reflect the true biology of these populations. Until they do, I would be cautionary. They don’t have enough robust analysis of the mixing of populations, which population is which that you are modeling, and until we get there, it would be premature to say the tunas have recovered. Furthermore, your question refers to the western bluefin population that’s spawning in the Gulf of Mexico. That is what should be discussed in those contexts, but unfortunately people say ‘bluefin tuna’ which is a whole species that doesn’t require an endangered species status. It’s a very complex problem. It raises the big question: in the ocean, what is an endangered marine species? When are there not enough parents to make the next generation? That’s a tough question. That’s the limit of our knowledge right now. What happens when you get down to the last few giant bluefin tuna? In our case, there could be larval cascades going on. In the old days, there may have been tens of thousands of bluefins spawning at once who made lots of bluefin babies and their burst of reproduction meant they were the dominant tuna. Now, a lot of the times they get many more of the smaller tuna eggs, the blackfin, and at the same time they get bluefin. There’s a potential that they are eating the bluefin at this point. JL: Does the fishing community see what you are doing as helping the long-term survival of their industry, or do they see you as an adversary? BB: I think we’ve come a long way with our fishermen especially in America. They respect us for the high content of the information we have put on the table. We are advocates for the fish, but we are also not going after closing fisheries. We think of sustainable fisheries. I’d like to see us protect, for example, the spawning areas immediately. It’s a case where longlines get set for a different tuna species called the yellowfin tuna, and the bycatch is bluefin that is protected by law. Currently, we wouldn’t outright close the boundaries and say, “Don’t fish here.” So we try to look for solutions that are practical for the people we are working with, and I think that builds respect rather than adversity between the two groups. JL: Both the main species—sharks and tuna—are going to East Asian consumers. Shark fins go to China and tuna goes to Japan. So shouldn’t we be working with those economies? BB: Sushi has become a fad around the world that it’s really amazing. In our grocery stores in America, we didn’t have tuna when I grew up. But now there’s tuna as a healthy snack. Same thing around almost all cultures. Eating raw fish has been passed from Japan to everyone. So there’s a global tuna pressure. Then canned tuna is very popular in America. I think to solve the problem we need to begin to think about what is it we want with our oceans. Do we want an ocean devoid of tunas? Or do we want an ocean that is managed correctly? So we can probably have healthy fisheries if we just had healthy management. That’s all we are saying. What we see as marine conservationists is the need for building protected areas in the sea. And there are some places like the California coast that might be a National Park, like Yellowstone, in North America. Places deemed unique in our oceans, rich in biodiversity should obtain World Heritage Site designations. The Great Barrier Reef is one such place but we need more. When I first moved to California 20 years ago, I had no idea when I looked out my office window, what a special place it is. And now after all this tagging, we’ve learned, “My God, we might be living in a hotspot in the sea.” We had animals coming from Indonesia, we had animals coming from Japan, we had animals coming from New Zealand. Many marine predators come to Monterey for a part of the year, and it’s exciting to see that this is the most spectacular place and nobody knows it’s there. And that’s my challenge. How do you make the seas transparent? JL: What do you think should be the strategy at the coming Bangkok meeting? Even if it’s sustainability that you are talking, not outright banning. How do you set quotas? It’s all a question of bargaining and Japan is going to veto anything. BB: Yeah, I know it’s really tough. What’s happened is that the green groups have gotten better at understanding the game and how it’s played. Japan is an economic force that is trying to get votes to help sustain its way of life. It’s a country that requires lots of tuna. I take hope in the fact that everyone is trying to solve the tuna aquaculture problem. And even I get bitten by that bug. We’ve raised tunas for 20 years and I can’t think of anything more fun than trying to raise, in our case, bluefin or yellowfin. Bluefin is very difficult to do. But Japan’s solved it and so has Australia; Spain’s trying to solve it. And I do think there’ll be a day not too long from now, 20 years from now, when a lot of the meat will be coming from these facilities. JL: Would such an operation be economically feasible? BB: I think it’s economically feasible and I think just like salmon, which 25 years ago was wild caught, is almost entirely produced through aquaculture. The challenge will be: Can we do aquaculture scientifically correctly? Which means that you’ve got to develop the feeds; you’ve got to make the feed out of something that is not competing with human protein. It’s very difficult and I recognise that. We dream of fish that eat soy grown on our farms in the plains, and then are potentially genetically selected like plants. Or, the other idea is raising fish on algae with the right essential oils. You feed little cubes like brownies to your tunas. At Monterey, we feed a snack to tunas that’s just like a green brownie, and it’s just seaweed with the right vitamins in it. JL: What about sharks? We’ve talked a lot about tuna. BB: The problem with sharks is that they reproduce in a manner very similar to us. They use internal fertilization and have a small number of pups per year, a reproductive style that has allowed them to be successful in the oceans for millions of years. We always hear about shark-finning, but people are eating the meat of some sharks, not all sharks. Humans are taking sharks at a level that really defies imagination. It just makes me wonder how could there be all these sharks in the ocean. The level of landing of sharks is stripping shark populations globally. They cannot handle the kind of fishing that was set up originally for tunas and other bony fishes. As tuna populations become smaller, the longlines and other gear target sharks by mistake. That was initially problematic for the fishermen, but now they are directed towards the sharks. Out there in the open ocean where people fished, initially sharks weren’t brought in, but now they are brought in. They are brought in for their fins, they are brought in for certain parts of their meat, and that is happening everywhere you go in the ocean. It’s really tragic because sharks cannot keep up with that pace. So there are places we go where we don’t even see sharks anymore. What’s interesting about that is we don’t understand what a shark does in a healthy ecosystem. We know they are important. We know that ocean ecosystems that are normal require top predators to maintain resilience and balance. When we remove them, we may ultimately be flipping the ecosystem to some new equilibrium that we don’t even understand. It’s happening everywhere where sharks are being removed; we are getting a new set of ecosystems. In some cases that might mean you have herbivores on the reef overnight, more algae growing because certain animals aren’t there anymore, or the sharks were removing part of the ecosystem that you didn’t realise what role it was playing. So we are doing these experiments everywhere and nobody really knows what the consequences are. I’m happy to say that off the California coast may be one of the places where sharks are running wild in a big way. Same in parts of Australia. It’s a question of what makes it healthy versus what do you gain from a healthy ecosystem? Do you gain happiness because you have have wildness? Or do you gain something in value that’s worth more? So we are actually looking for support right now to understand what does it mean to have an intact ecosystem. In general, it means more linkages, more stability, more resilience, but that’s hard to translate. JL: The trouble with making people feel a personal connection with any marine creature is the lack of a personality. BB: That’s what Shark Net is about. The Rolex award is about using new tools to bring a more personal connection to stories. I really don’t know if youngsters in India, Japan, or China would have the same interest as American youngsters. They love sharks. Here, there may be a culture that fears sharks, I don’t know. So how do you overcome the —what is a shark? JL: Do sharks have personalities? BB: An hour from where I live in San Francisco are the biggest predators, 5000 lb. white sharks, in the sea. I don’t dive very much anymore in my area; I have a healthy fear, but my students all surf. I think it’s great that I can go out and study the sharks in the fall, get them close to the boat, and work with them. None of them are real personalities to me; I see them as white sharks. But my students who study them quite regularly, they’ve got their favourites out there. There are sharks that’ll only approach the decoy one way. There’re sharks that come right up. One shark called Engine comes right up to the boat and always likes to tap the engine. He keeps us on our toes. Janaki Lenin is a freelance writer with a special interest in wildlife and conservation issues. email@example.com. Illustration: Pencil Sauce Photographs: TAG a Giant, Monterey Bay Aquarium/ Randy Wilder, Rolex Awards/Bart Michiels
151,094
CAPPS-L ArchivesArchiver > CAPPS > 1998-11 > 0911874903 From: Jim and Terri Tait <> Subject: CAPPS Book Date: Mon, 23 Nov 1998 20:35:03 -0600 Here is a review of the book "BRUNSON, CAPPS, TISDALE & JOHNSON: Families of Crenshaw County, Alabama" - by Thomas Heflin Compton (1996) Mr. Compton unfortunately does not have any copies of the book left available. Source of review: Pea River Trails, Vol 21, Spring 1996, Number 1, page 25. Pea River Trails is a publication of the Coffee Co, AL Genealogical and Historical Society THE CAPPS FAMILY There are many people in this area who are related to the Capps Family. In Enterprise there are several branches, not known to be closely related. The material in this article comes from some data of Thomas H. Compton, 10380 East Pike Drive, Inverness, FL-32650. This material is pertaining to the Brunson, Capps, Tisdale, and Johnson families of Crenshaw, AL: "While conducting research and compiling data necessary for an extensive Capps family record, I realized that the first and second generation children of the above pioneer families moved into the Luverne/Brantley area between 1820 and 1850. They had intermarried to the point where a record of any one of the four families would, of necessity, include a substantial number of the other three families. For that reason we decided to prepare a consolidated record of the four families and present it in a single volume. The result was a book containing a grand total of 470 pages. The book contains several pictures of long departed ancestors, plus several school and family group pictures. There is also an alphabetical name index with more than 1700 sur/maiden names and over 1,100 given names. The CAPPS family record will be of primary interest to the descendants of Alexander, Robert Humphrey, Richard M., John R., Lenora, and Harriett CAPPS. They were the children of Samuel CAPPS and Sarah WISE. The patriarch of this CAPPS line was one John CAPPS who lived on the headwaters of the Black River, in Camden District, S.C., in the mid 1700s. He was a Revolutionary War Veteran and was granted 200 acres of land in Camden District in 1704. He had sons named Samuel, Matthew, Adam, and James W. CAPPS. Samuel CAPPS married Sarah Wise and lived out his life in the Camden/Sumter District, S.C. Best information available indicates that all of these children moved to the Luverne area. William and John R. migrated on to Texas. Samuel J. moved first to Louisiana, and then to Arkansas. The other children remained in the Luverne area. Lenora married Daniel R. BRUNSON, and Harriett married Francis CORNETT." |CAPPS Book by Jim and Terri Tait <>|
162,962
The telephone booth has a long and rich history and is a significant metaphor for telling stories. The first phone booths were built on land owned by the phone company , so that patrons could easily locate them and use them while running on errands. This was made possible through the invention of cell phones. And shortly thereafter, phone companies began closing their payphone facilities. This has meant that there are fewer phone lines around the globe. The function of the payphone is transforming dramatically. Over the years, the concept of a public phone has changed. The nation’s first outdoor Internet access pay phone was installed in New York City last year. This year, Chinese manufacturers introduced a coin-operated cell-phone charger and 150 units of the same technology are now being installed in convenience stores and hotels across the U.S. Although the market for the traditional phone booth may have dried up it is possible that the device will make returned, but this time as an alternative to a private space. Learn more about Dallas Photo Booth Company now. The phone booth is a powerful method of advertising and its popularity is growing. There are a variety of ways to reach consumers. One of the most efficient is to advertise on TV or radio however the proliferation of media outlets makes it difficult for advertisers to reach the people you want to reach. Making use of the telephone booth as a method of advertising would give advertisers an opportunity to connect with their intended audience. It’s similar to the isolation booths used in quiz shows. Although the modern phone is evolving, it’s still extremely popular. The first outdoor Internet-access payphone was installed in New York City last year, and in China this year, a mobile phone with a coin-operated charger was introduced. The phones will also be sold in around 150 convenience stores and hotels across the U.S. This means that the traditional business model of the pay-phone has changed. The phone booth is likely to be back, but in a more private setting. Despite the fact that the majority of Canadians have an mobile phone, the popularity of pay phones has decreased. Public pay phones were popular in the mid to late 1990s. However, the market has declined since then. The first major company to leave the market in 2007 was AT&T, and Verizon followed with AT&T in 2011. The number of Americans who have personal cell phones has grown dramatically in the United States and is continuing to rise. The telephone booth is not without its problems. Some countries have completely banned it and others have banned it. In the U.S., the number of telephones in public spaces has increased. In the United Kingdom, the telephones are no longer placed in public areas and are instead placed in private buildings. This means that people can only use a phone booth in the office, not at home. There are many reasons why a phone booth could be out of favor, and some people might even opt to take them down. The phone booths are typically vandalized. In Northern Ireland, some are vandalized. It is typical for people to write explicit messages on the windows of the payphones. Others invite hooligans to throw rocks on the windows. Some people also make use of the booth as a public restroom and drunk pedestrians make use of it as a garbage can. Canada has seen an increase in the cost of paying for a phone, in part to ensure that businesses can continue to make money. In recent years, the concept of a payphone has changed drastically. In New York, an example of this was the 2002 installation of a different type of phone booth. These kiosks were useful for customers and also a source for revenue for the phone company. In addition they were also a source of revenue for the government. These types of public telephone booths were useful for businessmen. A phone booth is a great option if you are looking to connect with the outside world. In the beginning of the internet, the telephone booth was a typical feature in public areas. It was a wonderful way to connect with people around the world. The service provided by these phones is free of charge and it’s not required to pay to use the phone booth. The number of payphones available has increased dramatically in the years since the introduction of the Internet connected payphone in New York. These payphones are now the mainstay of urban infrastructure in certain countries.
83,186
Adeelah is a 44-year-old housewife who has two daughters and one son. Living in the same area for more than 10 years and also her sociable personality have given her the push to start a home business selling olive oil tanks and home-made pickles. Now that the neighbors and their friends buy from her and even order a specific type of pickles, her business has been growing more and more. Now Adeelah has applied for this loan to increase her working capital so she can start dealing with the olive pressers and factories to get more fresh olive oil at a lower price. About National Microfinance Bank Jordan is a small country located in the heart of the Middle East’s Levant region. Regional instability has caused Jordan to be excluded from global investments for decades. Additionally, a lack of natural resources—including water and energy—places tremendous strain on the Jordanian economy, over 80% of which consists of small businesses, largely in the service industry. Despite their importance in the economy, many of these businesses are excluded from the banking sector because of their size. Microfinance institutions like National Microfinance Bank offer them an opportunity to enhance and expand their businesses. NMB also offers its services to other underprivileged peoples in Jordan, providing them with loans to pursue educational goals and improve their homes and livelihoods.
132,632
SOURCE: BBC News (5-27-11) The US Congress has voted to renew three expiring provisions of the anti-terrorism Patriot Act which increase surveillance powers. The four-year extension was approved in the Senate just hours before the deadline at midnight (0400 GMT). The bill was then sent to the House of Representatives, where it passed by a 250-153 vote. The Patriot Act was brought in under President George W Bush in 2001 after the 9/11 attacks. US President Barack Obama is now due to ratify the bill, officials said. With Mr Obama currently in France for a G8 summit, a spokesperson said the president would use an autopen machine that holds a pen and signs his actual signature....
110,091
a1 University of New England, Armidale, N.S.W. The ancient tradition is strong that the execution of M. Marius Gratidianus during the Sullan proscriptions was carried out by L. Sergius Catilina. The earliest evidence comes from several passages in Cicero's speech in toga candida, delivered just before the consular elections in 64 and designed to rake up as much prejudice as possible against his two main rival candidates, Catilina and C. Antonius (Hybrida). While in none of the passages does Cicero specifically mention the executioner or the victim, it is Asconius commenting on the passages (which are preserved for us as lemmata in his commentary on the speech) who reveals that Catilina was the executioner and Marius Gratidianus the victim. We do not have a great deal of the speech in toga candida left (and we are indebted to Asconius for what we do have of it); if we did have the whole speech, it is clear that we would have been given the name by Cicero himself. The Ciceronian version (if that term may be used for convenience) is that the head of Gratidianus was cut off by Catilina, carried in his hands through the city from the Janiculum to the temple of Apollo, and delivered to Sulla still full of life and breath. This version is followed by Plutarch (Sull. 32.2). A variation can be found, as early as Sallust (and so for convenience it may be called the Sallustian version — not that the two versions are necessarily to be regarded as mutually exclusive). There is a fragment of the historiae which says that Gratidianus died after his arms and legs had been broken and his eyes gouged out, so that he expired as it were through each and every limb. There is nothing about his head being cut off and carried about, nor is there any mention of Catilina as the executioner. While the details of the torture and mutilation become progressively more gory, this version is followed by Livy (per. 88), Valerius Maximus (9.2.1), Lucan (2.173–93), and Florus (2.9.26 = 3.21.26).
141,398
The mailbox your kids may be most familiar with is a digital inbox, but Nickelodeon and the United States Postal Service are doing their part to change that. SpongeBob MailPants, an educational letter-writing initiative, launched today in more than 25,000 USPS Post Office locations across the country. With the goal of showing younger generations how much fun it is to write, send, and receive mail the old-fashioned way, the USPS and Nickelodeon have stocked participating Post Offices with special postage-paid, customized SpongeBob postcards in hopes that kids will start writing to loved ones more frequently. In 30 cities, mailboxes are being wrapped with a special SpongeBob design to make mailing extra easy (and fun!). "The program is a great way to inspire kids to write and send cards and letters, because it's done with the fun, positivity, and humor of the one and only SpongeBob SquarePants," said Nickelodeon's Pam Kaufman. For more information about the program, a list of participating locations, plus more activities to enrich your kids' letter-writing experience, check out the SpongeBob MailPants site.
72,715
Get detailed meaning of Uddar in English language.This page shows उद्दार meaning in English along with definition,translation and usage.This page provides translation and definition of Uddar in English language along with grammar, synonyms and antonyms. Answer of question :what is meaning of Uddar in English dictionary? उद्दार (Uddar) ka matalab Angrezi me janiye ( उद्दार का अंग्रेजी में मतलब ) Tags: English meaning of उद्दार , उद्दार meaning in english, उद्दार translation and definition in English meaning of Uddar , Uddar meaning in english, Uddar translation and definition in English language.
211,957
In order to store energy from renewable sources, suitable and efficient energy carriers and storage units are needed. This applies both to mobile use and large storage power plants. Currently, (lithium) batteries and hydrogen are used as novel energy storage devices. However, they have not only to be economical and efficient, they must also be safe to be accepted by the consumers. Ensuring the safety of energy storage systems is a core task of BAM. The high energy density of lithium batteries and rechargeable batteries makes them interesting as power storage devices. However, lithium’s high reactivity poses a threat. Defective or damaged batteries can ignite and are difficult to extinguish. BAM has the statutory task of determining the conditions under which defective lithium batteries may be safely transported. Transporting large, unpackaged prototypes must also be approved by BAM. BAM conducts its own investigations into the safety assessment of lithium batteries and contributes its expertise to international regulatory development at the United Nations (UN). Storage of gases as energy source Hydrogen (H2) is becoming increasingly important as an energy carrier because it can be generated by using electricity and water and can be re-transformed into electricity. A closed H2-cycle is pollutant-free and therefore of ecological significance. The storage of H2 is an ideal complement to battery storage, especially for the storage of large amount of energy, for example: in case of excessive electricity from renewable sources. The surpluses can be captured in the form of hydrogen and re-supplied when and where it is needed. However, hydrogen gas storage also requires new methods for testing and safety assessment. BAM has the appropriate testing equipment and experience. BAM develops assessment procedures for ensuring safety in hydrogen technology. In addition, BAM is researching methods that can be used to optimise storage units. It also improves their lifetime prediction as well as other topics such as feeding H2 into natural gas pipelines.
36,877
Australians spend less with retailers Market watch top headlines Retailers are continuing to struggle as Australian consumers funnel their money online and towards new cars, overseas holidays and restaurants. Australian retail spending slumped 0.1 per cent in November, according to figures released by the Australian Bureau of Statistics on Wednesday. The fall in spending disappointed retailers who were hoping for a strong Christmas sales period. "November should be a good month for the retail sector, towards the end of the month at least people start to focus on what will be in Santa's sack," Australian National Retailers Association CEO Margy Osmond said. "This didn't happen in 2012 and the result will send a chill through retailers' spines as they look to 2013." Ms Osmond said it appeared consumers were increasingly doing their Christmas shopping online, with overseas-based retailers receiving most of the benefits. "We know that Australians look for bargains overseas at peak buying times and it appears they have fully embraced overseas options early to ensure gifts arrive on time." Commonwealth Bank chief economist Michael Blythe said Australians were still spending money, but less of it was going towards retailers. "It appears consumers are being very selective where they spend and what they spend their money on," he said. "We know they (consumers) are quite happy to get out there and buy new cars at record rates at the moment, and of course we have record numbers heading overseas and no doubt doing a bit of their retail spending there." Household goods retailers suffered the biggest fall in sales in November, with spending down 0.9 per cent, which came on top of a 1.5 per cent fall in October. Clothing stores (down 0.6 per cent) and department stores (down 0.4 per cent) also struggled in November while spending in the normally resilient food retailing section was flat in the month. The only bright spots were a 0.3 per cent rise in spending in the cafes, restaurants and takeaway food sector and a 1.0 per cent rise in the sector marked "other" by the ABS, which includes businesses like newsagents, florists and chemists. Among the states and territories, conditions were best in Victoria (up 0.3 per cent) and the ACT (up 1.0 per cent), while retailers in the Northern Territory (down 0.9 per cent) and South Australia (down 0.6 per cent) fared worst. St George senior economist Jo Heffernan said the figures were surprisingly weak, given the series of interest rate cuts over the past year. The Reserve Bank of Australia has cut the cash rate, now at 3.0 per cent, by 1.75 percentage points since November 2011, although the most recent move, a 0.25 percentage point cut in December, came after the period covered by the retail figures. Ms Heffernan said more rate cuts may be needed before the retail sector picks up. "The rate cut delivered in December should go some way to easing consumer caution, however, it is likely that another rate cut will be necessary in coming months to assist with sectors, such as retail, which remain soft," she said.
95,081
MVX10 MACROVIEW OVERVIEW - High fluorescence efficiency plus stereo observation. - Seamless observation from 4x to 125x. - Zoom factor up to 31 times. - Long working distance for observation at optimum magnification. - Maximum specimen protection due to short exposure time. - Complete system solutions for optimized recordings. The MVX10 Optical concept The MVX is a mono zoom microscope designed specifically for fluorescence imaging. Featuring a large diameter single zoom optical path, the MVX is optimized to collect light with unprecedented efficiency and resolution at all its magnifications. The MVX gives the user maximum flexibility in observing the specimen without switching objectives. A series of parfocal objectives is also available along with a dual nosepiece. This allows the user to utilize the full zoom range of two objectives by easily rotating one or the other into the light path. Using the 0.63x and 2x objectives and 10x eyepieces on the MVX10 gives an effective zoom range of 4x to 126x, or a 31:1 ratio that takes your field of view from 55mm to 1.74mm. The Tilting Trinocular Observation Tube Allows the eyepiece to be inclined from 0º to 23º for maximum user comfort and offers a two position optical path selector for either 100% to the binocular tubes or 100% to the camera. This is a specially designed observation tube with a unique pupil separation optical path that can deliver a stereo-like image to the eyepieces. The stereo effect can be selected “on” or “off” via a slider mechanism. 0.63x MVX Plan Apochromat Lens has a high numerical aperture of 0.15. 1x MVX Plan Apochromat Lens has a high numerical aperture of 0.25. 2x MVX Plan Apochromat Lens - A unique and specially designed high-numerical aperture lens of 0.50 NA that features a correction-collar for correcting aberrations when imaging through plastic vessels or up to 5mm of water. This 2x PF (part of the parfocal series) objective provides superior resolution of over 1500 lines/mm. - Transmitted Light There are three transmitted light bases: basic, advanced and darkfield versions. The advanced model has an adjustable mirror that can be tilted and translated across the field of view, giving contrast-enhancing oblique illumination. The darkfield version has an exceptionally large illuminated field that allows for high and low magnification darkfield observation. All transmitted light bases can be illuminated by a 6V/30W bulb or an optional 150W fiber optic illuminator. All optical components in combination with the light path design contribute to the optimal fluorescence performance of the MVX10. The single-zoom optical path with a large diameter is optimized to collect light with unprecedented efficiency. Using the latest technologies and new materials, the MVX10 objectives produce minimal autofluorescence. This together with very high numerical apertures results in an extremely good signal- to- noise (S/N) ratio, ensuring excellent contrast for observation of even the faintest fluorescence signals. The MVX Fluorescence Illuminator has a four position turret for brightfield and fluorescence filter sets. Fluorescence excitation is accomplished via dichromatic mirrors in the optical axes of the microscope. The microscope objective acts as both the illuminating and imaging lens. A new coating technique gives the Olympus HQ filters an exceptional edge steepness and very low autofluorescence. All the filter cubes are equipped to absorb stray light. Light collection efficiency is also maximizsed with an aspherical fluorescence collector, which bundles the light for minimum intensity loss. The images below were taken with the MVX10 using a 2x MVXPLAPO objective and a DP70 digital camera. The sample is a mouse cerebellum Purkinje cell injected with Lucifer Yellow.
253,627
Below you will find a chronological list of research projects in the Studies Program. You can search by issue or region by selecting the appropriate category. In addition to this sorting control, you can search for specific subjects within the alphabetical, regional, and issue categories by choosing from the selections in the drop-down menu below. Each project page contains the name of the project director, a description of the project, a list of meetings it has held, and any related publications, transcripts, or videos. In this book, the author analyzes how the U.S. ought to manage immigration, taking into account politics, sociology, economics, and international relations. He calls for a benign attitude toward illegal immigration, a policy stance he supports even in the wake of September 11. Expected publication date: Spring 2006 The China and the Economy Roundtable Series is an ongoing series that will bring together a select group of economists, business leaders, and China experts to discuss what we know, don't know, and need to know about China's economy. Each session will focus on a different area of economic concern for China's leadership, such as the development of the service sector, the Chinese banking system, angel financing and venture capital, trends in the state-owned enterprise sector, and urbanization. This series is made possible through generous support from the Starr Foundation. From the Atlantic to the Gulf of Oman, the Middle East is witnessing unprecedented change and transformation. At this pivotal time of popular uprisings, revolutions, and ongoing efforts toward Israeli-Palestinian peacemaking, this roundtable series seeks to generate a deeper, richer understanding of the vast array of issues currently shaping the region. To this end, the series brings together policymakers, opinion leaders, and government officials with the most intimate knowledge of the Middle East to enrich the dialogue both on developments in the region and U.S. policy. The UN Roundtable meeting series seeks to organize high-level discussions with senior UN officials, including officials from member states and regional organizations, on timely issues related to conflict prevention, peacekeeping, and international security. A core group of selected invitees from member state governments, the private sector, and nongovernmental communities will participate in these discussions. The goal of these not-for-attribution meetings is to raise awareness of the role of the UN in addressing critical issues of peace and security. The UN Roundtable meeting series is cosponsored by the Center for Preventive Action and the Program on International Institutions and Global Governance, and made possible by the generous support of the Robina Foundation. This meeting series seeks to organize focused discussions on plausible short- to medium-term contingencies that could seriously threaten U.S. interests. Contingency meeting topics will range from specific states or regions of concern to more thematic issues and will draw on the expertise of government and nongovernment experts. The goal of the meeting series is not only to raise awareness of U.S. government officials and the expert community to potential crises but also to generate practical policy options to lessen the likelihood of the contingency and to reduce the negative consequences should it occur. A summary memo of the resulting recommendations will be distributed to participants and important policymakers and published on CFR.org. This series is made possible by the generous support of the Rockefeller Brothers Fund. The meeting series focuses attention on situations that are increasingly discernible as "flashpoints" for violent conflict. At each not-for-attribution meeting, experts from government, private sector, and nongovernmental communities present different perspectives on and address discrete elements of the problem. The goal of the "Flashpoints" series is to raise public awareness of potentially explosive places and to offer practical recommendations for preventive action in the discussed state or region. This series is made possible by the generous support of Carnegie Corporation of New York. For more information on the David Rockefeller Studies Program, contact: December 15 Application Deadline: Stanton Nuclear Security Fellowship January 16 Application Deadline: IAF in Nuclear Security March 1 Application Deadline: Edward R. Murrow Press Fellowship For application instructions and more information, visit www.cfr.org/fellowships.
152,360
June 19, 2014WAKEFIELD — Lake association members attending the June 11 Wakefield selectmen's meeting were in for a surprise when it turned out that the total of requests for milfoil control exceeded the funds available in the town's Invasive Species Capital Reserve. With seven lakes within its borders, Wakefield has not only been conscious of the threat of invasive species like variable milfoil, it has helped fund efforts to prevent and control the milfoil threat since 2003, when the capital reserve was first set up. Five of the lakes currently do not have milfoil and the main effort to prevent infestation is through the Lake Host program, which is managed by the Acton Wakefield Watershed Alliance (AWWA). Lake host inspectors examine boats at boat launches for traces of milfoil and remove them when found. Two of the lakes, Belleau and Balch, do have milfoil. Lake associations raise money to fight or prevent milfoil through dues and fundraisers and also apply for grants from the two states involved (New Hampshire for all seven lakes and Maine for Balch and Great East lakes). However, it is the towns that border the lakes that make the critical difference by providing funds of their own and the Wakefield Invasive Species Capital Reserve is a major source. At the June 11 meeting, $13,500 was requested for the Lake Host program, $5,000 was requested by the Balch Lake Improvement Committee, and $22,500 was requested by the Belleau Lake Property Owners Association. The total amount requested was $41,000. Unfortunately there is only $31,000 available in the capital reserve. The $31,000 balance has been maintained for a few years now, Town Administrator Teresa Williams explained. The difference this year is that the Belleau Lake request is higher than normal. Lorraine Rosenthal, head of the milfoil committee for the Belleau Lake association, said that almost three tons of milfoil was harvested in 2013, but it all came back. The state Department of Environmental Services, when it surveyed the lake this spring, cited more light during the winter of 2012-13 and a hot summer last year as the main reasons why the milfoil is coming back so strongly this year. This year the state recommended treating 50.4 acres now and 50.4 acres in the fall – a total of 100.8 acres vs. the 26 acres treated in 2013. The cost of the proposed treatments is $56,000. Rosenthal said the basic problem is that the lake is shallow, particularly in the top and bottom parts where the milfoil is worst. The association does not have the $56,000 and it does not qualify for state funding because it is a man-made basin without public access. Last year selectmen approved $28,300 in requests for funds, and that included $11,300 for Belleau Lake, $5,000 for Balch Lake and $12,000 for the Lake Host Program. While the Balch request was the same, the Belleau and Lake Host requests for 2014 were higher. Selectmen Charlie Edwards pointed out the $10,000 shortfall between the requests and available funds and asked audience members for suggestions on how to allocate the $31,000 available. After some discussion, Linda Schier, director of AWWA, reduced the Lake Host request to last year's $12,000, freeing up $1,500 for Belleau Lake, and Selectman Connie Twombley proposed to reduce the Balch portion to $2,500. There was no one left in the room to speak to that adjustment since Don Pierce, who had submitted the Balch request, had left the meeting. The adjustments raised the amount for Belleau Lake treatment to $16,500 – short of the $22,500 requested, but hopefully enough to get both treatments done with supplemental fundraising. Williams pointed out that the budget process begins in the fall, so if additional monies will be needed, that is the time to make the board aware. Schier volunteered to come to selectmen in October with a report on the outlook for 2015 funding needs.
98,818
In this article, I will focus on the improved twisting utilizing the unfolding folded faces (UFF) algorithm discussed in the last BRC post. The new twisting limits for both the Onera M6 wing and the F-18C vertical tail will be shown. See “Bob’s Research Corner: Grid Def – Twist” for the previous twist limits. Without the UFF algorithm, the maximum tip twist I could reach on the Onera M6 wing was 10.5 degrees. With the algorithm active, I can twist the wing tip 28 degrees before folding faces that can’t be unfolded. The image to the left shows the original grid (red), previous maximum twist (blue) and new maximum twist (green). That is almost a tripling of the previous maximum wing tip twist. The animation below shows the twisting of the wing over 25 time-steps. A comparison of the original (red) and deformed grid (green) at several zoom levels is presented in the slide-show below the animation. For the F-18C vertical tail, the maximum tip twist without the UFF algorithm was only 1.15 degrees. Now I can twist the tail 40 degrees at the tip. I’d say that is much more than any real world simulation would require!! The image immediately below shows the original grid (red), original deformation (blue) and new maximum deflection (green). An animation of the vertical tail twisting over 25 time-steps is show below the imagse followed by a slide-show comparing the grids (original in red; deformed in green).
295,806
(New York 27 July 2006) - The UN Global Compact together with International Business Leaders Forum and local partner Fundación Ideas para la Paz, this week brought together senior leaders from business, government and civil society in Bogota to discuss the role that business can play in addressing the causes and consequences of armed conflict in Colombia. The meeting coincided with the publication of the report Development, Peace and Human Rights in Colombia: A Business Agenda , which describes practical ways in which international and local business, civil society, unions, the Church, the UN system, bi-lateral agencies and the public sector in Colombia can collaborate to address vulnerable populations such as the internally displaced, and support the re-integration of ex-combatants into Colombian society. The report is primarily written for leaders and managers who run companies operating in Colombia. The meeting produced a key outcome: based on the UN Global Compact's principles on human rights, a commitment was made by a number of companies to work together to explore the feasibility of a code of conduct that would help companies maintain the safety of their operations whilst ensuring that human rights are respected. Such a code would draw on the experience of the the Voluntary Principles on Security and Human Rights. For further information, please contact Jonas Moberg at the UN Global Compact Office (firstname.lastname@example.org) or Luis Ernesto Salinas, the Global Compact Focal Point in Bogota (email@example.com).
205,209
You are unable to deny that the garments say a lot of issues relating to people. People today judge you if it’s old or new, they’ve been not, and lots other things tell which you are a scholar or even a professional. Whether you are a professional or perhaps a college student, the main thing they all carry together is that a purse. You want to look closely at a luggage exactly the like your own hair, clothing, and other matters as it is, in addition, the real estate which describes you. In The following article, you may know more about the vegan leather backpack and also the mad horse leather backpack readily available on the market. Please read the post to gain some facts about the totes and use them to obtain the bags. Vegan Leather bags All these Bags are produced from poly vinyl chloride (PVC) or plastic, plus they’re getting so much popularity since they are a superior alternate to leather bags. In an identical time, the slaughter of a creature for making leather totes may automatically acquire more than. It’s possible for you to apply these totes in the event that you are concerned about animals. Crazy Horse leather purses In This tote, a special wax is employed to the own surface after its buffing and smoothing to strengthen the leather fibers. The tote’s weight is currently around 1.5 kg, and its particular holding capacity is 20 to 25 liters. The tote has that much space you can easily hold A14″ Notebook. Servicing of vintage Leather luggage An Individual Ought to wipe out the bag With wet material. It is advised to hold the tote for drying. The use of the blower or Heat surface has to be averted. It might cause the leather to harden or twist. You Only need to buy those bags you may manage, but that does not signify you start buying fake bags that are cheap in value. Also, don’t really feel awful about yourself if you cannot need superior high quality bags, also consistently embrace your self.
81,941
Stress gets to even the best of us on at least an occasional basis. Maybe you experience stress on a situational basis, whenever a conflict at work or home arises, or you’re nervous about a big presentation coming up. Maybe stress and anxiety are present in your life on a much more common basis, and you find yourself tensing your muscles or quelling a panic attack somewhat often. The simple fact to keep in mind is no one is completely safe from stress. However, this doesn’t mean we should all allow ourselves to be helpless victims of it. There are habits and techniques we can all learn about and have at our disposal in order to better cope with the stressful situations that life can bring to us unexpectedly. Check Your Overall Well-Being Often The body and the mind operate together as one smooth machine. If one aspect of the body is having trouble functioning for any reason, it will more than likely have a ripple effect that will continue to impact other functions of the body as well. By choosing to eat healthy, balanced meals, as well as exercise on a regular basis, you can greatly increase your chances of bringing your body in sync so it can be healthier overall. One more great way to keep your total health and wellness in check is to start seeing a chiropractor at The Joint clinics. The Joint has a solid reputation for providing affordable and safe chiropractic care in a way that’s designed to improve many aspects of your health. When chiropractic is viewed as a holistic healthcare program, not just meant to treat back pain, it becomes easy to see why it can be so beneficial for improving total well-being. In fact, chiropractic has also been known to reduce levels of cortisol, the stress hormone, in the body, making it super effective for fighting off stress. Try Meditation or Music As silly as it may sound to hear people continually recommend mediation for stress relief, it really does work. The deep breathing and mindfulness exercises learned during meditation can help the mind stay focused and clear during times of great stress, which can make it easier to get past those moments of high anxiety. Alternatively, you may find comfort in listening to music. Some people can de-stress while listening to their favorite songs, while others prefer listening to calming, classical music instead. This article is made available for general, entertainment and educational purposes only. The opinions expressed herein do not necessarily reflect those of The Joint Corp (or its franchisees and affiliates). You should always seek the advice of a licensed healthcare professional.
159,033
Today I played Clue for the first time after my first attempt at developing a better notation system. My take-aways from the last attempt were: - Focus on who doesn’t have which cards - Pay attention to the progression of guesses The results were pretty good. The systematic nature of my notation was generally thought to be superior to the lackadaisical strategy of my friends (note: playing games lackadaisically is great; it’s just not how I roll). Here’s the basic layout of what I wrote down: Billiard Hall Kitchen Rope (these are the cards I had) DR – MrsW – Candle | F->A->D Ball – MrsP – Candle | D->L Then, in addition to keeping these notes on a blank piece of paper, I filled in the normal grid with the initials of who didn’t have which card. Let me explain the above, though. I made an entry for each guess, listing each card guessed as well as the progression of who guessed it to who eventually showed a card. Later on, when I had more information, I went back and determined which cards could not have been the ones shown, and ultimately which cards had been shown. Thoughts on this method: - It was great, though the transcription was still a little slow. - The arrows on the right-hand part are unnecessary. I should just write the initials in order. - I should not note when a suggestion is “helped”, but rather when it goes unhelped. This cuts down on the writing. - Most importantly, I should use the second sheet (the normal sheet) from the very beginning, because trying to transcribe that information on the primary sheet slowed me down at the beginning. - Also, it was a little overwhelming because I was making it up as I went along. Now that I have specific ideas about how I should do it, the method should be smoother. Ultimately, it would be nice to sort the list by guesser, so that it’s possible to see the progression of someone’s guesses. That would enable easier speculation about what cards they were shown. Some statistics from this game: - 4 players (including me) - 35 suggestions - 9 of those suggestions skipped one person before being helped - 8 of those suggestions skipped two people - The correct suspect was first guessed on the 10th suggestion, and quickly adopted widely. It was suggested approximately half of the time after it was first guessed. - The correct weapon was guessed on the first suggestion, and was used sporadically throughout. It was suggested about a third of the time. - The correct room was only suggested twice. - I had zero suspect cards, but figured that out first - I had three room cards, but was still less than 100% certain about that when I finally accused Anyway, it’s a fun game. We should play sometime.
273,797
Joseph Lee and Jan Matzeliger were African American inventors during the Industrial Revolution. Besides being African American inventors, they had something else in common. They all lived in Boston, Massachusetts. It is difficult for inventors, at the best of times, to succeed. There are many challenges to overcome. But these pioneers also had to surmount racial prejudice in a post Civil War era. The American Civil War led to the abolishment of slavery. Slavery precluded African American inventors from being recognized as citizens. African American Inventions were refused patent rights and the inventors could not enter into contracts. With slavery abolished, these inventors pursued their dreams. If you were an inventor during the industrial revolution, the place to be was Boston. There was a large concentration of instrument makers and machinists that immigrated to Boston. They became the prototype makers for new inventions - hundreds of them. Boston is where Samual B. Morse had his telegraph invention made, where Alexander Graham Bell patented his telephone. It is where Gillette invented his disposable razor, and where Thomas Edison created his first invention. It was a mecca of innovation - all in one location - all happening at the same time. It was the reason William Barton Rogers founded MIT (Massachusetts Institute of Technology) in Boston. It was also the birthplace of many African American Inventions. Joseph Lee was born in 1849 in Boston, Massachusetts. As a young boy he worked in a bakery. He progressed to food preparation and became a baker. He then became a cook - then managed a restaurant - then owned a restaurant - then owned two restaurants and a catering company. Joseph was a successful entrepreneur. He built his career based on great food, great service and a sound business plan. He then used his skills to invent solutions to a couple of needs in the food industry. He invented a bread making machine, that made bread faster, cleaner and more efficiently than a half dozen bakers. He also invented a machine that created bread crumbs from loaves of bread. Joesph licensed his inventions to manufacturers and his machines were sold around the world. Joseph Lee was not only a pioneer among African American Inventors, he was a pioneer in the food preparation industry. Jan Matzeliger was an African American inventor who moved to Boston from Philadelphia. Jan worked in a machine shop making shoes. Shoes were made by hand and a good cobbler could make fifty pairs of shoes a day. But Jan believed a machine could be made that would help make shoes faster. He invented a machine that allowed a cobbler to make 700 pairs of shoes a day. He patented his invention in 1883 and licensed it to the United Shoe Machinery Corporation of Boston. All across America shoes dropped in price due to the labor savings from his new invention. As a pioneer of African American Inventors, Jan Ernst Matzelinger, was honored on a postage stamp in 1991. Lewis Howard Latimer was a born in 1848 in Chelsea, Massachusetts, the son of escaped slaves from Virginia. He worked with his father hanging wallpaper until he was 16 before joining the Navy to fight in the Civil War. After the war, he returned to Boston and found a job running office errands for a patent firm. He was literate and liked to draw. He was fascinated with the work of draftsmen who prepared drawings of inventions. Lewis read everything he could about the craft and practiced it on his own time. One day, he asked if could try preparing a drawing. His talent was obvious and the law firm made him a draftsmen. He excelled at it and became an inventor as well, inventing and patenting a locking rack for coats, and a toilet apparatus for trains. But it was his next series of inventions that got him a lot of attention. He was hired as a draftsman for the U.S Electric Lightning Company and he invented electric lamps for them. This made Latimer well known and Thomas Edison hired him as the chief draftsman and patent expert for his company, which became General Electric. Lewis often appeared as an expert witness in patent lawsuits concerning electric lighting. He is a member of the Edison Pioneers, the select group of 28 individuals who worked on the Edison inventions. Among African American Inventors Lewis Latimer was the only one that worked with Thomas Edison.
98,511