text stringlengths 570 100k |
|---|
The following statement was issued by the Labor Fraction of Workers World Party. On April 6, President Donald Trump ordered a blatant act of war against the Syrian people. He did it without a shred of evidence that the Syrian government was involved in an alleged poison gas attack that killed civilians. What advantage would Syria gain strategically by targeting noncombatants, when the Bashar al-Assad government has been winning the war against U.S.-backed terrorist groups — the Islamic State group (IS), al-Qaida, the Free Syrian Army and others? In fact, there is evidence that the gas attack was actually carried out by so-called rebels. The attack on Syria was followed by the bombing of Afghanistan, employing the most powerful non-nuclear bomb ever dropped in all of world history. A military assault on the Democratic People’s Republic of Korea could be imminent. Working people, organized and unorganized, have no reason to support yet another war. In fact, the chatter in the workplace is that people are outraged that Trump has dragged us into what could be a major war — or wars. There will be mass suffering as a result of billions of dollars of cuts in human services carried out to shift money to the Pentagon war machine. The suffering of the Syrian people, including the nearly five million made refugees by this U.S.-sponsored war, will only worsen. Organized labor should be outraged! Yet its leaders, AFL-CIO President Rich Trumka and Change to Win President James Hoffa Jr., have said nothing. Silence is the voice of complicity. Their collusion with Trump — and with both Democrats and Republicans — when faced with Pentagon aggression is just their latest betrayal of our class interests as workers since the November election. These are the same leaders who sold out the heroic water defenders at Standing Rock and the migrant communities who are being rounded up, detained and deported en masse. Labor lieutenants of capitalism — a shameful tradition On Feb. 25, 1967, the Rev. Dr. Martin Luther King Jr. said “the bombs in Vietnam explode at home.” (tinyurl.com/aertr2e) While this towering figure of the Civil Rights movement was risking his life by positioning himself against the Vietnam War, rare were the voices from the labor movement striking a similar chord. In its silence, organized labor was complicit in a criminal war of aggression against the people of Vietnam, funded by the poor, the workers and the oppressed people of the U.S. Fifty years have passed. Yet we see the leaders of the AFL-CIO and Change to Win continuing to act as cheerleaders for imperialist war. They know full well that the union movement has enough muscle to bring the war machine to a halt. Even the ten percent of the working class in unions have a lot of power. Power to stop the transport of goods by truck, rail and air. Power to shut down telecommunications and government. Power to shut down the military-industrial complex at the point of production. We believe in the old union maxim that “an injury to one is an injury to all.” This principle has no borders. When our human family in other countries is subjected to imperialist violence, carried out in our name, labor in the U.S. has no choice but to join the chorus of voices saying, “Hands off Syria, Afghanistan, Korea and the world!” This message must be heard around the world on May Day, International Workers Day, and beyond. |
ADVERTISING: Twelve teams have signed up for the first Open Series, and amongst them are fan-favourites such asandThe first Open Series will be a best-of-one single elimination contest, with the format expanding to best-of-three clashes for the Semi and Grand Finals. A seeding system has been touted to ensure that heavyweight teams avoid each other in the early rounds, but it has not yet been confirmed.The winners will receive $150 and lay claim to the first spot in the Invitational Series, where they will eventually go head-to-head with the winners of the seven other Open Series qualifiers for the $10,000 grand prize.The action gets underway this Saturday, June 2nd at 13:00 Eastern Standard Time (19:00 CET), with FireFlash set to shoutcast all of it live, along withand - potentially - our very owntoo.Sign up information is available below. |
Description: CLAIM OF PRIORITY This application claims the benefit of U.S. Provisional Patent Application 61/837,354 entitled, A COGNITIVE ARCHITECTURE AND MARKETPLACE FOR DYNAMICALLY EVOLVING SYSTEMS by Bastea-Forte, et al., filed Jun. 20, 2013; U.S. Provisional Patent Application 61/888,907 entitled, INTERACTIVE COMPONENTS OF A COGNITIVE ARCHITECTURE FOR DYNAMICALLY EVOLVING SYSTEMS by Bastea-Forte, et al., filed Oct. 9, 2013; and U.S. Provisional Patent Application 61/917,541 entitled, QUALITY AND MARKETPLACE MECHANISMS FOR A COGNITIVE ARCHITECTURE FOR DYNAMICALLY EVOLVING SYSTEMS by Bastea-Forte, et al., filed Dec. 18, 2013, the entire contents of which are all incorporated herein by reference. BACKGROUND Some consumers and enterprises may desire functionality that is the result of combinations of services available on the World Wide Web or “in the cloud.” Some applications on mobile devices and/or web sites offer combinations of third-party services to end users so that an end user's needs may be met by a combination of many services, thereby providing a unified experience that offers ease of use and highly variable functionality. Most of these software services are built with a specific purpose in mind. For example, an enterprise's product manager studies a target audience, formulates a set of use cases, and then works with a software engineering group to code logic and implement a service for the specified use cases. The enterprise pushes the resulting code package to a server where it remains unchanged until the next software release, serving up the designed functionality to its end user population. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 illustrates a block diagram of an example plan created by a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 2 illustrates a block diagram of an example dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 3 is a flowchart that illustrates a method for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 4 illustrates a block diagram of an example plan for a dynamically evolving cognitive architecture system, under an embodiment; FIG. 5 illustrates a block diagram of another example plan for a dynamically evolving cognitive architecture system, under an embodiment FIG. 6 illustrates a block diagram of yet another example plan for a dynamically evolving cognitive architecture system, under an embodiment FIG. 7 illustrates a block diagram of an example of abstract representations of a small concept action network for a dynamically evolving cognitive architecture system based on third party developers, under an embodiment; FIG. 8 illustrates a block diagram of example object representations for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 9 illustrates a block diagram of example dialog templates for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 10 illustrates a block diagram of an example description of an equivalence policy for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 11 illustrates a block diagram of example concept action network nodes and edges for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 12 illustrates a block diagram of an example plan for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 13 illustrates a block diagram of another example plan for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; FIG. 14 illustrates a block diagram of an example user interface for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment; and FIG. 15 is a block diagram illustrating an example hardware device in which the subject matter may be implemented. DETAILED DESCRIPTION Embodiments herein provide dynamically evolving cognitive architecture systems based on third-party developers. At a minimum, the system functions with two action objects and three concept objects. For example, the system forms an intent based on a user input and creates a plan based on that intent. The plan includes a first action object that transforms a first concept object associated with the intent into a second concept object. The plan further includes a second action object that transforms the second concept object into a third concept object associated with a goal of the intent. The first action object and the second action object are selected from multiple action objects. The system executes the plan, and outputs a value associated with the third concept object. FIG. 1 illustrates a block diagram of an example plan 100 created by a dynamically evolving cognitive architecture system based on third-party developers, in which action objects are represented by rectangles and concept objects are represented by ovals, under an embodiment. User input 102 indicates that a user inputs “I want to buy a good bottle wine that goes well with chicken parmesan” to the system. The system forms the intent of the user as seeking a wine recommendation based on a concept object 104 for a menu item, chicken parmesan. Since no single service provider offers such a use case, the system creates a plan based on the user's intent by selecting multiple action objects that may be executed sequentially to provide such a specific recommendation service. Action object 106 transforms the concept object 104 for a specific menu item, such as chicken parmesan, into a concept object 108 list of ingredients, such as chicken, cheese, and tomato sauce. Action object 110 transforms the list of ingredients concept object 108 into a concept object 112 for a food category, such as chicken-based pasta dishes. Action object 114 transforms the food category concept object 112 into a concept object 116 for a wine recommendation, such as a specific red wine, which the system outputs as a recommendation for pairing with chicken parmesan. Even though the system has not been intentionally designed to create wine recommendations based on the name of a menu item, the system is able to intelligently synthesize a way of creating such a recommendation based on the system's concept objects and action objects. Although FIG. 1 illustrates an example of a system creating a single plan with a linear sequence that includes three action objects and four concept objects, the system creates multiple plans each of which may include any combination of linear sequences, splits, joins, and iterative sorting loops, and any number of action objects and concept objects. Descriptions below of FIGS. 4, 5, and 6 offer examples of multiple non-linear plans with splits, joins, and other numbers of action objects and concept objects. In a dynamically evolving cognitive architecture system based on third-party developers, the full functionality is not known in advance and is not designed by any one developer of the system. While some use cases are actively intended by developers of the system, many other use cases are fulfilled by the system itself in response to novel user requests. In essence, the system effectively writes a program to solve an end user request. The system is continually taught by the world via third-party developers, the system knows more than it is taught, and the system learns autonomously every day by evaluating system behavior and observing usage patterns. Unlike traditionally deployed systems, which are fixed in functionality, a dynamically evolving cognitive architecture system based on third-party developers is continually changed at runtime by a distributed set of third-party developers from self-interested enterprises around the globe. A third-party developer is a software developer entity that is independent of the dynamically evolving cognitive architecture system, independent of the end users of the dynamically evolving cognitive architecture system, and independent of other third-party developers. Third-party developers provide the system with many types of objects through a set of tools, editors, and other mechanisms. These objects include concept objects that are structural definitions representing entities in the world. These objects also include action objects, which are similar to Application Programming Interfaces (APIs) or web service interfaces that define a set of concept object input dependencies, perform some computation or transaction, and return a set of zero or more resulting concept object values. These objects also include functions, which define specific logic that implement an action object interface created by a self-interested party, and monitors, which are specific types of action objects and associated functions that allow external services to keep track of the world, looking for certain conditions. Once the conditions become true, associated action objects are injected into the system for execution. These objects additionally include tasks, for which a third-party developer specifies groupings of particular inference chains of action objects that make up an action object in a hierarchical way, and data, which provides instantiations of concept objects, such as product catalogs, business listings, contact records, and so forth. The objects further include linguistic data because there are many ways to interact with the system. Third-party developers may add new vocabulary, synonyms, and linguistic structures to the system that the system maps to concept objects and action objects to support the use case where natural language input is involved. The objects additionally include dialog and dialog templates provided by third-party developers, which contains all output strings and logic the system requires to communicate ideas back to the end user, either through visual interfaces or through eyes-free interfaces, and layout templates provided by third-party developers, which describe visually how the system presents information on a variety of devices. The objects may also include delight nuggets, which are domain oriented logic that enables the system to respond to situations in a way that surprises and delights an end user, providing additional information or suggestions that please and help the end user. Third-party developers provide these new concepts, actions, data, monitors, and so forth to the system, in a self-interested way, with the intent of making available certain new capabilities with which an end user may interact. As each new capability is added to the system, an end user may access the new functionality and may do more than the end user was capable of doing before. The system knows more than it is taught, meaning that if a third-party developer adds ten new capabilities, the system will, through dynamic combinations of services, be able to do far more than ten new things. Given a request from an end user, the system, in a sense, writes automatic integration code that links individual capabilities into new dynamic plans that provide value for the end user. FIG. 2 illustrates a block diagram of a dynamically evolving cognitive architecture system based on third-party developers 200, under an embodiment. As shown in FIG. 2, the system 200 may illustrate a cloud computing environment in which data, applications, services, and other resources are stored and delivered through shared data-centers and appear as a single point of access for the end users. The system 200 may also represent any other type of distributed computer network environment in which servers control the storage and distribution of resources and services for different client users. In an embodiment, the system 200 represents a cloud computing system that includes a first client 202, a second client 204, and a first server 206 and a second server 208 that may be provided by a hosting company. The clients 202-204 and the servers 206-208 communicate via a network 210. The first server 206 includes components 212-254 in an embodiment. Although FIG. 2 depicts the system 200 with two clients 202-204, two servers 206-208, and one network 210, the system 200 may include any number of clients 202-204, any number of servers 206-208, and/or any number of networks 210. The clients 202-204 and the servers 206-208 may each be substantially similar to the system 1500 depicted in FIG. 15 and described below. FIG. 2 depicts the system components 212-254 residing completely on the first server 206, but the system components 212-254 may reside completely on the first server 206, completely on the second server 208, completely on the clients 202-204, completely on another server that is not depicted in FIG. 2, or in any combination of partially on the servers 206-208, partially on the clients 202-204, and partially on the other server. One of the server components may include a concept action network 212. A concept action network 212 is the schema for the present capabilities and knowledge of the system 200, and a structured collection of known types fortified with atomic actions on those types. The concept action network 212 organizes and facilitates the interoperating execution of Internet enabled services, and may be represented as a mathematical graph with constraints defining its structure. Third-party developers may interact with the concept action network 212 by extending the concept action network 212 with new concept objects, new action objects, and new implemented services. End users may interact with the concept action network 212 to accomplish end user tasks. An Internet enabled service is a collection of functional interfaces to data retrievals, such as a local business search or querying a shopping cart, nontrivial computations, such as computing a symbolic integral, and real world actions, such as booking a reservation at a hotel or turning on a light in a smart enabled home. These functional interfaces are exposed to the public Internet via well-defined interfaces using standard protocols. When depicted as a mathematical graph, the concept action network 212 consists of nodes and edges. These nodes in a concept action network 212 include concept objects and action objects. A concept object is a model of a real world entity, such as a restaurant, or coupling thereof, such as a reservation, with a restaurant and a time. An action object is a model of an atomic unit of work that declares its external dependencies as input concept objects and produces a predetermined type of output concept object. The concept action network 212 may catalog similar Internet enabled services under a common schema, providing interoperability. The concept action network 212 may be depicted as a well-defined, strongly-typed mathematical graph structure that defines precisely a space of known capabilities. The server 206 may also include a planner 214 component. When provided with an intent, a planner 214 produces a static plan of execution, which is a collection of input signals and a goal representing the semantics of an end user's desired task or step. A plan is a directed and acyclic coupling of concept action network nodes. Being directed and acyclic ensures that the plan is executable and that every step in the plan makes progress to the goal. Plans may include multiple instances of concept action network nodes, such as two distinct businesses in the case that one task includes, as a component, another task of finding the nearest coffee shop to the nearest movie theater. The planner 214 also revises plans when dynamic execution deems necessary. The server 206 may include several registry components. A function registry 216 maps function values to action objects. Function values bundle declarative metadata about some action implementation with an invokable endpoint. A strategy registry 218 is a registry of selection strategies and instantiation strategies, both of which are used to satisfy the cardinality constraints of action inputs without bothering the end user. Strategies are keyed off the execution context in which they apply. A dialog registry 220 is a registry of dialog templates, keyed off the execution context in which they apply and guarded by additional dynamic context triggers. A follow up registry 222 is a registry of follow up plan intents/goals, used to suggest follow up actions to an end user under specific situations. Entries in the follow up registry 222 are also keyed off the execution context in which they apply and guarded by additional dynamic context triggers. A layout registry 223 stores third-party developer layout descriptions which the system 200 uses for rendering outputs based on concept object values to be rendered, such as the example of the wine recommendation described in FIG. 1. An end user data store 224 is an end user specific storage of preferences and instrumented usage data, used to store both the raw data about decisions an end user makes and official/explicit preferences. A global data store 226 is a cross-user storage of default preferences and aggregate usage data that is updated in batches offline from end user specific data. A service scheduler 228 determines the order in which services will be called for a particular action invocation. The service scheduler 228 balances the cost and quality of each service to maximize precision and recall. A session state 230 is the state for a specific session of execution. A short term end user memory 232 is made up of recently completed plans and currently interrupted plans that are pending additional input. An execution session 234 is a place for data, which is usually ephemeral, which an execution engine 252 uses. For example, as a plan executes the wine recommendation example in FIG. 1, the execution engine 252 stores the intermediate food classification concept object values in the execution session 234. An end user interface 236 is the user's view into the system 200 and associates an end user with an execution session. The end user interface 236 enables the end user's intent to be elicited at each step of interaction. A metrics store 238 is a data store housing all the raw, end user agnostic runtime data, such as service invocation attempts, successes, failures, latency, overhead, dialog selection counts and rendering overhead, end user request counts and overhead, and strategy selection counts and overhead, etc. The server 206 will also include developer tools 240-250 in an embodiment. Developer tools 240-250 are a set of editors, debuggers, etc. that enable creation and updating of the data supporting the runtime environment. A modeler 240 creates and updates concept objects, such as updating primitive and structured types, and action objects, such as updating input/output/metadata schema definitions. A function editor 242 creates and updates provider specific implementations of action objects, which may involve writing some code in a sandboxed scripting language that may be partially generated and validated against action objects. A dialog editor 244 creates and updates dialog scripts that specify output messaging and logic for various aspects of the system 200, which, in an embodiment, likely involves a simple templating language with conditional code, variables, etc. An analytics viewer 246 provides insight into the data stored in the metrics store and generates reports, which may include things like performance time of various components over time, domain distribution of end user requests, and speed and success performance analytics for service providers, etc. A follow up editor 248 associates follow up goals with a contextual trigger in which the follow up goals should become active and recommended to an end user. A follow up trigger may evaluate the execution context that led to the current goal, user preferences, or environmental conditions. A strategy editor 250 writes instantiation strategies and selection strategies in a sandboxed scripting language and registers those strategies with the appropriate context in which they should be triggered. In an embodiment, the server 206 will include the execution engine 252 that interacts with nearly all components of the dynamically evolving cognitive architecture system based on third-party developers 200. For example, the execution engine 252 weaves together the end user intent with the planner 214, strategy registry 218, dialog registry 220, end user data store 224, function registry 226, and session state 230 to set up and complete tasks. The execution engine 252 also handles interrupted tasks and resumes interruptions when more data is elicited. The execution engine 252 is instrumented, which allows the execution engine 252 to collect dynamic data like end user preferences and the success rates of using particular services. When action object preconditions are not met, the execution engine 252 may dynamically adapt and/or interactively elicit feedback from an end user in order to continue with new information. Furthermore, the execution engine 252 intelligently schedules evaluation of services within the execution order semantics. When parallel or alternative paths exist in an executable plan, the execution engine 252 dynamically determines whether to proceed along one or more paths or whether to prompt for additional end user input before proceeding. These determinations are made from a variety of sources, including past result precision, recall, performance, and both global and local user feedback. A natural language intent interpreter 254 provides a flexible platform for inferring intent structures from natural language queries. The natural language intent interpreter 254 allows the consideration of multiple sources of data, including, but not limited to, modeled vocabulary via exact and approximate language agnostic-matching, implicitly gathered usage data, such as popularity measurement, explicitly annotated training data via machine learning, and contextual data, for example an end user's current location. Additionally, the natural language intent interpreter 254 is dynamically reactive to both the upstream producers, such as speech recognizers, and downstream consumers, such as planners and executors, of its data. Furthermore, the natural language intent interpreter 254 is a flexible framework for handling a deep vertical integration between the concept action network 212 and all producers and interpreters of natural language. Also, the natural language intent interpreter 254 acts as a conduit through which, for example, a normally “black box” speech recognizer may access concept action network level usage data or relationships to function more accurately. Similarly, the natural language intent interpreter 254 leverages concept action network level information through its clients, such as the planner 214, a downstream consumer of the natural language intent interpreter 254, to function more quickly and accurately. The planner 214, in turn, may access internal metadata from either the natural language intent interpreter 254 itself or its upstream producers, such as a speech recognizer. Speech recognition is facilitated by concept action network specific natural language models, which are in turn bolstered with data generated from concept action network specific planning algorithms, which are tuned and guided by dynamic execution data. FIG. 3 is a flowchart that illustrates a method for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment. Flowchart 300 illustrates method acts illustrated as flowchart blocks for certain steps involved in and/or between the clients 202-206 and/or the servers 206-208 of FIG. 2. An intent is formed based on a user input, block 302. For example and without limitation, this may include the natural language intent interpreter 254 responding to a user saying “I want to buy a good bottle wine that goes well with chicken parmesan,” by forming an intent as a wine recommendation based on the concept object 104 for a menu item, chicken parmesan. The concept action network 212 provides the ability to represent an end user query, or task specification, in a format amenable to automated reasoning and automated satisfaction/servicing. The concept action network 212 enables queries and tasks from potentially many input sources to be represented in a single mathematical structure that does not contain natural language or other potentially ambiguous constructs. Below is an example of an unambiguous intent expressed in terms of a concept action network 212. 1 intent { 2 goal:phone.PhoneCall 3 value:biz.BusineesCategory (Pharmacy) 4 value:biz.BusinessName(CVS) 5 value:geo.PostalCode (95112) 6 } 7 The system 200 forms intents from concept action network elements, such as concept objects and action objects, based on their significance to the task at hand, and these objects may be instantiated with known data values that may aid in accomplishing the task. The system 200 annotates intents as source signals and a goal, the collection of which form an intent. Signals are a formalization of “what user data does the user provide,” and a goal is likewise a formalization of “what does the user want to accomplish.” An intent is an unambiguous, mathematical representation of these formalizations. Forming the intent may include outputting dialog that requests an additional user input. For example, the system 200 may provide dialog to ask the user if the requested wine recommendation is for a wine that the user wants to drink after the wine is ordered and subsequently delivered or if the requested wine recommendation is for a wine that the user wants to purchase from a local supplier within a short driving distance and then drink the same day. Although this example describes the natural language intent interpreter 254 forming an intent based on a user input provided via speaking, the user input may not be based on natural language and the user input may be provided via any of multiple modalities, such as typed entry of text via a real or virtual keyboard, or similar substitutions, touch and mouse gestures, speech, and combinations of the above. Given a concept action network 212 and an intent, the planner 214 may automatically reason about the existence of a sequence of concept action network prescribed steps that may service an intent. These steps of sequences produced by planning are denoted as plans, or programs for the concept action network 212 that, when executed with respect to the execution semantics, satisfies the goal within an end user's intent. A first plan is created based on an intent, wherein the first plan includes a first action object that transforms a first concept object associated with the intent into a second concept object and also includes a second action object that transforms the second concept object into a third concept object associated with a goal of the intent. The first action object and the second action object are selected from multiple action objects, block 304. By way of example and without limitation, this may include the planner 214 creating a plan based on the intent by selecting the action objects 106, 110, and 114 from multiple action objects in the concept action network 212. The action object 106 transforms the concept object 104 for a specific menu item, such as chicken parmesan, into the concept object 108 for a list of ingredients, such as chicken, cheese, and tomato sauce. The action object 110 transforms the list of ingredients concept object 108 into the concept object 112 for a food category, such as chicken-based pasta dishes. The action object 114 transforms the food category concept object 112 into a concept object 116 for a wine recommendation, such as a specific red wine. The concept object 104 may include data which provides instantiations of a concept object for a specific menu item, such as chicken parmesan, the concept object 108 may include data which provides instantiations of a concept object for a list of ingredients, such as chicken, cheese, and tomato sauce, and the concept object 112 may include data which provides instantiations of a concept object for a food category, such as chicken-based pasta dishes. Forming the intent may associate user data in the user input with a concept object, such as associating the user saying “chicken parmesan” with the concept object 104 for a specific menu item, such as chicken parmesan. Different third-party developers may have provided each of the concept objects 104, 108, 112, and 116, and the action objects 106, 110, and 114 to the concept action network 210 because the system 200 provides interoperability between the objects 104-116. A second plan is optionally created based on an intent, wherein the second plan includes a third action object that transforms a first concept object associated with an intent into a fourth concept object and also includes a fourth action object that transforms the fourth concept object into the third concept object associated with a goal of the intent, wherein the third action object and the fourth action object are selected from multiple action objects, block 306. In embodiments, this may include the planner 214 creating another plan based on the same intent, wherein the other plan includes action objects selected from the multiple action objects in the concept action network 212 to sequentially transform the concept object 104 for a specific menu item, such as chicken parmesan, eventually into the concept object 116 for a wine recommendation, such as a specific red wine. Given the likely case of the existence of an exponentially large number of feasible plans, the planner 214 may automatically identify the most efficient or desirable plan. The planner 214 may optimize plans using independently configurable metrics, including, such as plan size and plan execution cost, where cost may include notions of time, actual money required to invoke a service step, or fit with end user preference models. The system 200 may determine the simplest plan given an intent. The planner 214 efficiently enumerates the possible plans that satisfy an intent, defined as “includes steps that connect all signals to the given goal,” and selects which plan best satisfies some criteria, defined as a mathematical objective function over plans. The definition of the objective function is independent of the planner 214. One instantiation of this objective function is “simplest plan”, in which the planner 214 finds the plan with the fewest number of steps. A first plan is optionally selected for execution based on comparison of a first plan to a second plan based on an action object cost, an action object quality, and/or a number of planned action objects, block 308. For example and without limitation, this may include the planner 214 selecting the plan for executing the action objects 106, 110, and 114 based on three planned action objects for the plan to execute the action objects 106, 110, and 114 and five planned action objects for the other plan. Given the likely case of the existence of an exponentially large number of these plans, the planner 214 identifies the most efficient or desirable plan. A first plan is executed, block 310. By way of example and without limitation, this may include the execution engine 252 executing the plan to execute the action objects 106, 110, and 114 for recommending a wine for pairing with chicken parmesan, using the additional user input to identify a local supplier of the specific red wine. The execution engine 252 may execute a plan for recommending a wine for pairing with chicken parmesan based on an input parameter of an action object mapped to a web service parameter and a web service result mapped to an output value of the corresponding action object. Executing a plan may include using a user decision, a user preference, and/or user application contextual information to transform a concept object into another concept object. For example, the system 200 may identify a supplier of the specific red wine that is located geographically second closest to the user's current location as a favorite supplier of wine for the user based on previous purchases. A value associated with a third concept object is output, block 312. In embodiments, this may include the system 200 outputting the name of a specific red wine which the system 200 outputs as a recommendation for pairing with chicken parmesan through a visual interface or through an eyes-free interface. The system 200 may select another action object from the concept action network 212 and execute the other action object to transform the concept object associated with the goal of the intent into another concept object. For example, the system 200 may also recommend purchasing the specific red wine from a local supplier that is the third closest geographically to the user because the third closest supplier is selling the specific red wine at a lower sales price than the sales price of the specific red wine at the suppliers that are closer geographically to the user. Another third-party developer may provide another action object after the system 200 forms the intent based on the user input and before the system 200 outputs the value associated with the third concept object, as the system 200 and the concept action network 212 evolve dynamically, without the need to stop providing services at runtime while being updated with additional service capabilities during the dynamic evolution. Although FIG. 3 depicts the blocks 302-312 occurring in a specific order, the blocks 302-312 may occur in another order. In other implementations, each of the blocks 302-312 may also be executed in combination with other blocks and/or some blocks may be divided into a different set of blocks. FIG. 4 illustrates a block diagram of an example plan for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment. In this example, the system 200 responds to a user saying “What time is it in Japan?” by creating the plan 400. The plan 400 includes a left branch 402, a right branch 404, and a central branch 406. The plan 400 represents an ambiguity based on the assumption that a third-party developer has taught the system 200 that “Japan” could be both the name of a country and the name of a city, which is called a locality in the general geographic model. Therefore, the planner 214 begins with two given source signals, both with concrete values of “Japan,” but with two different types, city name and country name. The left branch 402 and the right branch 404 represent the resolution of the respective city and country source signals to a common resolved form, an AdministrativeDivision. The system 200 knows how to get a time zone from an AdministrativeDivision, from which the system 200 can query the current time. The static plan 400 represents an effort at unifying the source signals under a coherent plan that will achieve the goal. At runtime, the system 200 executes both the left branch 402 and the right branch 404, either serially or in parallel. When the values “join” at the AdministrativeDivision node 408 labeled “choice,” the following three cases may occur. First, “Japan” is a city, and not a country, such that the system 200 selects the locality value without prompting the user and returns the time. Second, “Japan” is a country, and not a city, such that the system 200 selects the country value is selected without prompting the user and returns the time. Third, “Japan” is either both a city and a country, or more than one of either, such that the system 200 prompts the user to clarify. This process is subject to dynamic learning, whereby the system 200 “learns every day.” As the system 200 is used, users will respond to prompts like this to inform the system 200, and the third-party developers by proxy, that “Japan” is not a city, or is rarely a city, and the system 200 subsequently adjusts its behavior. Although FIG. 4 illustrates an example of the system 200 creating a single plan with a joining sequence that includes a limited number of action objects and concept objects, the system 200 creates multiple plans each of which may include any combination of linear sequences, splits, joins, and iterative sorting loops, and any number of action objects and concept objects. FIG. 5 illustrates a block diagram of another example plan for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment. In this example, the system 200 responds to a user saying “Find Southwest flight status,” by creating the plan 500. The plan 500 includes an action object 502, a right branch 504, a central branch 506, and an object 508. A third-party developer models the “FindFlightStatus” action object 502 to accept both a “flightHandle,” which consists of a required FlightNumber and an optional carrier, and a carrier. The third-party developer indicates that the action object 502 can handle queries like “status of flight 501” and “status of united 501” without interrupting the user. However, the “Find Southwest flight status” query does not contain enough information because there are too many flights to reasonably query or present the results to the user, such that the system 200 must query the user for clarification. The right branch 504 involves a resolution to a carrier given its name, such as “southwest.” Assuming that the right branch 504 succeeds, the system 200 uses a “split” with the carrier identification to both initiate the construction of a flight handle, in the central branch 506, and pass directly to the FindFlightStatus action object 502. The construction of the flightHandle follows what the third-party developer has prescribed, that it must contain a FlightNumber. When the system 200 cannot find a flight number, the system 200 inserts a placeholder in the “Required: air.FlightNumber” object 508, which will later induce the system 200 to prompt the user with, for example, “Which southwest airlines flight(s) would you like to check?” Although FIG. 5 illustrates an example of the system 200 creating a single plan with a join and a split, which includes a limited number of action objects and concept objects, the system 200 creates multiple plans each of which may include any combination of linear sequences, splits, joins, and iterative sorting loops, and any number of action objects and concept objects. FIG. 6 illustrates a block diagram of an example plan for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment. In this example, the system 200 responds to a user saying “Show the highly rated restaurants,” by creating the plan 600. This example assumes to have a set of restaurants, perhaps from a prior result. The system 200 may cache user input data and system output data from a previous user request, and use the cached data as context for a subsequent user request. For example, the system 200 may cache user input data and system output data from a previous user request to find restaurants within a proximity of a shopping area that the user plans on visiting, and use the cached data as context for the subsequent user request for the highest rated of the identified restaurants. The system 200 transforms the user's intent of “highly rated” into a reference to the “rating.Rating” concept 602, with special platform-provided instructions to “sort by this.” Although FIG. 6 illustrates an example of the system 200 creating a single plan with a iterative sorting loop that includes a limited number of action objects and concept objects, the system 200 creates multiple plans each of which may include any combination of linear sequences, splits, joins, and iterative sorting loops, and any number of action objects and concept objects. FIG. 7 illustrates a block diagram of an example of abstract representations of a small concept action network for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment. Although the abstract representation 700 of a small concept action network includes about 300 objects, a real-life concept action network could include thousands or millions of objects. The detailed slice 702 of abstract representations of a small concept action network includes labels on concepts and actions and their relationships. An extension is a strong relationship between concept objects corresponding to the classic “is a” relationship in computing and philosophy. Concept objects related by extension are expected to be substitutable. For example, if a restaurant extends a business, a restaurant is expected to have all of the components of a business and is expected to be able to be used anywhere a business is expected. Concept objects may extend more than one other concept object, as the concept action network 212 supports multiple inheritances. A property is a strong relationship between concept objects that corresponds to the “has a” or containment relation. For example, a business (Business) has a property for its phone number (PhoneNumber). Properties may represent a one-to-many relationship, such as a business having multiple phone numbers, and these properties may carry cardinality restrictions. Action-connection edges include inputs and outputs. Inputs connect concept objects, such as a “restaurant,” to action object inputs, such as “BookReservation.” Action object inputs are models of what an action object requires in order to execute properly. Action object outputs connect corresponding action objects to the concept objects corresponding to their output type, such as “reservation.” Outputs represent what an action object produces when it executes as expected. The precise structure of the concept action network 212 acts as the central implementation point for many components of the system 200. In some situations, the system 200 enables concept objects to be directly transformed into other concept objects without action objects. For example, if a “call” action object needs a PhoneNumber, and the planner 214 selects a business concept object, the planner 214 separates or selects the phone number component of the business concept object and feeds the phone number component to the “call” action object. The resulting sequence for this part of the plan is: beginning concept object, concept object component, action object and resulting concept object or business concept object, PhoneNumber concept object, Call action object and InProgressCall concept object. There are three main cases of concept object to concept object transformations without action objects, property projections, extensions, and contextualizations. Property projections include copying, or selecting, once piece of an existing concept object as another concept object, such as selecting a PhoneNumber concept object from a Business concept object. Extensions include treating a specific concept object as its more general form, such as treating a Restaurant concept object as a Business concept object. Contextualization includes treating a general concept object as a more specific form of concept object, such as assigning the role of ArrivalAirport to a generic instance of Airport. None of these transformations actually involve manipulation of data; they only prescribe viewing the concept object from a different perspective. The property, extension, and contextualization relationships are parts of the declarative declaration of a concept object, such that they are third-party contributions. FIG. 8 illustrates a block diagram of example object representations for a dynamically evolving cognitive architecture system based on third-party developers according to an embodiment. Each of the objects in the concept action network 212 may be represented in a format using domain specific languages. The format may be declarative, rather than imperative, such as is typical with many programming languages. Third-party developers specify objects and contribute the objects to the shared concept action network 212. Each object may extend or reference other objects defined by the third-party developer community. Some examples of these formats include a type system for concept objects that allows a variety of aspects of a concept object to be declared, including type extension, properties, enumerations, etc., and a format for action objects that allows declaration of inputs and outputs and other aspects of an action object. Some other examples of these formats include a language for specifying formatting and rendering of data for display to an end user, a language for implementation of functions, and a language for describing executions that may occur based on input to achieve the output. A third-party developer may edit these objects using conventional developer tools, such as code editors, or dedicated tools specifically built for editing the concept action network 212. Third-party developers may contribute code to a versioned object storage system that optionally supports collaborative development and may allow third-party developers to track versions of their code, as well as fork or merge changes from one set of objects to another, much as with standard revision control systems. The object representations 800 shows possible syntax for describing a few concept objects, which include primitive and structure types, with optional extensions and properties. The object representations 800 shows a sample action object, including inputs, input types, input constraints, and outputs. FIG. 9 illustrates a block diagram of example dialog templates for a dynamically evolving cognitive architecture system based on third-party developers according to an embodiment. Another example of the formats using domain specific languages is a templating language for specification of language dialog that will be shown to an end user. The example dialog template 900 and 902 include patterns that indicate applicability of dialog expressions in different situations. FIG. 10 illustrates a block diagram of an example description of an equivalence policy 1000 for a dynamically evolving cognitive architecture system based on third-party developers according to an embodiment. Yet another example of the formats using domain specific languages includes an equivalence specification language that allows declaration of when different concept values are equivalent. For example, two restaurants may be considered equivalent if their phone numbers are the same, so the language allows description of the identifying fields that determine equality or inequality. The example description of an equivalence policy 1000 indicates when businesses, restaurants, or geographic points may be considered equal, based on structural, string, or numeric equality. FIG. 11 illustrates a block diagram of example concept action network nodes and edges 1100 for a dynamically evolving cognitive architecture system based on third-party developers according to an embodiment. The elements, such as nodes and edges, in the concept action network 212 map to well-defined semantics that allows an end user to use them. The process by which a node, such as an action object, is executed or evaluated corresponds to the invocation of a provider. For example, the execution semantics may prescribe: 1) the invocation of one or more Internet enabled services; 2) the manipulation of data returned by a service in a well-defined way: 3) the dynamic disambiguation of information, both implicitly from intermediate results and explicitly through end user input prompting; 4) the elicitation of additional information, such as credentials for a service; and 5) the interactive rendering of results produced at one or more nodes, starting and termination conditions and a well-defined execution order. An example of an element of these semantics is the evaluation of property edge. Property edges exist between concept objects and are interpreted as selective forms of data copying. The execution of a property edge involves selecting a component, or piece, of one concept object and copying it into another concept object. To execute a property edge between a concept object A and a concept object B, the execution engine 252 copies the component of the concept object A corresponding to the property associated with the edge from within the concept object A and instantiates the component in the slot reserved by the concept object B. The execution engine 252 may implement these semantics as server side software. The example concept action network nodes and edges 1100 are depicted during the process of execution by the execution engine 252. The execution engine 252 implements execution of action objects via functions, which are also contributed by third-party developers. Functions are represented in a programming language or declarative form that enables a third-party developer to fully specify how an action object is implemented in terms of data manipulations, external web service calls, and so on. In the case where functions are implemented in a traditional imperative or functional programming language, concept action network functions may correspond to methods or functions in the programming language. Concept objects may be mapped to values within the programming language. The programming environment may also offer additional features to facilitate use of web services, threading, error handling, and returning of output values as concept object values and indications of concept object types via metadata, where resource management may be facilitated by the execution engine 252. In other cases, function executable code may be synthesized by a declarative description of the function's operation, such as the mapping of input parameters to web service parameters, and the mapping of web service results to output values. Based on this declarative description, the function may be run via an interpreter or compiled into executable code. When data values are vended by multiple functions, declaratively modeled hierarchical equivalence policies may analyze values pairwise to determine whether the data values are equivalent, are not equivalent, or are of unknown equivalence. These equivalence policies may delegate to sub-policies or use a set of predefined predicates for primitive value comparisons. During the course of execution, the execution engine 252 may annotate data sources with metadata to indicate their source. For example, provenance may include an end user who entered the data, the name of a service, foreign keys on a remote system, and the copyright data associated with a piece of information. As data flows throughout nodes during execution, the execution engine 252 tracks the provenance of the data so that the ultimate result contains representations or links to the full, combined set of sources that contributed to a result. This information may be made available to an end user in some user interfaces. The system 200 may also use the provenance data stylistically when rendering, and to indicate follow up actions. In an embodiment, a preference library collects two types of preference data, end user explicit and end usage implicit. An example of end user explicit data is quick completion of regular order preferences, such as when an end user starts to order a sandwich and immediately seeing the autocomplete showing the exact type and condiments from previous orders such that the end user has a quick option to complete a full order as a shortcut for the same order as the order last time. Another example of end user explicit data is the recommendation of restaurants based on known food type preferences, such as when an end user either tags foods that the end user likes in the interface in the same way a “like” button works for social networks, or explicitly tells the system 200 about specific favorite food dishes so that the system 200 may use this information to locate restaurants serving variants of this food that are known either by menu data or mentions from reviews. End user explicit data may also include “things to do recommendations,” such as when an end user clicks on a quick menu of options for favorite social, cultural or category based things the end user likes to do, and the system 200 then uses this data to recommend a set of preference matched events, local attractions or other candidate geographically relevant activities with a single click of a button. A further example of end user explicit data is travel preferences, such as when the system 200 collects all travel preference data and applies the data to relevant planning and booking, such as frequent flyer information, seat preferences, hotel amenities, such as extra pillows, ocean views or rooms with entertainment systems with kids games, and general such as “hotels with a spa,” hotels “on the beach,” on so on. This may include the system 200 prompting the user to determine the type of trip being planned, such as individual travel, for which the system 200 uses personal preferences, or a family based trip, such as when the kids going, when it a romantic trip, or when it is an adventure trip In an embodiment, end usage implicit data may include any items ever selected via a generic menu of options becoming an implicit favorite, any specifically requested item categorized and assigned as a favorite within that category, and any ordered item in understood categories considered a favorite, such as when an end user orders pizza, this data implies that the end user “likes” pizza. Another example of usage implicit data may be if an end user frequently reserves flights that leave in the morning hours during weekdays, the system 200 understands that the end user prefers morning flights during the week. Likewise, if an end user reserves the same restaurant over and over, the system 200 assumes that the end user “likes” this restaurant and subsequently recommends restaurants similar to this restaurant when the end user is in unfamiliar geographies. Similarly, if an end user is at a certain location for four nights in a row at 2:00 AM, the system 200 infers that the end user lives at that location or if an end user travels between point A in the morning to point B and back the same route in the evening many times, the system 200 infers that the end user works at point B. Global learning is the confirmation of hypothesis by contextual user trends. The system 200 prompts an end user for a direction when an end user input may have multiple meanings. The system 200 reviews those disambiguation samples, examine the context, and learn what most people choose in order to avoid asking next time for similar inputs. FIG. 12 illustrates a block diagram of example plan 1200 for a dynamically evolving cognitive architecture system based on third-party developers, under an embodiment. The planner 214 may start with a null plan, a disconnected graph consisting solely of the signals and the goal, and growing the null plan into a full executable plan. The planner 214 incrementally connects nodes in the null plan, the intentional nodes, pairwise with paths. The planner 214 may define these paths in advance, such as inferred from usage data or pre-computed via a shortest/simplest heuristic, or the planner 214 may learn the path online through the traversal of the graph structure of the concept action network 212. The planner 214 adds and removes paths as defined by a set of search parameters, including, for example, a limit on the total amount of computation performed. The addition of paths to a plan and the removal of paths from a plan effectively induces a search over a diverse sequence of plans, each of which the planner 214 evaluates for fitness via a configurable objective function. The planner 214 stores the current best plan. Should no one plan emerge as a clear optimum, the planner 214 stores a set of the current best plans and carries the set forward to the next step of the search. The example plan 1200 is the simplest plan that satisfies the previously formed intent. FIG. 13 illustrates a block diagram of example plan 1300 for a dynamically evolving cognitive architecture system based on third-party developers according to an embodiment. The system 200 may determine the family of the N simplest plans, a generalization of the above. The system 200 provides alternative execution paths as contingency plans, and find and encode alternate interpretations, or multiple hypotheses, of an otherwise unambiguous intent structure. The example plan 1300 is a version of the plan 1200, but fortified with automatically generated contingencies and alternate interpretations. The system 200 may start with a known plan as an initial state, then, using, for example, a similar search procedure as before, connect the nodes in the plan with additional alternative paths until some totality condition is reached, such that that all possible alternative routes have been added. FIG. 14 illustrates a block diagram of example Explorer user interface 1400 for a dynamically evolving cognitive architecture system based on third-party developers according to an embodiment. The Explorer uses the concept action network 212 and the end user interface 236 to interactively elicit intent from an end user based on an action object graph. Since the system 200 dynamically extends the concept action network 212 at runtime, what an end user may say and do changes over time. The Explorer and the end user interface 236 enable an end user to form any intent representable by the concept action network 212 at the current time, and it forms the intent in a way that enables rapid construction of goals. The system 200 shows not only obvious follow up possibilities, but longer-tail inputs that enable a rapid plan sketch to be entered, allowing the planner 214 to fill in all of the missing steps to the end goal. For example, an end user selects “phone call” as the first step, the planner 214 suggests “phone number” as a closely associated input possibility via the end user interface 236, which enables the end user to discover suggestions such as “menu item.” These suggestions enable an end user to enter the plan sketch “lasagna—phone call” via the end user interface 236, and the planner 214 writes a sequence of steps that amount to “find someone who sells/has lasagna, and call that someone.” The Explorer UI elicits a goal from an end user, such as sorting suggested goals by relevance, prioritizing the output of actions. The Explorer UI may elicit a sub-goal, a property of the original requested goal—such as the name of a director name for a movie, from a user or continue with the original goal. The Explorer UI suggests signals by walking the concept action network graph from the goal via extensions and action objects and finding primitive inputs, without suggesting inputs that have already been selected and are not multi-cardinal. The Explorer UI repeats suggesting signals and finding primitive signals until an end user indicates a selection or until there are no more available signals. After an end user indicates their selection, the execution engine 252 executes the plan using the inputs and the goal. If the there is an interruption, the Explorer UI prompts for the interruption if the interrupted concept object is a primitive, otherwise the Explorer UI sets the goal to the interrupted concept object and begins suggesting signals and finding primitive signals. The example user interface 1400 elicits an intent structure centered around locating a movie. Intent is not only possible from explicit indications, but may be inferred via integration with other mobile, touch, or window/desktop applications. All user interaction may be via multiple modalities, such as typed entry of text via a real or virtual keyboard, or similar substitutions, touch and mouse gestures, speech, and combinations of the above. Any entity within an end user application that is selected or represented may be starting points for interactions that involve a set of concept objects and action objects in the concept action network 212. Selection of pieces of information via an indication such as typing in a text box, having keyboard focus on a window or an object on screen, a mouse or touch gesture on a displayed object, or a natural language reference to an object may be used to select concept object values. An end user application may also represent contextual information, such as a document that is currently being edited, a geospatial location, contact information such as name, address or phone number, or any other piece of information offered to, stored, or elicited from an end user by an end user application. Such pieces of information may be referred to as cues. Given a set of cues from an end user's use of an end user application, at any given point, the system 200 may link cues to corresponding concept action network objects or to intents in several ways. The system 200 may link cues or sets of cues to: 1) corresponding concept objects, action objects, renderings, or other information within the concept action network 212; 2) formal descriptions of intents; 3) natural language hints that may be used to describe intents; and 4) combinations of the above, such as a formally represented intent, combined with additional hints or inputs in natural language, and several additional concept objects corresponding to some of the cues. For example, within any end user application that shows business listings, such as a touch-based map application, a web-based or mobile phone application restaurant review portal, or a search results page, an end user may select a business using appropriate modality, and then see business details. This selection allows integration with concept action network-based follow ups. In another example, while using a mapping application, an end user may ask “what are the hours of that African restaurant in Adams Morgan,” the end user application, based on the context of the user looking at a map of that part of Washington, D.C., provides neighborhood restrictions on the lookup of restaurants, and the system 200 infers intent and provides execution. In addition, the mapping application may maintain references to concept object values for all objects on display, and provide those as cues directly to provide concept action network-based follow ups. In yet another example, on any representation of an object within an end user application, the end user application may offer contextual follow ups, such as menus, based on actions that correspond to actions and follow ups within the concept action network 212. Illustrating this example, an end user clicks on a calendar item, and sees a list or menu of additional actions for that calendar item, such as “invite others,” “create social network invitation,” etc. The execution engine 252 may interact with an end user through dialog. Dialog is modeled declaratively and may consist of a string template of dialog content, possibly including dependent references to other dialog declarations or runtime values, the general phase of execution in which the template applies, such as before an action evaluation, accompanying a selection prompt, or at a successful result view, the specific execution context in which the template applies, such as a restaurant, the PhoneNumber projected from an EventVenue, and the GeoRegion constraint to the FindBusiness action, zero or more contextual conditions, such as input/output modality, time of day, location, user preferences, or previous usage history. The system 200 abstracts the details of selection and presentation from end users and third-party developers, taking into account past renderings, the active output modality, user preferences, and information coverage/gain, amongst other things. The system 200 automatically renders concept object values, often taking the form of query results, with respect to declarative specifications. This automatic rendering is beneficial because it allows for different modalities, it requires third-party developers to think about the data model in a multimodal compatible manner, and it requires third-party developers to be explicit about relationships between data. The system 200 may mix and match different pieces of concept objects from different sources, such as injected layout exponential personal capabilities and presentation adaptive layout for mode, situation, and/or context. Automatically rendering concept object values with respect to declarative specifications enables the intelligent summarization of results, such as removing repeated data presenting the most relevant fragments of data, and enables intelligent, graceful degradation in the presence of bad/incomplete data to highlight contextual relevance. The system 200 may intelligently highlight results based on what an end user requested, such as highlighting selected pizza category restaurants, and enables provenance-aware rendering, such as highlighting branded data or merged data. Fully modeling the layout provides essential advantages. The system 200 structures data in a more linguistic manner and different representations of the same content support multiple platform and form factors. The system 200 renders data based on statically typed structural data, such as concept objects, from the concept action network 212, as well as contextual information, such as the rendering modality and environment, user preferences, modeling details, including structural data about the concept objects, relative placement constraints, hints about importance of displaying different pieces of content or properties within concept objects, and the set of available templates or forms and other rendering data. The goal includes a plan for what to render and how to render it for a given modality. During a planning phase, the system 200 performs optimization over possible renderings to best fit a desired set of goals, which may be implemented by optimizing an objective function, and renders the goals based on constraints, relative placement, and/or templates. Rendering layout may be performed server side, and optimized for lower latency, or higher quality of service, interactive use. The system 200 may minimize the amount of data sent to the clients 202-204 while still maintaining the original data structure on the first server 206 by pre-computing what data is shown to an end user in each frame. Interactive components may trigger a roundtrip to the first server 206, with the option of prefetching and pipelining the interactive responses. The system 200 implements learning-based prefetching based on an interactive user interface. By analyzing user interaction usage, the system 200 determines which interactive elements, or types of interactive elements, should be pre-fetched/pipelined to the clients 202-204 and in what order, which allows for the optimal balance. In an embodiment, the layout may be hierarchical, automatic, and template based. A set of templates may be designed to layout images, text, and buttons on a screen. These templates may have various priorities and hints assigned to text/button/image regions. The system 200 automatically lays out concept objects without explicit layout information on the concept object itself by matching the appropriate concept priorities/hints to template priorities and hints. In addition to displaying results in dedicated applications, such as a dedicated interactive user interface, the system 200 may embed results, dialog, and interactions with concept action network execution within end user applications wherever it may be useful for an end user. An interaction that begins from within an end user application may also display its results there. For example: the system 200 may overlay results on, combine results with, or interleave results with objects displayed in an existing end user application. The system 200 may display dialog or textual interactions within the same interaction patterns of an end user application. Examples include forms, dialog boxes, touch, keyboard or mouse-oriented menus, graphical placements of objects in visual positions, such as maps or charts, and stylistic elements such as making a contact or address appear in a certain format. Since individual services are typically built by different third-party developers, a key challenge is to reconcile three goals, the easy integration of third-party services into the system 200 by third-party developers, a high level of interoperability between these services, and a high level of quality of services offered to end users. Historically, most approaches to such a challenge are to offer a platform where third-party developers contribute their services, and interoperability is possible via the platform. However, one challenge is that such platforms for integrating third-party services may only be successful when all stakeholders have incentives to use the platform cooperatively, so each participant receives desired benefits, end users have a rewarding experience, making use of the best service for each situation. Third-party developers are compensated for value they offer end users or other parties. Other contributors, such as data providers and end users who edit or contribute content, are also incentivized to help improve user experience. Advertisers may reach appropriate audiences effectively. Mechanisms for building a marketplace of data and services are described in the context of a platform that supports the marketplace. For example, the platform may be the dynamically evolving cognitive architecture system based on third-party developers 200 described above, or any other software framework that allows contributions of services and interoperability between these contributions. The platform offers a collaboratively extensible environment for description of data and interoperable services, built from objects and relations between objects, and uses services to handle requests. A platform may include software services hosted by third parties, which are not part of the platform, objects which include data types passed to and from services, operations that may be performed by the platform, user interface and dialog descriptions, cues for natural language processing, functions that are executable or declarative software code that implement operations, and that may access data or other services, and data, which may be any information stored by the platform and accessed by functions. A platform may also include developer tools, such as editors for objects, and mechanisms for data ingestion or upload, allow contributors to offer new functionality, and a shared, visible repository for the declarations of these objects. This may be a centralized or distributed storage system, such as a database. Contributors are people or organizations offering data, services, and/or objects for use in a platform. Advertisers are a type of contributor that may offer content for delivery to end users in exchange for compensation. Compensation to contributors may take many forms, including real or virtual currency, and/or other benefits, such as public recognition, and/or increased opportunities for use of a platform. Invocation may be a single use of a function on behalf of an end user. For example, a platform runs executable software code on a specific input, possibly via remote services, such as looking up a city name from a postal code via a geocoding service. A request from an end user may be expressed as an intent to achieve a desired outcome that may be achieved by a combination of invocations. An object makes a contribution to the handling of a request if it is a function and it is invoked, or if it is another object and its definition is used to service a request. A visit is a view of a web page by an end user, or other form of digitally mediated user attention, such as an end user impression of an advertisement, or interaction with a widget or game. Traffic is quantitatively measured visits or contributions to services. Measurements may be in aggregate numbers of visits, level of engagement by an end user, or other more complex numeric representations of total contributions and visits. The marketplace for services is a set of processes and technical mechanisms to encourage effective use of the platform. The processes and mechanisms are designed to achieve the goals of high quality of individual services, in terms of data quality and completeness, features, and any other aspects that affect end user experience. Another marketplace goal is interoperability with other services, so that contributors may derive benefits from others' contributed objects and data, both via explicit dependencies and via automated means supported by a platform. Other marketplace goals include software code reuse and consistency, so that contributors may do this with less software engineering effort, accurate indications of suitability, via metadata and dynamic measurements, so that a platform may accurately determine when services are suitable for a request, and performance, including low latency, low cost to serve requests, and other metrics. The parties within a marketplace are the end users, a platform operator, and contributors of several types. The contributors may play several roles in the marketplace. Content application program interface providers desire branding, to sell advertising, and/or to sell access to restricted content. Data providers and data curators want recognition, payment for all content, and/or payment for enhanced or premium content. Transaction providers desire branding and transactions via selling of some good or service. Advertisers desire traffic from qualified end users. A single person or organization may play more than one of these roles. A platform may offer technical mechanisms for handling an end user request and invoking and combining services to respond to it. A challenge of a marketplace is to select and prioritize the services that are used, so that goals of different parties are met. Selection relies on accurate accounting of service usage and contributions. A platform may be instrumented to maintain current information, such as contributions per contributor and per object and per group of objects, including invocation contexts, number of invocation times, implicitly and explicitly expressed end user experience metrics, and performance metrics. Traffic management may include desired limits on whether a service or object may handle a request. For example, restrictions may be expressed by number of requests, by type of request, by rate, such as a number of requests per minute. In addition, these quotas may be expressed individually per end user, or for sets of end users. A traffic quota for an object is a representation of such desired traffic constraints for contributions from an object or service. A platform may provide mechanisms for enforcement of traffic quotas. In many situations a platform may choose services to meet explicitly known constraints. These may include contractual goals on service use, in which specific contributors may have traffic or data driven constraints, such as number of requests per hour, or requests containing a specific keyword or involving a certain geographic region. A platform may use standard mechanisms to ensure execution meets specific contractual needs, such as using certain services, white labeling avoiding certain services, and packaging of dependent services. End user expressed approvals are approvals made by an end user, either in response to a request, or via a previous selection of a service via existing phone/social network applications, or via explicit preference over services or categories of services. Contributed services may be reviewed by a single reviewing authority, such as the platform operator, to determine if they meet desired goals for authority based approvals. Services may have provisional approval for specific traffic levels, or for specific periods of time, or be unconditionally approved for use at any level. A platform may directly use traffic management facilities to ensure these goals are met for explicit selection mechanisms. Assuming a service meets explicitly specified restrictions, a platform may control traffic via implicit means, via a continuous process that begins by the assignment of initial traffic quotas via a policy. The automatic traffic control mechanism may maintain a set of current quotas which are enforced by a platform. Handling of requests may result in new analytics data, which a platform may use to update a set of current quotas. The initial quotas for services or objects may involve the speculative assignment of traffic based on initial indicators. A platform may dynamically rank objects and services according to the analytics provided by the platform, and dynamically adjust traffic quotas. Analytics signals that may contribute to traffic quota assignment include performance, including latency, automatically measured response quality, such as via known sentinel queries, or contributed test cases from contributors or users, precision/recall based on implicit user feedback, such as frequency of follow up queries, precision/recall based on explicit user feedback, such as a thumbs up or thumbs down selected by an end user in a user interface, after receiving a response, evaluations from human evaluators, such as from paid evaluators, or from other third party services, and proxy ranking off other indicators, such as a contributor's web domain ranking, or the ranking of that contributor's applications in an a publicly browsable app store. A traffic assignment policy, whereby quotas are determined from these signals, may be fixed set of rules, or determined via more complex algorithms, including machine learning based approaches. A few other processes may supplement the processes described above, such as automatic reporting of analytics and ranking data in a forum for third-party developers, end users, and the public to peruse, and to offer recognition to exceptional contributions. Another process may be the curation of services and objects based on review/approvals for categories or services, and peer reviews/curation. Yet another process may include service tiers, in which a platform maintains metadata on all services and objects, so that different levels of stability are simultaneously available, such as bleeding edge, beta, and stable. End users may opt into the tier of their choice. Further processes may include promotion and discovery of services, such as end user facing features for discovery of available services based on suitability, intent elicitation from end user based on available services, and prioritization based on payment category of service, such as free, paid, freemium, etc. A marketplace may support accounting and controls on all contributions from services and objects, enabling parties in the marketplace to enter into a variety of transactions: End users may pay to use services or objects, contributors may pay other contributors on which they depend, contributors may pay end users or other curators for help improving their services, contributors may pay the platform operator for operations of their services, and advertisers may pay the platform operator to obtain traffic or visits. In each of these cases, payment may be any form of compensation, immediately, or in the form of an agreement. Examples of end user transactions include free, but limited quantity or via promotion, purchase per request or by subscription, and freemium, for which limited features are free and premium features require a fee. The platform may charge contributors based on a variety of metrics, such as the number of objects contributed, the number of objects making contributions to end user requests, traffic levels, and the amount of data stored. A platform operator may adjust traffic quotas based on a variety of compensation from advertisers. A key approach may be via bid and auction mechanisms using real or virtual currency. A platform may select bids via an auction mechanism, which may include ranking based on a variety of factors, including bid price, contributor, object, or group scores, user preferences, current situation, time of day, geographic location, current or upcoming calendar events, etc., and known preference history based on specific attributes, preferred services. Advertisers may bid for traffic that captures contextual moments that fall outside of traditional keyword matching sponsored links, such as hotels bidding to be the first choice offer for airline weather delays near airports, bars bidding to offer drink specials to 21-35 year olds in the vicinity with a Klout score over 55, restaurants bidding to offer drink/dinner specials to sports fans in the time, and location vicinity of large games or events. In another example, the platform may use a trusted personality algorithm to promote timely sponsored service suggestions based not only on intent inference but also using known preference history based on specific attributes, preferred services and context information such as time of day and location information. Offers may be filtered through probability of attractiveness filters and delivered via proactive suggestions from the assistant via dialog alert. An exemplary hardware device in which the subject matter may be implemented shall be described. Those of ordinary skill in the art will appreciate that the elements illustrated in FIG. 15 may vary depending on the system implementation. With reference to FIG. 15, an exemplary system for implementing the subject matter disclosed herein includes a hardware device 1500, including a processing unit 1502, a memory 1504, a storage 1506, a data entry module 1508, a display adapter 1510, a communication interface 1512, and a bus 1514 that couples elements 1504-1512 to the processing unit 1502. The bus 1514 may comprise any type of bus architecture. Examples include a memory bus, a peripheral bus, a local bus, etc. The processing unit 1502 is an instruction execution machine, apparatus, or device and may comprise a microprocessor, a digital signal processor, a graphics processing unit, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), etc. The processing unit 1502 may be configured to execute program instructions stored in the memory 1504 and/or the storage 1506 and/or received via the data entry module 1508. The memory 1504 may include a read only memory (ROM) 1516 and a random access memory (RAM) 1518. The memory 1504 may be configured to store program instructions and data during operation of the device 1500. In various embodiments, the memory 1504 may include any of a variety of memory technologies such as static random access memory (SRAM) or dynamic RAM (DRAM), including variants such as dual data rate synchronous DRAM (DDR SDRAM), error correcting code synchronous DRAM (ECC SDRAM), or RAMBUS DRAM (RDRAM), for example. The memory 1504 may also include nonvolatile memory technologies such as nonvolatile flash RAM (NVRAM) or ROM. In some embodiments, it is contemplated that the memory 1504 may include a combination of technologies such as the foregoing, as well as other technologies not specifically mentioned. When the subject matter is implemented in a computer system, a basic input/output system (BIOS) 1520, containing the basic routines that help to transfer information between elements within the computer system, such as during start-up, is stored in the ROM 1516. The storage 1506 may include a flash memory data storage device for reading from and writing to flash memory, a hard disk drive for reading from and writing to a hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and/or an optical disk drive for reading from or writing to a removable optical disk such as a CD ROM, DVD or other optical media. The drives and their associated computer-readable media provide nonvolatile storage of computer readable instructions, data structures, program modules and other data for the hardware device 1500. It is noted that the methods described herein may be embodied in executable instructions stored in a computer readable medium for use by or in connection with an instruction execution machine, apparatus, or device, such as a computer-based or processor-containing machine, apparatus, or device. It will be appreciated by those skilled in the art that for some embodiments, other types of computer readable media may be used which may store data that is accessible by a computer, such as magnetic cassettes, flash memory cards, digital video disks, Bernoulli cartridges, RAM, ROM, and the like may also be used in the exemplary operating environment. As used here, a “computer-readable medium” may include one or more of any suitable media for storing the executable instructions of a computer program in one or more of an electronic, magnetic, optical, and electromagnetic format, such that the instruction execution machine, system, apparatus, or device may read (or fetch) the instructions from the computer readable medium and execute the instructions for carrying out the described methods. A non-exhaustive list of conventional exemplary computer readable medium includes: a portable computer diskette; a RAM; a ROM; an erasable programmable read only memory (EPROM or flash memory); optical storage devices, including a portable compact disc (CD), a portable digital video disc (DVD), a high definition DVD (HD-DVD™), a BLU-RAY disc; and the like. A number of program modules may be stored on the storage 1506, the ROM 1516 or the RAM 1518, including an operating system 1522, one or more applications programs 1524, program data 1526, and other program modules 1528. A user may enter commands and information into the hardware device 1500 through data entry module 1508. The data entry module 1508 may include mechanisms such as a keyboard, a touch screen, a pointing device, etc. Other external input devices (not shown) are connected to the hardware device 1500 via an external data entry interface 1530. By way of example and not limitation, external input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like. In some embodiments, external input devices may include video or audio input devices such as a video camera, a still camera, etc. The data entry module 1508 may be configured to receive input from one or more users of the device 1500 and to deliver such input to the processing unit 1502 and/or the memory 1504 via the bus 1514. A display 1532 is also connected to the bus 1514 via the display adapter 1510. The display 1532 may be configured to display output of the device 1500 to one or more users. In some embodiments, a given device such as a touch screen, for example, may function as both the data entry module 1508 and the display 1532. External display devices may also be connected to the bus 1514 via the external display interface 1534. Other peripheral output devices, not shown, such as speakers and printers, may be connected to the hardware device 1500. The hardware device 1500 may operate in a networked environment using logical connections to one or more remote nodes (not shown) via the communication interface 1512. The remote node may be another computer, a server, a router, a peer device or other common network node, and typically includes many or all of the elements described above relative to the hardware device 1500. The communication interface 1512 may interface with a wireless network and/or a wired network. Examples of wireless networks include, for example, a BLUETOOTH network, a wireless personal area network, a wireless 802.11 local area network (LAN), and/or wireless telephony network (e.g., a cellular, PCS, or GSM network). Examples of wired networks include, for example, a LAN, a fiber optic network, a wired personal area network, a telephony network, and/or a wide area network (WAN). Such networking environments are commonplace in intranets, the Internet, offices, enterprise-wide computer networks and the like. In some embodiments, the communication interface 1512 may include logic configured to support direct memory access (DMA) transfers between the memory 1504 and other devices. In a networked environment, program modules depicted relative to the hardware device 1500, or portions thereof, may be stored in a remote storage device, such as, for example, on a server. It will be appreciated that other hardware and/or software to establish a communications link between the hardware device 1500 and other devices may be used. It should be understood that the arrangement of the hardware device 1500 illustrated in FIG. 15 is but one possible implementation and that other arrangements are possible. It should also be understood that the various system components (and means) defined by the claims, described below, and illustrated in the various block diagrams represent logical components that are configured to perform the functionality described herein. For example, one or more of these system components (and means) may be realized, in whole or in part, by at least some of the components illustrated in the arrangement of the hardware device 1500. In addition, while at least one of these components are implemented at least partially as an electronic hardware component, and therefore constitutes a machine, the other components may be implemented in software, hardware, or a combination of software and hardware. More particularly, at least one component defined by the claims is implemented at least partially as an electronic hardware component, such as an instruction execution machine (e.g., a processor-based or processor-containing machine) and/or as specialized circuits or circuitry (e.g., discrete logic gates interconnected to perform a specialized function), such as those illustrated in FIG. 15. Other components may be implemented in software, hardware, or a combination of software and hardware. Moreover, some or all of these other components may be combined, some may be omitted altogether, and additional components may be added while still achieving the functionality described herein. Thus, the subject matter described herein may be embodied in many different variations, and all such variations are contemplated to be within the scope of what is claimed. In the descriptions above, the subject matter is described with reference to acts and symbolic representations of operations that are performed by one or more devices, unless indicated otherwise. As such, it is understood that such acts and operations, which are at times referred to as being computer-executed, include the manipulation by the processing unit of data in a structured form. This manipulation transforms the data or maintains it at locations in the memory system of the computer, which reconfigures or otherwise alters the operation of the device in a manner well understood by those skilled in the art. The data structures where data is maintained are physical locations of the memory that have particular properties defined by the format of the data. However, while the subject matter is described in a context, it is not meant to be limiting as those of skill in the art will appreciate that various of the acts and operations described hereinafter may also be implemented in hardware. To facilitate an understanding of the subject matter described above, many aspects are described in terms of sequences of actions. At least one of these aspects defined by the claims is performed by an electronic hardware component. For example, it will be recognized that the various actions may be performed by specialized circuits or circuitry, by program instructions being executed by one or more processors, or by a combination of both. The description herein of any sequence of actions is not intended to imply that the specific order described for performing that sequence must be followed. All methods described herein may be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. While one or more implementations have been described by way of example and in terms of the specific embodiments, it is to be understood that one or more implementations are not limited to the disclosed embodiments. To the contrary, it is intended to cover various modifications and similar arrangements as would be apparent to those skilled in the art. Therefore, the scope of the appended claims should be accorded the broadest interpretation so as to encompass all such modifications and similar arrangements. |
Last weekend I released a version of Coverage.py for Python 3.x. Getting to that point took a while because 3.x was new to me, and, it seems, everyone is still figuring out how to support it. I experimented with using 2to3 to create my 3.x code from my 2.x code base, and that worked really well, see Coverage.py on Python 3.x for some details. For a while, I developed like this, with 3.x code translated by 2to3 so that I could run the tests under Python 3.1. But then I had to figure out how to package it. I didn’t want to have to create a separate package in PyPI for the 3.x support. I tried for a while to make one source package with two distinct trees of code in it, but I never got setup.py to be comfortable with that. Setup.py is run during kitting, and building, and installation, and the logic to get it to pick the right tree at all times became twisted and confusing. (As an aside, setuptools has forked to become Distribute, and they’ve just released their Python 3 support which includes being able to run 2to3 as part of build and install. That may have been a way to go, but I didn’t know it at the time.) Something, I forget what, made me consider having one source tree that ran on both Python 2 and Python 3. When I looked at the changes 2to3 was making, it seemed doable. I adapted my code to a 2-and-3 idiomatic style, and now the source runs on both. Changes I had to make: ¶ I already had a file called backward.py that defined 2.5 stuff for 2.3, now I also used it to deal with import differences between 2 and 3. For example: try : from cStringIO import StringIO except ImportError : from io import StringIO and then in another file: from backward import StringIO ¶ exec changed from a statement to a function. Syntax changes like this are the hardest to deal with because code won’t even compile if the syntax is wrong. For the exec issue, I used this (perhaps too) clever conditional code: # Exec is a statement in Py2, a function in Py3 if sys . hexversion > 0x03000000 : def exec_function ( source , filename , global_map ): """A wrapper around exec().""" exec ( compile ( source , filename , "exec" ), global_map ) else : # OK, this is pretty gross. In Py2, exec was a statement, but that will # be a syntax error if we try to put it in a Py3 file, even if it isn't # executed. So hide it inside an evaluated string literal instead. eval ( compile ( """ \ def exec_function(source, filename, global_map): exec compile(source, filename, "exec") in global_map """ , "<exec_function>" , "exec" )) ¶ All print statements have to adopt an ambiguous print(s) syntax. The string to be printed has to be a single string, so some comma-separated lists turned into formatted strings. ¶ 2to3 is obsessive about converting any d.keys() use into list(d.keys()), since keys returns a dictionary view object. If the dict isn’t being modified, you can just loop over it without the list(), but in a few places, I really was returning a list, so I included the list() call. ¶ A few 2to3 changes are fine to run on both, so these: d . has_key ( k ) d . itervalues () callable ( o ) xrange ( limit ) became: k in d d . values () hasattr ( o , '__call__' ) range ( limit ) ¶ Exception handling has changed when you want to get a reference to the exception. This is one of those syntax differences, and it’s structural, so a tricky function definition isn’t going to bridge the gap. Where Python 2 had this: try : # .. blah blah .. except SomeErrorClass , err : # use err now Python 3 wants: try : # .. blah blah .. except SomeErrorClass as err : # use err The only way to make both versions of Python happy is to use the more cumbersome: try : # .. blah blah .. except SomeErrorClass : _ , err , _ = sys . exc_info () # use err This is uglier, but there were only a few places I needed it, so it’s not too bad. ¶ Simple imports are relative or absolute in Python 2, but only absolute in Python 3. The new relative import syntax in Python 3 won’t compile in Python 2, so I can’t use it. I was only using relative imports in my test modules, so I used this hack to make them work: sys . path . insert ( 0 , os . path . split ( __file__ )[ 0 ]) # Force relative import from myotherfile import MyClass By explicitly adding the current directory to the path, Python 3’s absolute-only importer would find the file alongside this one in the current directory. ¶ One area that still tangles me up is str/unicode and bytes/str. Python 3 is making a good change here, but it feels like we’re still in transition. The docs aren’t always clear on what will be returned, and trying to get the same code to do the right thing under both versions still seems to require experiments with decode and encode. After making all of these changes, I had a single code base that ran on both Python versions, without too much strangeness. It’s way better than having to maintain two packages at PyPI, or trying to trick setup.py into installing different code on different versions. Others have written about the same challenge: Stephan Deibel supports 2.0 through 3.1! Ryan Kelly has some useful tips on the string issues. Fabio Zadrozny has more specifics. |
FIA World Rally Championship star Andreas Mikkelsen and reigning Red Bull Global Rallycross champion Scott Speed will be joining the regular competitors for the first round of the 2016 Audi Sport TT Cup at the Hockenheimring this weekend Sixteen permanent entrants will battle it out with Mikkelsen and Speed over the weekend around the 4.574km circuit. “We have a very good mix of rookies and seasoned campaigners who competed in the Audi Sport TT Cup last year,” says Project Leader Philipp Mondelaers. New for 2016 is the Rookie class which will see ten new faces joining the line-up which is sure to shake things up for the regular competitors, “Following the impressions from the tests, I’m expecting to see very close races and a lot of variety on the podiums,” says Chris Reinke, Head of Audi Sport customer racing. Competitors will get a practice session on Friday followed by a 30-minute qualifying session on Saturday morning. Race action will be at 12:10 Saturday and 16:20 Sunday local time. Both rounds will be broadcast by live streaming at www.audimedia.tv. 2016 Audi Sport TT Cup permanent entrants with car numbers and car colors #2 Strohschänk, Kevin (D, *May 24, 1989), Rookie – Green #3 Rdest, Gosia (PL, *January 14, 1993) – Blue #4 Lappalainen, Joonas (FIN, *March 1, 1998) – Gray #5 Nielsen, Nicklas (DK, *February 6, 1997), Rookie – Yellow #6 Lefterov, Pavel, (BG, *November 12, 1997), Rookie – Orange #7 Hofbauer, Christoph (D, *July 15, 1991) – Green #11 Hofer, Max (A, *May 23, 1999), Rookie – Gray #12 Larsson, Simon (S, *May 13, 1997), Rookie – Gray #14 Caygill, Josh (GB, *June 22, 1989) – Yellow #23 Ellis, Philip (GB, *October 9, 1992), Rookie – Gray #27 Marschall, Dennis (D, *August 15, 1996) – Yellow #31 van der Linde, Sheldon (ZA, *May 13, 1999), Rookie – Blue #33 Lindholm, Emil (FIN, *July 19, 1996) – Blue #42 Egsgaard, Patrick (DK, *December 15, 1994), Rookie – Yellow #76 Holton, Paul (USA, *October 11, 1996), Rookie – Orange #91 Meyer, Yves (CH, *June 12, 1991), Rookie – Green |
We’re one of Northern Colorado’s newest game and comic stores, located in Windsor, CO! Heroes and Horrors Games & Comics carries fine quality board and card games for all ages. We sell items for collectible card games, role playing games, and Warhammer. We are proud to have one of the largest collections of Magic the Gathering card singles for sale in Northern Colorado. In addition to all those games, Heroes and Horrors carries a huge variety of comics, manga, graphic novels, and collectible figures. We sell used sci-fi and fantasy books for your reading enjoyment. The store has a growing selection of used video games as well. Come Play with Us! Participate in one of our weekly game events or try out a new board game during open play time. Our game room has seating for 24 and a growing game library of over 160 card and board games. Currently the game room is available for open play: Tuesday through Friday from 2:30 to 6:00 p.m. Thursday from 6:00 to 9:30 p.m. Saturday from noon to 5:oo p.m. Sunday from 5:30 to 9:30 p.m. These times may change as new groups form or others change days. Feel free to give us a call, (970) 833-5128, with any questions. See our Calendar for the listing of current organized play events. We regularly have Magic the Gathering tournaments, Warhammer 40K, Dungeons & Dragons, Pathfinder, and board game night. |
This article was updated on May 19 to include World Cup Qualification matches for Guatemala, St. Kitts and Nevis, and Canada. Fletcher Whiteley contributed to this article. Today marks the first day FC Dallas is training without what will be a good number of absences due to international duty for a variety of Oscar Pareja’s squad as Kellyn Acosta is in Australia in preparation for the US U-20s run in the FIFA U-20 World Cup. A number of players are soon to follow. This is a quick breakdown of what we expect to see. JeVaughn Watson – Jamaica – Copa America – probably leaves after the May 29 match against Sporting Kansas City. Jamaica also plays in the Gold Cup but we think there is a chance FC Dallas asked Jamaica to only take Watson for one of those matches. Blas Perez – Panama – Gold Cup – probably leaves after the June 19 match against the Colorado Rapids or June 26 match against the Houston Dynamo. Kyle Bekker – Canada – Gold Cup – probably leaves after the June 19 match against the Colorado Rapids or June 26 match against the Houston Dynamo. Canada also has World Cup Qualifiers on June 11 and June 16. Matt Hedges – USA – Gold Cup – might leave after the June 19 match against the Colorado Rapids or June 26 match against the Houston Dynamo, if he makes the team. Moises Hernandez – Guatemala – Gold Cup – might leave after the June 19 match against the Colorado Rapids or June 26 match against the Houston Dynamo, if he makes the team. Guatemala also has World Cup Qualifiers on June 12 and June 15. Tesho Akindele – Canada/USA – Gold Cup – might leave after the June 19 match against the Colorado Rapids or June 26 match against the Houston Dynamo, if he makes the team. Canada also has World Cup Qualifiers on June 11 and June 16. Atiba Harris – St. Kitts and Nevis – World Cup Qualification – probably leaves after the May 29 match but possibly after the June 7 match at San Jose for games on June 11 and June 16. Walker Zimmerman – USA U23 – Toulon Tournament and Olympic Qualifying – The Toulon Tournament is May 27-June 7. If he makes the squad, he will miss some key games. The Olympic Qualifying Tournament is in the first two weeks of October and the team has games in September leading into that tournament. Jesse Gonzalez – Mexico U20 – Same schedule as Accosta, has been with Mexico for a few weeks now. Alejandro Zendejas – USA U17 – The U17 FIFA World Cup is in the second half of October. Expect him to leave at the start of that month. |
WASHINGTON -- Scott Gillis sat in the House balcony on Thursday, watching a speech by Rep. Tammy Duckworth (D-Ill.). The last time Gillis had seen her, she was unconscious, bleeding profusely and in need of life-saving surgery. Gillis was one of the medics who helped save Duckworth's life in 2004. Back then, he was an Army sergeant stationed in Iraq, and Duckworth was rushed into Gillis' hospital tent after her helicopter was hit by a rocket-propelled grenade. Before passing out, Duckworth, an Army pilot, somehow managed to help land the helicopter, despite injuries that led to both of her legs being amputated and one of her arms being damaged. Gillis was there to receive her, helping to stabilize her before she was flown to Germany for emergency surgery. He never saw her after that. Despite having treated more than 2,000 soldiers during the war, Gillis said he always remembered Duckworth. There were a couple of things about her that stood out. "The grotesqueness of her injuries and that she was a woman," said Gillis, now 40 and living in Northern Virginia. "We also got briefed as to what happened to our patients when we got them." Eight years went by before he thought of her again. In August 2012, he watched his TV with disbelief as someone named Tammy Duckworth walked out on stage at the Democratic National Convention with prosthetic limbs, talking about her military experience and her run for Congress. That's when it began to register that not only had Duckworth survived, but she had gone on to make something of herself. It was surprisingly painful for Gillis. "When I finally made the connection as to who she was, I wasn't right for three days," he said. "I hadn't realized that I never found out what had become of any of my patients that lived. She was my first one. You would think it would have had a happier effect on me, but I think it opened a box I didn't know existed." He added, “People died. You kind of know how it went for them.” This Huffington Post reporter, who is friends with Gillis' wife Melissa, heard Gillis' story over dinner one night in the spring of 2013. After a series of messages between Gillis and Duckworth's congressional office, a meeting was finally set for Oct. 3 in a quiet room in the Capitol. The two sat together for more than half an hour and shared stories. When HuffPost wandered in, it was obvious both were stunned at what was happening. By the end, they were laughing like old friends. "I don't remember anything," Duckworth said of being brought into Gillis' tent, joking about intubation being more painful than her legs being amputated. "I might have an old complaint card if you want to fill that out," Gillis said. "Oh yeah, would you? That'd be great," she replied. "He said I was unconscious, but later on ..." Duckworth said, before Gillis jumped in: "She was ignoring me." Duckworth replied, "I was pretending to be dead, hoping he would go away." Duckworth eventually had to head to the House floor, but their time together didn't end there. Gillis sat with Duckworth's staff in the balcony and watched as she spoke below about the need to ensure veterans are taken care of during the government shutdown. Two days later, Gillis was Duckworth's guest at a dinner for wounded warriors. He said he couldn't get over how nice she was to him. "She was just so familiar. The first thing she did was give me a hug. I was so blown away," Gillis said afterward. "I must have told her 25 times, 'I just can't believe I'm sitting here with you.' She would be like, 'Alright, I need another big hug.' I'm like, 'Oh my god, you're a real person. This job didn't somehow fuck your head up.'" Gillis says he doesn't know when he may talk to Duckworth again, but the fact that he got to meet her at all has had a huge effect on him -- and his process of healing from the horrors he endured in Iraq. |
The Liga leaders could lose a host of their young talents, with Julio Pleguezuelo set to join Arsenal, while Sergi Canos is attracting interest from Liverpool and Tottenham By Duncan Castles Chelsea have agreed a deal to sign 16-year-old Barcelona starlet Josimar Quintero at the end of the season, with the Liga leaders braced to lose several promising talents to the Premier League.The Ecuadorian attacking midfielder has told the Spanish club that he will not be taking up their offer of a senior contract, which will enable him to join Roman Abramovich's outfit this summer for a nominal fee.A fast and direct creator of chances from wide or central positions, Josimar joins defender Julio Pleguezuelo in the latest exodus of Barcelona's youngsters.Pleguezuelo, a player in the mould of Carles Puyol, has already told staff at Barca that he is leaving for Arsenal in the summer, while 16-year-old forward Sergi Canos is actively encouraging offers from English sides.Canos, one of three Barca players called up by Spain for an international tournament against France, Italy and the Czech Republic in April, has been pursued by Liverpool and Tottenham. Like Josimar and Pleguezuelo, the striker has made it clear to his English suitors that financial terms significantly superior to those on offer at Camp Nou will convince him to move abroad.The players' first professional contract offers a window for Premier League sides to take advantage of Barcelona's much-admired academy programme. Fifa rules prevent individuals under the age of 16 from moving overseas except under special circumstances, but also bar academies from signing their best graduates to long-term professional contracts until they have reached that age.Should a club from another European league wish to offer them an alternative deal at 16 they must only pay the developing side Fifa-mandated compensation in lieu of a transfer fee. The maximum sum due for for a player who has spent four years in a “Category 1” club such as Barcelona is €360,000.Scouting then poaching youngsters from Barca's Under-16s has become a common strategy for the Premier League's more affluent clubs. Arsenal targeted Cesc Fabregas in 2003, rapidly turning him into a regular first-team player and eventually making him their captain before he forced a Camp Nou return for €41 million eight years later. Gerard Pique joined Manchester United in 2004, returning to Catalunya four seasons later for €6m. |
Guerrilla Games has ditched experience point gain for Killzone Shadow Fall's multiplayer. The Dutch developer has instead opted for a challenge-based system for the PlayStation 4 exclusive first-person shooter. Completing a challenge adds a point to your rank, Guerrilla explained in a blog post, which in turn rewards weapon attachments and ability enhancements. Guerrilla said there will be over 1500 challenges in the game when it launches alongside the PlayStation 4 this November. An example of a simple challenge is "Destroy 1 Turret". An example of a more complex challenge is "Kill 1 enemy player with Laser Tripmine while they are carrying a Beacon". Elsewhere, you can trigger temporary bonuses, called Combat Honours, by earning enough points during a round. These last only as long as your play session, so when you quit a match you lose them. In-match, they're stackable, and you can unlock as many as you put points into. As for the weapons, Guerrilla said they're all skill based, and promised Shadow Fall won't include recoil-less or auto-aiming guns. You can augment the weapons, though, with up to two different attachments at once. And here's something a bit different: the Spotlight System. At the end of each round players see a brief scene featuring the three top players from the winning side and the top player from the losing side. One of the winning players gets to select a Spotlight move to celebrate his or her victory over the losing players. If you fail to execute the move in time, the losing side gets the chance to perform a countermove. Shadow Fall ships with a wide selection of Spotlight moves, and more will be added post-launch. As previously revealed, Shadow Fall lets you add online and offline bots to multiplayer. You can add bots to online matches, with human players replacing them during the game. You can set up a co-op Warzone of sorts by adding bots to only one faction. In offline mode you can create Warzones and play against bots, but in so doing you can't complete Challenges. And finally, Guerrilla confirmed Shadow Fall does not contain Exoskeletons or Jetpacks - at launch. "Their inclusion would introduce a wide number of new variables and exceptions to account for," the developer explained, "and we want to focus on offering fair, reliable and consistent Warzone customizability." |
The Arizona Republic has found a large cohort of elderly and retired people who claim to have been abused by TSA staff at Phoenix's Sky Harbor airport. The passengers claim that they were required to remove their prostheses (particularly prosthetic breasts worn by cancer survivors), and that their objections were met with threats and hostility. One woman wrote that an agent ordered a pat down of her prosthetic breast and refused to conduct the search in private, before a flight in May 2012. "She made me pull it out in front of the world. When I got upset I was told to shut up. I have never been so humiliated in my life," the woman wrote. "The TSA has overstepped their bounds and ruined my vacation." Two weeks earlier, another passenger wrote that TSA agents twice patted down her breast in as many weeks. "Since this has occurred at two different checkpoints on two different dates, TSA clearly must have a procedure in place (that) requires that women with breast prosthesis to be singled out and treated in this cruel and humiliating manner," the woman wrote. There is no record that the TSA responded to the second woman. When it does, it's usually a form letter. |
Get the biggest Daily stories by email Subscribe Thank you for subscribing See our privacy notice Could not subscribe, try again later Invalid Email 'Britain First is not welcome here' - that is the clear and frank message from the Mayor of Ramsgate Trevor Shonk after the group announced plans to hold a demonstration in the town . The far-right activists revealed they would be holding a rally in Ramsgate in relation to the conviction of four men who gang-raped a teenager. Britain First and other far-right groups have been actively campaigning around the trial since the men were arrested after the horrific crime which took place above 555 Pizza and Kebab, in Northwood Road, in September last year. But Cllr Shonk, UKIP, has slammed their latest plans to hold a rally in Ramsgate and said they would not be welcome. Cllr Shonk said: "This is the problem with this country, people forget that the law is the law and it is final. "Hopefully the law is upheld again and sentencing is significant in this situation. "But people shouldn't be taking these things into their own hands. "We have all read all the awful stories about that case, it is terrible but the law should be left to take its course without all this far right stuff." Britain First announced plans to hold a gathering outside Ramsgate railway station on October 14, with a number of key figures from the group pipped to appear, including leader Paul Golding and deputy leader Jayda Fransen. The leader and deputy leader were arrested earlier this year for "inciting religious hatred" during the trial, and are currently understood to still be on police bail as they await their trial date. Just weeks ago Ms Fransen posted a live video from a police station in Kent, claiming that Mr Golding had been "taken into custody " again after they were called back by Kent Police as part of their bail terms. A flyer announcing the Ramsgate protest reads: "Paul Golding, Jayda Fransen and Steve Lewis are being persecuted for exposing the Ramsgate migrant rapists." The exact details of the gathering are not yet known, but the group is known for holding public rallies and marches – though they are often shut down by police. The group has protested outside the takeaway before, banging on the windows and shouting at shop staff. But Cllr Shonk said their protests do more damage to the country than good. 'Britain First is not welcome' He added: "I'm not against protests, you can campaign in a nice way but Britain First don't do that. "We seem to be a very divided country at the moment and this does not help anyone. "I am not supportive of this protest in any way. The law of the country comes first. "My doors are open to help anyone from all over. We are diverse here in Ramsgate and I'm proud of that. "It is a wonderful place and the negativity of groups like Britain First is not welcome." |
Chinese barber shop on East Pender after the riots. The wives of the tong elders had told her the history of white brutes in 1907 yanking the braided queues of the first elders and kicking them down Hastings Street , their white hands bashing Chinese heads and tearing down the shops and laundries of Chinatown . from All That Matters, p. 33, by Wayson Choy In 1907, an anti-immigration rally exploded into violence and vandalism in both Chinatown and Japantown in Vancouver. What began as riots in Bellingham as a movement to drive Punjabi Sikhs out of the lumber industry had eventually spread to white supremacist marches to Vancouver city with demands for a “White Canada.” The riots were not only a landmark in the rise of racism in Canada, they signified the commencement of systematic federal intervention to prohibit Asian immigration to Canada through the imposition of quotas on Japanese emigration, continuous voyage regulations those from India, and the enforcement of laws against the Chinese. The 1907 Riots were advertised in news reports, and by the time the parade arrived at city hall, a huge crowd had gathered. Crowd estimates vary between four thousand and eight thousand people. As rioters attacked Chinatown, the angry mob eventually turned toward Japantown or Nihon Bachi, around the Powell Street grounds in what is now Oppenheimer Park. Although news of the riot flashed reached different corners of the world, appearing on front pages in Ottawa , New York, and London, only three people were charged and only one person convicted of any offence. Not only had newspapers openly mocked the efforts of the court and police, few injuries were reported. All levels of government in Canada made vague apologies. |
About Sleek, elegant, X. Welcome, Kickstarter. Taking the same professional process we have used the past 25 years in designing and manufacturing cinematic features, we created, tested, and modified multiple prototypes. These cases achieve previously unattainable ergonomics and functionality in an iPhone case. Our patent pending X design is guaranteed to go on your phone 1 time and never come off. Existing mobile and iPhone accessory cases are bulky or have limited lens attachment capabilities. Most exhibit poor functionality and offer little protection. This case has been certified by design to withstand U.S. MIL STD 810G-516.6 shocks. What makes Xase best in market? X frame design: Aluminum is minimalistic and secure providing professional functional elegance Evolution of Xase Rubberized Grip: The grip has very simple clip technology so it is natural feeling, you will love it. Rubberized Grip on Xase Breast Cancer Awareness Pink: Together we can raise awareness and to show our support we designed a pink Xase Breast Cancer Awareness Pink Xase Super Cinematic HD Lens: Premium glass combined with the camera on iPhone 6s/s+ makes for a beautiful cinematic picture Super Cinematic HD Lens Kickstarter Exclusive! Leather Strap: Made of leather to look good and feel better on your wrist You'll need an HTML5 capable browser to see this content. Play Replay with sound Play with sound 00:00 00:00 "Xower Up" - Battery Pack Grip Xower - Battery Pack Wood Handle Grip Xower grip: 2200mAh battery grip to extend the life of your iPhone 2 full charges. The Team The design came to the team on a long pursuit to find an iPhone case that served their diverse needs and offer it in professional elegance. The team wanted to film on the go with confidence. Whether it be in the midst of action scene on set, or receiving an award, the team designed 1 case for every setting. We couldn't be happier with the design team on Xase. Many long days and nights were spent designing, fabricating, testing, and modifying Xase but only a few prototypes have lived to our standards. So it was only natural to build such a brilliant Xase. We know you will like it and be coming back for more ;) |
BAGHDAD — Naji Abdulamir used to run all over Baghdad but preferred the farmlands along the banks of the Tigris. Karim Aboud once ran for Saddam Hussein and has the gold watch and the newspaper clippings to prove it. Falih Naji ran for Iraq at a competition in India in 1982, and recalled, “There was no higher honor than representing your country.” The three men — now in their 60s, elder statesmen of Iraq’s tiny running community — were awash in memories last week ahead of the Baghdad International Marathon, the first in as long as anyone could remember. In fact, the race was not a marathon at all. Rather than the standard 26.2 miles, Baghdad’s version was a road race that allowed participants their choice of a lesser distance: two, four, eight or 10 kilometers. That mattered little. “I feel like a kid on Eid,” said Mr. Abdulamir, a running coach and former star of the Iraqi national team. |
Federal law enforcement agencies in the U.S. and Europe have shut down more than 400 Web sites using .onion addresses and made arrests of those who run them, which calls into question whether the anonymizing The Onion Router (Tor) network itself is still secure. The Web sites - which authorities say sold a range of illegal wares including drugs, firearms with the serial numbers filed off, phony credit cards, fake IDs and counterfeit money – have been taken down by seizing the servers that host them. Seizing the servers and the arrests indicate that law enforcement agencies have found a way to trace the physical locations of devices connected to Tor and to track down the individuals responsible for them – two things Tor was designed to prevent. Even the name of the coordinated effort - Operation Onymous – indicates that the agencies involved undermined the anonymity component of Tor, which they refer to as the Darknet. “[T]his time we have … hit services on the Darknet using Tor where, for a long time, criminals have considered themselves beyond reach. We can now show that they are neither invisible nor untouchable,” says Troels Oerting, head of the European Cybercrime Center in a press release from the agency. Law enforcement officials didn’t say how they had found the physical locations of devices and their owners, and Oerting says it’s not going to. “This is something we want to keep for ourselves,” he told Wired. “The way we do this, we can’t share with the whole world, because we want to do it again and again and again.” “Today we have demonstrated that, together, we are able to efficiently remove vital criminal infrastructures that are supporting serious organized crime. And we are not 'just' removing these services from the open Internet; this time we have also hit services on the Darknet using Tor where, for a long time, criminals have considered themselves beyond reach. We can now show that they are neither invisible nor untouchable. The criminals can run but they can’t hide. And our work continues....”, says Troels Oerting, Head of EC3. This makes it unclear whether these authorities have broken Tor to the point that it can no longer mask the location of its infrastructure or whether they found them using other intelligence. Tor relies on volunteers who host nodes of the network. Traffic bounces around within Tor in order to disguise where it comes from, but exit nodes and entrance nodes would yield the most useful information about actual IP addresses connecting to Tor. “Law enforcement could try to get in that first layer and see the sources and therefore try to reduce the anonymity as much as possible,” says Ben Johnson, chief evangelist at Bit9+Carbon Black. “Combine this with some older versions of the Tor software having some vulnerabilities and this could be how some of these users and sites are tracked down. “It will be interesting to see how quickly Tor becomes a bunch of systems that are actually owned by intelligence services, much like double agents, or something along those lines.” But because of its popularity and churn among those who set up nodes, he says he thinks the service will be reliably secure. “I believe enough people use and support Tor that new nodes (both relays and bridges) will spawn and continue to make Tor a viable anonymity service,” he says. The U.S. Department of Justice detailed some of the sites taken down as follows: “Pandora” (pandora3uym4z42b.onion), “Blue Sky” (blueskyplzv4fsti.onion), “Hydra”(hydrampvvnunildl.onion), and “Cloud Nine” (xvqrvtnn4pbcnxwt.onion), all of which were dark markets similar to Silk Road 2.0, offering an extensive range of illegal goods and services for sale, including drugs, stolen credit card data, counterfeit currency, and fake identity documents. “Executive Outcomes” (http://iczyaan7hzkyjown.onion[external link]), which specialized in firearms trafficking, with offerings including assault rifles, automatic weapons, and sound suppressors. The site stated that it used “secure drop ship locations” throughout the world so that “anonymity [was] ensured” throughout the shipping process, and that all serial numbers from the weapons it sold were “remove[d] . . . and refill[ed] with metal.” “Fake Real Plastic” (http://igvmwp3544wpnd6u.onion[external link]), which offered to sell counterfeit credit cards, encoded with “stolen credit card data” and “printed to look just like real VISA and Mastercards.” The cards were “[g]uaranteed to have at least $2500 left on [the] credit card limit” and could be embossed with “any name you want on the card.” “Fake ID” (http://23swqgocas65z7xz.onion[external link]), which offered fake passports from a number of countries, advertised as “high quality” and having “all security features” of original documents. The site further advertised the ability to “affix almost all kind of stamps into the passports.” “Fast Cash!” (http://5oulvdsnka55buw6.onion[external link]) and “Super Notes Counter” (http://67yjqewxrd2ewbtp.onion[external link]), which offered to sell counterfeit Euros and U.S. dollars in exchange for Bitcoin. “This action constitutes the largest law enforcement action to date against criminal websites operating on the “Tor” network,” according to a press release from the DoJ. |
Despite his absence, Mr Rove's place was marked with a name-tag Karl Rove, President Bush's ex-aide, has refused to attend a congressional hearing on allegations that he helped politicise the US Justice Department. Mr Rove has been accused of attempting to influence the prosecution of a former Democratic governor of Alabama. He is also said to have been involved in the firing of several US attorneys, allegedly for political reasons. Lawmakers subpoenaed Mr Rove to attend the hearing, but he has refused, citing executive privilege. The president and those who work for him are allowed by law to resist certain attempts by the judicial and legislative branches of government to force them to co-operate with inquiries - this right is known as "executive privilege". But the House Judiciary sub-committee, which is conducting the investigation into the Justice Department and issued Mr Rove with a subpoena, has rejected Mr Rove's claim of immunity. Despite Mr Rove's absence, the committee set up a chair for him, and marked his place with a name-tag. Stunt The committee could decide to seek Mr Rove's prosecution for contempt. Two other officials - White House Chief of Staff Josh Bolten and former White House counsel Harriet Miers - have already been held in contempt by the committee for failure to testify. Republicans in the US House of Representatives have dismissed the committee's actions as a stunt, and have called on its members to accept an offer made by Mr Rove to speak to them informally in private. The committee rejected Mr Rove's offer, because they wanted his remarks to be made under oath. The inquiry stems from the firing in 2006-07 of a number of US attorneys. Critics say the attorneys were sacked for political reasons, and that the Department of Justice subsequently attempted to mislead the public about the reasons for the dismissals. Mr Rove claims that executive privilege allows him to skip the hearing The committee's investigation has also been extended to cover the prosecution of former Democratic governor of Alabama Don Siegelman. Siegelman was convicted last year of accepting and concealing a contribution to his campaign to start a state education lottery, in exchange for appointing a hospital executive to a regulatory board. He was sentenced last year to more than seven years in prison but was released in March when an appeals court ruled that he had raised "substantial questions of fact and law" in his appeal. Siegelman has alleged that his prosecution was pushed by Republican officials, including Mr Rove. A former Republican campaign volunteer told congressional attorneys last year that she had overheard discussions suggesting that Mr Rove had put pressure on officials from the Justice Department to prosecute Siegelman. Departmental officials have disputed the claims, arguing that Siegelman was convicted by a jury, and that the case had been handled by career professionals, not political appointees. E-mail this to a friend Printable version Bookmark with: Delicious Digg reddit Facebook StumbleUpon What are these? |
Vols Film Study: Breaking Down the End of the Game What a play. Nearly everyone had written off the Vols after Jacob Eason’s touchdown pass put the Georgia Bulldogs up 31-28 with ten seconds left, but Josh Dobbs and Jauan Jennings wouldn’t be denied. Coach Butch Jones called the Hail Mary with four seconds remaining, and the Vols executed the play perfectly. Dobbs, the senior quarterback from Alpharetta, Georgia will finish his career 2-0 as the starter against his hometown Bulldogs. Jennings’ spectacular catch keeps the Vols’ undefeated season alive, and he will go down in Volunteer history forever. But before we look at the play that changed the Vols’ season, let’s look at how Tennessee set up the Hail Mary. After Georgia’s touchdown, defensive back Rico McGraw ran on the field without a helmet in celebration. By rule, that is unsportsmanlike conduct, and Georgia was penalized 15 yards on the ensuing kickoff. Now, instead of kicking off from the 35, Georgia would kickoff from their own 20. Tennessee lined up in a rather unconventional kick return formation. Rather than line up in a traditional formation, the Vols lined up with 10 players on Georgia’s side of midfield, with only Evan Berry deep. (Not pictured below are Jauan Jennings and Josh Malone, just off the screen to the near side, and Berry, back deep) The formation resembled what you would expect if you were facing an onside kick, and the personnel matched what you would expect on the hands team. Berry was joined by receivers Malone and Jennings, tight ends Jason Croom and Ethan Wolf, running backs Jalen Hurd and Alvin Kamara, safety Todd Kelly Jr., and linebackers Colton Jumper and Cortez McDowell. (I’ve yet to see a shot with an angle to I.D. the eleventh player on the field). However, Butch Jones clarified that the Vols were not expecting an onside kick. “It was not our hands team. It was comprised of a lot of skill players on the field, but it was not a hands team… This was a different type of return anticipating different types of kicks so you can adapt and adjust to it at the end of the game.” So what is the benefit of lining up in this unorthodox formation with skill players on the field at the end of the game? First, the Volunteers formation effectively kept Georgia from squib kicking. Kelly Jr. and Jumper lined up at the 35 yard line in the middle of the field. Had Georgia attempted a low squib kick, either of them could’ve grabbed the ball and took off running up the middle with outstanding field position. By putting so many skill players on the field, the Vols were well equipped to handle a squib. Next to a squib, the next best option in an end-of-game situation is a sky kick. Sure enough, Georgia head coach Kirby Smart and special teams coordinator Shane Beamer called for a sky kick in an effort to, as Smart said after the game, “get it away from the best returner in the country.” Unfortunately for the Bulldogs, the Vols’ formation meant that the ball would be headed right towards the All-American returner. Berry lined up at the 15 yard line, ready to sprint up and field the ball, no matter which direction it was kicked. With Berry as the only Vol past midfield, there would be no upbacks who might try to field the ball. By sending Berry back by himself, the Vols could ensure that the ball would end up in the hands of the best kick returner in America. The only way Georgia could’ve avoided kicking to Berry would be to boot it out of bounds or kick it very short. The Vols had their top two receivers, Malone, and Jennings, lined up between the 45-50 yard lines to the left side of the field, in position to field a short kick and give Tennessee outstanding field position. Georgia kicked the ball towards the left sideline, and Berry came sprinting up to field the ball on the run at the 32. The Vols appeared to be setting up a wall return back to the right. The blocking wasn’t great, but Berry ran through a few tackles on his way to the Georgia 48 yard line. Going with this return was a smart play for the Vols. In a regular formation, Berry likely would not have been in position to field the ball. Georgia would’ve simply kicked to an upback, likely a tight end or linebacker, who almost certainly would not have been able to return the ball to midfield. By leaving Berry as the only man deep and taking away the squib kick by alignment, the Vols forced Georgia to either kick the ball out of bounds or kick to the All-American. Doing so enabled a big return that put the Vols in range for Dobbs to throw to the end zone. After the game, Butch Jones said, “That was a kickoff return that we put in (for) the end of (a) game, and we’ve had it in for three years and never used it. To our kids’ credit, we rep it every Thursday, and we were able to get it (today), and it put us at midfield range where you could throw a Hail Mary.” Coach Jones also gave assistant coach Robert Gillespie a lot of credit, saying he was instrumental in making sure the team was prepared for the return. That is a great example of situational football by Jones and the Vols. For years, they had been preparing for an end-of-game kick return situation and had a play already planned out. When the time came, Jones knew exactly what play to go to, and the team was ready to execute. To add insult to injury for the Bulldogs, Georgia was offsides on the kick. Tennessee was able to add the penalty to the end of the return, moving the ball from the Georgia 48 to the 43. Now, with only four seconds left, Tennessee was down to one final snap. There would be no time for a quick pass to get the ball in field goal range. The only viable option would be to throw to the end zone. Originally, the Vols lined up in a trips left formation. Josh Malone, Ethan Wolf, and Josh Smith were split wide to the left, and Jennings was the single receiver to the right. Alvin Kamara was beside Dobbs in the backfield. Tennessee saw the look Georgia was in and used their first timeout. In the huddle, Coach Jones kept the play call the same. The Vols would still throw a Hail Mary from their trips formation. However, wide receivers coach/passing game coordinator Zach Azzanni decided to make some personnel changes. Azzanni flipped Jennings and Malone, putting Jennings to the strongside of the formation. Azzanni also removed Wolf from the game, putting the 6’5” Jason Croom in his spot. Once the Vols broke the huddle and returned to the field, they saw how the Bulldogs were planning to defend the play. Georgia lined up with three defensive linemen in the game set to rush Dobbs. Four defensive backs lined up close to the line of scrimmage, clearly playing man coverage on the four Tennessee receivers. Three defenders were in the end zone, evenly spaced across the field. Finally, Lorenzo Carter (#7), Georgia’s star 6’6” linebacker was playing the “jumper” role. Carter (yellow circle below) is the key player for the defense. He is an “extra” defender whose only assignment is to track the ball and jump up to bat it down at its highest point. Carter aligned at roughly a 7 yard depth in the end zone. For Georgia, the outside corner to the strong side is playing with outside leverage, while the slot corners play with inside leverage. The hope is to bunch all of the Vols’ receivers together. Georgia wants the end zone to become a cluttered mess with all the receivers in the same spot. That plays to their advantage because they will have more defenders (eight) than the Vols will have receivers (four). The backside safety stayed over the top of Malone, ready to help out should the Vols decide to throw to the single receiver side. The other two safeties, Quincy Mauger (#20) and Dominick Sanders (#24). are funneling the ball on the strong side, each one attempting to keep the ball inside of them. Carter’s job is to simply go to the ball. As the tallest defender on the field, he has to be able to go up over everyone and get his hands on the ball. When you consider the two safeties plus Carter, Georgia has three defenders in the end zone funneling the ball. Add three players in man coverage, and the Bulldogs outnumber the Vols six-to-three on the strongside. The Vols had actually designed the play to go to Croom. He was their “jumper” or “middle man.” Dobbs is aiming to throw the ball to Croom, whose job is to go up and catch the ball at its highest point. Jennings is the “back man,” designated to get ahead of Croom and be ready to make a play on a tip. Josh Smith’s assignment was to trail behind Jennings and Croom, also looking for the tip. Josh Malone was to cross the field from the weakside and be in position to catch the ball off a deflection towards the middle of the field. For the Vols, the first aspect of the play is the pass protection. The offensive line must give Dobbs a clean pocket and time to throw. The line, which has been maligned at times this year, came up big when it mattered most. With only three pass rushers, the Vols’ five linemen, plus Kamara, were able to double team each defender. None of the rushers even came close to Dobbs, giving him time to step into his throw. This is the most underrated aspect of the play. Dobbs, with a clean pocket, was able to throw a beautiful ball. Far too often, games end with receivers never getting a chance to make a play on the ball because the pass is inaccurate. Here, Dobbs threw a nice, high spiral and gave his receivers a chance to make a play. He also timed his throw perfectly. The ball arrived in the end zone just after the receivers did, giving the Vols the best chance to make a play. You can see here how the Vols’ had their receivers aligned in the end zone. Jennings was the deepest receiver, Croom was the “middle man,” and Smith was trailing behind, but all three receivers had their eyes on the ball. Carter is, once again, circled in yellow. Remember how he lined up seven yards deep in the end zone? So far back, he never had a chance to knock the ball down. Had he lined up five yards closer to the line of scrimmage, he very well might’ve knocked the ball down. Instead, he got caught behind the play and never had a chance. This ends up being the key to the play. The man Georgia assigned to track the ball and knock it down never made it to the ball because he lined up too deep in the end zone and didn’t move up quick enough. Cornerback Deandre Baker (#18), the defender assigned to Jennings, ended up well behind the play after getting caught up in traffic. The only two defenders that had a chance at the ball were the two safeties, Mauger and Sanders. Both defenders are listed at 6’0″, and both were overmatched versus the bigger, stronger Jennings. Even though he wasn’t the designated receiver, Jennings saw the ball coming his way and went up for the catch. Mauger and Sanders leaped from either side, but Carter and Baker never came close to the ball. Jennings had the best position out of any player on either team. You can also see that Smith is in a pretty good position as the trailer to respond to the ball should it be deflected towards him. If it had been tipped to Smith’s right, he would’ve at least had a chance. Jennings showed off his athleticism by going up and getting the ball at its highest point, and he showed off his strength by securing it in midair. What a catch. At the end of the day, football comes down to execution. Players win games. And in this case, Jennings went out on the field and won the game. Butch Jones and Kirby Smart can draw up this play on the sideline all day long, but one of the players, either a receiver or defender, has to go up and win. And on this snap, Jennings wasn’t going to be denied. And his reward? A 5-0 record for the Vols. Editor’s Note: Seth Price writes Vols Film Study weekly for FOX Sports Knoxville. You can see more of his work at Football Concepts. He is also the author of Fast and Furious: Butch Jones and the Tennessee Volunteer’s Offense, which is available on Amazon.com. |
Introduction For close to thirty years, desktop computing experiences have centered around a keyboard and a mouse or trackpad as our main user input devices. Over the last decade, however, smartphones and tablets have brought a new interaction paradigm: touch. With the introduction of touch-enabled Windows 8 machines, and now with the release of the awesome touch-enabled Chromebook Pixel, touch is now becoming part of the expected desktop experience. One of the biggest challenges is building experiences that work not only on touch devices and mouse devices, but also on these devices where the user will use both input methods - sometimes simultaneously! This article will help you understand how touch capabilities are built into the browser, how you can integrate this new interface mechanism into your existing apps and how touch can play nicely with mouse input. The State of Touch in the Web Platform The iPhone was the first popular platform to have dedicated touch APIs built in to the web browser. Several other browser vendors have created similar API interfaces built to be compatible with the iOS implementation, which is now described by the "Touch Events version 1" specification. Touch events are supported by Chrome and Firefox on desktop, and by Safari on iOS and Chrome and the Android browser on Android, as well as other mobile browsers like the Blackberry browser. My colleague Boris Smus wrote a great HTML5Rocks tutorial on Touch events that is still a good way to get started if you haven’t looked at Touch events before. In fact, if you haven’t worked with touch events before, go read that article now, before you continue. Go on, I’ll wait. All done? Now that you have a basic grounding in touch events, the challenge with writing touch-enabled interactions is that the touch interactions can be quite a bit different from mouse (and mouse-emulating trackpad and trackball) events - and although touch interfaces typically try to emulate mice, that emulation isn’t perfect or complete; you really need to work through both interaction styles, and may have to support each interface independently. Most Importantly: The User May Have Touch And a Mouse. Many developers have built sites that statically detect whether an environment supports touch events, and then make the assumption that they only need to support touch (and not mouse) events. This is now a faulty assumption - instead, just because touch events are present does not mean the user is primarily using that touch input device. Devices such as the Chromebook Pixel and some Windows 8 laptops now support BOTH Mouse and Touch input methods, and more will in the near future. On these devices, it is quite natural for users to use both the mouse and the touch screen to interact with applications, so "supports touch" is not the same as "doesn’t need mouse support." You can’t think of the problem as "I have to write two different interaction styles and switch between them," you need to think through how both interactions will work together as well as independently. On my Chromebook Pixel, I frequently use the trackpad, but I also reach up and touch the screen - on the same application or page, I do whatever feels most natural at the moment. On the other hand, some touchscreen laptop users will rarely if ever use the touchscreen at all - so the presence of touch input shouldn’t disable or hinder mouse control. Unfortunately, it can be hard to know if a user’s browser environment supports touch input or not; ideally, a browser on a desktop machine would always indicate support for touch events so a touchscreen display could be attached at any time (e.g. if a touchscreen attached through a KVM becomes available). For all these reasons, your applications shouldn’t attempt to switch between touch and mouse - just support both! Supporting Mouse and Touch Together #1 - Clicking and Tapping - the "Natural" Order of Things The first problem is that touch interfaces typically try to emulate mouse clicks - obviously, since touch interfaces need to work on applications that have only interacted with mouse events before! You can use this as a shortcut - because "click" events will continue to be fired, whether the user clicked with a mouse or tapped their finger on the screen. However, there are a couple of problems with this shortcut. First, you have to be careful when designing more advanced touch interactions: when the user uses a mouse it will respond via a click event, but when the user touches the screen both touch and click events will occur. For a single click the order of events is: touchstart touchmove touchend mouseover mousemove mousedown mouseup click This, of course, means that if you are processing touch events like touchstart, you need to make sure that you don’t process the corresponding mousedown and/or click event as well. If you can cancel the touch events (call preventDefault() inside the event handler), then no mouse events will get generated for touch. One of the most important rules of touch handlers is: Use preventDefault() inside touch event handlers, so the default mouse-emulation handling doesn’t occur. However, this also prevents other default browser behavior (like scrolling) - although usually you’re handling the touch event entirely in your handler, and you will WANT to disable the default actions. In general, you’ll either want to handle and cancel all touch events, or avoid having a handler for that event. Secondly, when a user taps on an element in a web page on a mobile device, pages that haven’t been designed for mobile interaction have a delay of at least 300 milliseconds between the touchstart event and the processing of mouse events (mousedown). If you have a touch device, you can check out this example - or, using Chrome, you can turn on "Emulate touch events" in Chrome Developer Tools to help you test touch interfaces on a non-touch system! This delay is to allow the browser time to determine if the user is performing another gesture - in particular, double-tap zooming. Obviously, this can be problematic in cases where you want to have instantaneous response to a finger touch. There is ongoing work to try to limit the scenarios in which this delay occurs automatically. Chrome for Android Android Browser Opera Mobile for Android Firefox for Android Safari iOS Non-scalable viewport No delay 300ms 300ms No delay 300ms No Viewport 300ms 300ms 300ms 300ms 300ms The first and easiest way to avoid this delay is to "tell" the mobile browser that your page is not going to need zooming - which can be done using a fixed viewport, e.g. by inserting into your page: <meta name="viewport" content="width=device-width,user-scalable=no"> This isn’t always appropriate, of course - this disables pinch-zooming, which may be required for accessibility reasons, so use it sparingly if at all (if you do disable user scaling, you may want to provide some other way to increase text readability in your application). Also, for Chrome on desktop class devices that support touch, and other browsers on mobile platforms when the page has viewports that are not scalable, this delay does not apply. #2: Mousemove Events Aren’t Fired by Touch It’s important to note at this point that the emulation of mouse events in a touch interface does not typically extend to emulating mousemove events - so if you build a beautiful mouse-driven control that uses mousemove events, it probably won’t work with a touch device unless you specifically add touchmove handlers too. Browsers typically automatically implement the appropriate interaction for touch interactions on the HTML controls - so, for example, HTML5 Range controls will just work when you use touch interactions. However, if you’ve implemented your own controls, they will likely not work on click-and-drag type interactions; in fact, some commonly used libraries (like jQueryUI) do not yet natively support touch interactions in this way (although for jQueryUI, there are several monkey-patch fixes to this issue). This was one of the first problems I ran into when upgrading my Web Audio Playground application to work with touch - the sliders were jQueryUI-based, so they did not work with click-and-drag interactions. I changed over to HTML5 Range controls, and they worked. Alternately, of course, I could have simply added touchmove handlers to update the sliders, but there’s one problem with that... #3: Touchmove and MouseMove Aren’t the Same Thing A pitfall I've seen a few developers fall into is having touchmove and mousemove handlers call into the same codepaths. The behavior of these events is very close, but subtly different - in particular, touch events always target the element where that touch STARTED, while mouse events target the element currently under the mouse cursor. This is why we have mouseover and mouseout events, but there are no corresponding touchover and touchout events - only touchend. The most common way this can bite you is if you happen to remove (or relocate) the element that the user started touching. For example, imagine an image carousel with a touch handler on the entire carousel to support custom scrolling behavior. As available images change, you remove some elements and add others. If the user happens to start touching on one of those images and then you remove it, your handler (which is on an ancestor of the img element) will just stop receiving touch events (because they’re being dispatched to a target that’s no longer in the tree) - it'll look like the user is holding their finger in one place even though they may have moved and eventually removed it. You can of course avoid this problem by avoiding removing elements that have (or have ancestors that have) touch handlers while a touch is active. Alternately, the best guidance is rather than register static touchend/touchmove handlers, wait until you get a touchstart event and then add touchmove/touchend/touchcancel handlers to the target of the touchstart event (and remove them on end/cancel). This way you'll continue to receive events for the touch even if the target element is moved/removed. You can play with this a little here - touch the red box and while holding hit escape to remove it from the DOM. #4: Touch and :Hover The mouse pointer metaphor separated cursor position from actively selecting, and this allowed developers to use hover states to hide and show information that might be pertinent to the users. However, most touch interfaces right now do not detect a finger "hovering" over a target - so providing semantically important information (e.g. providing "what is this control?" popup) based on hovering is a no-no, unless you also give a touch-friendly way to access this information. You need to be careful about how you use hovering to relay information to users. Interestingly enough, though, the CSS :hover pseudoclass CAN be triggered by touch interfaces in some cases - tapping an element makes it :active while the finger is down, and it also acquires the :hover state. (With Internet Explorer, the :hover is only in effect while the user’s finger is down - other browsers keep the :hover in effect until the next tap or mouse move.) This is a good approach to making pop-out menus work on touch interfaces - a side effect of making an element active is that the :hover state is also applied. For example: <style> img ~ .content { display:none; } img:hover ~ .content { display:block; } </style> <img src="/awesome.png"> <div class="content">This is an awesome picture of me</div> Once another element is tapped the element is no longer active, and the hover state disappears, just as if the user was using a mouse pointer and moved it off the element. You may wish to wrap the content in an <a> element in order to make it a tabstop as well - that way the user can toggle the extra information on a mouse hover or click, a touch tap, or a keypress, with no JavaScript required. I was pleasantly surprised as I began work to make my Web Audio Playground to work well with touch interfaces that my pop-out menus already worked well on touch, because I’d used this kind of structure! The above method works well for mouse pointer based interfaces, as well as for touch interfaces. This is in contrast to using "title" attributes on hover, which will NOT show up when the element is activated: <img src="/awesome.png" title="this doesn’t show up in touch"> #5: Touch vs. Mouse Precision While mice have a conceptual disassociation from reality, it turns out that they are extremely accurate, as the underlying operating system generally tracks exact pixel precision for the cursor. Mobile developers on the other hand have learned that finger touches on a touch screen are not as accurate, mostly because of the size of the surface area of the finger when in contact with the screen (and partly because your fingers obstruct the screen). Many individuals and companies have done extensive user research on how to design applications and sites that are accommodating of finger based interaction, and many books have been written on the topic. The basic advice is to increase the size of the touch targets by increasing the padding, and reduce the likelihood of incorrect taps by increasing the margin between elements. (Margins are not included in the hit detection handling of touch and click events, while padding is.) One of the primary fixes I had to make to the Web Audio Playground was to increase the sizes of the connection points so they were more easily touched accurately. Many browser vendors who are handling touch based interfaces have also introduced logic into the browser to help target the correct element when a user touches the screen and reduce the likelihood of incorrect clicks - although this usually only corrects click events, not moves (although Internet Explorer appears to modify mousedown/mousemove/mouseup events as well). #6: Keep Touch Handlers Contained, or They’ll Jank Your Scroll It’s also important to keep touch handlers confined only to the elements where you need them; touch elements can be very high-bandwidth, so it’s important to avoid touch handlers on scrolling elements (as your processing may interfere with browser optimizations for fast jank-free touch scrolling - modern browsers try to scroll on a GPU thread, but this is impossible if they have to check with javascript first to see if each touch event is going to be handled by the app). You can check out an example of this behavior. One piece of guidance to follow to avoid this problem is to make sure that if you are only handling touch events in a small portion of your UI, you only attach touch handlers there (not, e.g., on the <body> of the page); in short, limit the scope of your touch handlers as much as possible. #7: Multi-touch The final interesting challenge is that although we’ve been referring to it as "Touch" user interface, nearly universally the support is actually for Multi-touch - that is, the APIs provide more than one touch input at a time. As you begin to support touch in your applications, you should consider how multiple touches might affect your application. If you have been building apps primarily driven by mouse, then you are used to building with at most one cursor point - systems don’t typically support multiple mice cursors. For many applications, you will be just mapping touch events to a single cursor interface, but most of the hardware that we have seen for desktop touch input can handle at least 2 simultaneous inputs, and most new hardware appears to support at least 5 simultaneous inputs. For developing an onscreen piano keyboard, of course, you would want to be able to support multiple simultaneous touch inputs. The currently implemented W3C Touch APIs have no API to determine how many touch points the hardware supports, so you’ll have to use your best estimation for how many touch points your users will want - or, of course, pay attention to how many touch points you see in practice and adapt. For example, in a piano application, if you never see more than two touch points you may want to add some "chords" UI. The PointerEvents API does have an API to determine the capabilities of the device. Touching Up Hopefully this article has given you some guidance on common challenges in implementing touch alongside mouse interactions. More important than any other advice, of course, is that you need to test your app on mobile, tablet, and combined mouse-and-touch desktop environments. If you don’t have touch+mouse hardware, use Chrome’s "Emulate touch events" to help you test the different scenarios. It’s not only possible, but relatively easy following these pieces of guidance, to build engaging interactive experiences that work well with touch input, mouse input, and even both styles of interaction at the same time. |
FOXBOROUGH, MA—In a savage and gruesome turn of events, Patriots head coach Bill Belichick reportedly slaughtered a half-dozen dogs adopted from the humane society Friday, sewing together the dismembered body parts to construct a new, horrific tight end. “They were cute dogs at first, but then I figured out that if you rip them apart, they could be really useful,” said Belichick, watching the fur-covered abomination lumber across the field, producing the blood-curdling sound of splintering bone and ripping flesh with every step. “While tinkering around in my workshop, I started out stitching a few dog legs together, combining ribcages and whatnot, and soon I was reanimating the dead tissue with a portable generator. In almost no time at all, I had a viable red zone target.” Belichick confirmed that the grotesque tight end had a far better understanding of the offense and was considerably more intelligent than Rob Gronkowski. Advertisement |
Quarterbacks being taken first and second in the draft is nothing new. It’s happened three times in the past five years alone, most recently with Jared Goff and Carson Wentz starting off the 2016 NFL Draft with a bang. The Rams and Eagles both made blockbuster trades to land their respective franchise quarterbacks, and each has already paid dividends after less than two full seasons. On Sunday, the two will square off for the first time ever when Wentz’s Eagles pay Goff’s Rams a visit. While they’ll never be on the field at the same time, all eyes will be on the star-studded matchup at quarterback. And although this Week 14 battle has huge playoff implications, with the winner moving one step closer to clinching a first-round bye, Goff and Wentz are the headliners of this show. There’s no reason they shouldn’t be, either. Goff and Wentz are the primary reasons their teams are 9-3 and 10-2, respectively, and their individual performances make them worthy of the MVP award. That’s unusual for two second-year quarterbacks to battle for the most coveted individual award in the NFL, but it’s undoubtedly the truth with regards to Goff and Wentz. They have a chance to be everything we wanted from Jameis Winston and Marcus Mariota, or Andrew Luck and RGIII, or even Peyton Manning and Ryan Leaf. But who’s been the better quarterback? That depends on a variety of things, but looking at each player’s stat line, Wentz appears to be having the superior season. Wentz: 242-for-399 (60.7 percent), 3,005 yards, 29 TDs and 6 INTs (102.0 passer rating) Goff: 244-for-392 (62.2 percent), 3,184 yards, 20 TDs and 6 INTs (98.4 passer rating) If you go beyond the basic stats, the race becomes much closer. Goff certainly has the edge in some categories, particularly yards per attempt and big plays downfield. The following stats show where Goff and Wentz rank in the NFL in each category. We’ll let the numbers speak for themselves. Big plays (25-plus yards) 4. Goff: 29 17. Wentz: 17 Third-down conversions (pass plays) 2. Wentz: 50 percent 9. Goff: 43.2 percent Yards after catch by receivers 3. Goff: 1,661 18. Wentz: 1,142 Fourth-quarter passer rating 18. Wentz: 91.3 31. Goff: 75.4 Yards per attempt 3. Goff: 8.12 10. Wentz: 7.53 Aggressiveness (throws into tight windows) 1. Wentz: 24.8 percent 36. Goff: 13.8 percent Red zone passer rating 2. Wentz: 118.8 7. Goff: 106.3 |
As we approach the end of this project's run, I would just like to sum up the most critical bits of information in all the previous updates, as well as release one final update for the model. Firstly, I have thought about some of the comments that point out that the nose is a little blocky while the visor is a little unrealistic, and agree that these are valid points. As such, I have revised the design for the nose, adding more cheese slopes and replacing the two 1 x 2 tiles(with grille) with two trans black 1 x 2 tiles. Check out the new (final) model!: LDD file available here* ** *Note: Some of you may notice that there is a slight disparity between my part count (1141 bricks, see below) and the LDD count (1111 bricks). This is because the file only includes the two extra tails (without part optimization) and not the extra white bricks required to remove the blue stripe along the fuselage. **This LDD file is for personal use only. Please give credit where it is due. Thanks! Now, to sum up: Final part count of Concorde and the Bristol Olympus is 889 bricks (Concorde=868, Olympus & trolley=21). This will be the base model, as proposed in the original draft, should Lego decide that the part count is too high to add any of the other accessories. Final model of the Olympus jet engine of Concorde and the Bristol Olympus is 889 bricks (Concorde=868, Olympus & trolley=21). as proposed in the original draft, should Lego decide that the part count is too high to add any of the other accessories. Final model of the Olympus jet engine Mobile staircases are each made up of 63 bricks, meaning that if two of them are added, the total part count will be brought up to 1015 bricks. 1 x mobile staircase 1 x mobile staircase Microfigures would be nice, but these are not so critical to the main idea so I won't be pushing for them Lastly, the liveries: To add the option for all three liveries, British Airways, Air France and British Airways (Classic), 126 bricks (possibly less if optimized further) are needed, so this would bring the part count up to 1015 bricks without the mobile staircases and 1141 bricks with the staircases. A final word Thanks everyone for such a a tremendously fun journey! When I first started out on Lego IDEAS my best projects merely had LDD screenshots for illustrations, but throughout this whole process I've had the refreshing, mind blowing, brain racking opportunity to learn POV-ray, simple code and how to run a social media campaign. It has been my pleasure to receive your delighted comments upon the release of a major update or the passing of a significant milestone and to see my model grow with your constructive criticism and input. Even if this project doesn't pass the review, I'm thankful to have had the opportunity to develop this project with you and experience what it's like to be a Lego designer, to build and to propose a new set. Thank you, thank you all and have a magnificent New Year! ABStract (Ethan Low) |
I wish I hadn’t waited so long to read this paper. It’s got three of my favorite things in a graphics paper: it’s image-space, it’s got a proof rather than hand waving, and it’s clever! It contains some damned pretty images too. The setup is pretty much the same as every image-space rendering algorithm. You render a few buffers (3D position and normal) of the refractive object from the view of the light. Like most image-space algorithms, you want to consider each texel in these buffers to be a small surface. To calculate the caustics on the scene, you want to know where the light refracted through each of these surfaces ends up in the 3D scene. This is the hard part about rendering caustics, because you need to know where the refracted ray intersects the scene. Ray-scene intersection on the GPU = impractical (though obviously not impossible). This is the problem that this paper takes a hack at. By additionally rendering the 3D positions of the scene (sans-refractive object) from the view of the light, this algorithm totally bypasses explicit ray-scene intersection. The paper outlines an iterative method which moves toward the correct distance along the refracted ray at which it intersects a scene surface, in image-space. The algorithm is as follows: Assume an initial distance d along the refracted ray do for some number of iterations: Backproject the 3D position P1 at length d along the ray into view space of the camera at length along the ray into view space of the camera Use the calculated view space position to get the 3D position P2 of the scene from the scene position buffer of the scene from the scene position buffer Use the distance between the P1 and P2 as the new estimate for d The paper offers a proof of convergence based on Newton’s method. By repeating this process for each texel in the refractive object buffer and splatting the refracted flux onto the scene at the 3D position calculated by the iterative process above, voila caustics. One problem with a naive implementation is that the amount of flux splatted onto the scene is dependent on the number of texels covered by the refractive object in the refractive object buffers. The paper states that the flux contribution of each texel is the flux at the surface (N dot L) multiplied by the reciprocal of the projected area of the object in the refracted object buffer. The paper doesn’t state this, but I believe that this should additionally be multiplied by a fresnel term. The projected area is calculated by performing an occlusion query from the view of the light. I think the method in this paper is very practical. The frame rates are fantastic. They suggest two buffers for the refractive objective information but it could be stored in one RGBA texture by storing depth in one channel and backprojecting/unprojecting the depth to 3D position. This will save a bit on bandwidth and utilize the ALU a bit more. Musawir A. Shah, Jaakko Konttinen, Sumanta Pattanaik. “Caustics Mapping: An Image-space Technique for Real-time Caustics” To appear in IEEE Transactions on Visualization and Computer Graphics (TVCG). paper – project page Advertisements |
In May 2012, researchers observed a pod of killer whales attacking a gray whale and its calf in Monterey Bay, California. After a struggle, the calf was killed. What happened next defies easy explanation. Two humpback whales were already on the scene as the killer whales, or orcas, attacked the grays. But after the calf had been killed, about 14 more humpbacks arrived—seemingly to prevent the orcas from eating the calf. “One specific humpback whale appeared to station itself next to that calf carcass, head pointed toward it, staying within a body length away, loudly vocalizing and tail slashing every time a killer whale came over to feed,” says Alisa Schulman-Janiger, a whale researcher with the California Killer Whale Project. For six and a half hours, the humpbacks slashed at the killer whales with their flippers and tails. And despite thick swarms of krill spotted nearby—a favorite food for humpbacks—the giants did not abandon their vigil. It’s not clear why the humpbacks would risk injury and waste so much energy protecting an entirely different species. What is clear is that this was not an isolated incident. In the last 62 years, there have been 115 interactions recorded between humpback whales and killer whales, according to a study published in July in the journal Marine Mammal Science. “This humpback whale behavior continues to happen in multiple areas throughout the world,” says Schulman-Janiger, who coauthored the study. “I have witnessed several encounters, but nothing as dramatic as [the May 2012 event],” she says. It remains the longest humpback-to-killer whale interaction known to date. What Is Going on Here? The most logical biological explanation for the humpbacks’ vigilante-like behavior is that the whales receive some sort of benefit from interfering with orca hunts. For instance, orcas are known to attack humpbacks, and the whales are most vulnerable when they are young. Once fully grown, though, a single humpback is large enough to take on an entire pod of killer whales. So perhaps the “rescuing” behavior has evolved as a way to help the species get through its weakest life stage, with humpbacks charging in when they think a young whale is at risk. There’s also a good chance that the calf under attack is related to the whales coming to its rescue. Was This Whale Trying to Save a Diver’s Life? “Because humpbacks calves tend to return to the feeding and breeding grounds of their mothers, humpbacks in a given area tend to be more related to neighboring humpbacks than to the population as a whole,” says study leader Robert Pitman, a NOAA marine ecologist and National Geographic Society grant recipient. But there’s a wrinkle in this explanation. Of all the incidents the scientists investigated over the last five decades, killer whales targeted humpbacks just 11 percent of the time. The other 89 percent involved orcas hunting seals, sea lions, porpoises, and other marine mammals. There’s even one incident in which humpbacks apparently tried to save a pair of ocean sunfish from becoming orca hors d'oeuvres. Perhaps it’s personal. Schulman-Janiger notes that not all humpbacks interfere with orca hunts, and many that do bear scars from being attacked by orcas earlier in their lives, perhaps as calves. Therefore, it’s possible that personal history drives humpbacks to respond to orca hunts. The study also notes that it’s possible the humpbacks are responding to auditory calls made by the killer whales rather than the animals they are hunting. This would mean that the humpbacks don’t know what species is being attacked until they have already invested energy in swimming to the battle. Such a behavior could persist in the population because it would occasionally benefit humpbacks—apparently enough to justify benefiting other species the majority of the time. View Images A Weddell seal rests on the chest of a humpback whale, safe for the time being from attacking killer whales. Photograph by Robert L. Pitman All for One, and One for All? Other whale experts see a dose of something even more complex: altruism. “Although this behavior is very interesting, I don’t find it completely surprising that a cetacean would intervene to help a member of another species,” says Lori Marino, an expert in cetacean intelligence and president of the Whale Sanctuary Project. Humpbacks are capable of sophisticated thinking, decision-making, problem-solving, and communication, says Marino, who is also the executive director of the Kimmela Center for Animal Advocacy. “So, taken altogether, these attributes are those of a species with a highly developed degree of general intelligence capable of empathic responses.” Furthermore, humpbacks are not the only animals that seem to display some sort of regard for another species. Dolphins have been famously depicted as “aiding” dogs, whales, and perhaps even humans—though it should be noted that onlookers, not animal experts, often report such events, and it can be easy to misinterpret animal behavior. Whether humpbacks are truly performing what amounts to a good deed or are benefiting from the process, it’s clear that we still have much to learn about the minds and motivations of the animals around us. For the most part, Pitman says animals tend to do what is in their own best interest—even if the motivations themselves aren’t entirely clear to us. “As biologists,” he says, “that is where we should start our search for explanations.” |
Image caption Carwyn Jones and Nicola Sturgeon want to prevent any loss of power devolved to Wales and Scotland A proposal that could have given the Welsh Assembly power to veto key Brexit legislation has been rejected by MPs. On the first day of detailed scrutiny on the EU Withdrawal Bill in the House of Commons, Plaid Cymru's planned amendment lost by 318 votes to 52. It had the support of SNP MPs but Labour said before the vote they could not support the proposed change. As it stands, Westminster wants support from the devolved nations but can push the planned law through without it. The Welsh and Scottish governments have called the bill a "power grab" which undermines devolution. Prime Minister Theresa May has warned she will not "tolerate" any attempt to block the legislation. With Plaid only having four MPs, it needed support of politicians from other parties for the amendments to the bill to pass. It is one of more than 350 tabled changes to the wording of the bill, which has passed its second reading and was scrutinised by MPs in the Commons on Tuesday. The European Union (Withdrawal) Bill intends to convert all existing EU laws into UK law, to ensure there are no gaps in legislation on Brexit day. But the Welsh and Scottish Governments have objected to the idea that EU responsibilities in devolved policy areas such as agriculture should first be held at Westminster, pending longer-term decisions. While the administrations have no formal power in the Commons, they have suggested a list of amendments which have been tabled by SNP and Welsh Labour MPs to be discussed at committee stage this month. Image caption Plaid Cymru MP Hywel Williams said the amendments would make sure all of the UK had a say in the final Brexit deal Speaking ahead of the debate, Plaid's Brexit spokesman Hywel Williams MP said it would be "irresponsible and dangerous" if the prime minister were to "bulldoze her disastrous Brexit mirage through, against the will of three of the four members [of the UK]". Mr Williams added: "This is not an attempt to derail Brexit - it is an attempt to make sure Wales and the other UK member countries have a say. "Every national parliament should be involved in this process, not just Westminster." A Welsh Government spokesman said the administration had "grave concerns" about the proposed legislation. "There are still serious questions of how Westminster plans to honour the referendum while safeguarding the economy and respecting devolution and the established powers of the Welsh Government," he said. The UK government has been asked to comment. |
Posted 6 years ago on Dec. 18, 2012, 12:23 p.m. EST by OccupyWallSt Tags: honolulu On Wednesday, December 12th, members of (de)Occupy Honolulu filed a lawsuit against the City & County of Honolulu, Wesley Chun (Director & Chief Engineer of Department of Facilities Maintenance), Trish Morikawa (County Housing Coordinator), and Sergeant Larry Santos (Honolulu Police Department), over deprivation of civil rights during raids on the encampment, in the U.S. District Court for the District of Hawai`i. On Monday, December 17th, a Temporary Restraining Order has been issued, until the Preliminary Injunction hearing in a month, dealing with raids of Thomas Square. All defendants have either quit their jobs or retired since the last raid at Thomas Square, the day before Thanksgiving. The lawsuit focus on the city & county’s abuse of Ordinance 10-29 (AKA Bill 39), which limits the use of sidewalks after pushing (de)Occupy to the sidewalk, and Ordinance 11-029 (AKA Bill 54), which allows the Department of Facility Maintenance, Housing, Parks, and HPD to traumatize, steal, and brutalize the vulnerable houseless population Since the (de)Occupy camp was established on November 5, 2011, the movement has been fighting against Ordinance 11-029, which was used as a tool to repress freedom of speech within hours of being signed into law. City ordinances like Bill 39 and Bill 54 criminalize the houseless. The U.S. 9th Circuit Court of Appeals stated in Tony Lavan v. City of Los Angeles, “For many of us, the loss of our personal effects may pose a minor inconvenience. However, . . . the loss can be devastating for the homeless.” “Houseless rights are human rights. We have been standing vigil 24/7 for over a year. During that time the city has repeatedly stolen and destroyed our collective and personal property, including car registrations, medications, and bedding of protesters and the houseless alike,” says Sugar Russell, plaintiff. “The city has humiliated people using intimidation and violence. This is what the government does to people who are willing and able to stand up and document abuse and inequality.” “The fight is not over until the peoples’ voice means more than corporate money! (de)Occupy Honolulu is determined to shut down the unconstitutional ordinances of Bill 39 and Bill 54 throughout the County of Honolulu. Prioritizing programs like job placement, rehabilitation, and housing first will show a better return in value for both the community, and the thousands of houseless on the island,” says plaintiff Christopher Nova Smith. “Restructuring the assistance housing funds to mirror Hawaii County’s plan could offset the financial strain on the community. By investing in the value of people, the City and County of Honolulu can save taxpayers millions of dollars while promoting equal civil rights and community sustainability.” DeOccupy Honolulu // www.DeOccupyHonolulu.org Facebook: OccupyHonolulu // Twitter: #OHNL |
A homeless man in Los Angeles has gotten quite innovative with turning a freeway underpass into his personal compound. Ceola Waddell Jr, 59, furnished an underpass in L.A.’s 110 freeway near Coliseum, complete with a makeshift jacuzzi, two porcelain toilets, couches, discarded refrigerators, and a four-poster bed, the Daily Mail reported. Waddell began living in the underpass six months ago, but has since decorated the underpass into his personal paradise. The man has become a viral sensation, thanks to a Facebook video he took of his living space. City officials, however, are not so pleased with his decision to deck out the freeway underpass. They say the site is dangerous and that Waddell has turned down their offers for temporary housing and homeless services. Workers removed a refrigerator with an “abundance of rotting food,” “explosive materials,” and other unsanitary items, according to the Los Angeles Times. In the Facebook live video tour he gave of his living space, he described it as “Paradise Lane.” “You have now entered Paradise Lane. Let me give you a little tour,” he said. “This here is my jacuzzi. It holds ten gallons of water. All it is is a refrigerator on its bottom. I’m being innovative.” “Come on down. You have now entered the man cave. This is where my quarters are,” he continued, introducing his bedroom. He has another bed, “jacuzzi,” and toilet in his guest room. Waddell rents out his spare room, which has a tent, to other homeless people in the area for $25 a week. “I decided I wanted to live like everybody else, make me something nice that I wanted to come home to,” he said. “If I was in the Arctic, I’d make me an igloo.” “I refuse to let the city beat me down to what they think a homeless person’s profile is, living on cardboard,” he added. City officials say they have received reports about the site and have had sanitation crews dismantle it twice. |
Up is down, down is up, the bull is a bear, the bear is a bull and an economy in recovery is really in recession. Such is the current state of the markets, according to Morgan Stanley strategists, who see a "Bizarro World" where nothing makes sense and it's getting tougher and tougher to make a buck. "Everything seems backwards," Adam Parker, the firm's chief U.S. equity strategist, said in a note to clients. "Sell winners, buy losers, own staples in both up and down markets. Just do the opposite of what makes sense." Read MoreThis trend is an 'unambiguous buy' signal: BofA The "Bizzaro" reference is familiar to Superman fans for a world where the Man of Steel is really a bad guy and everything else is upside down as well. But for Morgan Stanley, it's been no comic book but rather stark reality. The firm's investment portfolio registered its worst month in more than five years — 61 months, to be exact — as the stock market got off to one of its worst starts ever this year. |
The first official commercial resupply mission to the International Space Station (ISS) successfully passed the critical phase of its arrival at the orbital outpost, as SpaceX’s CRS-1 Dragon was “tamed” by the Space Station Remote Manipulator System (SSRMS) ahead of schedule, at 6:56am Eastern. The vehicle was then successfully berthed to the Harmony module. Dragon Berthing (milestones will be updated during the events): Advancing from its tasks during the C2+ test objectives – that involved Dragon undertaking a lap around the Station to test communication assets – the private spacecraft was now qualified to arrive at the ISS on Flight Day 3 of its mission. The spacecraft made a series of thruster burns, each taking it closer to the station; holding at distances of 2,500, 1,200, 250, 30 and 10 metres (2,735, 1,310, 273, 33 and 11 yards), before finally being grappled by the Canadarm2 Remote Manipulator System, and attached to the nadir port of the Harmony module. Akihiko Hoshide operated Canadarm2 during capture, while Sunita Williams will later use it to berth the Dragon. However, as always, Dragon was required to pass a series of “Go No/Go” points during its rendezvous, ensuring it provides no risk to the $100 billion Station. The series finite manuevers began as Dragon caught up to the Station via the Height Adjustment (HA) and Co-Elliptical (CE) burn points, bringing Dragon 2.5 km below ISS. A Go/No-Go was performed for the HA3/CE2 burn pair bringing Dragon to 1.2 km below ISS. The HA3/CE3 burn pair, using RGPS and configured with the ISS’ own GPS system, were then conducted, followed by the HA4 (Ai) burn, taking Dragon inside the corridor where the crew began to monitor the spacecraft’s approach. With both SpaceX mission control in California, and NASA’s ISS Flight Control Room (FCR) in Houston monitoring, Dragon arrived and held at 250 meters distance from the Station, where checks of Dragon’s LIDAR system were successfully conducted, a key element of hardware that has a heritage of testing via the Space Shuttle Discovery during her STS-133 mission. With all parties are satisfied with Dragon’s performance – and ability to abort if required – Dragon was given a “Go” to approach to 30 meters distance from the Station where it automatically paused. At all points, the ability to abort could be made by controllers on the ground, the Dragon itself and the Expedition 33 crew – via the Commercial Orbital Transportation Services (COTS) Ultra High Frequency (UHF) Communication Unit, or CUCU, which rode in the middeck stowage locker on Atlantis during STS-129 late in 2009, before being handed over to ISS crewmembers ahead of the demonstration flights. The CUCU provides a bi-directional, half-duplex communications link between Dragon and ISS using existing ISS UHF Space to Space Station Radio (SSSR) antennas, which provides a communication path between MCCX (SpaceX) and Dragon during proximity operations and a command security between ISS and Dragon. “SpaceX1 Capture Preparations: The crew and ground controllers performed a checkout of the CUCU, the RWS (Robotic Work Station), and the SSRMS, in preparation for SpaceX1 capture. All checkouts went well and there were no problems,” noted L2 CRS-1 Status – LINK – in the days prior to Dragon’s launch. Proceeding from 30m to the Capture Point at 10 meters out, Dragon automatically held position again, allowing the ISS’ robotic assets – already translated to the pre-capture position – to make the move towards the Dragon via controls in the Cupola RWS. “MT Translation: The MT translated from worksite 5 to worksite 2, in preparation for SpaceX1 arrival. All MSS hardware is repowered, without any significant issues,” added the Status reports, showing the translation of the large ISS robotic assets for the grapple of Dragon upon arrival, Upon receiving the “Go for Capture” call from Houston, the ISS crew armed the SSRMS capture command and begin tracking the vehicle through the camera on the Latching End Effector (LEE) of the SSRMS, noted an overview presentation (L2 – Link). With the ISS’ thrusters inhibited and Dragon confirmed to be in free drift, the arm’s LEE maneuvered over the Grapple Fixture (GF) pin on Dragon to trigger the capture sequence ahead of pre-berthing maneuvers. With the addition of several holds into the timeline, capture was confirmed at 6:56am Eastern. The Dragon, secured by the SSRMS, was then carefully translated to the pre-install set-up position, 3.5 meters away from the Station’s module, allowing the crew to take camcorder and camera footage of the vehicle through the Node 2 windows. This footage will be downlinked to the ground for engineers to evaluate the condition of the Dragon spacecraft (See raw download collection from C2+ mission in L2). The SSRMS then maneuvered Dragon to the second pre-install position, at a distance of 1.5 meters out. Desats were inhibited prior to the maneuver of the Dragon into Common Berthing Module (CBM) interface to begin the securing of the spacecraft to the ISS. A “Go” at this point was marked by all four Ready To Latch (RTL) indicators providing confirmation on the RWS panel. As has been seen with other arrivals – and indeed new additions to the Station itself – Dragon was put through first stage capture tasks, allowing the SSRMS to go limp, ahead of second stage capture, officially marking Dragon’s berthing with the ISS. With all of the ISS berthing milestones ahead of the pre-planned schedule, the ISS crew decided to open the hatch to the Dragon a day ahead of the timeline. The Dragon spacecraft is carrying 905 kilograms (1995 lb) of cargo to the space station, consisting of 461.5 kilograms (1015 lb) of usable items. The cargo includes 118 kilograms (260 lb) of supplies for the crew; including food and clothing; 117 kilograms (390 lb) of scientific equipment for NASA, the US National Laboratory, ESA and JAXA; 102 kilograms (225 lb) of spares and other station hardware; and 3.2 kilograms (7 lb) of computer equipment; mostly spare hard drives and CD cases. The US scientific payloads include a General Laboratory Active Cryogenic ISS Experiment Refrigerator, or GLACIER, cryogenic experiment; the Fluids Integrated Rack (FIR); Commercial Generic Bioprocessing Apparatus Micro-6 (CGBA/Micro-6), a commercial biosciences payload studying fungi in the space environment and Capillary Flow Experiments 2 (CFE-2), a fluid dynamics experiment. Hardware for the Alpha Magnetic Spectrometer (AMS), retrieval equipment for the MISSE-8 exposed experiment, and refrigeration bags, are also being carried. The European Space Agency’s BioLab and Energy experiments are also being delivered by the SpaceX CRS-1 mission. BioLab will be used to perform biological research in the Columbus module, while Energy will study the station’s crew’s energy balance. The Japan Aerospace Exploration Agency has included its Education Payload Operations 10 (EPO-10) payload, which will be used to record video of experiments aboard the station for educational purposes. Dragon is also carrying an experiment to study plant microtubules, and an ammonia test kit. The Dragon spacecraft is scheduled to depart the International Space Station on 28 October; with the spacecraft being unberthed and released via Canadarm2. The spacecraft will perform a burn to depart the vicinity of the ISS, before closing its GNC bay and beginning its deorbit burn. Once the deorbit is complete, the trunk module will be jettisoned, and the spacecraft will reenter the atmosphere. The trunk section is expected to disintegrate, while the capsule descends under parachute for a landing in the Pacific Ocean. For its return to Earth, the capsule will be loaded with completed experiments and equipment no longer needed aboard the space station, including 74 kilograms (163 lb) of crew equipment, 393 kilograms (866 lb) of scientific equipment and samples, 253 kilograms (518 lb) of station hardware, 5 kilograms (11 lb) of computer equipment, 33 kilograms (68 lb) of spacesuit parts used by previous crews, and a 20 kilogram (44 lb) payload for Roskosmos. (Images: via L2’s SpaceX Dragon Mission Special Section – Containing presentations, videos, images (Over 2,000MB in size), space industry member discussion and more. Additional imagery via SpaceX and NASA). (Click here: http://www.nasaspaceflight.com/l2/ – to view how you can support NSF and access the best space flight content on the entire internet). |
Jonathan Ferguson One of the most persistent firearm myths is that American soldiers fighting in the Second World War (or later, in the Korean War) were at substantial risk of being identified and engaged by the enemy because of the distinctive ‘ping’ sound made by ejection of clips from their issued rifles. The M1 ‘Garand’ was ahead of its time as a military self-loading rifle, but unlike modern rifles it did not feature detachable box magazines. Instead it was loaded with eight round metal en bloc clips. These were inserted into the open action from the top and retained inside the weapon until the last round was fired, at which point the clip would eject (along with the final fired cartridge case) with a distinctive ‘ping’ sound (you can clearly hear this in the movie ‘Saving Private Ryan’, for example, and see it in slow motion in this Forgotten Weapons video). The notion of this ‘ping’ being a fatal flaw is a myth, in that there’s no evidence that it endangered infantrymen. However, there’s a bit more to it than that… A lot of ink and pixels have been expended arguing the ‘M1 ping’ myth back and forth, and some have even tried to practically demonstrate why it’s a silly idea. Tactical trainer Larry Vickers recreated a scenario for his ‘TAC TV’ series, and more recently YouTuber ‘Bloke on the Range’ has tackled the myth. The Bloke shows just how difficult it would be to even hear the ‘ping’, without the various other loud noises associated with battle. Soldiers have only recently begun to wear any kind of hearing protection at all, which would have made such a noise even more difficult to detect. Not to mention the obvious fact that soldiers rarely fight alone. Even if a German or Japanese soldier did manage to take advantage of the ‘ping’ window of opportunity, he’s likely to get shot by another GI. More importantly, the Bloke shows how easy and quickly one could reload following the ‘ping’. At all but the closest ranges, this really is a myth and a total non-issue. As Bloke points out, there is no actual historical evidence for this ever having happened, and for every claim that a veteran experienced it, there is an ‘equal and opposite veteran’ making a claim to the contrary. This is typified by an exchange in ‘American Rifleman’ magazine in 2011/12 (reproduced here). It’s almost impossible to find a first-hand account either; it’s always a relative, a friend, or a friend-of-a-friend, and being told and retold decades after the fact. At this point, one would normally call ‘case closed’ as Garand expert Bruce N. Canfield has done online, in no uncertain terms. However, this situation is more complicated than just the bare facts. Sometimes, myths intrude into reality by being thoroughly embedded in thought and practice. There is no doubt whatever that whether this ever happened or not, quite a lot of soldiers in the ‘40s and ‘50s clearly did believe that this quirk of their rifle posed a real threat. This is proven by a fascinating document uploaded by the Garand Collector’s Association. 1952 Technical Memorandum (ORO-T-18 (FEC)), entitled ‘Use of Infantry Weapons and Equipment in Korea’, was written by G.N. Donovan of ‘Project Doughboy’. This was an effort by the Operations Research Office of the John Hopkins University to gather feedback on the practical usage of US military weapons in the then-current Korean War. On page five we read the conclusion that: “The noise caused by ejection of the empty clip from the M1, despite the fact that at close range it could be heard by the enemy, was considered valuable by the rifleman as a signal to reload.” And on page eighteen: “One other complaint about the M1 was the noise made by the safety. Half the men had a nagging fear that some day the noise made in releasing the safety would reveal their positions to the enemy, yet only one-fourth objected to the distinctive noise the empty clip made when ejected. They were quite willing to retain the noise of the clip even though the enemy might be able to use it to advantage, because they found it a very useful signal to reload.” However, the question that prompted this response was rather a leading one (p. 51): “Interviews Conducted on Noise of the Rifle Is the sound of the clip being ejected of possible help to the enemy or is it helpful to you as an indication of when to reload, or is it of no importance? [Answers are followed by the number of men responding in the affirmative] Helpful to the enemy – 85 Helpful to know when to reload, therefore retain – 187 Of no importance – 43 [Total responders – ] 315” But the answers speak for themselves. Of those soldiers surveyed, twice as many believed that the noise was helpful to the enemy, as thought it unimportant. Many more men thought it was actually a useful audible indication of an empty weapon, bearing out the Bloke’s results that yes, you can hear the ping if you’re close enough, but no, you probably can’t successfully rush a man before he can get another clip into his rifle. In defence of their findings, the researchers commented thusly: “Results of these interviews show that there is great uniformity in responses to questions asked, and all numerical estimates of such items as range of firing, load carried, etcetera, have been found to cluster around a central point with comparatively little scattering. Thus it is felt that the results are reliable and can be fairly said to represent what the infantryman believed he did. The fact that these were group interviews further increased the reliability of the results, since any apparent exaggeration by one man was quickly picked up and questioned by others. In this way the men themselves provided a check on the accuracy of their answers.” In other words, if other soldiers thought it impossible for the enemy to take advantage of the ‘ping’, they would have said so. This is probably true, although interviewees are likely to behave differently under observation and questioning, and so some doubt must remain. There was also no recommendation made with respect to this perceived ‘flaw’ with the weapon, and no comment from officers on the issue (interestingly, they did point out that the noisy safety could be carefully operated not to make noise). However, again, the numbers here speak for themselves, along with the later anecdotal evidence. Some soldiers really did believe that it was possible for the enemy to hear the ‘ping’ of your rifle, rush your position, and kill you. And, whilst unlikely, there’s no reason to believe that such a thing is impossible. For example, in an incident that occurred in Afghanistan in 2008, a skirmish between a British patrol and a small number of Taliban came down to just such a one-on-one situation, with a British officer and Taliban fighter positioned just feet from each other with only a river bank in the way. Realising his weapon was empty, the attacking officer opted to use his bayonet (and the element of surprise) rather than take time to reload, and killed the wounded enemy. If we imagine a similar engagement where one party is armed with a Garand, it may well be possible to hear the final shot and the clip go ‘ping’, close the distance, and kill the unfortunate combatant. There are many other scenarios in which this could happen, but all would involve a lull in firing, being isolated from one’s squadmates (or at least in their firing line, preventing them from shooting past you), running out of ammunition at just the wrong moment, and a certain amount of bravery and/or luck on the part of the defender. It may have happened, it may never have happened; on that question the balance of the evidence suggests that it did not. However, and this is an important caveat, it is important not to insist that this claim is a total myth as Canfield has done, stating that it is ‘…so silly as to not be worthy of serious discussion’. The implication is that no-one with any knowledge of the subject would make this claim, but we now know that many veteran combatants who fought with this rifle, in fact, believe it. They simply believed that the minor risk posed by the noise was outweighed by the benefit of an audible cue to reload the weapon. Remember, all arms and munitions are dangerous. Treat all firearms as if they are loaded, and all munitions as if they are live, until you have personally confirmed otherwise. If you do not have specialist knowledge, never assume that arms or munitions are safe to handle until they have been inspected by a subject matter specialist. You should not approach, handle, move, operate, or modify arms and munitions unless explicitly trained to do so. If you encounter any unexploded ordnance (UXO) or explosive remnants of war (ERW), always remember the ‘ARMS’ acronym: AVOID the area RECORD all relevant information MARK the area from a safe distance to warn others SEEK assistance from the relevant authorities |
That's what Hanna Rosin's young son, Jacob, asks her everyday about her recent book The End of Men: And the Rise of Women. I am reading Rosin's book for additional research for my forthcoming book on why men are going on strike in marriage, fatherhood and in the culture. One reason I suggest in my book for men's negative attitudes towards marriage, women and the society is the denigrating and damaging way that boys and young men are treated in our culture and a book with a title like this sure doesn't help. To her credit, Rosin at least offers up a lame explanation to Jacob that "I want to convince people that some men out there need our help, since it's not so easy for them to ask for it." "He doesn't quite believe me yet, but maybe one day he will." Yet as I read the pages of her book, I am not sure what type of help she thinks men need and as Christina Hoff Summers said to me about men's centers that try to convince men to be more like woman: "I don't think that's the kind of help men want." Rosin points out the ways in which girls are seen as better than boys. Rosin describes a shift in the US whereby parents, both men and women, prefer a girl when asked. It took two hypothetical daughters for people to say they would prefer the third child to be a boy. Rosin goes on to say: Women are not just catching up anymore; they are becoming the standard by which success is measured. "Why can't you be more like your sister?" is a phrase that resonates with many parents of school-age sons and daughters, even if they don't always say it out loud. As parents imagine the pride of watching a child grow and develop and succeed as an adult, it is more often a girl than a boy that they see in their mind's eye. Did Rosin ever stop to think that with men are just responding to the culture around them. "The End of Men," "boys are stupid, throw rocks at them," Girl Power, and parents who want them to be girls--these are damaging messages to send to our young men. Boys and men keep many of their thoughts and feelings to themselves but don't think that they won't hear and respond to what is happening around them. Books declaring "the end of men" are contributing to the problem, not trying to find a solution to the reasons that boys and men are not faring as well in our society. |
As we reported on Friday, a critical bill that was unable to pass this past week was the extension of unemployment benefits to millions of Americans currently collecting a $1,200 average monthly stipend from the US government for sitting on their couch and not paying their mortgage. As a result of this huge hit to endless governmental spending of future unearned money, the WSJ reports that "a total of 1.3 million unemployed Americans will have lost their assistance by the end of this week." Furthermore, the cumulative number of people whose extended benefits are set to run out absent this extension, will reach 2 million in two weeks, and continue rising: as a reminder the DOL reported over 5.2 million Americans currently on Extended Benefits and EUC (Tier 1-4). The net result is yet another hit to the US ledger, as soon 2 million Americans will no longer recycle $1,200 per month into the economy. In other words, beginning in July, there will be $2.4 billion less spent each month by America's jobless on such necessities as LCD TVs (that critical 4th one for the shoe closet), iPads and cool looking iPhones that have cool gizmos but refuse to hold a conversation the second the phone is touched the "wrong" way. As the number of jobless whose benefits expire grows, the full impact of lost money will progressively increase, and absent some last minute compromise, the monthly loss will promptly hit $5 billion per month. Annualized this is a hit of $60 billion to "consumption", and represents roughly 120 million iPads not purchased, and about half a percentage point of GDP (ignoring various downstream multiplier effects). Worst of all, as these people surge back into the labor force, the unemployment rate is about to spike by nearly 1%, up to 10.5%. From the WSJ: On Thursday, Senate Democrats failed to secure the 60 votes needed to break off a GOP-led filibuster. Sen. Ben Nelson (D., Neb.) voted with Republicans in a 57-41 roll call. Senate Majority Leader Harry Reid (D., Nev.) said this third vote on the matter would be the last, allowing the Senate to move on to modest legislation cutting taxes for small businesses. The collapse of the wide-ranging legislation means that a total of 1.3 million unemployed Americans will have lost their assistance by the end of this week. It will also leave a number of states with large budget holes they had expected to fill with federal cash to help with Medicaid costs. Up in the air are other provisions that were to be included in the legislation, including some $50 billion in new taxes designed to help offset its cost. They included an increase in levies paid by private investment groups, including hedge-fund firms and real-estate partnerships, a provision long sought by some Democrats that will likely return another day. Under a program initially enacted last year—which expired June 2—jobless workers could receive up to 99 weeks of aid, including 26 weeks of basic assistance provided by states plus longer-term federal payments. The Labor Department estimates that the long-term unemployed, meaning those out of a job for at least six months, make up 46% of all jobless workers in the U.S. And like every other stimulus program, there are those who focus on possible cons from the program end... There are economic risks in ending benefits. Workers receiving them tend to funnel money back into the economy immediately, helping prop up demand and jobs. In addition, said Harvard economist Lawrence Katz, if workers are unable to find work and no longer eligible for unemployment benefits, some will turn to other government programs, such as disability and Social Security. "If you're really concerned about the long-term deficit, you should be really concerned about the long-term unemployed," Mr. Katz said. and pros... Other economists argue that extended benefits have played a part in keeping people out of the labor force. "There's a very large body of research that says that more generous benefits and benefits that last longer…encourage people to stay out of work longer," said Bruce Meyer, an economist and public policy professor at the University of Chicago. James Sherk, a labor economics analyst at the conservative Heritage Foundation think tank, said that while it could be argued that the benefits made available last year were too extensive, cutting off workers who expected to receive the full 99 weeks of benefits isn't ideal either. "You don't sort of pull the rug out from someone halfway through," he said. In our view, what will happen is that the 1.3 million who had gotten used to receiving benefits (and for whom we certainly feel sorry, as once again expectations and reality under the current administration diverge in a dramatic fashion) and had no desire to look for work, will immediately flood back into the labor force to find some job, any job, that pays even remotely as well as what the government did. What this means is that the total labor force (which incidentally dropped by 322,000 From April to May) of 154.393 million, is about to grow by at least 1.3 million, and as much as 2 million, in July. And since census employment peaked, and the number of employed will stay flat (at best) at 139.420 million, the expansion in the total labor force, will increase the unemployment rate by almost 1% in just a month, growing from 9.7% in May to 10.5% in July. That number will be reported in late August. But by then the sequel to the Great Depression v2 movie will be playing in every theater across the land, and this number will be the least of our worries. Appendix A: average monthly benefits check as per the Daily Treasury Statement and the DOL's weekly claims report. Appendix B: For an extended discussion of jobless benefits, how they work, and how their expiration will adversely impact the economy, read As Extended And Emergency Unemployment Benefits Finally Begin Expiring, A Much Different Employment Picture Emerges |
KIEV (Reuters) - Britain continues to support keeping sanctions on Russia, its foreign minister Boris Johnson said during a visit to Ukraine on Wednesday, adding that London’s position was unchanged by June’s vote to leave the European Union. Britain's Foreign Secretary Boris Johnson (L) shakes hands with Ukraine's Foreign Minister Pavlo Klimkin during a meeting in Kiev, Ukraine, September 14, 2016. REUTERS/Valentyn Ogirenko On his first visit to Kiev since taking office, Johnson said it was primarily up to the Kremlin to make progress towards peace in eastern Ukraine, where fighting between Ukrainian troops and separatist rebels has killed more than 9,500 people. He said he supported the efforts of the foreign ministers of Germany and France, who were also separately in Kiev for talks, to achieve a lasting ceasefire and a roadmap for peace under the so-called Minsk agreement. There were fears in Kiev ahead of the June 23 EU referendum that a Brexit vote would weaken the EU’s support for Ukraine and undermine its resolve to stand up to Russia. Some EU states want sanctions against Russia lifted. In the run-up to the vote, Johnson, who championed leaving the EU, also publicly linked the Ukraine crisis to what he called the “EU’s pretensions to running a defence policy”. “Whatever you want to say about the EU’s handling of the issues, the crucial thing now is that we maintain sanctions,” Johnson said on Wednesday, while fielding a question that referred to his earlier remarks. “Brexit or not, it makes no difference to us,” he said. “We continue to be a major player, as I’ve always said, in common foreign and security policy. It’s inconceivable that the UK would not be involved in that kind of conversation about sanctions.” Johnson said that the Minsk process was progressing at a “snail’s pace” but remained the only way of resolving the conflict in the Donbass region, which erupted after Russia’s annexation of Crimea in 2014. “Clearly it’s up to the Russians primarily to make progress on the security side,” he said, speaking to reporters alongside his Ukrainian counterpart Pavlo Klimkin. “But it’s up to all sides I think in this conversation to make progress together.” Moscow denies accusations by Ukraine and NATO that it helps the separatists with troops and arms. A ceasefire in Donbass was launched to coincide with the start of the school year on Sept. 1. It failed to stop all fighting but the German and French foreign ministers said on Wednesday an attempt to revive a ceasefire in eastern Ukraine from midnight could set the scene for agreement next week on further peace moves. German Foreign Minister Frank-Walter Steinmeier said Ukraine had agreed to abide by a new seven-day truce proposed by Russian-backed separatists and explicitly backed by Moscow. |
This is the third of three stories in a mini-series on how artificial intelligence is affecting the work that agencies do. Read the previous stories about Xaxis and Publicis.Sapient. After years of double-digit growth, global lingerie brand Cosabella suddenly lost momentum in 2016. “We decided we needed to cut ties [with our agency] and change something up,” said Courtney Connell, marketing director at Cosabella. Cosabella had three options: hire another agency, hire more in-house marketers or adopt an artificial intelligence platform that can handle marketing and media buying autonomously. In October, after assessing multiple vendors, Cosabella chose Adgorithms’ AI engine, Albert. Albert’s machine learning powers marketing in email, mobile, search, social and display. Marketers enter high-level parameters like geos, channels and target audiences and set a budget and KPIs around return on ad spend. “After that, [Albert] makes every single decision,” Connell said, including identifying targets and keywords, moving budgets between channels, identifying fraud, controlling bids and executing buys. After three months with Albert, Cosabella saw a 336% increase in return on ad spend. In Q4, revenues increased 155% and the brand saw 1,500 more transactions year over year, 30% of which came from new customers. In Albert’s first month, Cosabella decreased costs by 12% by increasing returns by 50%. On Facebook, return on ad spend was up 565% within Albert’s first month. By the end of month three, Albert had increased conversions on Facebook by 2,000%. Cosabella didn’t have to hire any new talent to bring marketing in-house with Albert. Its 10-person marketing department does creative production in-house, feeding Albert images and copy to serve dynamically. “He can mix and match [creative] however he pleases,” Connell said. “He might start with an ad and if he sees that getting fatigued, he might roll out a new combination.” Connell checks the Albert dashboard every morning, but because the tool self-optimizes, her team only must check on campaigns once or twice a week. It takes them less than an hour to produce graphics and copy and other materials for a campaign. “All of the big idea, strategy and campaign creative is happening in-house,” Connell said. As Albert buys and optimizes media, it makes suggestions. For example, it told Cosabella that creative featuring people performed 50% better that ads featuring just the product. “The beauty of Albert is we don’t have to optimize campaigns,” she said. “He’ll make suggestions on budget or different microsegments he’s seeing movement on.” While systems integration can be bumpy for clients, Connell described ramping up on Albert as “painless” and requiring “no technical investment whatsoever.” All a marketer has to do to is link their accounts, like Google AdWords and Facebook, to Albert. It ingests and optimizes ongoing campaigns for about two to three weeks before deploying its own. “Ever since then it’s been very easy,” Connell said. “We just give him the creative concept to make sure he has enough fresh content.” Albert only takes a matter of days to weeks to set up because it can work with just pieces of a marketer’s data, said Or Shani, CEO of Adgorithms. “We really didn’t want to be in the position of the marketing clouds where it takes six months to a year to onboard,” he said. “We want to get started very fast and show value even if we don’t have all the information.” Eventually, Cosabella will get Albert talking to the other AI vendors it’s onboarded since cutting ties with its agency, including Emarsys for email marketing and Sentient for customer acquisition and real-time merchandizing. Albert can ingest customer lists for lookalike targeting, but Cosabella wants to hook it up the company’s CRM system to keep that information flowing in constantly. Connell estimates the development work will take up to three hours. “We want to hook Emarsys up to Albert so he can model high- or low-value customers and adjust his budgets to spend more to attain a certain customer,” she said. “We all want them talking to each other.” If an email company creates a higher lifetime-value customer, for example, Albert can change its calculations to spend more to target that customer. “At the end of the day, Albert is just as good as the data you hook it up to,” Shani said. “The more information he can get, the more accurate he can execute.” Before technologies like Albert, mid-size companies like Cosabella, which has 100 employees, didn’t have many options to leverage AI, Connell said. “A lot of companies have proprietary technology, but that’s just not reachable for small to mid-size companies,” she said. “Now that’s totally changed.” Connell doesn’t miss working with an agency at all. Bringing marketing in-house has allowed Cosabella to communicate better and work more efficiently on marketing without the agency as a middleman, she said. “There’s nothing I miss about advertising agencies,” she said. When it comes to measurement, attribution and reporting, Albert is more accurate than Cosabella’s agency ever was. “He knows that he’s shown someone a Facebook ad or if they click on a search ad and make a purchase,” she said. “He gives you reports on assists versus actual sales so you can see how the channels work together to get the customer to make a purchase.” This isn’t the first time Albert has snagged an agency’s business. A large CPG brand recently fired its agency after piloting Albert for four months, Shani claimed. “Everybody tells us we’re the agency killer,” he said. “We are a threat to them, there’s no way around that, because were trying to take the pieces of the puzzle they make a lot of money on and that’s a risk.” Connell doesn’t foresee a time when Cosabella will return to working with an ad agency. There’s just too much data for a human to process and make real-time decisions on. “I would never have a human do this type of work ever again,” she said. “Albert is looking at very small, subtle patterns 24/7. When everybody else should be sleeping, he’s out there making decisions.” She leaves marketers with a word of advice. “If you’re not up to speed, get up to speed and get a tool like this,” she said. “If you want to survive, that’s what you need to do.” |
WILSON COUNTY, Tenn. (WKRN) - Add Wilson County State Senator Mae Beavers' name to the growing list of those who said they may run for governor. The long-time lawmaker told News 2 that after word Republican Montgomery County State Senator Mark Green might be under consideration for Secretary of the Army, she "got calls for two days looking for a conservative candidate." She also told News 2 in an on-camera interview that some people from Mountain City to Memphis and "all over the state" have been asking her to run for six months. "I am exploring the idea," she said. The lawmaker said she "did not consider it" while Senator Green was in the race. Senator Beavers said, "He will probably be picked for Secretary of the Army and they were asking me to get in the race." When asked when she might make a decision, Beavers said, "we'll see how long it takes for Senator Green to get his background check and his decision and we will go from there." When asked if she thought it was a "done deal" that Green will become Secretary of the Army, Beavers replied, "I do. There is no reason that he won't pass a background check." While serving in Iraq, Sen. Green, who is also a physician, was one of the first to examine Saddam Hussein after the former Iraqi leader's capture. In addition to Sen. Green, who has extensive military service, U.S. House Representatives Diane Black and Marsha Blackburn have been among those mentioned as potential Republican candidates, along with Tennessee House Speaker Beth Harwell. On the Democratic side, former Nashville Mayor Karl Dean has officially announced, while Tennessee House Democratic leader Craig Fitzhugh is among those considering a run for governor. |
WASHINGTON (CNN) -- The Supreme Court's conservative majority expressed varying degrees of concern Wednesday over a civil rights case brought by 20 firefighters, most of them white, who claim reverse discrimination in promotions. Recent case has Supreme Court justices deciding when race considerations are proper to ensure a diverse workplace. The suit was filed in response to New Haven, Connecticut, officials' decision to throw out results of promotional exams that they said left too few minorities qualified. At issue is whether the city intentionally discriminated, in violation of both federal law and the Constitution's equal protection clause. The high court is being asked to decide whether there is a continued need for special treatment for minorities, or whether enough progress has been made to make existing laws obsolete, especially in a political atmosphere where an African-American occupies the White House. Watch why the plaintiffs are suing » As is true in many hot-button social issues, Wednesday's arguments fell along familiar ideological lines, with most justices expressing clear views on when race considerations are proper to ensure a diverse workplace. "It looked at the results and classified successful and unsuccessful applicants by race," said Justice Anthony Kennedy, head in hand. "And you (the city) want us to say this isn't race? I have trouble with this argument." But a ruling against the city could leave New Haven officials stuck in a "damned-if-you-do, damned-if-you-don't" situation, subject to lawsuits from both minority and majority employees, said Justice David Souter. It is a situation business groups and municipalities have long expressed concern about. Key plaintiff Frank Ricci and others took promotional exams in 2003 for lieutenant and captain positions that had become available in New Haven, Connecticut's second-largest city. The personnel department contracted with a private firm to design an oral and written exam. When the results came back, city lawyers expressed concern about the results because none of the black firefighters and only one Latino who took the exam would have been promoted. The New Haven corporation counsel refused to certify the test and no promotions were given. The record does not indicate how many firefighters took the two tests for promotion to captain and lieutenant. Watch why the lawsuit is so controversial » The city said that under a federal civil rights law known as Title VII, employers must ban actions such as promotion tests that would have a "disparate impact" on a protected class, such as a specified race or gender. But a group of firefighters sued, calling themselves the "New Haven 20." The plaintiffs, wearing their dress blue uniforms, posed on the high court steps after the 75-minute argument. Nineteen identify themselves as white while one says he is Hispanic-white. Inside, conservatives on the high court questioned whether the city could throw out the results of the promotion exams after they were already given. "You had some applicants who were winners and their promotion was set aside," said Justice Antonin Scalia. Chief Justice John Roberts offered a hypothetical: "Jones, you don't get the promotion because you're white ... and they go down the list and throw out everybody who took the test. That would be all right," he asked. "They get do-overs until it comes out right. Or throw out this test, they do another test. Oh, it's just as bad, throw that one out." Christopher Meade, arguing for New Haven, said, "The city has a duty to ensure that its process is fair for all applicants, both black and white." Justices on the left seemed to support that view. Justice John Paul Stevens suggested that if there were a choice of two tests, one of which had a lesser "disparate impact" on minorities, "they could take that test, even though its sole purpose was to achieve racial proportionality in candidates selected." The firefighters' attorney, Greg Coleman, countered by saying the city's action in this instance "violates the principle of individual dignity." Kennedy's views could prove key. He appeared to oppose the city's dismissal of the test results and has traditionally been skeptical of many race-based decisions in education and the workplace. But his more moderate views could blunt the impact of any ruling by his more right-leaning colleagues. In a key ruling three years ago that tossed out racial diversity plans in two public school districts, Kennedy took a more centrist view that held open the limited use of skin color when trying to achieve diversity in the classroom. The Obama administration also has taken a nuanced position on the appeal. A Justice Department lawyer told the high court that while the federal government supports the city's discretion to nullify the test results, it believes the lawsuit should be allowed to proceed on a limited basis. The case has attracted a broad range of interest from a variety of advocacy and business groups concerned about how far the high court would go to allow race to be used at all by government and the private sector in such areas as affirmative action, education, and contracting. The case is Ricci v. DeStefano (07-1428), A ruling is expected in about two months. All About Affirmative Action • U.S. Supreme Court • Employment Discrimination |
Some people lack self-control. A habit of saying the wrong thing at the wrong time is one example. But now, scientists have developed a way of improving a person's self-control through electrical brain stimulation. This is according to a study published in The Journal of Neuroscience. Researchers from the University of Texas Health Science Center (UTHealth) at Houston and the University of California, San Diego, say their findings could be useful for future treatments of attention deficit hyperactivity disorder (ADHD) and Tourette's syndrome, among other self-control disorders. To reach their findings, the investigators analyzed four study participants with epilepsy who were required to perform a series of behavioral tasks that involved the "braking" of brain activity. Could you resist? Scientists say they have discovered a way to enhance a person's self-control through the use of electrical brain stimulation. Could you resist? Scientists say they have discovered a way to enhance a person's self-control through the use of electrical brain stimulation. The researchers found that the area in which the brain-slowing activity occurred was in the prefrontal cortex of each participant. Using brief electrical stimulation through electrodes implanted directly on the brain surface, a computer increased activity in the prefrontal cortex brain of each patient at the point when their behavioral brain activity slowed. The researchers note that this was a double-blind study, so both the participants and investigators did not know when or where the electrical charges were triggered. 'Self-control enhanced' with stimulation of braking system They found that the electrical stimulation in the prefrontal cortex of the brain enhanced the slowing of behavioral activity, leading to an enhanced form of self-control. However, when electrical stimulation was administered outside the prefrontal cortex, the participants showed no change in behavior. The researchers say this suggests that the effects of electrical stimulation are specific to the prefrontal cortex. Commenting on the findings, Nitin Tandon, of the Vivian L. Smith Department of Neurosurgery at the UTHealth Medical School and senior author of study, says: "Our daily life is full of occasions when one must inhibit responses. For example, one must stop speaking when it's inappropriate to the social context and stop oneself from reaching for extra candy. There is a circuit in the brain for inhibiting or braking responses. We believe we are the first to show that we can enhance this braking system with brain stimulation." The investigators point out that although their findings are promising, they do not yet provide evidence that direct electrical stimulation is effective for treating self-control disorders, such as borderline personality disorder, obsessive-compulsive disorder (OCD), and Tourette's syndrome. But they say their proof-of-principle study may be useful one day when it comes to treating these types of disorders. Medical News Today recently reported on a study detailing the potential for mind control, after scientists discovered that a brain region activated when people work out mathematic calculations is also activated when people say quantitative terms. |
Ask any landscape photographer when their favorite time to shoot is, and they’ll most likely say Golden Hour. Golden Hour light is unparalleled in that it’s soft yet vibrant, warm yet even. And man, does it do wonders for showing off the features of a landscape! But taking a high-quality landscape photo during Golden Hour requires more than just pointing the camera toward the sunset and pressing the shutter. I’ve put together a collection of nine spectacular sunset shots to inspire your work, and I’ve included a few tips and tricks along with them. Let’s see just what you need to do to improve your Golden Hour photos in order to create masterpieces like the photos below. When shooting a sunset, many photographers will make the sky the focal point of the image. And while that works in many instances due to the gorgeous coloring of the sky, sometimes the image works better if the sunset takes a backseat to another element. In this shot, Kevin McNeal uses the beautiful waterfall as a focal point, which plays perfectly into the photo. The bright white of the water really pops while the visual weight of the waterfall balances out the layering of the cliffs that dominate the right side of the image. Using water in the foreground of a sunset shot is a great way to improve the exposure. By reflecting the brightness of the sky in the water, the photographer, Steve Kossack, was able to open up the foreground and help prevent it from becoming a dark, shadowy weight that brings the photo down. Better still, the water reflects the gorgeous colors of the sunset, adding additional pop to an already gorgeous image. In this image, Rick Sandford highlights the value of having a perfectly level horizon. Though it’s easy to be taken in by the beauty of the scene, it’s imperative that when you’re photographing a sunset with a clearly defined landscape like this one that you pay close attention to the framing of the shot. If the horizon is off just a little, it will be plainly visible and ruin an otherwise breathtaking photo. In this gorgeous Golden Hour photo, Loscar Numael capture golden tones as the sun illuminates the distant mountains. When photographing sunsets, you can enhance these golden tones by switching your white balance to the “shade” setting. Because the shade setting is intended to warm up bluish tones, it adds red and orange tones to the shot. That means that when it’s used on golden tones, it makes those red and orange tones that much more prevalent. When photographing a sunset, don’t be afraid to extend the length of the exposure to show the movement of the clouds. As we can see in this shot by Jason Odell, the clouds take on a dreamy quality with the blurriness that’s induced by the long shutter speed. Paired with the explosion of color from the setting sun, the movement of the clouds gives this image a greater level of depth and interest. Even though Golden Hour is a prime time to show off the sky, again, we see the value of incorporating foreground interest into the shot. In this case, Joe Rossbach has framed the shot perfectly with the rocks in the foreground serving as an anchor for the photo. The rocks also give our eye something to follow deeper into the scene, giving it a greater sense of dimension. The cool tones of the rocks act as a nice balancing point to the bright, warm colors of the sunset as well. In another beautiful example of a long exposure, Edwin Martinez pairs the harsh lines and shapes of the rocks in the foreground with the soft, smooth surface of the water. In the background, the fog acts like a giant diffuser, helping to spread out the rays of the setting sun in a way that makes the fog glow. In looking at the differences in the colors between the foreground and background, we also see how you can use color to help achieve improved visual balance from front to back. Gary Hart demonstrates with his photo above how not all sunset photos have to be taken after the sun actually sets. When photographing a landscape before the sun has hit the horizon, it’s a good idea to work in aperture priority mode so you can make quick changes to the exposure settings as they rapidly change with the movement of the sun. Then, once the sun dips below the horizon, switch to manual mode so you have greater creative control over your camera’s settings. Not all sunset photos have to include the sun or even need to be taken in the direction of the sunset. In this image by Steve Kossack, the setting sun bathes the rock formations in an orange glow, giving us a better sense of the texture of the rocks and the size and scale of the landscape. The lesson here is the value in turning around. Often, as spectacular as the setting sun might be, there very well could be an equally beautiful view behind you! These photos show what’s possible when you put in the time and effort to find an interesting vantage point, incorporate foreground interest, use the appropriate camera settings, and so forth. Another crucial aspect of creating images like those seen above is to use high-quality filters that boost colors, help you blur movement, and control the dynamic range of the scene at sunset. Singh-Ray makes some of the best filters around, including polarizers, solid neutral density filters, and graduated neutral density filters. They even have reverse neutral density filters that are perfect for sunrise and sunset shooting because they are darkest in the center of the filter with clear glass on the bottom and graduated from dark to light above the horizon line. That’s beneficial because at sunset, the brightest part of the sky is along the horizon. By filtering out some of that light, the reverse neutral density filter helps you control the dynamic range of the shot by lightening the foreground and gradually controlling the brightness of the sky. The benefit to you is that you get all those effects with a single filter. No more long post-processing sessions! I shoot with Singh-Ray filters because I feel they are the best on the market. If you want to take your photos to the next level, I suggest you check them out. |
Scotland Yard has raided five squats in London 24 hours before the royal wedding – a week after promising pre-emptive action to ensure the day is trouble free. Three squats in Camberwell, south London, were raided on Thursday morning along with a community at Heathrow, known as Transition Heathrow and set up in opposition to the building of a third runway. The fifth squat raided was Offmarket in Hackney, north-east London. Scotland Yard said 14 people were arrested in Camberwell. A spokesman denied the raids had anything to do with the royal wedding. Police said the raid at a squat known as Ratstar in Camberwell was carried out under a section 18 warrant to search for stolen goods. A spokesman said once officers arrived at the address they found that those inside were bypassing the electricity meter and were arrested for "electricity abstraction". "It's business as usual," a spokesman said. "This is nothing to do with the royal wedding." On Wednesday police officers from the Metropolitan and Sussex police forces raided a squat in Brighton and arrested seven people. Sussex police confirmed it had been assisting the Met in executing three warrants in the city in response to the trouble at last month's anti-cuts protest in London, which followed the TUC march in the capital. Scotland Yard's denial that the raids were in any way linked to the police preparations for the royal wedding came a week after senior officers made clear they would be taking pre-emptive action, including raiding squats and making arrests, in advance of the wedding to ensure that no criminal activity took place on the day. To arrest people under conspiracy laws the police would have to have evidence of a plot. But the raids on Thursday all appeared to have been carried out under warrants to search for either stolen goods or to look for evidence relating to the disorder at the TUC march on 26 March and the anti-cuts demonstration in London last December. The warrant issued in Hackney stated the raid was taking place under "section 8 of the Police and Criminal Evidence Act" to look for "documentation ... material ... mobile phones, cameras and correspondence ... that can be linked to events and suspects of serious disorder at the TUC rally on 26 March 2011". One legal source pointed out that it was highly unusual for so many raids on squats to be carried out in one day. "The Heathrow squat has been there peacefully, supported by many people in the community, for more than a year," said the legal source. John McDonnell, the MP for Hayes and Harlington, which covers the Heathrow squat, accused the police of "harassing environmental campaigners". McDonnell raised a point of order in the Commons to question the timing of the incidents, saying they appeared to be "some form of pre-emptive strike before the royal wedding". He added: "I believe this disproportionate use of force is unacceptable and I would urge that a minister comes to this house from the Home Office to explain what is exactly happening today, what are the grounds for that action and also to contact the Metropolitan police commissioner to explain that many of us feel that this is disproportionate and no way to celebrate this joyous wedding." |
Action Bronson and Party Supplies are returning on November 1st with the second installment of Blue Chips. Today they've released the cover art for the mixtape. Action was supposed to have a very legendary surprise guest on the project, which, it turns out, what supposed to be fellow New York Cam'ron, but as Action told XXL, that fell through (and it was more of a "pipe dream"). "Unfortunately, I wanted to get Cam’ron in," Bronsolino said. "He was going to be the guest, but we kind of jumped the gun by writing that." Bronson instead decided to write himself in as the (legendary) featured artist. Who would like to hear an Action x Cam'ron collaboration? Peep the artwork in the gallery above, and watch the teaser for the project below. |
This post was updated Sept. 1 at 9:25 a.m. UCLA officials announced Wednesday a partnership with the Los Angeles Lakers basketball team that covers in-game health care for players and naming rights to the Lakers’ new training facility. UCLA Health will serve as the exclusive in-game health providers for Lakers’ players. The team’s new training facility and offices in El Segundo, California, will also be named the UCLA Health Training Center. Tami Dennis, UCLA Health spokesperson, said in an email statement existing physicians and staff would care for the players, with the potential to hire additional staff. “As we expand our efforts in musculoskeletal activities, including orthopedics, sports medicine and rehabilitation, we anticipate expanding our staff as well,” Dennis said. Construction of the new training center began in September 2015 and is expected to be completed by the fall of 2017. Jeanie Buss, president and co-owner of the Lakers, said in a statement that she is extremely pleased with the partnership. “Their innovative, forward-thinking, research-oriented medical team and facilities are unsurpassed,” Buss said. “Their focus on not only treating, but preventing, injuries will translate into the ultimate goal of helping our players perform better on-court and to prolonging their professional careers.” John Mazziotta, vice chancellor of UCLA Health Sciences and CEO of UCLA Health, said in a statement he thinks the partnership with the Lakers will allow both organizations to promote health and fitness to a diverse audience. “UCLA Health is committed to improving the health of our community, both for individuals and populationwide,” he said. The 120,000 square-foot facility will be the new home of the Lakers and will contain two basketball courts, a public sponsors’ galley for UCLA Health, separate office and gameday entries, separate and secure players parking and entry and an employee hub/internet cafe. Dennis said UCLA Health will pay $4 million to the Lakers per year over the next five years as part of the partnership. “The partnership includes the naming rights to the UCLA Health Training Center, a strong advertising presence at Staples Center through the placement of our brand and information about our services and enhanced visibility of UCLA Health via broadcast and social media channels,” Dennis said. Dennis added UCLA Health expects the partnership to last 15 years. UCLA Health committed to the first five financially with the option to extend in five-year increments. |
According to reliable sources within IBJJF itself that have contacted BJJEE.com, the leading federation of Brazilian Jiu-Jitsu, the IBJJF which is run by Carlos Gracie Jr. is planning some major changes in black belt registration for IBJJF members. IBJJF is a private for-profit company and even though they are regarded as the leading and most prestigious BJJ federation (followed by UAEJJF) they are not an official governing body of the sport. For BJJ black belts to get certified by IBJJF, they need to pay hundreds of dollars to “certify”their black belt and “degrees”. This is a conversation that was sent to BJJEE. portions have been redacted, including the European country in question, to protect the source and the investigator. In these files you see a couple issues regarding the black belt degrees. We see the shifting of the requirements to change the required belt to rank black belts to third degree from second, as it has been until now. Deemed as “quality control” or “tradition”, this means that to own a fully functional, independent BJJ academy with the proper certifications takes an additional three years. And if your BJJ academy was independent at second, you’re now BACK on the hook because the requirements shifted. Three years of additional affiliation fees can range into the thousands of dollars, and you will not be able to compete under your own flag during that time. At present time, only a second degree black belt can promote a brown belt to a black belt in BJJ. The minimum required time to get a first degree in BJJ is 3 years and add another 3 years to get a second degree. These changes haven’t been officially confirmed by IBJJF as of yet but are rumoured to be put in effect in early 2018. Clips from the interview with the high ranking IBJJF official detailing IBJJF’s control policies in Europe: What does this all mean? For some prominent members of the community this is good news because it means that the federation wants only mature instructors (at least 9 active years at black belt) to be able to promote new black belts. They would want to avoid a 25 year old black belt (the youngest 2nd degree black belt) to promote another black belt. This is also quality control so that BJJ doesn’t end as diluted as Taekwondo. For others, this is a hypocrisy because of the actions of some highly ranked and legit black belts that have promoted what some feel are ‘undeserving’ members of the bjj community or even worse, martial artist that haven’t even put in the the time to train in the Gi or in some cases haven’t even trained BJJ at all… Some bad examples: Or: |
WATCH: Donald Trump signs his first official act as president, the waiver for retired Gen. James Mattis to serve as defense secretary. pic.twitter.com/MoL3m235cx — Washington Examiner (@dcexaminer) January 20, 2017 As one of his first actions as President, Donald Trump signed a waiver that will allow retired Marine General James Mattis to serve as Trump’s Defense Secretary. He still needs to be confirmed, but the waiver is a necessity because of a restriction under federal law that prevents Mattis from getting the position. Federal law says that in order to serve as Secretary of Defense, a person has to be a civilian, and “may not be appointed as Secretary of Defense within seven years after relief from active duty.” Since Mattis only retired three years ago, he wouldn’t be qualified under the statute. The House approved the waiver on Friday in a vote of 268-151. Only 36 Democrats supported the bill. The Senate easily approved the waiver a day earlier. However, some Democrats opposed the bill fearing that it was too vague because it didn’t mention Mattis by name. “If we don’t stand up for ourselves now, we’re going to be rolled over countlessly,” Rep. Adam Smith of Washington state, the ranking Democrat on the House Armed Services Committee said according to Politico. The waiver for Gen. Mattis is just another example of Donald Trump thinking the rules that his predecessors followed shouldn’t apply to him. pic.twitter.com/S9NfpM49OK — Ruben Gallego (@RepRubenGallego) January 13, 2017 This isn’t the first time this has happened. General George C. Marshall became Secretary of Defense in 1950, despite having been Army Chief of Staff until 1945. Congress allowed Marshall to take the job, but they made it clear that they didn’t want to make a habit of doing this. When Congress passed legislation that let Marshall become Secretary, they specifically said, “the authority granted by this Act is not to be construed as approval by the Congress of continuing appointments of military men in the office of Secretary of Defense in the future.” Ronn Blitzer contributed to this report. |
Harvard scholar Christopher Jencks reviews an edited volume, Legacies of the War on Poverty, where some of the best economists weigh in on what worked and what didn’t. Superb review. I learned a lot. The review was in two parts, and here’s the conclusion: On the one hand, there have clearly been more successes than today’s Republicans acknowledge, at least in public. Raising Social Security benefits played a major part in cutting poverty among the elderly. The Earned Income Tax Credit cut poverty among single mothers. Food stamps improve living standards for most poor families. Medicaid also improves the lives of the poor. Even Section 8 rent subsidies, which I have not discussed, improve living standards among the poor families lucky enough to get one, although the money might do more good if it were distributed in a less random way. Head Start also turns out to help poor children stay on track for somewhat better lives than their parents had. On the other hand, Republican claims that antipoverty programs were ineffective and wasteful also appear to have been well founded in many cases. Title I spending on elementary and secondary education has had few identifiable benefits, although the design of the program would make it hard to identify such benefits even if they existed. Relying on student loans rather than grants to finance the early years of higher education has discouraged an unknown number of low-income students from entering college, because of the fear that they will not be able to pay the loans back if they do not graduate. Job-training programs for the least employable have also yielded modest benefits. The community action programs that challenged the authority of elected local officials during the 1960s might have been a fine idea if they had been privately funded, but using federal money to pay for attacks on elected officials was a political disaster. The fact that the War on Poverty included some unsuccessful programs is not an indictment of the overall effort. Failures are an inevitable part of any program that requires experimentation. The problem is that most of these programs still exist. Job-training programs that don’t work still pop up and disappear. Title I of the Elementary and Secondary Education Act still pushes money into the hands of educators who do not raise poor children’s test scores. It has had little in the way of tangible results. Increasingly large student loans still allow colleges to raise tuition faster than family incomes rise, and rising costs still discourage many poor students from attending or completing college. It takes time to produce disinterested assessments of political programs. The Government Accountability Office has done good assessments of some narrowly defined programs, but assessing strategic choices about how best to fight poverty has been left largely to journalists, university scholars, and organizations like the Russell Sage Foundation, which paid for Legacies. Scholars are not completely disinterested either, but in this case we can be grateful that a small group has helped us reach a more balanced judgment about a noble experiment. We did not lose the War on Poverty. We gained some ground. Quite a lot of ground. |
Jump to Prev Top Next Close Jennifer Hale asks a few questions about the character. That's less than 30 seconds after she walks in the room. Her arrival prompts the usual bit of Hollywood hug and kiss, and some hello-how-are-yous, but then it's down to business. Who is this character? What is she doing? Why is she here? And then, just a minute later, she's in the booth and she's nailing it. If you've played a video game in the past several years, you'll probably recognize her voice. Her list of credits is enormous. Baldur's Gate, Planescape: Torment, Eternal Darkness: Sanity's Requiem, Metroid Prime, Knights of the Old Republic, Mercenaries, the Metal Gear Solid series, Mass Effect 2 and 3, Gears of War 3, Diablo 3, Halo 4 and 5, Call of Duty: Black Ops, BioShock Infinite, The Last of Us and Broken Age are not even half of the games she's contributed to. And now, added to that list, is Defense Grid 2. Executive Producer Jeff Pobst and Script Co-Writer Sam Ernst are directing, sitting in chairs with wood frames and slung canvas, like you'd expect. Each is holding a script the size of a small phone book. The engineer signals he's ready to begin. And Hale begins. Standing in the recording booth, she runs over a couple of lines, trying out different voices. She's playing a new character, a former scientist who is now part of a computer, and who will help the player. Hale asks if it's all right if the character is well-traveled. "She's moved around a lot, but spent a lot of time in Australia?" she suggests. Pobst says, "Sure." And then Hale drops it, and it's perfect. A fully realized character, pulled out of the bag like it's nothing. The result of (and perhaps the cause for) over two decades of successful work in the video game industry. For every game you play, this scene will repeat multiple times. Each character, each voice, each barely noticeable grunt or scream is created by a person in a booth. Not always by someone as innately talented as Hale, but someone. Somewhere. After 10 minutes of working with Hale, Ernst and Pobst noticeably relax. It's working. The new character, voiced by the veteran Hale, sounds better than they'd hoped. Stitched together after the fact with the voices recorded by the other actors, it will somehow feel perfectly in place. Even though Hale had never heard those voices, and hadn't read the script until today. Ernst and Pobst celebrate with pastries and warm smiles, while Hale continues to rocket through the script, laying down lines, adding life to the game that's still being made hundreds of miles away, in a completely different state. This is game development. The writer Ernst and writing partner Jim Dunn wrote the script for the original Defense Grid. That was back before they'd really made it in Hollywood. Since then, they've written and produced two television series, Haven and Crisis, as well as some episodes of Stephen King's Dead Zone. They're the type of Hollywood writers whose names aren't yet well-known, but they're doing it — making money, making shows. "Journeymen" wouldn't be an unfair characterization. Neither would "pros." When the time came to write the script for Defense Grid 2, Pobst went back to the well, to the now more experienced team. Ernst and Dunn flew to Seattle in spring of 2013 to begin discussing with Hidden Path's executives what to do with the script for the game. Their first suggestion: Kill off main character Fletcher. The Hidden Path execs lost their minds. "I wasn't saying we should kill Fletcher permanently," Ernst tells me in LA, over sushi. "It's not that I wanted to get rid of him. ... It was really just the shock value of getting to say that to a bunch of people." The original Defense Grid script had been a fixer-upper project for Ernst and Dunn. A version had already been written, but those writers were not going to see the project through. When Ernst saw what had been created, his first instinct was to jettison it and start over. Ernst and Dunn are one of the rare professional writing teams brought in to help make games. But the practice is becoming more common as game developers try to break out of the traditional enthusiast fan base and into more mainstream markets. Ernst and Dunn's first game project was for one of the Shrek games. Ernst says the process initially was painful. A script had been written, but it was overly complex — and terrible. Jeff Pobst (middle) and Sam Ernst (right) "The idea of bringing in writers was slow," Ernst says. "These ... designers, they thought they could write, and they sucked. They sucked like — I don't know if you read any fan fiction. On Haven, we would have all this fan fiction, and I couldn't read much of it, because a lot of it was sexy. And I was like, 'What are you doing with my characters, man?' And of course I named one of the characters after my daughter, so it was really awkward. But [Shrek] was really on that level. "The reason we got hired on Shrek was to go in because they were in a bad spot. Where the game was, where the story was — the problem was they would focus all on story. That's what they think is important, is story, and there are very few good TV shows or movies where the story is insanely complicated. If anything, you spend all your time trying to simplify a cool story and make it emotionally complex, the characters. When you run into a building and kill zombies, it's hard to focus on character. That's changed, as you know. But that was the big challenge for video games." For Defense Grid that process of focusing on character would be tricky. The Defense Grid series is tower defense. The player doesn't portray a character so much as they manipulate the objects on the screen. They are spoken to by characters in the game, but the characters are never shown. They're just voices. So any dialogue or dramatic interaction is between characters that aren't directly driving the action on the screen, and are also invisible. It's a unique challenge for the creative team. "So the big question is, how much dialogue can you get away with when you can't see the characters?" says Ernst. "With DG1, I don't think anybody knew. We were trying to tell a real story, and there was a lot of back-and-forth on how much dialogue we can do." Ernst and Dunn's first attempt was, in effect, a two-character story, involving dialogue between the main character Fletcher, and the player playing the game. Only the player's lines were not spoken, but typed on the screen while the game played. "We thought it would be awesome, and we put it in and it was horrible," says Pobst. "Because you were playing the game and reading it, and it didn't work." Pobst called the writers and told them the game would have to change. The dialogue would have to all become monologue. "Silence on the other end of the line, for way too long," says Pobst. "I was like, 'They don't want to work with this anymore.'" "The only emotion they want is like a Steven Seagal movie. Someone kills Steven Seagal's family, now he's got emotion." The writers recovered, and gave it a shot. The result turned out better than they hoped, and shipped with Defense Grid. Now, almost eight years later, the cast of characters in the Defense Grid universe has expanded. The Containment expansion introduced Simon, voiced by Alan Tudyk, and Cai, voiced by Ming-Na Wen. Defense Grid 2 will add even more characters including, for the first time in the series, a villain. Ernst sees his work as tapping more fully into emotion in whatever medium he's working in. He's critical of video games and movies that attempt to portray heroes as badass, but skimp on their feelings. "You have to be willing to talk about emotions," he says, while describing how he approached the rewrites on the Shrek game. "I felt like [action game] designers, they [are] afraid of emotion, because it was sappy and stupid and nobody cares about that. The only emotion they want is like a Steven Seagal movie. Someone kills Steven Seagal's family, now he's got emotion. ... He's sad for a scene, he puts a flower on the grave, and then he stands up and his eyes have changed and now he's gonna go be a man. That's Steven Seagal. Or George W. Bush. These are very one-dimensional ideas." For Defense Grid 2, the characters introduced in the first game and subsequent expansions are evolving, and there's drama to unfold with new characters in an entirely new world. How well that all works is only partly up to Ernst and Dunn. The game itself will have to carry some of that weight, but most of the emotion of the characters will either come through or not in the performances of the actors. And those performances are happening in Burbank, Calif. The recording The process of turning words on the page into performances you can hear starts in unexpected places. An entire industry exists to service the effort, mostly in Los Angeles. For Defense Grid 2, Hidden Path works with The Voicecaster in Burbank. It's billed as the longest-serving VO agency in Hollywood, and it provides a "full-service solution," including casting and studio rentals. We arrive at Voicecaster on a Thursday morning . It's not a glamorous place, but it is home to four separate recording studios and has produced VO for hundreds of productions — television, film, commercials and video games. Walking inside the place, it's like the 1970s never ended. Deep pile carpets, dark wood paneling. The recording equipment and computer look out of place amidst the retro decor. The Keurig machine, sitting on a table, looks like an alien artifact. Working with Voicecaster, Pobst scheduled returning actors Jim Ward and Alan Tudyk, and found an actress to take over the Cai role from Ming-Na Wen, as well as actors to handle most of the new characters. Most of the actors are booked in hour-long blocks throughout the day. Juan Carlos Bagnell arrives to engineer the sessions. He's a veteran, and a longtime Voicecaster employee. But like most people working in show business in LA who haven't become huge stars (and some who have), Bagnell works a variety of jobs. He's known as "Some Gadget Guy" on YouTube, where he reviews technology and gadgets. That's his passion, but the VO work pays the bills. Sometimes Bagnell directs. Today he's only engineering. The computer and sound decks are turned on and waiting for Bagnell when he arrives. He checks to make sure everything is how he wants it, walks into the sound booth to adjust the mic, and then waits. All told, he's good to go in under five minutes. The first session of the day is for the character Cai. Ellen Dubin replaces Ming-Na Wen, who's now appearing in Marvel's Agents of S.H.I.E.L.D.. "Ming-Na got new agents, and the new agents basically said, 'Oh, well, you know, now that she's a big TV star there's no way we would do what we did 12-13 months ago, for that price,'" Pobst says. "As much as I liked her ... it seemed like that was the place to make a change." Dubin is new to the production, and takes a few line reads to find her footing. Bagnell plays Ming-Na's performance so Dubin can understand the character, but also so that she won't accidentally imitate the well-known actress' performance. There's a fine line between remaining true to the character and delivering a straight-up imitation. One would be good; the other might turn players off. Like the "uncanny valley" effect of seeing a robot of a game character that's almost lifelike, but not quite. Pobst wants Cai to sound similar to the original performance, but different enough that it sounds like an obviously different actress. After several tries it's still not quite there. Ernst gives the note "more balls." Dubin acknowledges "more balls." And then she delivers it. The performance unmistakably has "more balls." And it's perfect. The character has been found. And then, less than an hour later, it's Jen Hale's turn. After she finds her slightly Australian-tinted character, the next 35 minutes go by in a blur. Hale, whose session started late because the previous session also started late, performs hundreds of pages of dialogue at a rate of approximately one line every five seconds. Occasionally she does one twice, but mostly she nails it on the first take. At one point, while being directed, she cuts off Pobst. She likes to read the line as soon as she hears it in her head, she says. It saves time. Pobst agrees. When she's finished, a quick exchange of thank yous, a pose for a picture, and then she's done. Jennifer Hale, the consummate professional, whisks herself out the door in a swirl of bewildered appreciation and smiles, presumably on her way to do it again someplace else, for some other video game or television show. And then, for the DG2 crew, it’s on to the next character, which just happens to be the most important character in the game. "Ming-Na got new agents, and the new agents basically said, 'Oh, well, you know, now that she's a big TV star there's no way we would do what we did 12-13 months ago, for that price.'" Jennifer Hale Magic on demand After Hale takes her leave, it's Jim Ward's turn. Ward plays the iconic character Fletcher, the original AI with whom the player interacted in the first Defense Grid. Fletcher is a martial character, regal and dignified. He is an ancient leader from the world where the first Defense Grid game took place, who has now become a voice inside of a computer. When Ward arrives, he looks anything but regal and dignified. Wearing a leather jacket, jeans and a T-shirt, Ward looks like he's either just woken up or come home from a wild night. He walks timidly. He admits he's not feeling well, and his voice reflects that. It's rough, soft and hoarse. Ward takes some time to compose himself. He gets a drink of water. A stool is located for him to sit on in the booth because his back is failing him. Worried looks are exchanged. Ward is responsible for almost half of the lines in the script. His character, by far, carries the game. If he can't deliver, half of an entire day will have been wasted. He's booked for another four-hour block the next day, but with so many lines to cover, both days were planned to be full. Pobst and Bagnell play it cool, saying kind things and trying not to let their worry show, but the tension rises. There is concern. Ward settles in the booth, on his stool. Bagnell signals he's ready, and plays some old Fletcher lines to refresh Ward's memory. And then it's time. Ward clears his throat, takes a deep breath and speaks ... and he's Fletcher. In an instant, Jim Ward is gone, and the person sitting on that stool, in that booth is inhabiting an almost extra-dimensional plane, channeling the character of Fletcher. Ward perfectly re-creates the character in line after line, one after the other, barely pausing for breath. He's reading one line every few seconds, tearing through the script at an astonishing pace. At one point, as Ward is ripping through one-line "barks" that will play after certain actions are performed in the game, Pobst leans over and whispers, "It's exactly the same as he performed it eight years ago." And sure enough, after I return home from Burbank I compare the barks recorded in 2014 with the same barks recorded in 2007 for the original game, holding my voice recorder up to the computer. They sound absolutely identical. At the end of the day, Ward has finished reading the final Fletcher line in the script, plus some extra "available now!" advertising blurbs. He's banged out a total of over 900 lines in just under four hours. The second half-day session won't be required. Ward has landed it. By the end of the next day, almost every single line of dialogue for Defense Grid 2 will have been recorded, except for those of Firefly and Serenity star Alan Tudyk, who was in Australia. He'll have to record another day. Pobst will fly home from LA having completed just another recording session for just another game. Magic, on demand. Meanwhile, back in Bellevue, Wash. at Hidden Path, the game isn't finished. The voice-overs are just one more piece of the puzzle. Months of writing, weeks of planning and casting, hours of recording, hours yet to be performed of editing and mixing and in the end it will be just one part of what you see and hear when you play the game. That's voice-over recording, and this is game development. Ward is responsible for almost half of the lines in the script. His character, by far, carries the game. Jim Ward Continue to part 10 of this series here. This story is part of a series covering the development of Defense Grid 2. To read previous installments, please visit the Making of Defense Grid 2 page. This series will continue into mid-2014, the projected launch date for Defense Grid 2. Images: Hidden Path Entertainment, Polygon |
The following is an excerpt from The Sync Book: Myths, Media, Magic and Mindscapes, an anthology that came out on 9/11/11 in which 26 bloggers/writers/artists share their perspective on the strange and beautiful universe in which we live. Available here. Sync Generally speaking, when one seemingly significant thing or event echoes another, in a way that can't be understood causally, some call the phenomena synchronicity. As the connection between these thing-events1 and what makes them significant, is up to the interpretation of the individual, this kind of sync is relative. The decision that the relationship between one thing and another is entirely understood (being then normal cause and effect), or not (being then sync), also rests with personal interpretation. It is then an opinion to say "this" is connected to "that," or not. The word coincidence is generally associated with thing-events that echo one another through chance.2 The decision that something is chance or more mysterious also lies in the murky phantom world of opinion. Synchronicity and coincidence are the same thing, only the individual bias over whether the relationship is meaningful or arbitrary changes. Two people will witness the same events and one will call it coincidence and the other sync. This is an issue of individual temperament-and does not change whether the thing-event took place or not. All is sync or nothing is sync Everything is connected to everything else,3 sync being the cases when our current perspective allows us to see these thing-events as related (or as not divided). Often the seemingly random and meaningless will later be understood as perfectly "in sync," when the perspective shifts appropriately. In this view of sync, we now move away from seeing synchronicity as the connections deemed special and move into a knowing of that property which makes one connection meaningful or not-a property that is always present, because it is ourselves. Syncs offer endless insight into the world, but their most essential quality is in vivifying what and who really allows for them. If we reflect on one of those amazing animations where we zoom in (or out) infinitely on a fractal Mandelbrot set, we notice that, at points, the entire shape comes into focus and then recedes into strange and dazzling complexity. This happens repeatedly, regardless of where we travel on the infinite complexity of the fractal, as it always resolves into the same familiar shape eventually. Our macro/microcosm has the same property. We have all seen films where the camera moves rapidly between vast amounts of space containing familiar forms like atoms, molecules and cells-eventuating into a creature or plant that would be part of our normal experience or magnification. Further "up," we have the same dynamic: the clutter of streets and houses resolving into patterned cities; later becoming the planet; moving through the vastness of empty space; resolving into the solar system . . . much more space and we see the galaxy, etc. Sync compares, in the fractal example, to the points at which we see a whole familiar shape after lots of complexity, and, in the micro/macro images, to the moments when we recognize a familiar form resolving after much empty space. The sync is always part of the whole, made up of the interconnected infinite thing-events, but stands out as where we-owing to our unique perspective-resolve this complexity into something conceivable and as associated to other parts of our experience. All understanding is sync, which is simply association, relationship or connections between thing-events. We derive meaning from putting things and events together to tell ourselves a story. Without constantly making associations we would be lost in perplexing noise and chaos, all the information coming at us making no sense at all. What we generally call synchronicity is the fringe of this everyday activity. Creating unusual associations (that eventually become accepted as universal) is how we expand the parameters of the consensus association narrative (our reality), adding depth and texture to the experience of experience itself. The idea that the sun is the center of the local spheres was once an obscene sync, now included in the common story about the reality we all share. The connection between the movement of the earth relative to the sun, causing seasons, are commonly accepted associations between thing-events (or syncs), while the connection between 9/11 and 2001: A Space Odyssey is a more occult (out of the ordinary) relationship. On 9/11/2001, the World Trade Center collapsed right beside "The Millennium Hilton Hotel," a building designed to resemble the black Monolith from the film 2001: A Space Odyssey. The building was practically flush with the towers, being damaged by falling debris and was captured in many of the iconic images from 9/11. Both the real life event and the film associate to the year 2001, as well as sharing the presence of the Monolith. The film depicts key evolutionary phases in mankind's history overseen and influenced by the Monolith. 9/11 can also be viewed as a key evolutionary point in our history, and occurred in the presence of the same object as in the film 2001. Through sync association, the context of the film-evolution involving Jupiter-becomes applicable to the real-life it reflects. Realizing 911 is also the emergency call service number in America, the vivid synchronicities involved in 9/11 act as an emergency wake-up call into a higher state of consciousness, where we become aware of our inseparability from thing-events. I call this process the "9/11 Mega Ritual." The boundaries between things and events are collectively and individually agreed upon conventions. We use them in order to make sense of our environment and navigate our everyday lives. The categories we impose on the world are what allow for definition and the creation of all symbols;4 these are necessary and helpful tools, but not the nature of the actual reality they point towards. The culture5 of a certain time and place decides the general agreed-upon lines of division we draw between things-events and how we interpret them. Even the divide between "myself" and "other" is a convention or phantom of this process: the labeling of thing-events that creates our understanding of reality. It is conducive to health and well-being to notice these conventions as shadows or phantoms. That way, these playful apparitions will not be frightening or confuse our activities. Thing-events are not only seamlessly interpenetrating, but are also boundless in their depth and have infinite complexity. Sync is the experience of the relaxation and dissolution of the boundaries between ourselves and the thing-events of the world. The more we allow ourselves to notice sync, the less barriers there are and the more our depth of perception will grow, allowing us to penetrate deeper into the world — a world which starts to feel inseparable from what we consider ourselves. Sync is Sign People of many indigenous cultures are known for seeing "signs" in their surroundings. Spirits6 of ancestors and plants communicate through signs in the natural environment with individuals, mystics and shamans sensitive to such matters. These signs help heal and guide the culture. Sync is the modern equivalent, now recognized, as the false-distinction between the natural and human-created world exits. All thing-events (whether trees, cars or movies) arise from the great non-local mystery of existence. The entire interrelated process of creation shapes the forest as much as it does the city. Seeing signs in the urban landscape is sync. I go on regular vision quests or "sync walks" through the concrete jungle with my Ayahuasquero friend,7 seeing syncs and signs in number plates, T-shirts, billboards and trash. Usually a sync walk will end at the movie theatre, the temple of the city where communion with nature reaches its peak amongst the "stars." Just like signs have helped align the healthy smaller cultures of earth with Creator's plan, sync attunes the modern person to the unfathomable will of the Self realizing itSelf. How do we know we are understanding the messages from these syncs or signs? Because the ultimate ever-present reality is total perfection,8 the greater the amount of joy one obtains from their interpretations of sync, the more accurate, successful and aligned the reading of its meaning is. The universe is created in all places and times non-locally, right here and now, the home of consciousness. Thankfully (and mercifully) the intensity of this gnosis varies, allowing for the daily ebb and flow of life. We view this bizarre happening of creation sequentially, doing our best to make sense of it. Sync is the new level of understanding (a collective allowing) about the nature of the universe, now making its way into everyday consensus awareness. When noticing the non-local hand during a prerecorded movie, the mind-blowing elegance hinted at by the new "in-sync" perspective starts to become tangible. I will often sit down in a theatre or at home and watch something, noticing how the situations, objects and words align with things I have been meditating on, realizing the movie echoes activities and conversations I've been engaged in recently, with uncanny perfection. On occasion, watching media during moments where the context has already allowed for particularly heightened states of awareness, the reactive mirroring between the screen and myself is immediate. As a teenager, glimpsing this reality with a head full of conspiracies and misperceptions about power and influence, I perceived syncs in movies as hints of a nefarious agenda. Now I realize this entrainment, between my personal experiences and films made independently from me, is the emergent awareness of myself as a non-local organism-environment.9 I bleed into everything I perceive, my boundary or what I consider as "myself" and the "world" is a flexible convenience, and my perception detaches from the individual focal point. That a prerecorded film is alive and interactive — reacting to my specific context at a given moment — shows that what creates both myself and the film, is ever-present, interrelated and, by implication, non-local. The intensity of holy communion with a film (as with life in general) varies appropriately with our degree of presence. I can enjoy watching TV with my mom, noticing a few light entrainments here and there. Or, I can do Ayahuasca with my friend Jim Sanders, the next day stepping out to the cinema; shaking in my seat with vivid, seemingly impossible boundary loss. Entrainment hints at a property inherent in sync associations that draw them together. The concepts of sync and entrainment are so interrelated that the words are regularly interchanged. Often a word will arise in the mind10 of the organism and, at the same moment, consciousness will notice this word somewhere in the environment-perhaps on a passing T-shirt or in a song playing in the background. Old models try to say: "either the T-shirt was seen first, prompting my mind to issue the same word" or "perhaps my mind thought the word, then, out of all the clutter in my surroundings, was primed to notice the chance occurrence of the same word." Indeed they are coincident (in the sense of happening at the same time) and this is entrainment between myself and environment. Both myself (which thinks the word) and the environment (which contains the T-shirt) share the same source that is primary to both. These examples of entrainment, those happening at the same instance or perhaps very close to each other, will help us make the leap to the more unusual ultimate reality of sync. As all is sync (or nothing is sync), regardless of the length of time between events; they are always entrainment as the non-local self is present in any instances, never mind the justification put forward by the inherently-limited mind. All the associations we make are portals opening between ourselves, across the barriers of timespace, organism-environment and thing-event. The most recognized of such portals is love. When we meet a future lover, and our upcoming associations are to be moments of intense shared awareness, we might even recognize it from the first glance. The sensation that things are specifically being orchestrated for (or even by) yourself, is a normal result of the emerging sync consciousness. Depending on the temperament and makeup of the specific belief system, the interpretation of sync can be nefarious or benign. If concepts of influence over what happens in spacetime are associated to pyramid-type hierarchies, the syncs can form a reality of peculiar control networks, manipulating the texture of the moment.11 To satisfy the ever-increasing depth of the experience, the limited self (ego) needs increasingly powerful and subtle top-down organizations able to manipulate the environment, sometimes extending "them" beyond the physical (into the spiritual, inter-dimensional and godlike spheres). If the external control concepts are replaced by the personal and internal, the individual experiencing sync can start thinking him or herself God. Many undergoing this particular process (awakening as a united organism-environment field via synchronicity) will have a hodge-podge of these symptoms. The faulty idea that the universe is a hierarchy of power and influence, introduced at a young age, is responsible for these phantom menaces. This is not to undermine the models of external higher power and internal personal divinity, but to help put them in the most helpful context we can imagine. The nature of reality clearly corresponds in some areas to the two seemingly opposing ideas. This vivifies the continued joke being played on us as we try and impose concepts and symbols over the (thankfully) indefinable transcendent nature of what ultimately Is. If we could fit the nature of our Selves and God into a conceptual map or box, it would imply that It is finite, and not bottomless eternal perfection. Imagine a ladder extending infinitely up and down, that all possible beings are climbing. The ladder represents our progress and success as entities in the universal enterprise. As this ladder extends eternally higher and lower, regardless how far apart Gods are from humans, or humans are from ants, we are all still in the center. Only relatively speaking are there higher and lower beings. All are in the center from which consciousness emanates. From a profile view, power represents the top of the pyramid. When we continue up a dimension, and see the pyramid from the overhead perspective, we notice the tip is the center and balanced point. Real power comes from being in harmony with the totality and filled with a joy ultimately free from concept. If the ultimate controlling and manipulating force were not inside of us right now (and in everything else) it would not be ever-present, and not the true eternal Master. Investigating sync leads one, not only to relaxing the boundaries between things and events, but also to letting go of the rigid classifications of these thing-events. In order to notice that one thing-event (situation, object or symbol) has an affinity to another, often means being "loose" with our associations. In a sense, to see and understand sync we must become fools-free from the limitations, but not the benefits, of mind. For example, a few years ago I was struggling with actress Robin Tunney climbing K2 (the mountain) in the film Vertical Limit and also passing signs reading "2K" (in reference to the year 2000 Millennium) in another film, End of Days. K2 is obviously 2K backwards, but my mind was resistant to accept this as a clear association, which it now plainly recognizes. The old model of perception was concerned with the simple relaxation of associating something backwards (letting the box that fits K2, now also accept 2K). This shows how we can be confronted with sync and miss it-owing to how we discriminate between what associates and what we think is not associated. Sync is realizing all associations are agreed upon conventions, and we are free to re-appropriate the process. The symbol representative of the planet Jupiter12 clearly looks like an amalgamation of 2 and 4. In synchromysticism13 it has come to symbolize "42." 42 is "The Answer to Life, the Universe, and Everything" in the popular book series and major motion picture The Hitchhiker's Guide to the Galaxy. 42 is also the angle at which light refracts, becoming the colors of the rainbow. Now when I see the number 42, concepts like "Jupiter" and "rainbow" are evoked, perfectly reasonable given the above context. In the same fashion, any symbols or words or concepts are up for re-association, unlocking their infinite potential. We saw Jupiter associating to the sync-starting "9/11 Mega Ritual" and here it is freeing our symbols. Jupiter is the source of words like "jovial" and "joy"-and we know that the ultimate reality is perfect Joy. The evolutionary jump we are undergoing, assisted by sync, is overseen by Jupiter. Sync is time travel The one unambiguous ever-present factor in any and all synchronicity is the witness or consciousness.14 Consciousness itself is the ultimate sync, present in all sync. All syncs point towards consciousness and arise from it. Like water is to the fish, consciousness is so central and ubiquitous to sync (and all else) that we tend to miss it. Consciousness is present whenever you see a 42 or any other sync. The next time you witness a 42, there will be a non-local bridge between the past and present self. This is part of the exciting charge of seeing syncs. The past, present and future selves, all created now, witnessing resonant events and becoming aware of each other beyond time. It is also why significant events (like 9/11) are encoded heavily in the sync architecture of the present. Syncs are signs of our potently aware non-local selves bearing witness to thing-events. Often syncs are interpreted-including 2012 phenomena-as pointing towards an imminent massive collective spiritual experience. This event — collective consciousness realization — does, by its very nature, singularly stand out in the fabric of all we perceive. The great perceiver, perceiving itself through us on the largest planetary scale in known history. Individuals are becoming aware of themselves across spacetime. At the same moment, many different individuals, who are noticing the same syncs, start perceiving their shared transpersonal essence. Real-time synchronicity sharing (what all communication/association essentially boils down to) across the internet and on networks like Twitter, are the result of this emergent process (of the collective awaking into a unified greater Self), as well as facilitating in its increased realization. The ultimate sync is consciousness in this moment, and we have it already. This does not remove from the delight of processes and play in the world around us. Knowing you are the Self makes you the best player you can possibly be. Movie stars are "as below" resonators of the skies above Even though our current general associations are agreed upon conventions (and we are free to make new ones), they still arise from the ultimate mind that orchestrates all thing-events and are not arbitrary. The map is not the territory, but is part of the territory, and both share the same fountainhead. A wonderful example is how we use the word "star" for celebrities. Our oldest myths and stories are associated to the heavenly spheres. They have been personified, deified and their movements become elaborate dramas. Kings, Queens and other big players in our cultures have been connected to these bodies and vice versa. The stories about the stars and humankind are inseparably intertwined and are reflections of each other. Our cinema is a recent incarnation of this dynamic, the obvious giveaway being the word "star." The mystery and beauty of the stars (that would pull man deeper into the void), had to be increasingly turned away from at the onset of "mind." Playing right into Creator's hands, as he/she had put them into the silver screen to keep telling us stories, and continue our process of becoming stars ourselves. Astrology studies the relationships between us and the heavenly spheres. Synchromysticism realizes the same dynamic exists between our world and celebrity stars. Meditating on the film strip ladder — passing at 24 frames a second — we climb the stairway to heaven. Film and pop culture offer a rich and immediate portal into the collective awakening psyche when treated as creative flux emanating from the heart of all Being. The artist is acknowledged as shaping his/her medium, yet channeling the energy to create, directly from the greater Self. The ever-changing patterns and themes surrounding us (via our omnidirectionally mediated and increasingly mercurial environments) are taken as the externalized collective Body. We can investigate this dynamic entity-disguised as the forms and context of the environment (that we ourselves comprise) — by treating all that arises in our awareness as sacred and ready to be re-contextualized — with joy as our guide and the sky as the limit. The mainstream culture, no longer a toxic river, is the major artery from which all other strange subcultures branch and receive nourishment. The original collective context of our media and forms are not lost, but celebrated and elaborated upon. The world remains cohesive and integrated (and its individuals sane), yet open-ended for infinite exploration, as depth and meaning penetrate everything continually. The pool of pop and meaning we collectively swim in anchors our experience and supplies a shared framework from which we can launch our experimental, far out and freaky, sync depth charges. Which of these will explode . . . ? New connections that are caught up and pulled in by the gravity of others' interests, only to eventually go "pop" themselves and enrich the sync whole. Notes: (1) Using "thing-events" helps highlight how things and events are not ultimately separable or essentially different. I could say, "the tree I am looking at right now is . . ." a thing, or an event, if I realize all the infinite processes that are involved in there being a tree. "Tree" as a "thing" is a convenient label for all the processes that comprise the limitless mysterious reality of the object I am seeing. Syncs are values of mundane versus profound we place upon one thing-event associated to another. (2) Chance is a label for the occurrences between the initiation and outcome of thing-events far too subtle for current perspective to understand. Chance happenings (coincidences) versus meaningful synchronicity, are different models mapping the same phenomena beyond the scope of both. All models are inherently beyond the reach of our labels of the unlimited thing-events. If a map had all the detail of the area it represented it would be identical to it, and useless as a representation. (3) Reality isn't ultimately connected or not connected (one or many), it is something beyond understandable categories. The ultimate nature of sync goes to the indefinable core of all that exists, and our words about it will always only be relatively true. The words can guide towards transcendental understanding of sync, as they (and the reader) arise from the same source. (4) To "symbolize" is to give a finite shape and definition to a thing-event (ultimately indefinable) for the purpose of creating associations, which in turn create our perception of the world. The letters and words you are now reading are part of just such a system, symbols creating associations and giving rise to this story of sync. Symbols are in flux, new interpretations are constantly being associated to them, and new symbols are being added to our collection; the story of reality. A collection of symbols, like "letters," can make up another symbol, such as a "word." Our entire perception of reality is a big symbol for the indefinable mystery it represents. (5) CULTure is the reigning collection of sync associations that make up the current reality of entities (ranging in size from the entire planet down to a single individual). Large cultures are the familiar ones, like countries or regions. Smaller groups, like synchromystics, share many associations with symbols only agreed upon by the group itself. Cults of only one person exist and they are often labeled eccentrics or mad men/women. Smaller cults are the breeding grounds for associations that could go viral and become accepted by the bigger groups of association networks (a.k.a. realities). The more joy and harmony emanating from your cult-whether a large or small group-the more it resonates with the ultimate purpose of the totality. (6) The essences of things are infinite and boundless. When we draw a perimeter around a thing, by the necessity of conceptualization, we place a border we can recognize around part of it. The parts not contained, yet still perceived by those sensitive to such matters, are often called spirit. Other spirits are things so subtle that no model has yet been created to contain it. The spirit world is the realm of thing-events beyond the event horizon of human conceptualization. There is a continual process of evolution where the human nervous system grows to acknowledge new facets of this realm and include it in the consensus. What was once spiritual is now science. What is now sync will soon be regular association. (7) In the forests of South America, certain Shamans have cultivated a profound relationship of feedback between themselves and the environment. They have a partnership with a conscious plant brew, Ayahuasca. The feedback between the individual and the environment (through the plant) is a singularly powerful portal for what-creates-both to come into this world. The practice has spread to new cultures all over the earth as the living biosphere self-organizes for the next dramatic evolutionary leap. In my home of Winnipeg, I have been fortunate enough (clearly sync entrainment) to stumble upon just such a movement, headed by Shaman and man of sync, Jim Sanders. (8) The more sensitive and free from imperfection the film stock, the more clarity and depth we can capture in the picture. Considering the infinite nature up and down every point of the macro- and microcosmic spacetime manifold, we realize the most ultimate and perfect substrate allows for it. That we can never grasp It is even clearer proof of Its existence, for to be graspable, It must be containable, thus finite. This perfection and the joy that is every moment is beyond the understanding of the limited mind, from which it itself is born. Often the mind is perplexed at how the events of our lives and societies reflect this ultimate of realities. The total eternal and ever-present perfection, regardless of context, is self-evident to the ultimate Self. (9) Using "organism-environment" helps highlight how the perceiving entity and what is being experienced are interrelated and ultimately united (or not divided). Both the organism and its environment are thing-events that arise in primary consciousness. When I notice myself (organism) and what I am seeing (environment), the real I is the witness of both. In any spacetime dynamic there is an organism-environment-thing-event. (10) The mind is a localized collection of symbols, forming a map or model through which the ultimate consciousness perceives the world. As a collection of limitations, the mind and all it generates (including the persona) are never to be taken primarily for the realities it perceives. Again, the mind is not the territory, but it is part of the territory, and both share the same fountainhead. (11) My reality tunnel at this stage resembled The Truman Show, The Matrix, The Illuminatus Trilogy! and 1984, all put in a blender. (12) The Jupiter symbol as 42, and its association to rainbows, was explained to me by Jim Sanders. (13) Synchromysticism is a name I started using to describe thoughts about synchronicity in 2006. "The art of realizing meaningful coincidence in the seemingly mundane with mystical or esoteric significance." I used this summary on an old blog site to try and encapsulate synchromysticism. I still see it used on new websites today. Nothing is essentially wrong with it. Perhaps too slippery on the brain and open for misinterpretations. This is likely also its strength as a catchphrase. I hope this current document clarifies, or at least confuses in the right direction, the continuing process of creating a better understanding of the phenomena of synchronicity. On the Internet, an ever-changing community of people have come and gone associating themselves, willing or otherwise, with the word. (14) Consciousness is the mysterious property, always out of reach, that knows. Consciousness can refer to this essence in individuals or groups, depending on the context it is being used in. There is an ultimate consciousness underlying everything, directly connected and primary to all other levels of consciousness. The unknowable I that knows it knows. The Sync Book is available here Teaser image by ralphbijker, courtesy of Creative Commons license. |
Tokyo is to foot a $3.1 billion bill, which is part of the cost for relocating American troops from Okinawa. For the first time, it will also host US long-range surveillance drones, which would help to monitor disputed islands in the East China Sea. The cost-sharing agreement for the troop transfer and the future deployment of drones by next spring are both part of an effort aimed at updating the US-Japan military and diplomatic alliance. The pledge to modernize the alliance for the first time in 16 years was made in a joint declaration during the visit of US Secretary of State John Kerry and US Defense Secretary Chuck Hagel, who met their Japanese counterparts, Foreign Minister Fumio Kishida and Defense Minister Itsunori Onodera. Japan hosts some 50,000 American soldiers and officers, particularly in Okinawa. Their presence is a constant source of tension with local populations due to crimes committed by the servicemen, disruptions caused by military flights and land use by the US military. Last year the countries announced a plan to relocate about 9,000 US Marines from Okinawa to other locations. 5,000 of them will go to Guam while others will be stationed elsewhere. The estimated cost of the relocation is about $8.6 billion. Japan will cover $3.1 billion of that sum, the officials from the two countries announced on Thursday. The cost includes development of new facilities in Guam and the Northern Mariana Islands. As the foot soldiers leave, US Global Hawk unmanned aircraft will be arriving, marking the first time that American drones will be stationed on Japanese soil on a permanent basis. Two or three long-range spy drones will be placed at a US base to help monitor Japan’s territory. While the disputed Senkaku Islands in the East China Sea was not mentioned in the documents, the islands contested by Japan, China and Taiwan was a prevailing topic in public speeches after the signing. Hagel said the US reiterated that it recognizes Japan's administration of the islands and has responsibilities to protect Japanese territory under a mutual defense treaty. "We strongly oppose any unilateral or coercive action that seeks to undermine Japan's administrative control," he said. The US will also deploy second X-band early warning radar in Japan. Officials were careful to stress that it will be directed against North Korea rather than China, and will help track down and probably intercept missiles coming from the defiant state. The plan to deploy radar was first announced by the then-Defense Secretary Leon Panetta about a year ago. The new system will be placed at Kyogamisaki air base in Kyoto prefecture in western Japan to complement already existing radar in the northern part of Japan. Beijing however may not be convinced by the assurances. It has criticized the installation of the inaugural military radar, saying it could disrupt the strategic military balance in the region and destabilize the situation. Other plans to boost US military presence in Japan include possible deployment of F-35 jet fighters around 2017, a top UN official told AP. There is also a plan to send Navy P-8 anti-submarine aircraft later this year - the first time the sub-killers deployment outside of US. The upgrade also expands cooperation in areas like counter-terrorism and cyber warfare. The Internet threat is the one that Japan sometimes cannot defend itself against with the systems it currently has, Kazunori Kimura, the Defense Ministry's director of cyber-defense planning, told Reuters. |
Cox’s Bazar and Chittagong airports to remain closed amid cyclone Mora News Hour: Cox’s Bazar and Chittagong airports will remain closed from early Tuesday morning till midday due to Cyclone Mora. The Civil Aviation Authority (CAAB) suspended domestic and international flight operations in this routes. CAAB officials said they suspended the air traffic movements to and from Cox’s Bazar Airport until further notice while flight operations at Chittagong Shah Amanat International Airport will be closed at least until 2pm tomorrow from midnight today. Wing Commander Reazul Kabir, the manager of the airport, said the suspension could be extended or withdrawn early depending on what the weather is like. The cyclonic storm ‘Mora’ over north bay and adjoining east central Bay is feared to be intensified further and move in a northerly direction and predicted to cross Chittagong -Cox’s Bazar coast by tomorrow morning, the latest weather bulletin said this evening. Like this: Like Loading... |
With reporting by Hotnews.ro Russian Deputy Prime Minister Dmitry Rogozin has accused Romania of planning to annex Moldova by supporting Chisinau's efforts toward European integration.Rogozin, in a messageon October 2, said Romanian President Traian Basescu, whom he called the "Traian Horse," has a two-step plan: first, Moldova's "association with the EU, then its Anschluss with Romania" -- a reference to Nazi Germany's annexation of Austria in 1938.In response, Basescu told a news conference in Bucharest that Romania did not intend to annex any country but would continue to support Moldova's European aspirations.Basescu said Rogozin was used to "making a statement about Romania every morning before having tea."Moldova hopes to sign an Association Agreement with the European Union at an Eastern Partnership summit in November.Russia recently banned Moldovan wine imports, a move widely seen as a warning to Chisinau. |
“This has become a country where people are not just killed, they are tortured, mutilated, burned and dismembered … Children have been decapitated, and we know of at least four cases where the killers have eaten the flesh of their victims.” Navi Pillay, UN High Commissioner for Human Rights, was describing conditions in the Central African Republic (CAR), where the country’s entire minority Muslim population faces either death or expulsion at the hands of the Christian majority. According to Amnesty International, the troubles in CAR began when the Muslim “Seleka” militia started a murderous rampage in the northeast of the country. It then seized the capital of Bangui in March, 2013, ousting president Francois Bozize, a Christian, and replacing him with a Muslim, Michel Djotodia. Amnesty reports that over the next 10 months, the mainly Muslim militia killed countless Christian civilians, burned numerous villages and looted thousands of homes. To fight the Seleka troops, the Christian population organized their own militias and started carrying out reprisal raids on Muslim neighbourhoods. By November, 2013, violence reached such levels, the UN warned CAR was at risk of spiraling into genocide. Unable to hold on to power, on January 10 of this year, Djotodia resigned and fled the country. With him gone, the tide turned against the Muslim militia, resulting in an unprecedented orgy of reprisal revenge attacks on Muslims across the country that have not stopped. The Associated Press reported thousands of Muslims who tried to flee the sectarian violence in Bangui were turned back by peacekeepers as crowds of angry Christians shouted, “we’re going to kill you all.” As Muslims tried to flee to neighbouring Chad and Cameroon, Reuters reported Christian militias were blocking the main roads used by Muslim civilians and attacking the refugees. According to Amnesty, the stated goal of the Christian militias is now to rid the country of Muslims forever. And as the world looks on, the killing continues. At this rate, CAR will be Muslim-free in a matter of months. The killings come at a time when the world is observing the twentieth anniversary of the Rwandan Genocide. Canadian Sen. Romeo Dallaire, who witnessed the 1994 genocide in Rwanda as a UN peacekeeper, says, “Let’s not divorce what’s happening in the Central African Republic with what happened 20 years ago in Rwanda.” In an interview with the Guardian, he said, “We’ve actually established a damn pecking order and the sub-Saharan black African — yes we’re interested but it just doesn’t count enough to spill our blood, to get embroiled in something complex that will need longer-term stability and influence.” For Muslims around the world, witnessing yet another Muslim community suffering mass murder, and so soon after the killings in Myanmar, it’s traumatic. It’s easy to start believing in conspiracy theories and to become addicted to victimhood. However, as a Muslim I believe this latest tragedy sends us a message we must not ignore, whether we are in Africa, Asia or here in North America. The problems we Muslims face are the making of our poor political and religious leadership. If we wish to join the rest of humanity, we need to get rid of those who now hold our reins. We need to free ourselves from bondage. If we don’t, the Central African Republic will not be the last tragedy we will face. |
Hatsune Miku Project Diva F 2nd’s Diva Room detailed Sega releases another large batch of screenshots. The large batches of Hatsune Miku Project Diva F 2nd screenshots continue. This time, we’re introduced to the game’s Diva Room feature, new songs and modules, and shots from the opening movie. In the Diva Room, you can encounter characters and experience fun events. In the room events, you’ll savor spending more time together, doing things like cooking and knitting. Room themes and items are also added, bringing more variety. You’ll communicate with characters by touch with the PS Vita and by analog stick on PlayStation 3. With more interactions, you’ll see a variety of reactions. There is a maximum limit to how many times you can engage in touch communication, and if you continue to do nothing but touch, you’ll make them upset. If that happens then you’ll be unable to touch communicate for a set amount of time. Similarly, you can give them presents, but if you do it consecutively then you’ll get the reaction, “Enough already!” When you’ve upset someone, they’ll turn their back to you and the next time you try to touch communicate it’ll be more difficult. New components include: Request Speech Bubbles: In this room, sometimes as a rare event, characters will make a request. Things like changing background music, set remodeling, wardrobe changes, etc. If you fulfill their requests, you’ll become closer. In this room, sometimes as a rare event, characters will make a request. Things like changing background music, set remodeling, wardrobe changes, etc. If you fulfill their requests, you’ll become closer. 10,000 Feet Alps: This is a continuation of the mini-game, “Look this way!” You’ll play this nostalgic game with Miku and friends. The speed of the song changes, so it can get difficult! Songs shown include “Decorator” by Livetune, “Nisoku Hokou” by Deco 27, “Suki Kirai” by HoneyWorks, “Melt” by Ryo, and “Mikumiku ni Shite Ageru” by Ika_mo. And modules shown include “Breath You” by Shirako Mugi, “Yume Miru Panda” by Yamako, “Koisuru Shirokuma” by Yamako, “Hatsune Miku V3” by iXima, “Kaito V3” by iXima, “Gothic” by Karasu-R, “Fraulein” by Hako, and “Fuwafuwa Coat” by Nananana10. View the screenshots at the gallery. (Or download them in a 30mb zip here.) Hatsune Miku Project Diva F 2nd is due out for PlayStation 3 and PS Vita in Japan on March 6. |
It’s been nearly two years since former National Security Agency (NSA) contractor Edward Snowden first leaked to the Guardian that the NSA was spying on American citizens. A new survey from the Pew Research center finds that the revelations of the mass government surveillance programs has definitely impacted the way certain segments of the American population now view their privacy — but that hasn’t yet translated into behavior changes. The survey found that a vast majority of respondents — 87 percent — had heard of the leaks in some way. Among them about a third, 34 percent, had actually modified their behaviors to protect their privacy from the government more, with 25 percent reporting they had modified the way they use different technologies “a great deal” or “somewhat.” Common reactions included changing their privacy settings on social media (17 percent), using social media less often (15 percent), avoiding certain apps (15 percent) and uninstalling apps (13 percent). "But, a certain double standard holds true -- because most of the respondents said it was ok for the government to monitor others as long as they aren't the average Americans." Meanwhile, 14 percent of the 475 respondents said they now speak in person more often than communicating online or over the phone. About 13 percent said they now avoid the use of certain terminology online. ADVERTISEMENT While some of these changes might be subtle, they do show evidence of the social impact of surveillance monitoring, said Mary Madden, a senior researcher at the Pew Research Center and a co-author on this report. “This is especially true of those who have heard ‘a lot’ about the programs and among those who are younger,” Madden told PBS MediaShift in an email. “At the same time, when viewed within the context of Americans’ concerns about the programs, the changes in behavior don’t yet match the level of concern.” ADVERTISEMENT Mismatched reactions? At the same time, a significant portion of Americans have taken the impact of the Snowden leaks to heart and modified their behaviors to protect their privacy. The survey also showed that adoption of more advanced privacy or security strategies is low. One big reason for this, according to 54 percent of respondents, is that it would be “somewhat” or “very” difficult to find the tools and strategies that would enhance their privacy online and when using cell phones. Some other notable figures, as stated in the Pew report: Madden said a range of factors came up in the survey that could be influencing these figures. It’s not just that people didn’t feel they had the right expertise or time to research the tools available — it’s that they also thought that doing so might defeat the purpose of trying to enhance their privacy, or that it didn’t really matter. “Other respondents viewed activities such as the use of encryption or anonymity software like Tor as something that might raise suspicion and make them a target for monitoring,” she told MediaShift. “In addition, we heard from some respondents who weren’t concerned about monitoring of their accounts and activities because they felt as though they ‘had nothing to hide’ or it was a ‘small price to pay’ for their safety.” Among the other findings of the survey? Sixty-one percent of those who were aware of the government surveillance programs said they have become less confident the surveillance was in the public interest as news has continued to unfold. But, a certain double standard holds true — because most of the respondents said it was OK for the government to monitor others as long as they aren’t the average Americans. Eighty-two percent said it’s acceptable to monitor the communications of suspected terrorists, and 60 percent said it was OK to both monitor the communications of foreign leaders and those of American leaders. And more than half of respondents (54 percent) approved of monitoring the communications of foreign citizens. In comparison, 40 percent of Americans said it was OK to monitor ordinary American citizens. Sonia Paul is a freelance journalist based in India, and is the editorial assistant at PBS MediaShift. She is on Twitter @sonipaul. |
During a speech at the University of Pennsylvania on Thursday, former Vice President Joe Biden argued that in 2016, the Democratic Party “did not talk what it always stood for, and that is how to maintain a burgeoning middle class.” Biden stated that he thinks the choice between protecting American jobs and engaging with the world is “exaggerated.” He added, “Look, in a sense, we wouldn’t be having this conversation about American jobs, in the way it’s just been phrased, legitimately, by the president, were it not for 171,000 votes, 171,000 votes in four states, that put us in this position.” Biden continued that 2016 was the first campaign he could remember “where, my party did not talk what it always stood for, and that is how to maintain a burgeoning middle class. And the truth of the matter is, you didn’t hear a single solitary sentence in the last campaign about that guy working on the assembly making $60,000 a year, and the wife making $32,000 as a hostess in a restaurant…and they’ve got two kids, and they can’t make it, and they’re scared, and they’re frightened.” He further stated that while on the macro level, globalization has been a phenomenal success, but it has “left people behind.” And the global system is something the US needs more than anyone in the world. Biden later said, “[Y]ou know, all those angry white men, you know, we talk about, that are racist. Guess what? Barack and I won them. Let’s get this straight. It wasn’t racist. They voted for a black man, twice in a row, but they didn’t this time. They didn’t this time, because they look out there, and they’re scared and no one’s talking to them.” He also stated President Trump “has not created any jobs. He’s not going to create many jobs.” He also argued that it’s a “false choice” to try and decide between focusing on the white working class and being progressive. (h/t Dan Merica) Follow Ian Hanchett on Twitter @IanHanchett |
Only adventurous beer drinkers living in the Bay Area 30 to 35 years ago got to sample the wares of America’s first modern microbrwery. However, thanks to Boston Beer Company — yes, the makers of Sam Adams Lager — New Albion’s pale ale has been recreated. New who? New Albion Brewery was founded in Sonoma in 1976 and produced its first beers in 1977. It was gone by the end of 1982, when many of us who enjoy good beer today were far from legal drinking age. (If you weren’t born yet, I don’t want to hear it). If New Albion was before your time — especially if New Albion was before your time — it’s a story worth revisiting. From Scotland to Sonoma Navy man Jack McAuliffe discovered good beer the same way most Americans did in the 1960s: by leaving the country. He fell in love with Scottish ales and started homebrewing while stationed in Glasgow. McAuliffe finished his tour, came home to California, graduated college, and nursed a wild idea to apply his engineering skills to building a small brewery. Unlike Fritz Maytag, who purchased and improved the existent Anchor Brewery, McAuliffe was starting from scratch. He read a bunch of 19th century books on brewing, featuring illustrations of equipment that looked nothing like modern hardware. Then he built a tiny brewery anyway, in Sonoma, mostly by himself. He used barrels as fermenters, labeled bottles with a machine from 1910, and trucked in water from an offsite well. “I built a little apartment above the brewery and I lived up there like a spider,” McAuliffe told the Craft Brewers Conference in 2011. He named his fledgling brewery New Albion. There was formerly an Albion Brewery in the Hunter’s Point neighborhood of San Francisco. (Click here for a photo of its remains and here to see what the block looks like now). That brewery was named after Sir Francis Drake’s original name for Northern California, Nova Albion. A drawing of Drake’s ship the Golden Hinde and a pre-bridge Golden Gate became New Albion’s label art. Anheuser-Busch had the old-timey horses, McAufliffe reasoned, and he wanted his brewery to have a historical feel too. (Bay Area drinkers are more likely to recall another local homage to Sir Francis Drake.) An uphill battle American beer was pretty much all the same in the mid-70s, and here was a guy trying to sell unpasteurized bottles of pale ale, porter, and stout in handmade wooden cases. (Keg beer would appear later). Distributors didn’t know how to handle or sell this kind of beer, so McAuliffe eventually began self-distributing his beer to a selection of bars willing to take a chance on it. He can’t remember which bars in particular were his best customers, but says about half the beer went to San Francisco and the other half stayed in Sonoma county. It was the Carter administration, and I’m not an expert on the economy back then, but it sounds like a rough time to start a business. New Albion needed funding to grow, but bankers didn’t want to invest in weird beer at a time when capital was already limited. McAuliffe also sensed that he was missing out on a big piece of the pie by giving all his beer to other people to pour. At the time, so-called “tied house” legislation prevented breweries from selling their own beer directly to the public. (Bear in mind homebrewing wasn’t even legal until 1978.) McAuliffe, along with Berkeley’s current mayor Tom Bates and other beer industry pioneers like Anchor’s Fritz Maytag, rallied for changes in the law. Then-assemblyman Bates authored a bill that allowed California breweries to sell their own beer as long as there was a restaurant attached, only the second bill of its kind in the nation. It passed in 1982, paving the way for California brewpubs, but it was too late for the financially struggling New Albion. The legacy Anyone starting a brewery in the early days was likely inspired by New Albion’s DIY set-up. Ken Grossman, founder of Sierra Nevada, was another mechanically-minded ‘70s homebrewer with brewery dreams. He was on the phone with Jack McAuliffe a lot in the beginning to ask questions and brainstorm brewery problems. When Sierra Nevada was planning 30th anniversary brews in partnership with American brewing legends, it makes sense that Jack McAuliffe got another call. The resulting commemorative beer, Jack & Ken’s Ale, was a barleywine based on an old New Albion brew. Then there’s Don Barkley, a local homebrewer who was unceremoniously dismissed the first time he came around to New Albion offering free labor. (McAuliffe says he was in the middle of a brewhouse emergency at the time). Barkley tried again and was allowed to stay, got to know the New Albion operation well, and went on to found Mendocino Brewing (which got New Albion equipment after it shut down). Barkley is at Napa Smith today, where he was the first to briefly revive New Albion pale ale. The return of New Albion Pale Another member of the unofficial Jack McAuliffe fan club was Jim Koch, who founded Boston Beer Company in 1984. He purchased the New Albion trademark when it was about to expire and probably could have gotten away with brewing anything under the name. Instead, he got Jack McAuliffe back into a brewhouse to help clone New Albion’s original pale ale. Between McAuliffe’s excellent memory, the simplicity of the recipe, and the preservation of New Albion’s yeast at UC Davis for all these years, they think they got pretty close to the real deal. Samuel Adams New Albion Ale premiered at the Great American Beer Festival last fall and made its debut in bottles at Russian River Brewing Company last week, where Russian River’s Vinnie Cilurzo hailed McAuliffe as “the original nanobrewer.” Jim Koch came from Massachusetts, Jack McAuliffe came from Texas, and Bay Area beer geeks from all over packed the Santa Rosa brewpub where the two held court. I didn’t have the gumption to elbow through the throngs of beer VIPs to meet either McAuliffe or Koch, but I was happy just to be there for the historic event, soaking up beer history and drinking ale last seen in bottles when I was seven. During the Q&A, I did ask McAuliffe if there was a chance we’d ever see New Albion’s porter and stout revived. He quickly replied, “Oh yeah, you betcha!” I hope he was serious. The beer itself is simple: all Cascade because that’s what there was, and mild by the standards of today’s pales. It’s quaffable and pleasant, until you imagine it busting out of nowhere in a world of light lagers and skunky imports, with only Anchor beers for company. Then it’s a revelation. Look for it in six-packs at any store in the US that usually carries Sam Adams, then enjoy the taste of 1977. Further reading It’s easy to get deeper into New Albion’s history, thanks to beer writers who were on top of this chapter of brewing history long before I was. Maureen Ogle’s book on the history of beer in America, Ambitious Brew, devotes a large section to Jack McAuliffe and New Albion. It’s how I learned much of what I know about the subject, and I recommend the book to beer lovers in general. She also sometimes posts about it on her blog. Longtime Bay Area beer writer Jay Brooks has several interesting blog posts on the subject: Jack McAuliffe’s visit to Russian River, where he offered to autograph the original New Albion sign hanging behind the bar despite having one arm out of commission from a car accident. Brooks writes, “we got out the ladder and up he climbed, sharpie between his teeth like a beer pirate.” McAuliffe’s nostalgic visit to the old New Albion site in 2011. McAuliffe did a Q&A at the Craft Brewers Conference in 2011, essentially reintroducing himself as a public figure willing to talk beer. Brooks snagged the video. New Jersey-based beer writer John Holl has also done a great job covering New Albion. This piece takes you inside the pale ale’s 2012 brew day. A detailed biography of Jack McAuliffe and his brewery and, for giggles, the anecdote behind the naming of New Albion’s Old Toe Sucker barleywine. Just goes to show that the beer business has been full of crazy stories from the beginning. Disclosure: Samuel Adams New Albion Ale was provided to me free of charge at a media event prior to the Russian River launch, but I was already obsessed with the history of New Albion by then. |
In Plato's dialogues the philosopher Socrates encounters leading figures from other disciplines, such as mathematics and rhetoric. Often this leads to an intellectual contest. In a famous passage from the Republic Socrates says that there is a long-standing quarrel between poetry and philosophy (607b), although he then tries to show that the aggression lies on the side of poetry, not philosophy -- for his part, he says, he would be glad to see even the most dangerous poetry defended convincingly. These passages can give the impression that in the dialogues the function of poetry, mathematics and so on is to be the rivals of philosophy. Probably the most influential book to have taken this approach is Andrea Nightingale's Genres in Dialogue: Plato and the Construct of Philosophy (Cambridge, 1995). According to Nightingale, Plato gives philosophy a distinct voice in Athenian intellectual conversation by bringing it into relation with other, competing forms of discourse, such as poetry and oratory. The obvious attraction of this approach is that it offers a way of understanding the relationship between different disciplines or genres in Plato's writing. But if scholars expect Plato constantly to mark the boundary between philosophy and other disciplines (and from time to time to engage in a skirmish with another discipline), they risk being distracted from comparisons within a discipline, such as between different doctors or different philosophers. That risk is not altogether avoided in Susan Levin's original book on the 'rivalry' between philosophy and medicine in the dialogues. In a previous monograph (The Ancient Quarrel between Philosophy and Poetry Revisited, Oxford, 2001) Levin has explored philosophy and poetry, or philosophy and 'literature', as she sometimes calls it, in Plato. In this new book she argues that medicine and philosophy have a similarly antagonistic relationship, at least until the Laws, where there is a rapprochement. Much of the book is structured around Levin's account of medicine in the Gorgias, Symposium, and Republic, and in the penultimate chapter she discusses the newly irenic attitude to medicine in the Laws. A second theme of the book is the doctor-patient relationship in Plato, and in the final chapter she considers what Plato has to say to contemporary bioethics. Here too the Laws provides much of the material: Levin uses the Laws to suggest how there can be asymmetry without paternalism. The third theme is politics: Levin draws connections between Plato's attitude to medicine and developments in his political philosophy. Levin obviously finds useful a developmental explanation of contrasts, and she does not say much about contemporary alternatives to 'developmentalism', as her kind of approach is now called. She defends her assumptions about the dialogues' relative dates in an early footnote (p. 5 n.1): it is quite an understatement to say that 'some controversy abides' on the subject of chronology, and non-specialists may get the false impression that scholarship is drawing ever closer to a consensus. (Levin aims to convince colleagues not only in ancient philosophy but also in bioethics and the history of medicine.) The greatest challenge for Levin is to demonstrate a critical or hostile attitude to medicine in the Gorgias, Symposium, and Republic. As she acknowledges (p. 40), there are 'appearances to the contrary'. She provides two chapters on the Gorgias, the first of which discusses the confrontation not with medicine but with Callicles, rhetoric and sophistry, as well as the criteria for a craft or expertise (technê). (Transliterated Greek is used frequently in the book, but Levin provides at the start of the book a full glossary of Greek words.) Any specialist can see why Levin wished to put the discussion of medicine in its context, but non-specialists (and probably some students) will struggle to understand why a book on medicine and philosophy starts with the ethical theories of Callicles and Socrates. It would also have helped to offer some historical explanation of why in the fourth century it seemed quite so important to determine whether or not a profession constituted a technê. The second chapter then turns to medicine in the Gorgias, and Levin contrasts the status of medicine in that dialogue with various claims made for medicine in the Hippocratic corpus. As Levin argues, Hippocratic authors did indeed make stronger claims for medicine than Plato did. But showing this contrast, by juxtaposing passages of Plato and Hippocratic writing, does not establish that Plato was offering a critique of medicine and its authority. In the third chapter Levin turns to Eryximachus, one of the speakers in Plato's Symposium. Not surprisingly, she suggests that his speech shows the limitations of medicine, even though Socrates directs his criticism against other speakers, Agathon and Aristophanes. In the dialogues Eryximachus is the closest thing to a representative of the medical profession, and, contrary to Levin's interpretation, there are doubts as to whether even he exactly fits that description. Eryximachus of course draws attention to his profession as a doctor, but his speech is not a narrowly medical perspective on Love. A previous speaker, Pausanias, has just distinguished between two kinds of 'love', and Eryximachus offers further applications of Pausanias' distinction, in medicine but also in agriculture, music and divination. It is hardly to Eryximachus' discredit, as Levin suggests, that he says little about virtues of the soul, for that was a central theme of Pausanias' speech, and Eryximachus is trying to show how Pausanias' distinction belongs not only to the sphere of human relations, but also to the treatment of the body and plants and to dealings with the gods. Levin is well aware of the significance of Pausanias for Eryximachus' speech, but she does not recognize that this explains the latter's reticence about moral virtues. His reticence does not, as she supposes, show that he resembles Callicles. The discussion of medicine in the third book of the Republic is considered next. As Levin rightly observes, this is a comparatively neglected part of the Republic (philosophical scholarship tends to rush past it in order to get to the tripartition of the soul), and further treatment is very welcome. On the other hand, the contrast in this passage is not between medicine and philosophy but between different uses of medicine: roughly speaking, these are (1) treatment of injuries and the less chronic illnesses and (2) prolonging life when an illness is incurable. Levin suggests a contrast between medicine and philosophy by saying that Plato, or Socrates, comments on medicine 'qua philosopher' or 'from his standpoint as a philosopher' (pp.115, 117). This is not as innocuous as one might suppose. Socrates is speaking from a political perspective (he is teased for making the legendary doctor Asclepius too much of a politician, 407e), and the relationship between philosophy and politics has not yet come into view. Was Plato really incapable of considering a profession without considering what makes it different from philosophy? A chapter on the Statesman makes the shift in attitude between the Republic and Laws less abrupt. Levin's account of Plato's political development is rather uneven. In the discussion of the Statesman there is a good comment (p. 150) on the variety of crafts and the interest shown in their various contributions to the city. But in the discussion of legislation adverbs do too much of the talking: 'laws do not figure significantly in the Republic' (p. 165), and yet on the other hand laws are not 'wholly irrelevant in the Republic' (p. 167). Then at last we get to the Laws, where doctors and their patients are more highly regarded: doctors are no longer subordinated to philosophers, and the doctor-patient relationship is more equal than elsewhere in Plato. I expected the chapter to focus on the discussion of medicine in Book 4 (720a-e) -- another Platonic contrast between different kinds of doctor -- but instead the chapter addresses more generally the different political ideals of the Republic and the Laws. In the closing comments on bioethics, Plato is presented as a better companion to ongoing debates than Aristotle. Levin uses Aristotle's account of phronêsis (practical wisdom) against him: according to her, the Aristotelian wise man's superiority entails that the doctor will have 'categorical supremacy' over the patient (p. 214). It is hard not to feel that a more sympathetic account of Aristotle -- or a more sympathetic application of what he says -- could be offered without very much difficulty. For one thing, why must the 'wisdom' reside in the doctor alone? It is unfortunate that Levin does not devote a chapter to the Timaeus, as it would have encouraged her to think about philosophy and medicine in terms different from those of rivalry and reconciliation. Timaeus, the main speaker, is an authority on the body as well as the soul, and in medicine as well as philosophy. The Timaeus gives an extraordinary picture of how medicine, cosmology and psychology could inform one another. Philosophy and medicine are not rivals, and they do more than merely respect each other. Some consideration of the Timaeus would also have shown that Plato's writing about medicine is not tied to his political thought exclusively. His view of the body as an object of inquiry is important, too. |
Draft Democratic Platform Gives LGBT Issues Just One Paragraph The Democratic National Committee Friday released a draft platform, offering the first glimpse of how the party will frame this election and the issues it illuminates. In comparison with previous year’s platforms, issues affecting LGBT Americans appear to be more tightly woven into the fabric of the platform. In the 35-page document, a single paragraph is dedicated exclusively to LGBT issues. In what appears to be a first for the party platform, it uses the word “transgender” twice. David Badash at The New Civil Rights Movement notes, however, that the platform uses the term “LGBT” 11 times, which is more than double the usage of that phrase in the 2012 platform. This year's draft platform mentions “sexual orientation” and “gender identity” three times, each in succession on paragraphs about civil rights and military service. But nowhere in the document do the words “gay,” “lesbian,” or “bisexual” appear. The paragraph titled “LGBT Rights” reads: “Democrats applaud last year’s decision by the Supreme Court that recognized LGBT people — like every other American — have the right to marry the person they love. But there is still much work to be done. LGBT kids continue to be bullied at school, a restaurant can refuse to serve a transgender person, and a same-sex couple is at risk of being evicted from their home. That is unacceptable and must change. Democrats will fight for comprehensive federal nondiscrimination protections for all LGBT Americans and push back against state efforts to discriminate against LGBT individuals. We will combat LGBT youth homelessness and improve school climates, and we will protect transgender individuals from violence. We will promote LGBT human rights and ensure America’s foreign policy is inclusive of LGBT people around the world.” The draft platform also features a paragraph on HIV and AIDS, though it does not explicitly mention LGBT people in that section. Instead, it states that “Democrats believe an AIDS-free generation is in our grasp” and pledges to “increase research funding for the National Institutes of Health, cap pharmaceutical expenses for people living with HIV and AIDS, address HIV criminalization laws, and expand access for HIV prevention medications, particularly for the populations most at risk of infection.” Notably, the draft platform — which will be revised numerous times before it’s finalized at the Democratic National Convention in Philadelphia later this month — steers clear of some of the most contentious issues that have come to the forefront during this election season. The platform mentions “religious freedom” once, in a pointed rejection of “Donald Trump’s vilification of Muslims.” Although the draft platform praises the demise of “don’t ask, don’t tell,” it does not specifically address the freshly overturned ban on open military service by transgender Americans. It does acknowledge that “our military is strongest when people of all races, religions, sexual orientations, and gender identities are honored for their service to our country.” While previous platforms have highlighted Democrats’ support for specific LGBT-inclusive legislation, like the Employment Non-Discrimination Act, the draft platform at this point does not mention that ill-fated legislation’s newest incarnation, the Equality Act. In fact, the draft features no discussion on defending or building on existing legal protections for LGBT people — a stark contrast from the promises made to LGBT Americans by presumptive Democratic nominee Hillary Clinton. By contrast, the final party platform in 2012 used the term “LGBT” twice — once in reference to antibullying efforts to protect queer youth, and once to affirm that LGBT families should be considered in immigration reform. The word “gay” appeared four times, but the words “lesbian,” “bisexual,” or “transgender” were nowhere to be found. That year’s platform mentioned “sexual orientation” and “gender identity” twice, in a two-paragraph section on civil rights. The 2012 platform did have a paragraph that defined “gay rights as human rights,” urging U.S. diplomats to speak out against anti-LGBT laws and policies in countries around the world. “Recognizing that gay rights are human rights, the President and his administration have vowed to actively combat efforts by other nations that criminalize homosexual conduct or ignore abuse,” the platform read. It also mentioned gay men in reference to the Affordable Care Act’s capacity to improve access to HIV and AIDS prevention among at-risk populations. Read the full draft platform at the DNC’s website. |
Plano Police have released security camera video of the suspects believed to be responsible for graffiti painted on Plano West Senior High School facilities late last month. A crop of vulgar messages and lewd images painted on the exterior of the school’s gym was discovered in the early morning hours of Feb. 27. The graffiti was discovered on the outside walls of Plano West High School The video released Tuesday appears to show three females spraypainting the gym doors and walls. A black sedan is seen driving away from the school just after the time of the offense. Police say the suspects are believed to be adults and have not been identified. The punishment for vandalism like this can carry jail time up to two years and include a fine of up to $10,000. Crime Stoppers is offering a reward of up to $5,000 for information that leads to an arrest. Tips should be phoned in to Crime Stoppers at 877-373-8477 (TIPS). Copyright 2016 WFAA |
Apparently the odd couple of Kanye West and Paul McCartney have found some real magic in the studio as it is being reported that the Beatle legend will co-produce West's entire new album. After a new Rihanna, West and McCartney song hit the 'Net last night, Ye's longtime friend and barber IBN Jasper took to Instagram and made some revelations about the Yeezy LP. According to him, not only will McCartney be featured on the LP, he will also co-produce the entire project. "Kanye's whole new album is co produced with McCartney," Jasper typed into the comment section of his IG post of the cover art for the track. He also revealed the song is originally a KW song that Rihanna was added to. The track will be available on both of the music star's albums. "[West] decided to put Rihanna on the song and put it on BOTH of their albums because they are both Roc Nation," he added. As previously reported , West expressed his desire to work with the McCartney last summer with them getting in the studio a short time later. On Jan. 1 they put forth the first fruits of their labor with the track "Only One" and of course recently followed up with the Rihanna collab, "FourFiveSeconds." West caught some flack for the different direction of his last album Yeezus . Do you think the hip-hop world is ready for an entire album put together with help from a strictly rock legend? Related: Kanye West Says His Braids Got Him A Felony Here’s The Status Of The Most Anticipated Albums Of 2015 Read Kanye West’s Handwritten Lyrics To “Only One” |
Why WaPo Changed Headline to Zerlina Maxwell’s Insane Rape Allegation Opinion Article An opinion piece in the Washington Post brought on so much scorn on Twitter that they changed the headline in a matter of hours. Professional idiot and occasional Democratic strategist Zerlina Maxwell’s piece was entitled “No matter what Jackie said, we should automatically believe rape claims,” but after tons of Twitter mockery, the headline was changed from “automatically” to “generally.” Hey @ZerlinaMaxwell. remember original headline on your crazy story? pic.twitter.com/z3aOtbIDMW — Dan Gainor (@dangainor) December 6, 2014 Why did @ZerlinaMaxwell downgrade Belief Settings from "Automatic" to "Generally?" Is she a witch? pic.twitter.com/OhgNv7rak1 — Film Ladd (@FilmLadd) December 6, 2014 Here are some of the better tweets about the piece: .@LilMissRightie Zerlina Maxwell is all about ignoring facts when it suits her: pic.twitter.com/yxCHuO4Mi5 — neontaster (@neontaster) December 6, 2014 I wonder what @ZerlinaMaxwell would say if a woman accused her of rape? Should we Automatically Believe™? @LilMissRightie @AdamBaldwin — Film Ladd (@FilmLadd) December 6, 2014 As @ZerlinaMaxwell and others are demonstrating, Twitter provides a service: it allows you to find out which journalists believe in truth. — Charles C. W. Cooke (@charlescwcooke) December 6, 2014 What if everybody started accusing @ZerlinaMaxwell of rape? By her logic, her Facebook will suffer, but she'll otherwise be fine. — Dr. Kanko, Doctor (@kankokage) December 6, 2014 Using @ZerlinaMaxwell's logic, could someone please arrest Bill Clinton for rape. Thanks. — Matthew (@Matthops82) December 6, 2014 Shorter @ZerlinaMaxwell : Who cares if a guy is falsely accused of rape bc the dude bro may lose a friend on Facebook. Meh. No biggie. — lauren (@LilMissRightie) December 6, 2014 Hi @ZerlinaMaxwell just in case you're avoiding the comments in that piece of garbage you wrote today, Preview: Ppl think you are INSANE. — lauren (@LilMissRightie) December 6, 2014 The @ZerlinaMaxwell is a lawyer? I want to know what cereal box she got her little degree from. — SúperTaterLovah (@SuperAndrea) December 6, 2014 So you agree Bill Clinton raped Juanita Broadrick? MT @ZerlinaMaxwell We never question the discrepancies in the rapist's version of events — Jalen~ sweet as pie (@GOPMommy) December 6, 2014 I think @ZerlinaMaxwell took this tweet seriously pic.twitter.com/H293pk2Go2 — TMZ Politics (@TMZ_Politics) December 6, 2014 .@ZerlinaMaxwell : Why did u change your article's headline from "automatically believe" to "generally believe"? — AJ Delgado (@AJDelgado13) December 6, 2014 Oh good @ZerlinaMaxwell's editor changed the headline. Now just a general dismissal of presumption of innocence instead of an automatic one. — Neal Dewing (@Neal_Dewing) December 6, 2014 Atticus Finch weeps. RT @dangainor: Hey @ZerlinaMaxwell. remember original headline on your crazy story? pic.twitter.com/90sjyWaajg — John Nolte (@NolteNC) December 6, 2014 And this is no exaggeration, she is literally saying that someone accused of rape faces few consequences, so these claims should be accepted without scrutiny: Many people (not least UVA administrators) will be tempted to see this as a reminder that officials, reporters, and the general public should hear both sides of the story and collect all the evidence before coming to a conclusion in rape cases. This is what we mean in America when we say someone is “innocent until proven guilty.” After all, look what happened to the Duke lacrosse players. In important ways, this is wrong. We should believe, as a matter of default, what an accuser says. Ultimately, the costs of wrongly disbelieving a survivor far outweigh the costs of calling someone a rapist. Even if Jackie fabricated her account, UVA should have taken her word for it during the period while they endeavored to prove or disprove the accusation. I wonder if she believes that all white women’s rape allegations against blacks should be automatically believed? And is this what “equality” means, that women will be believed over men? Yeah that’s kinda stupid. |
Prince al-Waleed bin Talal once called bitcoin an “Enron in the making.” Two months later, the Saudi royal suddenly finds himself looking up at the man or woman (or group) behind the soaring cryptocurrency on the list of the world’s wealthiest billionaires, according to numbers crunched by Quartz on Monday. And yet, even after all the buzz, we still don’t know who the bitcoin’s anonymous creator, known as “Satoshi Nakamoto,” actually is. Perhaps an Australian entrepreneur? No. Or maybe it’s Tesla’s TSLA, -0.30% Elon Musk? Guess again. Nevertheless, with bitcoin BTCUSD, +0.40% trading just under $20,000 ahead of the launch of bitcoin futures on the Chicago Mercantile Exchange Sunday, Nakamoto’s net worth reached $19.4 billion, enough to place him at 44th on the Forbes rich list. That would put him ahead of the prince and just behind Microsoft MSFT, +0.69% co-founder Paul Allen and Apple AAPL, +0.06% founder Steve Jobs’s widow. Nakamoto’s net worth estimate comes from the 980,000 bitcoins he is believed to own, which, at the current price of about $18,900, has him slipping down the list. In the crypto world, these numbers shift faster than we can keep track. However you want to calculate his net worth, he’s come a long, long way since October, when he would have cracked the Forbes list at No. 247 with a fortune of $5.9 billion. Clearly, it’s been a good couple months/years to be a bitcoin “hodler.” |
Whatever's gotten into Stephen Shellen, he probably never asked for this. Stephen Shellen, best known as the voice actor for Deus Ex: Human Revolution's David Sarif, has holed up in an undisclosed location to hide from Illuminati agents and their fully equipped fruit flies. No, really. A video featuring the voice actor's paranoid rambling has been uploaded to YouTube. Shellen warns the world that we are under attack in our own homes, from inconspicuous specks that he has identified as "fully fucking equipped Area 51 deadly dangerous fruit flies." These tiny agents of terror are allegedly shooting vaccines into us, as well as being armed with some "alien form of laser." In other words, Shellen is quickly approaching Charlie Sheen levels of bonkers. Many have noted that the video is far too well-cut to be the product of true insanity. The fact that Shellen is so deeply entrenched in the conspiracy could mean that this is all part of a viral marketing campaign for another Deus Ex game, a series built from layers upon layers of conspiracy theories. Neowin reports that "Shellen believes the Illuminati are coming for him, and his time is limited before he dies for real. He uploaded a YouTube video showing the extent of his concern. According to him, the Illuminati are spying on him at present, and he is due to die on July 30th 2012." This information doesn't seem to come from the video. For those of you keeping track, July 30 has already passed, so either the Illuminati have covered up their success or we'll (presumably) be hearing more from Shellen soon. Adding to the mystery, Shellen's Wikipedia page has undergone heavy revision over the past few days, with changes including adding his date of death as the 30 and inserting "Icarus has found you" (a reference to a warning from the original Deus Ex). At the time of this writing, the page is locked due to "persistent vandalism." Update: Thanks to some sleuthing by Chris Franklin, it appears that this video (and surrounding conspiracy) may be disingenuous. The video itself is a re-uploading of an older video in which Shellen plays a character called "Hobo Steve." The original video is part of a channel of similarly outlandish conspiracy theories and "a generous dose of humor." This is not to say that this is conclusively staged - there isn't enough information to tell whether the Hobo Steve character is purely fictional or a persona Shellen uses to express his actual beliefs on the channel. Either way, it's safe to assume that this has nothing to do with the Deus Ex franchise. Source: YouTube |
Founder of gorgeous ambient label Em:t about their animal-themed covers George Palladev Blocked Unblock Follow Following May 22, 2017 David Thompson: “We wanted our visuals to be a bit more imaginative than the fractals used on most electronic music sleeves. The photographs give the label an unique identity and, seeing as how the animals usually look pretty weird, they reflect the abstract nature of the sounds we’re dealing with. There’s also a veiled ecological comment. The way the world is going, it won’t be too long before we are left with nothing but pictures of these creatures. Most of our images are obtained through this amazing company called Oxford Scientific Films. They send people into jungles and up mountains right across the world to snap everything which moves. They’ve built up a massive library over the years. The musicians choose the photos of the single-artists albums, but myself and my partner, Chris Allen, select the frogs for the compilations. It’s great fun. You wouldn’t believe how silly get when a big package of new singles of new slides arrives in the office.” Check the beautiful and trippy Woob’s ambient dub and Qubism’s psy ambient from the em:t catalog. |
This is the remote-controlled Digger D-3 "flail tank". It's the latest and greatest (read: explosive-proof) of Digger mine-detonators, which have been around since WWII. Basically, it's steered around on the battlefield like a giant R/C car tank while it wails on the ground with a rotating drum of 10-pound hammers on chains, setting off anything explosive it comes in contact with. God what I'd give to drive that thing around town. The ten pound hammers spin wildly on the bar, digging up to 8 inches into the dirt as they strike. Heavy armor protects the tank if a mine explodes, and any damage to the hammers or chains is easily repaired in the field. I love it. Granted I'm sure we could invent some sort of robotic mine detector or an orbiting satellite that could locate and detonate land mines from space with a powerful laser beam, but I miss the the good old days when the answer to everything was "just beat the shit out of it." *eying mangled printer* Haha, you know what I'm talkin' about! Hit the jump for a video of the D-3's predecessor (cleverly named the D-2), in action. This robo-tank whacks landmines into submission [dvice] Thanks to Kevin, who detonates land mines the old fashioned way: by losing a leg. Yeah, about that. |
The U.S. government is concerned Islamist militants may be preparing attacks aimed at disrupting the Winter Olympic games in Sochi in February and has offered closer cooperation with Russia on security. One militant group had issued explicit direct threats to disrupt the Olympics, a State Department official said. Two bombings in the Russian city of Volgograd over the last two days, one at the city's central railway station and another on a bus, killed dozens of people and raised anxieties about the safety of the Olympics. U.S. officials said U.S. and Russian authorities have engaged in extensive contacts regarding security preparations for the Games. The United States is expected to share with Russia information it might collect about possible threats to the Games. “We're taking lots of security precautions” related to the Winter Games, a U.S. State Department official said on Monday. U.S. security officials said the government was not surprised by the Volgograd bombings and had anticipated that such attacks might well occur in the run-up to the Games. Caitlin Hayden, a spokeswoman for the National Security Council, condemned the attacks in Volgograd blamed on suicide bombers. She added that the U.S. government had “offered our full support to the Russian government in security preparations for the Sochi Olympic Games, and we would welcome the opportunity for closer cooperation for the safety of the athletes, spectators, and other participants.” The State Department is expected to caution U.S. travelers on Monday about possible bombings and hostage takings in Russia, particularly in the North Caucasus region which is less than 100 miles (160 km) from Sochi. The U.S. offer for closer cooperation with Russia follows two issues earlier this year that raised tensions between U.S. and Russian security agencies: the involvement of two Chechen brothers in the Boston Marathon bombing and Russia's granting temporary asylum to former U.S. National Security Agency contractor Edward Snowden. Despite these points of contention, a U.S. official said security cooperation between the U.S. and Russia regarding the games had improved in the run up to the Olympics. In November, Matthew Olsen, director of the government's U.S. National Counter-terrorism Center, said his agency was “coordinating and integrating the intelligence community's support...to the Winter Olympics in Sochi.” Olsen told a Senate committee he had visited Sochi a few days earlier and met Russian intelligence and security officials to discuss the games. |
Sadiq Khan has weighed in on the row over Air China’s "racist" tour guide to London and insisted the capital is one of the safest in the world and its multicultural composition is one of its greatest strengths. Air China, the country’s national airline, prompted outrage after warning travellers to avoid visiting areas of London “populated by Indians, Pakistanis and black people” in its in-flight magazine Wings of China. The guide also said: “We advise tourists not to go out alone at night, and females always to be accompanied by another person when travelling.” We’ll tell you what’s true. You can form your own view. From 15p €0.18 $0.18 $0.27 a day, more exclusives, analysis and extras. Shape Created with Sketch. People news in pictures Show all 9 left Created with Sketch. right Created with Sketch. Shape Created with Sketch. People news in pictures 1/9 US President-elect Donald Trump and musician Kanye West pose for media at Trump Tower in Manhattan, New York City Reuters 2/9 Anna Wintour apologises for criticising Donald Trump on a train. Fashionista was reportedly heard saying the President-elect would use the Presidency 'to sell himself and his brand' Getty 3/9 Ivanka Trump and her husband might be joining the next administration. The couple is plotting a move to the nation's capital Getty 4/9 Samuel L Jackson calls Muslims 'the new black kids in America' 'People perceive them as a threat before even saying hello,' actor says of Muslims in the US Getty 5/9 Former JLS star Oritse Williams denies rape allegation The singer has not been charged Getty 6/9 Bill Gates announces $1bn investment fund for clean energy technology Team-up with Richard Branson, Jeff Bezos and others aims to fight climate change - and reap 'super' rewards Getty 7/9 Donald Trump's aide worked for anti-immigation extremists Poll was used by President-elect during campaign to justify banning Muslims from the US Reuters 8/9 Henry Kissinger tells Nobel Peace Prize forum to give Donald Trump a chance More than 7,000 people called for the 'mastermind of war' to be arrested while visiting Norway EPA 9/9 John Travolta dismisses new Scientology documentary by former member Leah Remini The actor defends the church and says it was a source of support for him when he lost his girlfriend, mother and son Getty 1/9 US President-elect Donald Trump and musician Kanye West pose for media at Trump Tower in Manhattan, New York City Reuters 2/9 Anna Wintour apologises for criticising Donald Trump on a train. Fashionista was reportedly heard saying the President-elect would use the Presidency 'to sell himself and his brand' Getty 3/9 Ivanka Trump and her husband might be joining the next administration. The couple is plotting a move to the nation's capital Getty 4/9 Samuel L Jackson calls Muslims 'the new black kids in America' 'People perceive them as a threat before even saying hello,' actor says of Muslims in the US Getty 5/9 Former JLS star Oritse Williams denies rape allegation The singer has not been charged Getty 6/9 Bill Gates announces $1bn investment fund for clean energy technology Team-up with Richard Branson, Jeff Bezos and others aims to fight climate change - and reap 'super' rewards Getty 7/9 Donald Trump's aide worked for anti-immigation extremists Poll was used by President-elect during campaign to justify banning Muslims from the US Reuters 8/9 Henry Kissinger tells Nobel Peace Prize forum to give Donald Trump a chance More than 7,000 people called for the 'mastermind of war' to be arrested while visiting Norway EPA 9/9 John Travolta dismisses new Scientology documentary by former member Leah Remini The actor defends the church and says it was a source of support for him when he lost his girlfriend, mother and son Getty The row emerged on Wednesday after Haze Fan, a Beijing-based producer for CNBC, noticed the advice while travelling to the UK. She took a photograph of the guide and shared it on Twitter asking Khan, the Mayor of London, what he thought of it. Khan has now spoken out in defence of London and said London’s mix is one of its strongest assets. “London is one of the safest cities in the world and Londoners from different backgrounds living side by side is one of our greatest strengths,” said a spokesman for Khan. “The mayor is pleased that the magazine has now been withdrawn”. Air China released an apology and withdrew the controversial edition after outrage emerged. After the indignation emerged, Virendra Sharma, the Labour MP for Ealing Southall in west London, where almost 40 per cent of the population is Asian, said Air China's advice was “blatant racism”, and invited the airline to visit the area. “I am shocked and appalled that even today some people would see it as acceptable to write such blatantly untrue and racist statements," he said. “I have raised this issue with the Chinese ambassador, and requested that he ensures an apology is swiftly forthcoming from Air China, and the magazine is removed from circulation immediately. I have invited representatives of Air China to visit my constituency of Ealing Southall to see that a very multicultural area is safe, and would be of great value for those visiting London to see.” We’ll tell you what’s true. You can form your own view. At The Independent, no one tells us what to write. That’s why, in an era of political lies and Brexit bias, more readers are turning to an independent source. Subscribe from just 15p a day for extra exclusives, events and ebooks – all with no ads. Subscribe now |
Former Fremantle captain David Mundy will play on next season after triggering a one-year contract extension. The 31-year-old is now guaranteed to extend his decorated 255-game career at Fremantle into a 15th AFL season. Mundy started the year on the AFL’s free agency list after originally signing a three-year playing deal that was due to run out at the end of this season. But as of this month, the 2010 Doig medallist has met terms in his contract needed to trigger an extra year that will keep him at the Dockers in 2018. The extension is a timely reward after a difficult 12 months. The Dockers coach talks about Freo's upcoming clash with West Coast The West Australian Play Video Video The Dockers coach talks about Freo's upcoming clash with West Coast Mundy, who turns 32 in July, was thrust into the captaincy role last year during one of the toughest seasons in Fremantle’s history as the club crashed from the minor premiership to win just four games. He was subsequently replaced as skipper by Brownlow medallist Nat Fyfe. Mundy’s manager Anthony McConville, from Mac’s Sports Promotions, confirmed the contract extension, but would not discusses what milestone had guaranteed the extra year. “He’s reached triggers from his previous contract to play on into 2018,” McConville said. A contract trigger is typically linked to performance indicators such as the number of AFL games played across the length of the deal or placings in club best-and-fairest counts. Mundy has already played more games than any footballer in Fremantle’s history other than retired champion Matthew Pavlich and has enjoyed a career renaissance as a key figure in the club’s dramatic revival. The veteran has been pushed forward across a three-game winning streak and is the Dockers’ equal leading goal kicker this season with six majors. When Hayden Ballantyne hit the ball sweetly from 55m after the siren, everyone thought he'd won the Dockers the game The West Australian Play Video Video When Hayden Ballantyne hit the ball sweetly from 55m after the siren, everyone thought he'd won the Dockers the game He has also proven he can still be a match winner around the ball, amassing 12 disposals and three clearances in a telling final quarter performance that helped drag the Dockers over the line in Saturday’s night’s thrilling five-point win over North Melbourne at Domain Stadium. Mundy is averaging 26 possessions and five clearances this year. His only better season statistically came in 2015 when he won his only All-Australian guernsey. A hamstring tear that will sideline Stephen Hill for up to a month is likely to force the former captain back into a more permanent on-ball role starting with Saturday night’s western derby. Hill’s injury has opened the door for a potential recall for axed wingman Danyle Pearce. Second-year midfielder Harley Balic will also be available after recovering from a minor hip complaint. Pearce, 31, was dumped to the WAFL for the first time in his five-year career at Fremantle after the side crashed to an 89-point away defeat to Port Adelaide in round two. Coach Ross Lyon has flagged an opening for Pearce to fight his way out of selection exile. “I’ve got full faith in those guys that went out,” Lyon said. “There’s no doubt Danyle Pearce, Cam Sutcliffe, (Nick) Suban – they can come in and play really good footy.” |
St. Paul’s oldest remaining fire station will stay standing. After months of discussion with developers who had previously planned to raze the historic West End structure to make way for a hotel, St. Paul City Council member Rebecca Noecker announced Thursday that a deal had been reached to redevelop it instead. Part of the arrangement includes a $500,000 forgivable loan from the city’s Housing and Redevelopment Authority to help developers cover the added costs associated with adjusting building plans to accommodate both the hotel and the firehouse on the site. The property is on the southwest corner of Leech Street and Grand Avenue near United and Children’s hospitals. Built in 1871 for the Hope Engine Co., the firehouse is the oldest standing building that once served a municipal purpose in St. Paul. Despite its history, it has not been designated as historic. Until recently, real estate developer Dave Brooks and his business partner Jim Kelly had planned to demolish the building and replace it with a 109-room, extended-stay Marriott. Construction was slated to start this summer. The developers bought the property from Kraus-Anderson Construction Co., which annexed the former fire station into a warehouse built on the site years ago. “I am thrilled to be able to preserve the firehouse for the next generation of Saint Paul residents,” Noecker said in a written statement about the deal. “The committed neighbors in the area deserve a huge thank you for their efforts in raising awareness of the building’s significance and staying its demolition. I also appreciate the developers’ willingness to come to the table and figure out a better way forward.” Neither Brooks nor his representative Chuck Repke could be immediately reached for comment about the project. Brooks has redeveloped several historic sites in Lowertown. It’s not yet clear how the firehouse will be redeveloped, though previous discussion was centered around turning it into some type of restaurant or coffeeshop that would serve guests staying at the new Marriott. Elyse Jensen, president of the Historic Irvine Park Association, said she’s heard both options remain on the table. She was part of the group of community members from the West Seventh Street neighborhood who filed a civil suit in Ramsey County District Court to thwart Brooks’ development plans after learning about the toll they would take on the firehouse. The suit was stayed to allow both sides time to seek an agreement outside of court. Jensen welcomed news of the firehouse’s preservation Thursday. “We are really happy (the developers) were willing to compromise,” she said. “It seems like we found a solution that will work for them and now the community gets to keep an iconic building that is historically valuable to us.” While it’s not yet clear what the $500,000 HRA loan will cover, Repke previously said that the Marriott would lose about 25 of its planned parking spaces if the fire station remained onsite. To accommodate the loss, he said spaces could be built underneath the Marriott. He estimated at the time that the adjustment would cost about $600,000 and said the developers would look to the city to offset it. Noecker could not be immediately reached for additional comment on project details. Correction: This story has been updated to correct the spelling of Historic Irvine Park Association. |
[ Home Page ] [ Third Reich ] [ Old Reich ] [ Kaiser Reich ] [ Imperial Russia ] [ Axis Powers ] [ Italian Fascist ] [ WW I ] [ Landsknecht ] [ Kaiser Wilhelm ] [ Frederick the Great ] Special Entry Watercolor of St. Charles's Church in Vienna by Adolf Hitler With Strong, Official Provenance and Expertise This is the actual watercolor by Adolf Hitler. Adolf Hitler's signature as seen on the painting Another church depiction by Adolf Hitler Hitler’s painting of a southern Bavarian church-1925 Another view of the Saint Charles's Church by Hitler-1912 The Minorite Church in Vienna-1910-12 Saint Stephen's Cathedral in Vienna-1910 This is the book by Billy Price on the paintings of Adolf Hitler. It is the only complete book so far published on the subject, and both of the paintings we offer are listed and pictured (the very ones!). The watercolor of the Vienna church as seen in Billy Price's book on Hitler's art Another picture from Price's book on the art of Adolf Hitler Hitler’s signature changed over the years. Authentic watercolors by him have been seen with several of his varied signatures (No two were ever alike.). Please understand that not all the signatures pictured in this image are from paintings, but they are from Billy Price's book Adolf Hitler: The Unknown Artist. Here is the picture of the painting with notary seals secured to the back of the official statement by Peter Jahn Here is the expertise and certificate of authenticity by Peter Jahn in reference to this watercolor by Adolf Hitler. Peter Jahn, along with Dr. August Priesack, were the only recognized authorities able to accurately authenticate Hitler paintings. Here in rather broken English Herr Jahn says unalterably that the Karlskirche in Vienna signed by Adolf Hitler and dated 1912 is authentic and he praises it as the second-largest Hitler watercolor he had ever seen and is wonderful in detail and impression. He goes on to say that he considers it to be one of the finest and most naturalistic ones he had ever personally held. He says the background displays high technical expertise and has not seen many of this high quality (Excellent!). In this watercolor one can see Hitler’s great talent as a painter. After giving a short narrative on his life and career, he goes on to say that this picture is, in his opinion, one of the largest and most beautiful works done by the hand of Adolf Hitler. The statement is with the signature and official stamps of a notary who notarized Peter Jahn's signature in 1982. Interesting that Peter Jahn did this statement on April 19, 1982, the day before Hitler’s birthday (Significent?). Original Adolf Hitler Watercolor of St. Charles’s Church With Official Provenance and Expertise (Item AH 28-14; ART 17-23; SPECIAL ITEM ) DESCRIPTION: This is the other watercolor painted by Adolf Hitler that we recently obtained. This is the second one mentioned in the article above in the description of the canvas of the castle of Neuschwanstein. We mentioned in that narrative that there were certain buildings and other pieces of architecture that Hitler truly admired and often painted, and this magnificent depiction of Karl’s Church in Vienna was certainly his favorite subject of all. It shows up in both his sketches and paintings several times among the ones that were found. This piece we offer is a full-blown precious watercolor in all its glory. We have mentioned in the article above that only two experts have had proper credentials for authenticating Hitler watercolors and drawings. They are the late Dr. August Priesack and the late Peter Jahn and were the last surviving experts after the war to honestly authenticate a Hitler painting and such expertise from either man is the singular best authentication and support that any purported Führer art piece can carry. Others have also claimed that they can offer authentication. One such ‘expert’ that I would rather term an “X-Spurt” is Herr Hans Horvath also from Vienna. He has built for himself a completely undeserved reputation as an expert in National Socialist paraphernalia and art. In actuality he is a furniture restorer and perhaps he is good at that trade, but in the role of an authority on Hitler art, I think he had better stick to the sandpaper and glue pot. So, in essence, the singular recognized experts in this field remain the late Dr. Priesack and the late Peter Jahn: all others must be taken with skepticism. The numerous Hitler watercolors and oils that show up are legion, and serious collectors invariably believe only in the ones that bear the Priesack or Jahn credentials. We have explained much about this in the article above regarding the magnificent Schloss Neuschwanstein watercolor. The Karlskirche in Vienna as seen in our accompanying picture just above is also like the other one—accompanied with a provenance and expertise by none other than Peter Jahn with a letter of positive authenticity dated April 19, 1982. According to Jahn, this painting, like the castle rendering, was also one of the largest Hitler watercolors he’d ever seen. The size is 15.75 x 11.5 inches. This is absolutely in my opinion as well, one of the most detailed and crisp examples of Hitler’s work ever located and offered. It is definitely done with watercolor and gouache, boldly signed and dated “1912.” It is in fine condition throughout. The great architectural technique is superb and the people in the depiction are somewhat substantial. Hitler, jokingly perhaps, often said that his paintings could easily be recognized by their “unreal people;” however, the incredible attention to detail in his landscapes, city scenes, and architectural renderings absolutely abound in realism while unfortunately less apparent in his handling of the human figure. It is obvious in his works that he reached for majesty in some of his art, but he also pictured simple Germanic country scenes, as well. For him, the great structures such as the Pergamon Altar and the Parthenon, both of ancient Greece, and the ancient Roman Pantheon, symbolized for him the dimension and glory of the race he considered the founders and builders of Western civilization—the Aryans. The monumental cathedral constructions of the medieval period, the palaces of the Renaissance and the neoclassical structures of the 19th century were as he often said, “expressions of a cultural community, a heritage to be preserved and perpetuated.” Why did Hitler the purported atheist paint churches and cathedrals? Why indeed? Well first of all, the dubious atheist contention comes from the writings and verbal utterings of the “court historians” who seek always to slander him to the fullest with pompous insolence bordering on superciliousness. They seem duty bound with their chosen agenda to attack every vestige of the man’s very being. Hitler was certainly no atheist. He was raised a Catholic and never at any time renounced his faith. In his book Mein Kampf he proclaimed his Christianity and in numerous verbal pronouncements he spoke of his belief in an “Almighty Creator.” Yes, to some extent, he harbored the anticlerical belief that the church in Rome wielded too much power over its faithful adherents; he disdained “churchology” believing God lives within the soul of man and determines his destiny. He was always in favor of “positive Christianity.” He said in a 1922 speech, “My feelings as a Christian point me to my Lord and Savior as a ‘Kämpfer [“fighter”].” In a 1928 speech he said, “We tolerate no one within our ranks who attacks the idea of Christianity . . . in fact our movement is Christian!” So perhaps this is why he so often portrayed the glory and majesty of churches, abbies, and cathedrals in his paintings both in Germany and Austria. The Karl’s Church in Vienna was, as we said, one of his favorite-subject paintings not only because of its beautiful architectural value, but probably because his youth was spent in the study and admiration of famed saints of the church—as any good altar boy would be proud to do. His appreciation of Saint Charles Borromeo, the Patron of the Baroque, was one of the greatest reformers of the 16th century. In 1713, one year after the last great plague epidemic, Charles VI, Holy Roman Emperor, pledged to build a church for his namesake patron Saint Charles Borromeo, whom was revered as a healer for plague sufferers. Mr. Billy Price’s book Adolf Hitler: The Unknown Artist depicts numerous churches that were painted by Adolf Hitler. It seems it was his most preferred subject matter and obviously, this says something at least about his very nature and his spirituality. He actually portrayed Karl’s Church in many different views—front, back, sides—over a period of time and he found during his Vienna period of painting that the depictions of this building sold by far the best to the public whom he at that time desperately sought to sell to. But as to the several churches that he artfully depicted, we know this one by far is the absolute finest! Its brilliance and clarity stand out like a beacon shedding the true artistic light that now goes far to illuminate the intense interest that the future Führer had in all things religious when he was young. It now looms obvious and can be plainly seen in this magnificent watercolor that this must be called a “very significant work” and we know it was painted by this amazing artist whom the autochthonous plebian writers call a “house painter” in their ever-dubious inflammatory writings. So, here is what I would dare to call a “masterpiece” with ironclad provenance and expertise by one of the only two authorities recognized in the art circles for Hitler paintings. This is a golden opportunity to make a very wise purchase that can only increase in value in a very short time. Already, a watercolor painted by Hitler was reported to bring almost $15,000 in an auction on or about April 23, 2009. But, this painting was in my estimation very dismal and dark and reportedly had no letters or documents of authentication or any provenance. Actually, I didn’t even think it was Hitler’s style at all! This story is repeated over and over every year that goes by. The mere mention of anything that Adolf Hitler owned or produced seems to appeal to those who for any reason are so fascinated with him as to loosen their pockets in a heartbeat if the chance to buy something no matter how loose the connection is or how much actual authentication is provided (Barnum was obviously right!). This dubious canvas that brought nearly the $15,000 was sold in England by Mullock's Specialist Auctioneers & Valuers in Shropshire. So I repeat again that only the expertise of Dr. Priesack and/or Peter Jahn is accepted today, Otherwise you “pays your penny and takes your chance.” In closing let it be said that if you ever wanted to own the ultimate Hitler item actually produced by this phenomenal man here is the unique opportunity that will be before you in all probability only once! PRICE: SOLD BERLIN—A 1914 watercolour by Adolf Hitler fetched 130,000 euros ($161,000) at auction in the German city of Nuremberg on Saturday, the auctioneers said. The buyer was a private person from the Middle East who attended the sale in person, said Kathrin Weidler, head of the auction house. She said there had also been inquiries from Asia and America. The painting, entitled "Standesamt und Altes Rathaus Muenchen" (Civil Registry Office and Old Town Hall of Munich), is one of about 2,000 works that Hitler painted between about 1905 and 1920 as a struggling young artist. Asked before the auction whether it was tasteless to auction the Nazi dictator's works, Weidler said complaints should be addressed to the sellers—two unidentified German sisters in their 70s. Weidler said the vendors had decided to donate around 10 percent of the proceeds to a charity that helps disabled children. Weidler said the original handwritten bill of sale, dated Sept. 25, 1916, had come with the painting and was a rarity for Hitler's art. That also explained the relatively high selling price, she said. Hitler Art is the New Rage Among Collectors This work titled “Siegfried” by August Bischoff was a Hitler favorite and is expected to bring a huge price possibly in the six-figure area of $150,000.00, or more? Adolf Hitler’s favorite artists and artwork, promoted throughout Nazi Germany and shunned as a result by the world for decades, are now on fire, with art collectors in America and Europe paying more than $150,000 for certain pieces such as paintings, tapestries, and bronze statuary. The general consensus is that there’s a vibrant market here. Marius Martens, a Dutch art dealer, said that art from Karl Walther or sculptor Georg Kolbe, whom Hitler liked and whose work he displayed in Third Reich buildings, has finally caught the eye of collectors because the World War II period is now popular. Martens said that the popularity of Hitler’s favorite artists sprang to life in just the last 12 months. “Last year, the market was awakened by the sale of a painting by Karl Walther for 23,000 euro. It was an extremely scarce piece as it once hung in the New Chancellery of Adolf Hitler,” he said. “It seems now that this was not a one-off occasion. Recently works of other artists popular in the Third Reich have been sold for considerable prices,” he added. “Almost 70 years after World War II, more and more people see this art from a purely historical perspective. Although the artworks originate from an extremely tragic period, they should not be hidden or destroyed. This is an opinion shared by several museums, seeing the rising number of exhibitions of this art and the number of visitors,” said Martens. He added that as the World War II generation dies off, their period becomes history. “The driver is time. Just like no well-thinking human being bought a portrait of Napoleon in 1820, short after he destroyed Europe,” said Martins. “In the coming 10 years everybody who lived in the war will die: this means that living-past will change into history.” Contact Us Please E-mail for any additional information you may need. If you prefer, contact 'Germania' at PO Box 68, Lakemont, GA 30552 or call at 706.782.1668. Please! do not call during the wee hours of the morning. The best time for calling us is between 10 am and 12 noon and between 9 and 11 pm eastern time. |
FLINT, MI -- One man was killed and three other people injured following a shooting Thursday morning on the city's west side. Flint Police Capt. Collin Birnie confirmed one person died after gunfire broke out between subjects around 9 a.m. Thursday, May 4 on Copeman Boulevard near Dupont Street. "There's an obvious altercation when gunfire was exchanged," said Birnie to media gathered near the scene. "I can tell you that there is one male adult deceased at this time." One dead in multiple shooting in Flint, one person in custody Flint police Capt. Collin Birnie said there was an altercation and someone began shooting around 9 a.m. on Copeman Boulevard near Dupont Street. The additional victims included two men and one woman, according to Michigan State Police Lt. David Kaiser. The altercation took place between someone at a home in the area and the people that were shot. Three of the victims were found in a van, while the man killed was discovered in the street, Kaiser said. One person of interest was taken into custody by police, while other interviews are being conducted as the investigation continues. Police on scene of fatal shooting where at least 4 people were shot Police were trying to kick down a door in the 600 block of Copeman Boulevard and Dupont Street was blocked off between Copeman and Begole Street. The shooting scene covered a large area in the neighborhood and police dogs were brought in as part of the investigation. Thursday's incident comes on the heels of gunfire exchanged by 4-6 people Wednesday afternoon near Court Street and Mann Avenue. No one was injured, but multiple vehicles and house were struck. Shootout puts Flint water distribution site at church on lockdown An initial investigation has revealed the teen were shooting at each other, but they struck eight houses and four vehicles during the incident. No injuries have been reported. A water resource site at West Court Street Church of God was temporarily closed after Wednesday's incident. Anyone with information on either shooting may contact Flint police at 810-237-6800 or Crime Stoppers at 1-800-422-JAIL (5245) or report a tip anonymously at P3tips.com. MLive-Flint Journal reporter Dominic Adams contributed to this report. |
Intermission Dogs of War LOCATION: Equestria. TIME-FRAME: Over the course of three weeks. Gyvon was given the task of bringing each Equestrian Army Element, both Pegasus and Unicorn up to speed. Gyvon started the training by teaching them all the strengths and weaknesses of the Decepticons. Then, he spent a few days with each Element to customize their training regimen. The Pegasus Guard had a rich tradition of Air Dominance. Every war that Equestria found itself in, it was the Pegasi that controlled the skies. Even against the Griffon Dominion, they always made good on the promise of a friendly sky over the field of battle. Gyvon worried that the Decepticon fliers would, for the first time, be too much for the proud Pegasi, but after watching one slice through six inches of steel with his wings, he knew they'd be able to put up a fighting chance. They might not win the battle, but the 'Cons won't have an easy time. The Unicorns, however, were another story. Able to fire bolts of arcane energy from their horns, their magic would make them almost equal to a modern Earth military in a ranged fight. They couldn't fire the bolts rapidly, but they more than made up for it in accuracy. One commander joked that his best spell-slinger could hit a gnat in the right testicle from four hundred yards. And the Training continued. Each day, Gyvon would spend time with a different unit, instructing them in basic tactics, target practice, and the like. It wasn't perfect. Unlike NEST, the Equestrian Army couldn't practice their tactics against the Autobots, and the cardboard cutouts that he used were severely lacking in both weight and the ability to fight back. However, the Ponies did have a few tricks he could exploit. The Pegasi's ability to control weather could be harnessed to blow 'Cons away with tornadoes and harm them with lightning bolts and the Unicorns had many tricks at their disposal to turn the tide of battle. All throughout the training period, Gyvon made a point to return to Ponyville every day. Although training the Equestrian Guard was necessary, he felt better returning to familiar ground every day, and Ponyville had become like a second home to him. Most of his time in Ponyville was spent studying with Twilight, but he still spent some time with his other friends. Applejack had a few dead trees on the farm, and Gyvon helped her clear them away. His time with Fluttershy was usually spent escorting her through the Everfree Forest near her cottage, either looking for animals of hers that got loose or searching for medicinal herbs. Rarity mainly had him over for tea and pleasant conversation, although the conversation was a little less pleasant when he got the bill from her. Gyvon had a sneaking suspicion that Rarity had overcharged him for his wardrobe, but she denied it, citing increased materiel costs from his larger-than-pony size, which he accepted reluctantly. With Pinkie Pie, he helped her watch the Cake twins from time to time, with little Pumpkin Cake being particularly attached to him. Rainbow Dash, strangely enough, wanted combat lessons. Word had leaked out about the Royal Guards' increased training regimen, and she had guessed correctly that he was training them to fight the Decepticons, and she wanted in. Gyvon was happy to oblige, though less so when he got his ass handed to him while trying to teach her basic martial arts. They had a good laugh when Dash explained that she was already a black belt. Twilight, on the other hand, spent her time with Gyvon asking him questions. Questions about the War, about Earth, and about Humanity in general, and Gyvon did his best to answer. He never white-washed history, telling her about the atrocities as well as the accomplishments, but he always made sure to end his lessons on a high note. All throughout those three weeks, Gyvon's worries began to lessen. The Guards trained hard and were swiftly becoming his equal in training. For the first time, he began to hope that they could defeat the Decepticons. LOCATION: Galvatron's Lair TIME: Noon. "Damnable pests." spat Galvatron as he blasted yet another of the canines. They had been raiding his stores of energon gems since the day he had set up the base. It was more a nuisance than an actual threat, but they quickly began to annoy him. Over the past three weeks, thousands of Predacons had joined him at their new base of operations, along with three more Decepticons. Their current task was to find the source of the infestation. The dogs had put up a fight, and the Predacons did suffer casualties, but their commander always reassured Galvatron that they were close to finding the nest. As if on cue, the commander stepped out of the shadows and kneeled before his master. "My lord Galvatron" he said, gaining the Decepticon's attention. "Rise Tarantulas, and report. Have you found where these dogs are coming from?" Tarantulas came to his feet and nodded. "Yes, Lord Galvatron, we have located their main encampment. We await your orders." Galvatron chuckled. "No survivors." he said. Tarantulas saluted, turned, and walked out. As he did so, Galvatron felt a presence in his mind. A presence that could mean only one thing. His Master wished to speak with him. Galvatron turned and headed for the communications bunker. When he arrived, he ordered the few Predacons manning the controls to leave. Once they were gone, he activated the holographic display, and kneeled before the disembodied head of Unicron. "What is thy bidding, Master?" asked Galvatron. He did not enjoy being subservient to the god-like being, but he had no choice. Unicron could end his life with the merest of thoughts. It was the cost levied when he was revived by The Darkness. "I have received a communique from that wretched world." said Unicron. "My first Disciple lies imprisoned there." Galvatron stood and looked up at the hologram in shock. "Your first disciple? But... The Fallen is dead! I saw him die!" A sharp pain lanced across Galvatron's body, bringing him to his knees. Unicron would not be interrupted. "The Fallen was not the first to succumb to The Darkness. My first was created by the AllSpark as Nova Prime, but took the name Nemesis when he fell." he said as he continued his mental assault on Galvatron. "He is an ancient being, predating the Dynasty by millennia." Unicron halted his assault on Galvatron's systems. "Your task is to free Nemesis Prime from the Lost Prison that Prima created." Unicron sent the coordinates of the Lost Prison straight to Galvatron's mind and signed off. Galvatron saw that the Prison was located near a large native settlement. He called for his Decepticons to begin planning. They would need to be careful, otherwise they risked alerting the native lifeforms to their presence. Elsewhere in the tunnels, the massacre commenced. The Predacons were ruthlessly efficient in their attack. Men, women, children, all were cut down where they stood. The Predacons reveled in the slaughter before them. All but one. Removing his blade from yet another canine, one Predacon was quailed by what he was a part of. There is no honor in this he thought, even as he continued the grisly work. He saw how his compatriots enjoyed their work, and knew that he could not remain with such psychotic beings. LOCATION: Galvatron's Lair TIME: Midnight. A lone being left the caves and proceeded south to the nearby forest. A being that the world had not seen for millions of years, a velociraptor. A being fleeing from the depravity of his former comrades. |
Ryan Flanagan, CTV Kitchener Although the first Bombardier light rail vehicle for Metrolinx – the agency behind a bulk purchase that includes the 14 vehicles used in Waterloo Region’s Ion system – has missed its deadline for production, the company says it will still be able to deliver the rest of the order on-schedule. “There will be no delays,” Bombardier spokesperson Marc-Andre Lefebvre said in an interview. “The first car will be delivered to Waterloo in December of this year.” Metrolinx has ordered a total of 118 light rail vehicles from Bombardier. Most of them will be used on two LRT lines the agency is building in Toronto. Those lines won’t be up and running for a few years yet, which means the 14 vehicles for Waterloo Region will be some of the first to roll off the products lines at Bombardier. But the very first vehicle is a test car, which was supposed to be complete before the end of August. While that deadline has come and gone without the vehicle being delivered to Metrolinx, Lefebvre said Thursday that the vehicle was “days away” from being ready for inspection. Lefebvre said delays with the test vehicle aren’t causing further harm to the vehicles that will actually be used for the Ion system. Delivery of the first of those vehicles was originally scheduled for August as well, but has since been pushed back twice. The timeline now calls for the first vehicle to arrive in Waterloo Region this December, with all 14 being ready by the end of 2017. “All of these cars will be delivered on time,” Lefebvre said Thursday. Regional officials have already moved the anticipated start date for the Ion system from late 2017 to early 2018, blaming the delays at Bombardier. Coun. Tom Galloway, who chairs the regional planning and works committee, says news of the test car delay is concerning – but what he’s really watching for is the deadline to get the first vehicle into the region’s hands. “We really just want to see our first vehicle by the end of the year,” he said in an interview. Asked if he was confident that Bombardier would stick to the newest schedule, Galloway replied that “confident isn’t a word that we can use in the same sentence as Bombardier.” The first two of Waterloo Region’s 14 vehicles are in the process of being assembled in Thunder Bay. Bombardier recently announced that the rest of the order would be put together at a facility in Kingston instead. Galloway said the Thunder Bay plant had been experiencing issues around labour relations and quality control, and moving production to Kingston could bring improvements. “We have some high hope that that’s going to sort out some of their issues – but again, we just want to see the vehicles,” he said. With reporting by Abigail Bimman |
A Troy Township Democratic official was charged with setting up a sex date with a 15-year-old boy and federal agents searched her house on suspicion she has been producing child pornography videos, police said. Margarita Hernandez, 32, of 6901 Monmouth Drive on Joliet's far west side, was arrested about 3 p.m. Thursday and taken to the Will County jail on a warrant charging her with two counts of aggravated criminal sexual abuse. Hernandez had sex with a 15-year-old Chicago boy during a prearranged July meeting at her home, police said. Get all the latest Joliet news in your inbox every morning. Sign up for our free daily newsletter. Hernandez shares that home with her boyfriend, 76-year-old veteran weekly newspaperman John Gabriel. Both Gabriel and Hernandez are precinct committeemen for the Troy Township Democrats. An official with the Troy Democrats said Tuesday he believed Hernandez is Gabriel's granddaughter. But Gabriel confirmed she is his girlfriend. Gabriel went on to claim his much-younger girlfriend was being framed in an attempt to get back at him for exposing corruption. "This is all a setup," Gabriel said. Gabriel said the frame was easy to spot "If you remember how some of the people reacted when I went after some of the crooked policemen and crooked politicians." Gabriel said he suspects a Romeoville police officer he accused of once shooting at him was behind the setup, but declined to identify the supposedly dirty cop. Gabriel said it would all come out when his girlfriend goes to court. "This is all a mechanism to try to get even with me," he said. Hernandez's alleged sexcapade with the teen reportedly came to light after the boy's mother learned of the tryst and went to the Chicago police, who alerted the FBI and the Joliet police. Joliet Police Chief Mike Trafton said FBI agents searched Hernandez and Gabriel's house for evidence that Hernandez recorded sex romps with minors and added that the federal investigation is still under way. Follow-Up Coverage: Joliet Newsman Says Foes Will Destroy His Gal Pal with Fake Sex Case FBI spokeswoman Joan Hyde could not immediately be reached for comment. Joliet Detective Tizoc Landeros unraveled the case, but says he believes Hernandez has had sex with even more underage boys. He asked anyone with information about her—or anyone else—engaging in sex with minors to call him at 815-724-3035 or to alert detectives at 815-724-3020. Landeros said tipsters can also call Crime Stoppers of Will County at 800-323-6734. Landeros said the teen was first introduced to Hernandez through a friend. The friend's mother is Hernandez's cousin, he said. "We know that there's going to be more victims," Trafton said. "We have reason to believe that there are other boys involved as well that were victims." Are you follwing us on Facebook? |
Kazakhstan – Top 5 Places to Travel As the ninth largest country in the world, Kazakhstan has many things to offer tourists. Our list showcases Kazakhstan’s cultural heritage, natural wonders and rapid modern development. #1 ALMATY Almaty is the largest city in Kazakhstan with a population of 1.7 million people. It has myriad sightseeing opportunities, with plenty of parks and a variety of places of entertainment. You can also access free audio guide for Almaty and explore the city by your own. It’s easy to take a day trip to Shymbulak ski resort, Medeu outdoor skating rink or Big Almaty Lake. Almaty’s international airport is well connected, making it the perfect starting point for your Kazakhstan or Central Asia Tour. # 2 Astana Astana is a glorious modern city, planned and built by globally-renowned architects. It is unique in Central Asia and you can be forgiven for thinking that you are in a modern western city with huge malls, modern skyscrapers, and broad avenues. Astana hosts World Expo 2017 dedicated to the theme of “Future Energy” which will be definitely worth checking out. # 3 Turkistan city & Yassawi Mausoleum Turkistan is an important city with a rich cultural and historical heritage. The blue-domed mausoleum was built in the XIVth century and dedicated to Sufi philosopher and poet Khoja Ahmed Yassawi. # 4 Altyn Emel National Park & Charyn Canyon Altyn Emel was established as a National Park in 1996. It covers an area of 4600 square kilometers – the size of Luxembourg and Mauritius combined. One of the highlights of the park is the singing dune. Charyn Canyon looks like a sister of Grand Canyon in the USA, plunging to 300 meters in places. It has an impressive size of 80 kilometers in length as well. # 5 Kolsai Lakes & Kaindy Kolsai is one of the most beautiful places for recreation, hiking, and horse riding in Kazakhstan. There are three lakes situated at an altitude of 1800 to 2700 meters above sea level. Kolsai’s lakes are situated around 300 km from Almaty. On the way, make a stop at Kaindy. This magical lake with birch trees is the result of an earthquake in 1911 that flooded the forest. |
The Jacksonville Jaguars have been trying to be a forward thinking team under new owner Shad Khan and general manager Dave Caldwell. That's not limited to the marketing or scouting department however as kicker Josh Scobee will attempt to kick extra points and short field goals left footed during training camp and the 2014 pre-season. "You have to up your versatility a bit when you're a special teams player," Scobee told Big Cat Country. "By being able to alternate which foot I'm kicking with it will make field goals and PATs harder to block. The team's won't always know which way the ball is going to slice over the offensive line." While teams will be tipped off by how the holder is kneeling before the snap, perhaps the Jaguars can do things like call an audible to have punter Bryan Anger simply reset which way he is kneeling which will force teams to potentially adjust their block packages. "For the longer stuff, over 30 yards I'm still going with my right leg," Scobee added. "It's the power leg but I think I might be a little more accurate on the shorter ones with my left. It's something I've played around with in the offseason but I think we can actually try it out in live games." It will be interesting to see if it's something the Jaguars will go ahead with in the regular season. "Make sure when I hit the first left footed one in a game the Bold City Brigade section holla's atcha boy." |
The survey included responses from 50 economists, traders, analysts and money managers. “The basic rationale for a third round of Quantitative Easing is that … the Fed needs to do more to do its part and end this period of sub-par nominal GDP (explain this) growth,” wrote Mike Dueker of Russell Investments in response to the survey. He’s looking for the Fed to act this week. John Katter of Eastern Investment Advisors disagreed, saying, “Although I think more QE is coming, it will not be this year. The economy is not weak enough, the stock market is doing well, and interest rates are low enough.” And former Fed President Lee Hoskins took the other extreme, noting continued sub-par growth following several Fed easing programs. “Doing QE3 and expecting a different outcome borders on the irrational,” he said. Many market participants have pushed ahead their forecast for the first Fed tightening into 2015, with 48 percent now predicting no rate hike until then compared with 13 percent in the April survey. The fed funds rate (explain this) is seen at just 0.3 percent all the way until the end of December, 2013. “The Fed now faces the possibility of trying to offset policy errors not only in the euro zone but also mistakes in its own backyard on Capitol Hill,” wrote Lynn Reaser, Point Loma Nazarene University. The biggest threat facing the U.S. economy is the "fiscal cliff," chosen by 41 percent of respondents, taking the top spot away from the European financial crisis, which was picked by about a third. The "fiscal cliff" refers to a combination of spending cuts and tax hikes that will go into effect at the end of the year unless Congress acts. Seventy-eight percent say the fiscal cliff issue is already having a negative effect on business and the economy. “The odds that we reach the 'cliff' with no action taken is rising,” said David Resler of Nomura Securities. Added investment strategist Dennis Gartman: “The biggest test facing the U.S. economy is that we shall do something truly stupid: raise taxes and cut spending aggressively, doing immeasurable damage to the economy in the process.” Recession (explain this) chances in next 12 months have jumped to 26 percent from 21 percent in June — the worst finding since September, 2011. Market participants for the first time are predicting sub-2 percent growth on average in 2012 compared with 2011 and see GDP growing just 2.26 percent next year, down from a 2.55 percent forecast in April. As a result, market participants see stocks ending the year little changed from current levels, but rising 5 percent over the next 12 months. The 10-year Treasury yield (explain this) is forecast to rise to 1.7 percent by year-end and hover around 2 percent next June. But QE is seen helping both rates and stocks. Asked the effects of a hypothetical $500 billion QE program, 90 percent said it would lead to higher equity prices. Twenty-eight percent said it would raise prices by 5 to 6 percent, the most popular choice. Seventy percent said they believed QE would reduce mortgage rates, with about a third seeing an effect greater than 10 basis points. But just 42 percent said it would reduce yields on 10-year Treasurys and 23 percent predicted no change to yields. A third believed QE could raise rates. A reduction in yields of 6 to 10 basis points was the most popular choice among those who predicted a decline in rates. A full 82 percent of respondents now believe the euro zone will lose one or more countries in the next five years, either because they are ejected or leave, the highest percentage since CNBC began asking the question. The default probability for Spain also hit a survey record of 38 percent and 80 percent continue to expect a second default from Greece. Meanwhile, concerns eased for defaults in Portugal and Ireland. |
An Anonymous Coward writes in to tell us about sightings of secrets-related privsep in the wild: The developer known by the pseudonym insane coder, who authored the popular pro-LibreSSL review LibreSSL: The good and the bad, has presented a solution for preventing common coding mistakes resulting in another Heartbleed: To protect against exploiting such bugs, one should ensure that buffer overflows do not have access to memory containing private data. The memory containing private keys and similar kinds of data should be protected, meaning nothing should be allowed to read from them, not even the web server itself. He then talks about using memory protection and process separation to isolate a server's private keys from anything which can be exploited to send them over the network. This technique has already been utilized in an stunnel-like server, and it remains to be seen when others will follow. |
Here is a link to HJC’s website where you’ll find information on installing and removing shields, base plates, cheek pads, chin curtains, etc, as well as helmet care and cleaning. Below is a size chart provided by HJC for this product. If you need help with how to measure, or how to evaluate the fit of a helmet please have a look at this guide by HJC (the size chart included in this guide is for a “generic” HJC helmet and may differ slightly from the chart below that is specific to this product). If you have questions about how this helmet might fit as compared to other helmets in your closet, please visit this FAQ for some advice. Helmet Size Hat Size Head Measurement (inches) Head Measurement (cm) XS 6 3/4 to 6 7/8 21 1/4 to 21 5/8 54 to 55 Small 6 7/8 to 7 21 5/8 to 22 55 to 56 Medium 7 1/8 to 7 1/4 22 1/2 to 22 7/8 57 to 58 Large 7 1/4 to 7 3/8 22 7/8 to 23 1/4 58 to 59 XL 7 1/2 to 7 5/8 23 5/8 to 24 60 to 61 XXL 7 3/4 to 7 7/8 24 3/8 to 24 3/4 62 to 63 Other Useful HJC Information Links: Care and Cleaning Shield Installation Interior Parts Removal/Care Need help choosing the right shape and size helmet for your own noggin? Learn about the LidPicker! |
There are calls to expel Eritrea's top diplomat in Canada because he presides over a system that's milking money from the Eritrean community in this country. Evidence obtained by CBC News suggests Consul Semere Ghebremariam O. Micael is again soliciting taxes despite a threat by Canada eight months ago not to renew his credentials if he kept at it. But one Eritrean in Toronto, who has asked not to be identified, tells the CBC it was business as usual just a few weeks later when he had to pay. "You have to go to the consulate and they arrange how you have to pay the money. They want two per cent … they don't give you a reason. You have to pay the money." What would happen if he didn't? "My family [in Eritrea] would get in trouble if I don't pay," he said. Threats and intimidation A United Nations report last year indicated that state threats and intimidation were commonly used against families in Eritrea to get their relatives living in Canada and other countries to pay up, though now the government sometimes uses a financial middleman. "As far as I'm concerned it's a ruse, doing indirectly what the government told them not to do directly," said David Matas, a Winnipeg human rights lawyer who represents some in the Eritrean community who resent it. A United Nations report last year indicated that state threats and intimidation were commonly used against families in Eritrea to get their relatives living in Canada and other countries to pay up. (CBC) The dictatorship in Eritrea imposes what the UN has condemned as a worldwide "diaspora tax" on its nationals, valued at two per cent of their income. It often adds a second tax up to $500, described on the Eritrean government clearance form as a "donation to national defence against Ethiopian invasion." On Sept. 10, 2012, Canada's Department of Foreign Affairs advised the Eritrean consul in Toronto that soliciting and collecting these taxes was incompatible with consular duties, and his accreditation would not be renewed if he and his consulate didn't stop. The consulate later indicated in writing that it would comply. But audio provided to CBC News by Eritrean-born Teklezghi Yohannes Gabir from a meeting he attended in Winnipeg on April 21, 2013, reveals a voice he identifies as that of the consul sounding as if he is again soliciting money. "What we are saying is that you have to fulfil the law of the country to be an investor because you are a citizen of the country" it says in a translation done for the CBC to English from Tigrinya, the language of business in Eritrea. "Therefore, since what it comes down to is national honour and law, any service that requires a permit will have to remit two per cent." Refusing to pay Gabir, 36, an Eritrean living in Winnipeg, has paid the tax in the past but refuses to pay any more, and offered the audio hoping it might help stop the collections. "I was there personally, and it was all aimed at collecting money and sending it to Eritrea," he said. "I think the Canadian government didn't follow up and they don't know what is going on." But a source tells CBC News that Canada's spy agency, the Canadian Security Intelligence Service (CSIS), is familiar with the story and has been in contact with the Eritrean community seeking information about the tax scam. And the issue was also laid out to federal officials as recently as three months ago, according to Ghazae Hagos, who was present at the meeting. Hagos, a former journalist in the Eritrean capital of Asmara, speaks for HIDMONA, the Eritrean-Canadian Human Rights Group of Manitoba. He says he and a colleague met last February with Conservative MP Deepak Obhrai, the parliamentary secretary to the minister of foreign affairs, and a deputy director from the Africa division of the Department of Foreign Affairs and International Trade. "They said they were very concerned about it. They said they would seriously study the matter and take the appropriate action," Hagos said. In the past, Eritrean Consul Semere Ghebremariam Micael denied there's opposition to the tax and said as much on the radio network Voice of America (VOA) on Sept. 27, 2012, just days after Canada told him to get out of the business or lose his accreditation. "I don't have much doubt that this is going to be an obstacle to the people … the public is still doing it, saying about this matter.… 'It is our right to pay.' We don't have any problems with our community," he said. Reliance on diaspora for cash Eritrea is one of the youngest and poorest countries in Africa. And with 10,000 political prisoners filling its jails, according to an Amnesty International report this month, one of its most repressive. Independence came only after decades of conflict with Ethiopia, with which it maintains an uneasy peace today. Consequently, the regime relies on diaspora cash for hard currency. But according to the UN, it also uses its money to support armed rebels opposing Ethiopia, and others with ties to the notorious al-Shabaab movement in Somalia. Because of Eritrea's destabilizing role in the troubled Horn of Africa, the UN imposed sanctions on the country in 2009, hoping to choke off its access to arms and money. Canada later adopted them, meaning those who pay are violating UN sanctions and may also be breaking Canadian law according to past reports. Through it all, the consul has not been shy about his country's intention to keep collecting cash no matter how Canada views it. In the VOA interview on September 2012, he interpreted Canada's warning just a few days earlier, as a green light for Eritrea to keep collecting. "What the government of Canada is saying is that the task of a consulate office is not to collect a tax of two per cent, and it is not your mandate to do that, so you cannot collect payment here. "But the law of Eritrea is still there as it is, and they have not said anything about that. Therefore, it is not that Eritrea should not ask payment, but you cannot charge here." To that end, Ghazae Hagos of HIDMONA says Eritrea has adopted some opaque banking methods. Money wired to Germany In a sworn affidavit seen by CBC News, an Eritrean who has asked not to be identified describes being schooled in the tax payment process by officials at the Eritrean Consulate in Toronto, three months after Canada warned the office to end its involvement. Several hundred dollars of his money were subsequently wired from a Canadian bank, to a second financial institution in Germany called the Deutsche Zentral-Genossenschaftsbank (DZ Bank) of Frankfurt. From there, the documents show the funds were wired to a third institution, the Housing and Commerce Bank of Eritrea in the capital city of Asmara, of which the majority owner is the ruling regime, the People's Front for Democracy and Justice. "They should stop," said Winnipeg human right lawyer David Matas. "But they were already asked to stop and they didn't, so I think they should be evicted. I mean, they're thumbing their noses at the Canadian authorities." If Canada doesn't do something, Matas worries it's setting up people from Eritrea and potentially other expatriate communities to become walking ATMs for other regimes. "If Eritrea gets away with it, we're going to start seeing China doing it. And Iran doing it. And North Korea doing it. And I think we have to make every effort to stop this right now, or else we're going to see it mushroom." Ghazae Hagos of the Eritrean-Canadians Human Rights Group of Manitoba said he would like to see the Eritrean Consulate closed. "Canada has to go beyond threat of pressure, of threat of expulsion of the consul. I think the closure of the consulate office is long overdue if Canada is really serious about it." CBC News contacted the Eritrean Consulate three times in the past week to request comment, but telephone calls were not returned. |
Get the biggest Liverpool FC stories by email Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Could not subscribe, try again later Invalid Email Jordan Henderson will remain Liverpool FC captain, with Jurgen Klopp confirming his own arrival at Anfield was never going to change the existing set-up. Henderson has not yet played under Klopp, with his last action for the Reds coming during the first home game of the season against Bournemouth in August. Since then, James Milner has taken the captaincy, with Mamadou Sakho and Martin Skrtel also briefly wearing the armband under the German coach. The 25-year-old was originally suffering from a heel problem but then, shortly after returning to training, broke his foot to prolong his absence. Klopp revealed Henderson’s return to the first team is edging nearer, and he will return as captain. “There was no second of doubt about this decision,” said Klopp. “I didn’t ask because it was logical for me, we never had to think about whether Henderson was the right captain. “I’ve met him, he’s an absolute leader and he’s in a good way at this moment, and we all hope he’s back in a few weeks. “I do not know what will happen in the next two weeks, it’s very important and we’re waiting for this. Hendo stays captain.” Sturridge update Though Henderson appears closer to a first appearance under his new manager, Daniel Sturridge does not. The striker, who picked up a knee injury in the week before Klopp’s debut at Tottenham, remains sidelined. Klopp would not be drawn on a return date for Sturridge, but once more emphasised the need for patience in bringing him back into the fold. On if Sturridge would return any time soon, he said: “Yes, I think so.” But he then added: “Soon is relative. I don’t know. It isn’t as fast as we thought of course but we cannot put pressure on this. “He is starting to train outside after four weeks, so of course he needs time to bring him back in shape or whatever. “He can start training and then we can talk about when Sturridge can play, but it’s nearly like a summer break and he’s really training hard after this. We have to see when we can talk about him.” |
Jan 28, 2015; Phoenix, AZ, USA; Washington Wizards forward Paul Pierce (34) and head coach Randy Wittman against the Phoenix Suns at US Airways Center. The Suns defeated the Wizards 106-98. Mandatory Credit: Mark J. Rebilas-USA TODAY Sports This past offseason, future Hall of Famer Paul Pierce stunned the basketball world when he announced his decision to join the Washington Wizards on a 2 year contract. Obama , J Wall here I come — Paul Pierce (@paulpierce34) July 13, 2014 Pierce is known for a variety of things: winning a championship as a Celtic, veteran leadership, using his savvy to draw fouls, and perhaps most importantly of all, his ability to hit big shots. Washington Wizards fans envisioned Pierce making clutch plays to close out games, such as this dagger in the playoffs vs. the Toronto Raptors last season: Slotting in at the small forward spot, Pierce made up for the defensive presence of Trevor Ariza by bringing instant offense to the table for the Wizards, with his off the dribble scoring skillset and clutch shooting. There were countless times this season where Pierce buried huge three pointers at the end of games, notably against the Orlando Magic and the Boston Celtics to name a couple. Despite his huge contributions earlier this season, Paul Pierce hasn’t been as effective as of late. He is in a bit of a shooting slump, shooting just 28.1% from the field in his last 5 games. Furthermore, he is averaging just 3.4 minutes per game in the fourth quarter in the last 5 games, sitting out the entirety of the Charlotte Hornets game after three quarters (which went into double overtime). Despite the recent skid, Pierce is simply too valuable to sit. He is shooting 42.9% from the field in the 4th quarter this season, including 41.9% from deep. This is a man who lives for taking the big shot, as evidenced by the article he wrote for The Players Tribune earlier this month: “I’ve been practicing for this situation my entire life, so I knew exactly when to make my move. Five seconds. Four seconds. I see an opening and start driving to the basket, but Amare cuts it off. Two seconds. I step back, using my body to lean off of him and create space. Then all I see is the basket. I take the shot.” Of course, Pierce is 37 years old and Randy Wittman is wise to keep him well rested and energized for the playoffs. However, with the race for the 3rd seed still alive, Wittman and the Wizards should be doing everything possible for the chance to play the Milwaukee Bucks in the first round as opposed to the Toronto Raptors or Chicago Bulls. Here’s to hoping that Paul Pierce gets a few more 4th quarter minutes ahead of Martell Webster. |
Chelsea are rated as favourites to sign PSV Eindhoven winger Zakaria Bakkali. The Daily Star Sunday says the Belgian international has been heavily linked with a move away from the Philips Stadion in recent months, and according to reports, Premier League giants Chelsea and Liverpool are interested in landing the winger. Those reports suggest that both Jose Mourinho and Brendan Rodgers are eager to sign the 18-year-old in the January transfer window. But it seems that Reds boss Rodgers is loosing the race to sign the youngster, who has been dubbed the new Eden Hazard. Sources in Spain claim that Chelsea are closing in on the coveted winger, who has attracted interest from a host of Europe's top clubs. For the big stories and the banter follow us on Twitter: @tribalfootball |
JACQUELINE MARCUS FOR BUZZFLASH AT TRUTHOUT Instead of making American taxpayers pay for the estimated billions of dollars in damage resulting from Hurricane Sandy’s damages, the bill should be sent directly to the industrial polluters, the Koch Brothers and oil & coal executives. If you believe that these two extreme storms, a hurricane colliding with a massive winter storm in late October, are typical Mother Nature activity, you’re living in a Dick Cheney fantasy world. Before trapped emissions created the “greenhouse effect” and rapid glacier ice melts played havoc with cyclical weather, what is now categorical evidence of climate change disasters, hurricanes would hit southern Florida once every ten years. It was regarded as exceptional and rare. Fast forward to 2008, and on the average, five to ten hurricanes hit the U.S. shores during hurricane season. As late as the 1980s, the idea of a hurricane smashing the northeast coast from New Jersey to Maine would be unthinkable or totally exceptional. Welcome to the New Normal of global warming, sponsored by and perpetually prolonged by your friendly polluting oligarchs who are doing their best to keep us dependent on fossil fuels. The polluting industrialists have spent billions of dollars via the corporate media to keep the public in a state of doubt over climate change. Please watch this excellent PBS Frontline documentary, “Climate of Doubt” that explains how Big Oil & Coal deceive the public. Hurricane Sandy is being assessed from every single meteorological angle except for the most obvious, important one: Climate Change. This is not Mother Nature’s fury, as I explained in my last Buzzflash commentary, let’s get real: this is the extreme type of weather that climate change is producing. The world community of scientists and climatologists predicted that climate change damages would cost taxpayers billions and billions of dollars in repair from electrical failures, flooding, infrastructure, and food shortages. Hurricane Sandy provides some context as to why the Pentagon claimed that climate change is a far greater threat than terrorism. So instead of making FEMA (Federal Emergency Management Agency), pay for the damages at the cost of billions of dollars, the Federal government should send the bills to the Koch Brothers and to the executives of Big Oil & Coal every time there is a climate change catastrophe. If they were forced to pay for the damages caused by global warming, perhaps it would financially force them and their shareholders to shift to clean energy alternatives, knowing that they will have to pay for all climate change disasters from infrastructure to agricultural damages at the cost of billions of dollars. Of course, don’t expect our sold-out, oil-soaked members of congress to hold the polluters accountable. |
Afraid Of Twerking, Vermont High School Cancels Dance In a letter to the town's paper this week, the principal of Mount Anthony Union High School in Bennington defended canceling this years homecoming dance. DON GONYEA, HOST: Good morning. I'm Don Gonyea. Teenagers in a small town where dancing has been banned - it happened in "Footloose" and now a clampdown in Vermont. In a letter to the town's paper this week the principal of Mount Anthony Union High School in Bennington defended canceling this year's homecoming dance. He's worried they'll be twerking - twerking - meetings with student leaders may come next week. Paging Kevin Bacon your services and dance moves are needed. It's MORNING EDITION. Copyright © 2014 NPR. All rights reserved. Visit our website terms of use and permissions pages at www.npr.org for further information. NPR transcripts are created on a rush deadline by Verb8tm, Inc., an NPR contractor, and produced using a proprietary transcription process developed with NPR. This text may not be in its final form and may be updated or revised in the future. Accuracy and availability may vary. The authoritative record of NPR’s programming is the audio record. |
Spread the love Imagine what our society would be like if only 1 or 2 of these inventions weren’t suppressed? Throughout history there have been countless attempts to discourage new technologies only to protect other people’s self-interests. Below are some of the most suppressed inventions ever. The Original Electric Car: Unplugged? Perhaps the most notorious suppressed invention is the General Motors EV1, subject of the 2006 documentary, Who Killed the Electric Car? The EV1 was the world’s first mass-produced electric car, with 800 of them up for lease from GM in the late ’90s. GM ended the EV1 line in 1999, stating that consumers weren’t happy with the limited driving range of the car’s batteries, making it unprofitable to continue production. Many skeptics, however, believe GM killed the EV1 under pressure from oil companies, who stand to lose the most if high-efficiency vehicles conquer the market. It didn’t help that GM hunted down and destroyed every last EV1, ensuring the technology would die out. In5D Comment: While we are starting to see some electric cars come onto the market, their efficiency is long to be desired as most will not run for very long and would be virtually impossible to use on long trips. For example, the world’s first car made entirely from hemp runs on electricity but can only be driven for 100 miles before it needs to be recharged. The Death of the American Streetcar In 1921, if the streetcar industry wasn’t actually naming streetcars Desire, it was certainly desiring more streetcars. They netted $1 billion, causing General Motors to hemorrhage $65 million in the face of a thriving industry. GM retaliated by buying and closing hundreds of independent railway companies, boosting the market for gas-guzzling GM buses and cars. While a recent urban movement to rescue mass transit has been underway, it is unlikely we’ll ever see streetcars return to their former glory. The 99-MPG Car The holy grail of automotive technology is the 99-mpg car. Although the technology has been available for years, automakers have deliberately withheld it from the U.S. market. In 2000, the New York Times reported a little-known fact, at least to most: A diesel-powered dynamo called the Volkswagen Lupo had driven around the world averaging higher than 99 mpg. The Lupo was sold in Europe from 1998 to 2005 but, once again, automakers prevented it from coming to market; they claimed Americans had no interest in small, fuel-efficient cars. In5D Addendum: We are starting to see evidence of cars that will now exceed 99 mpg as evidenced in a recent article entitled, “Volkswagen’s New 300 MPG Car Not Allowed In America“. For the most part, the major auto manufacturers are in bed with Big Oil and will continue to suppress the manufacturing of these cars for as long as they can. Free Energy Nikola Tesla was more than just the inspiration for a hair metal band, he was also an undisputed genius. In 1899, he figured out a way to bypass fossil-fuel-burning power plants and power lines, proving that “free energy” could be harnessed using ionization in the upper atmosphere to produce electrical vibrations. J.P. Morgan, who had been funding Tesla’s research, had a bit of buyer’s remorse when he realized that free energy for all wasn’t as profitable as, say, actually charging people for every watt of energy use. Morgan then drove another nail in free energy’s coffin by chasing away other investors, ensuring Tesla’s dream would die. Miracle Cancer Cure In 2001, Nova Scotian Rick Simpson discovered that a cancerous spot on his skin disappeared within a few days of applying an essential oil made from marijuana. Since then, Simpson and others have treated thousands of cancer patients with incredible success. Researchers in Spain have confirmed that THC, an active compound in marijuana, kills brain-tumor cells in human subjects and shows promise with breast, pancreatic and liver tumors. The U.S. Food and Drug Administration, however, classifies marijuana as a Schedule I drug, meaning that it has no accepted medical use, unlike Schedule II drugs, like cocaine and methamphetamine, which may provide medical benefits. What a buzzkill. Water-Powered Vehicles Despite how silly it sounds, water-fueled vehicles do exist. The most famous is Stan Meyer’s dune buggy, which achieved 100 miles per gallon and might have become more commonplace had Meyer not succumbed to a suspicious brain aneurysm at 57. Insiders have loudly claimed that Meyer was poisoned after he refused to sell his patents or end his research. Fearing a conspiracy, his partners have all but gone underground (or should we say underwater?) and taken his famed water-powered dune buggy with them. We just hope someone finally brings back the amphibious car. Chronovisor What if you had a device that could see into the future and revisit the past? And what if you didn’t need Christopher Lloyd to help you? Father Pellegrino Maria Ernetti, an Italian priest, claimed in the 1960s to have invented what he called a Chronovisor, something that allowed him to witness Christ’s crucifixion. The device supposedly enabled viewers to watch any event in human history by tuning in to remnant vibrations that are caused by every action. (His team of researchers and builders included Enrico Fermi, who also worked on the first atomic bomb). On his deathbed, Fermi admitted that he had faked viewings of ancient Greece and Christ’s demise, but insisted the Chronovisor, which had by then vanished, still worked. Unsurprisingly, conspiracy theorists say the Vatican is now the likely owner of the original Chronovisor. Rife Devices American inventor Royal Rife (his real name), in 1934, cured 14 “terminal” cancer patients and hundreds of animal cancers by aiming his “beam ray” at what he called the “cancer virus.” So why isn’t the Rife Ray in use today?A 1986 book, The Cancer Cure That Worked, Fifty Years of Suppression, by Barry Lynes and John Crane, revived the Rife device affair. The book, written in a style typical of conspiratorial theorists, cites names, dates, events and places, giving the appearance of authenticity to a mixture of historical documents and speculations selectively spun into a web far too complex to permit verification by any thing short of a army of investigators with unlimited resources. The authors claim that Rife successfully demonstrated his device’s cancer curing ability in 1934, but that “all reports describing the cure were censored by the head of the AMA from the major medical journals.” A 1953 U.S. Senate special investigation concluded that Fishbein and the AMA had conspired with the U.S. Food and Drug Administration to suppress various alternative cancer treatments that conflicted with the AMA’s pre-determined view that “radium, x-ray therapy and surgery are the only recognized treatments for cancer.” Cloudbuster In 1953, a drought threatened Maine’s blueberry crop, and several farmers offered to pay Reich if he could make it rain. The weather bureau had reportedly forecast no rain for several days when Reich began the experiment at 10 a.m. on July 6, 1953. The Bangor Daily News reported on July 24: Dr. Reich and three assistants set up their “rain-making” device off the shore of Grand Lake. The device, a set of hollow tubes, suspended over a small cylinder, connected by a cable, conducted a “drawing” operation for about an hour and ten minutes. According to a reliable source in Ellsworth the following climatic changes took place in that city on the night of July 6 and the early morning of July 7: “Rain began to fall shortly after ten o’clock Monday evening, first as a drizzle and then by midnight as a gentle, steady rain. Rain continued throughout the night, and a rainfall of 0.24 inches was recorded in Ellsworth the following morning.” A puzzled witness to the “rain-making” process said: “The queerest looking clouds you ever saw began to form soon after they got the thing rolling.” And later the same witness said the scientists were able to change the course of the wind by manipulation of the device. The blueberry crop survived, the farmers declared themselves satisfied, and Reich received his fee Overunity Generator A number of overunity generators, which produce more energy than they take to run, have surfaced in the past century. Ironically, they have been more trouble than they were worth. In nearly all cases, a supposedly working prototype has been unable to make it to commercial production as a result of various corporate or government forces working against the technology. Recently, the Lutec 1000, an “electricity amplifier,” has been making steady progress toward a final commercial version. Will consumers soon be able to buy it, or will it too be suppressed? Cold Fusion Billions of dollars have been spent researching how to create energy using controlled “hot fusion,” a risky and unpredictable line of experimentation. Meanwhile, garage scientists and a fringe group of university researchers have been getting closer to harnessing the power of “cold fusion,” which is much more stable and controllable, but far less supported by government and foundation money. In 1989, Martin Fleischmann and Stanley Pons announced that they had made a breakthrough and had observed cold fusion in a glass jar on their lab bench. To say the reaction they received was chilly would be an understatement. CBS’s 60 Minutes described how the resulting backlash from the well-funded hot-fusion crowd sent the researchers underground and overseas, where within a few years their funding dried up, forcing them to drop their pursuit of clean energy. Hot Fusion Cold fusion isn’t the only technology to get buried by hot-headed scientists. When two physicists who were working on the decades-long Tokamak Hot Fusion project at Los Alamos Laboratory stumbled across a cheaper, safer method of creating energy from colliding atoms, they were allegedly forced to repudiate their own discoveries or be fired; the lab feared losing the torrent of government money for Tokamak. In retaliation, the lead researchers created the Focus Fusion Society, which raises private money to fund their research outside of government interference. Magnetofunk and Himmelkompass Nazi scientists spent much of World War II hidden in a covert military base somewhere in the arctic, creating the Magnetofunk. This alleged invention was designed to deflect the compasses of Allied aircraft that might be searching for Point 103, as the base was known. The aircraft pilots would think they were flying in a straight line, but would gradually curve around Point 103 without ever knowing they were deceived. The Himmelkompass allowed German navigators to orient themselves to the position of the sun, rather than magnetic forces, so they could find Point 103 despite the effects of the Magnetofunk. According to Wilhelm Landig, a former SS officer, these two devices were closely guarded secrets of the Third Reich. So closely guarded were they that neither device apparently survived the collapse of Hitler’s Germany, although the real tragedy is that no one has ever named their band Magnetofunk. A Safer Cigarette? In the 1960s, the Liggett & Myers tobacco company created a product called the XA, a cigarette in which most of the stick’s carcinogens had been eliminated. Dr. James Mold, Liggett’s Research Director, reported in court documents in the case of “The City and County of San Francisco vs. Phillip Morris, Inc.,” that Phillip Morris threatened to “clobber” Liggett if they did not adhere to an industry agreement never to reveal information about the negative health effects of smoking. By advertising a “safer” alternative, they would be admitting the dangers of tobacco use. The lawsuit was dismissed on a technicality and Phillip Morris never addressed the accusations. Despite their own scientists’ publication of research that showed less cancer in mice exposed to smoke from the XA, Liggett & Myers issued a press released denying evidence of cancer in humans as a result of tobacco use, and the XA never saw the light of day. TENS The Transcutaneous Electronic Nerve Stimulation (TENS) device was created to alleviate pain impulses from the body without the use of drugs. In 1974, Johnson & Johnson bought StimTech, one of the first companies to sell the machine, and proceeded to starve the TENS division of money, causing it to flounder. StimTech sued, alleging that Johnson & Johnson purposely stifled the TENS technology to protect sales of its flagship drug, Tylenol. Johnson & Johnson responded that the device never performed as well as was claimed and that it was not profitable. StimTech’s founders won $170 Million, although the ruling was appealed and overturned on a technicality. The court’s finding that the corporation suppressed the TENS device was never overturned. The Phoebus Cartel Phillips, GE and Osram engaged in a conspiracy from 1924 to 1939 with the goal of controlling the fledgling light-bulb industry, according to a report published in Time magazine six years later. The alleged cartel set prices and suppressed competing technologies that would have produced longer-lasting and more efficient light bulbs. By the time the cabal dissolved, the industry-standard incandescent bulb was established as the dominant source of artificial light across Europe and North America. Not until the late 1990s did compact fluorescent bulbs begin to edge into the worldwide lighting market as an alternative. The Coral Castle How did Ed Leedskalnin build the massive Coral Castle in Homestead, Florida, out of giant chunks of coral weighing up to 30 tons each with no heavy equipment and no outside help? Theories abound, including anti-gravity devices, magnetic resonance and alien technology, but the answer may never be known. Leedskalnin died in 1951 without any written plans or clues as to his techniques. The centerpiece of the castle, which is now a museum open to the public, is a nine-ton gate that used to move with light pressure from one finger. After the gate’s bearings wore out in the 1980s, a crew of five took more than two weeks to fix it, although they never did get it to work as effortlessly as Leedskalnin’s original masterpiece. Hemp Bio-fuel The father of our country, George Washington, who is rumored to have said “I cannot tell a lie,” was a proud supporter of the hemp seed. Of course, the only thing more suppressed in this country than an honest politician is hemp, which is often mistakenly for marijuana and therefore unfairly maligned. Governmental roadblocks, meanwhile, prevent hemp from becoming the leader in extracting ethanol, allowing environmentally damaging sources like corn to take over the ethanol industry. Despite the fact that it requires fewer chemicals, less water and less processing to do the same job, hemp has never caught on. Experts also lay the blame at the feet of (who else?) Presidential candidates, who kiss up to Iowa corn growers for votes. In5D PATREON: https://www.patreon.com/in5d See our In5D articles the day before they’re released, AD FREE, on Patreon for a minimal donation! Follow In5D on YouTube, OnStellar, MeWe, Informed Planet, Steemit, Minds, Gab, Twitter, Facebook In5d’s New Earth News is your hottest source of news on the waves of energy washing over the planet in preparation for the shift to the New Earth! Become a contributor by e-mailing us at Newearth@In5d.com. Subscribe to In5d to get the latest news in your e-mail inbox. |
First Japanese Bitcoin Exchanges Receive Licenses to Operate Japanese exchanges have begun to receive formal operating licenses from local regulator the Financial Services Agency (FSA). Major trading platforms QUOINE and bitFlyer were among the first to get the formal certificate of approval. Also read: European Central Bank VP Derides Bitcoin, Calling it a ‘Tulip’ Join the Bitsonline Telegram channel to get the latest Bitcoin, cryptocurrency and tech news updates: https://t.me/bitsonline Exchanges Relieved After Six Month Process Bitsonline called in on the operators of both exchanges today after they visited FSA headquarters. CEO Mike Kayamori of QUOINE looked pleased and relieved to get the license — certificate number #00002. Certification, he said, meant companies would have to take the business a lot more seriously, operating more like traditional financial institutions. “There’s all kinds of fiduciary responsibilities — monthly reports, quarterly reports, transaction reports, suspicious activity statements, etc,” he said. QUOINE has been doing all this since first applying in April, though. “You don’t just start complying after you get your license,” Kayamori added, “The laws took effect on 1st April; they’ve been watching us for the past six months.” In the end, receiving the certificate itself was pretty straightforward. There was a small meeting at FSA headquarters in Tokyo’s capital district, and a sense that things were now more serious. QUOINE, bitFlyer Among the First to Get Licenses QUOINE’s competitor bitFlyer also received its certificate (number #00003) today. The FSA announced its first approvals at a media conference in Tokyo at 4PM local time on Friday 29th September, with bitFlyer holding its own event shortly after. In the end, more than 10 Japanese exchanges received licenses on Friday. They included Money Partners (Zaif), Bitbank, GMO Coin, BTCBox, BitTrade and BitPoint. Exchanges were invited to apply for operating licenses when Japan’s new digital currency-friendly laws began earlier in 2017. It was no rubber stamp, and there’s no guarantee all exchanges operating today will obtain (or keep) their certificate. For exchanges — and the digital economy in Japan — this is the beginning of a new era. Though many in cryptocurrency scoff at the idea of government permissions, for the moment it’s the reality. Japan Decided to Regulate, Not Ban Japan got a taste of the Bitcoin Wild West in 2014 when Mt. Gox brought a ton of unwanted international attention. Mopping up that mess is an ongoing concern almost four years later, and Japan was eager to avoid the same thing happening again. For cryptocurrency in Japan, it was either regulation like other financial services, or oblivion. Proponents can feel lucky at least that Japan has chosen regulation over bans, uncertainty and roadblocks. For exchanges like QUOINE and bitFlyer, the next step could be the ICO market. That’s a whole other issue. The FSA is reportedly comfortable only with assets it has spent time studying, including Bitcoin, Bitcoin Cash, and Ethereum. Next Step Is ICO Trading – but Not in Japan for Now QUOINE recently launched an altcoin and digital token exchange called QRYPTOS, but it’s only available to traders outside Japan. BitFlyer has its professional-focused Lightning exchange which also has crypto derivatives — again though, only BTC, BCC, and ETH. Both exchanges are aimed at professional FX traders as much as consumers. It’s a lucrative market, especially in Japan with its army of “Mrs. Watanabe” amateur forex speculators. In fact, FX may even count as a national pastime — and the exchanges know it well. Regulation by the FSA will make that easier — at least for the traders. For the companies themselves, it’s a lot of responsibility. Do you think Japan is handling the digital asset market well? Let’s hear your thoughts. Images via Jon Southurst |
Get the biggest daily news stories by email Subscribe Thank you for subscribing We have more newsletters Show me See our privacy notice Could not subscribe, try again later Invalid Email A Middle East expert has relived the chilling moment he caught a rare glimpse of Jihadi John’s face during a shocking encounter in Syria. Jurgen Todenhofer was fact-finding in a terrorist stronghold when the British ISIS executioner – masked knife-wielding “star” of a series of sickening beheading videos – was assigned to be his driver. The Jihadist – real name Mohammed Emwazi – always hid his face. But when Jurgen, 74, walked into a restaurant with an ISIS commander he came face-to-face with the killer, minus his mask. Jurgen, who was accompanied on the dangerous mission by his son Freddie, said: “I realised Jihadi John was one of our drivers. He was always the masked driver and boss of our commander. “Later I saw him unmasked in a restaurant and they said I had done it on purpose, that I was trying to find out his identity. "I said to the ISIS commander, ‘What the hell, all the other terrorists take off their masks, why is he so special?’ But they didn’t answer. “The fighters had hours and hours of conferences after that about the situation, they would not speak to or sleep or eat with us any more, because I had seen his real face, heard his real voice.” He said swaggering Emwazi, filmed gloating over the brutal beheadings of Britons Alan Henning and David Haines in two videos, had long curly hair, a nose like an eagle’s beak and was “the most unfriendly guy we met there”. German former judge and politician Jurgen went to the region with his son after Freddie, 31, contacted ISIS online and arranged to meet Jihadi fighters. Leaders of the terror group promised they would not be harmed and they spent days talking to terrorists and members of the group’s “police force” about their vile cause. They also witnessed their squalid living conditions, which turned out to be far from the life of riches with a selection of wives catering to their every whim conjured up by ISIS recruiters to suck in impressionable young Muslims. Jurgen, who has written several books about the Middle East, is a friend of British hostage John Cantlie and wanted to see him during the visit five months ago. Video Loading Video Unavailable Click to play Tap to play The video will start in 8 Cancel Play now The war photographer is being held by ISIS and appeared in several of its propaganda videos after being waterboarded and terrorised. Jurgen said: “I was devastated at what they did to John. There is nothing these perverse people are not able to do. “I wanted to meet him and he [Jihadi John] insisted that I should meet John Cantlie, who would give me a letter to David Cameron and the British people and to Cantlie’s family. "IS wanted to film me accepting the letter. I said, ‘No, I will not play a role in your videos’ and we had the first quarrel. “Jihadi John was always masked, you could only see one eye and he had a strong accent, the same accent as Jihadi John we know from the videos.” Emwazi was born in Kuwait but grew up and went to university in London. His last video appearance was in January in a film of him beheading Japanese journalist Kenji Goto. On their trip Jurgen and Freddie visited the Syrian cities of Aleppo and Raqqa as well as Mosul in Iraq, which have been captured by ISIS as part of its murderous campaign to form an Islamic state – and it was the same grim story wherever they went. Jurgen said: “Everywhere I was it was sleeping on the floor or in broken old beds. These stories of fighters being rich and having several wives are told to persuade young people to join them. "They only get pay-outs if they win a battle – those who conquered Mosul got $1,000 or $2,000 but normal fighters get $50 (£30) a month. "For a while all we could get to eat were chocolate cookies which become horrible after a while. In Mosul we were in a restaurant and all the fighters eat are cheeseburgers, hummus, fries and Pepsi. “They don’t have 10 women per man, this is another myth. Most fighters don’t have a girl and the 15 and 16-year-old girls who leave our countries for IS get put into women’s houses where they try to find husbands for them.” He added: “I met many fighters from the UK, Sweden and Germany. I asked them questions about the Koran but they couldn’t answer because they don’t know the Koran. "They can’t come home because they are betrayers in the eyes of IS fighters and are executed, condemned to death if they want to leave. Some have escaped, hundreds have been executed.” Jurgen believes the only way to stop Western recruits going to Syria is to stop them crossing the border with Turkey. He said: “We must force Turkey to allow us to police these borders.” And his assessment on IS? “It is a very complicated system but in the end is like all governments, there are four people at the top who aren’t really fighting for Islam, they are fighting for personal power.” Below: Beach killer Seifeddine Rezgui and Jihadi John were part of SAME terror training camp |
Imagine that you are a bouncer, checking IDs outside a popular bar in a college town. It is somewhat dark outside the door, there are many distractions: loud music is playing and your job requires you to also keep an eye on the crowd for trouble. And because the patrons are dressed for a night out, many of them look somewhat different than their ID photos. Despite all these challenges, intuition probably tells you that matching faces to ID photos is easy and accurate. Look at the photo, look at the person, and they either match or not. It turns out, however, that this intuition is wrong. Detecting false IDs is surprisingly difficult, especially when they rarely occur. A bouncer for a college bar can likely expect to catch roughly a dozen fake IDs in an evening, and the cost for missing one is relatively low: an underage student sneaks into a bar, and the bar makes more money. Now imagine that you are screening IDs for airport security. Again, you must simultaneously verify IDs while keeping an eye on the crowd for suspicious activity, and there is time pressure to keep the line moving. Moreover, travelers vary widely in age and appearance; their IDs and passports are from all around the world; and there can be great differences between a person’s photo and their current appearance. Most importantly, only a very rare person would attempt to board an airplane with a false ID, and the consequences of missing that person could be dire. With the recent disappearance of Malaysian Airlines Flight 370, and reports that two men boarded the plane using stolen passports (although they were subsequently ruled out as potential terrorists), attention has become focused on this potential security loophole. In many airports around the world, there are several checks in place to prevent individuals with stolen IDs from passing through security, including scanning passengers’ passports against the Interpol database of known missing/stolen documents. Approximately 3.1 billion people traveled via airplane in 2013, yet Interpol estimates that passengers successfully boarded airplanes 1 billion times without having their passports scanned against their database. Although this oversight may reflect negligence or lack of available technology, it underscores the need to understand the second line of defense against stolen identity documents: the human ability to match faces to photographs. Given the myriad contexts in which society relies on face matching, it is surprising to learn that decades of research have documented its remarkable fallibility. People often have the intuitive impression that they (and others) are “expert” face processors, given the social relevance and ubiquity of face and expression perception. In many domains, this intuition is correct. Humans are capable of recognizing hundreds of individuals across years, and under varying environmental conditions. However, this impressive ability is generally limited to familiar faces. In 2011, researchers asked U.K. and Dutch participants to sort 40 photographs of individuals into piles so that each pile contained pictures of the same person. The 40 photographs depicted only two individuals, both Dutch celebrities, and, in fact, almost all of the Dutch participants created only two piles. By contrast, the U.K. participants created an average of 7.5 separate piles. Without familiarity to aide their processing, the U.K. participants perceived the faces as representing far more unique identities. Other research has focused on unfamiliar face matching. Although there are certainly situations in which an observer must match a familiar face to his photo ID–for instance, a frequent flyer or familiar face at a neighborhood bar or liquor store–the majority of people passing through security lines or other age and identity checkpoints are likely to be unfamiliar to the person checking their documents. Under these circumstances, a premium is placed on catching the “fakes.” Although it is not ideal to inconvenience someone by closely scrutinizing their ID, the consequences of missing a stolen ID are severe. Unfortunately, laboratory research has revealed that this task is remarkably error-prone. Under idealized conditions, with just two faces to compare, almost 20 percent of identity mismatches go undetected, according to research published in 2008. Performance drops even further when the observer compares faces of other-race individuals, extending the well-known own-race bias in face recognition to perceptual tasks that place little burden on memory systems. But how well do such laboratory studies mimic real life? To approximate real-life conditions, researchers sent shoppers through a supermarket carrying credit cards with identifying photos on the front. When the shoppers attempted to pay with their assigned cards, they were unaware of whether the credit card photo depicted them, or a different individual, matched for age and gender. Although all cashiers were aware of the ongoing study, and were warned to watch out, they accepted nearly 50 percent of the fraudulent cards. Error rates exceeding 20 percent are harmless in the lab, but they can have severe consequences in applied settings. One difficulty in comparing lab studies with applied contexts is the rate at which observers encounter fake IDs. In most laboratory studies, observers encounter 50 percent identity matches and 50 percent identity mismatches. While it is possible for a liquor retailer to encounter frequent fake IDs (particularly in small college towns with not much else to do!), one can likely assume that very few individuals present fake or stolen IDs when traveling through the airport or crossing national borders. Although this sounds like a good thing, there is solid evidence to suspect that these contextual statistics will have a powerful (and detrimental) influence on an individual’s ability to detect identity mismatches. In visual search tasks such as baggage screening in which targets occur rarely, people become less likely to notice them. This is known as the low-prevalence effect, and it often manifests as a conservative bias in decision-making. That is, individuals become less “willing” to report a target when those targets appear infrequently. The same finding – but far stronger – emerges in unfamiliar face matching. In a study published earlier this year, I along with Stephen Goldinger at Arizona State University found that when people rarely encountered false IDs–in our study, they were looking at two pictures depicting the same or different individuals–they missed 45 percent of those that occurred. That is, in those instances, they thought the two photos were of the same person when they were not. This error resisted many attempts to reduce it: we asked observers to make certainty judgments and even gave them a second chance to view some face pairs. Thus, face matching is strongly affected by viewers’ expectations. If someone does not expect to encounter a fake ID, that person will be less likely to detect fake IDs. The consequences of these biases, coupled with the inherently challenging nature of unfamiliar face matching, suggest that photo-ID matching is far more challenging (and unsuccessful) than we might care to believe. References: Bahrick, H. P., Bahrick, P. O., & Wittlinger, R. P. (1975). Fifty years of memory for names and faces: A cross-sectional approach. Journal of Experiment Psychology: General, 104, 54-75. Hancock, P. J. B., Bruce, V., & Burton, A. M. (2000). Recognition of unfamiliar faces. Trends in Cognitive Sciences, 4, 330-337. http://dx.doi.org/10.1016/S1364-6613(00)01519-9 Jenkins, R., White, D., Van Montfort, X., & Burton, A. M. (2011). Variability in photos of the same face. Cognition, 121, 313-323. http://www.sciencedirect.com/science/article/pii/S0010027711002022 Kemp, R., Towell, N. & Pike, G. (1997). When seeing should not be believing: Photographs, credit cards, and fraud. Applied Cognitive Psychology, 11, 211-222. DOI: 10.1002/(SICI)1099-0720(199706)11:3<211::AID-ACP430>3.0.CO;2-O Megreya, A. M. & Burton, A. M. (2006). Unfamiliar faces aren’t faces: Evidence from a matching task. Memory & Cognition, 34, 865-876. http://www.ncbi.nlm.nih.gov/pubmed/17063917 Megreya, A. M. & Burton, A. M. (2007). Hits and false positives in face matching: A familiarity based dissociation. Perception & Psychophysics, 69, 1175-1184. http://www.ncbi.nlm.nih.gov/pubmed/18038955 Megreya, A. M. & Burton, A. M. (2008). Matching faces to photographs: Poor performance in eyewitness memory (without the memory). Journal of Experimental Psychology: Applied, 14, 364-372. http://www.ncbi.nlm.nih.gov/pubmed/19102619 Papesh, M. H., & Goldinger, S. D. (2014). Infrequent identity mismatches are frequently undetected. Attention, Perception, & Psychophysics. doi: 10.3758/s13414-014-0630-6 Wolfe, J.M., Horowitz, T.S., & Kenner, N.M. (2005). Rare items are often missed in visual searches. Nature, 435, 439-440. http://www.ncbi.nlm.nih.gov/pubmed/15917795 |
Architect's rendering of the eight-story, 855-space garage planned for the Park South neighborhood. The garage is controversial, with some city residents saying it's far too big for the area south of Washington Park in Albany. less Architect's rendering of the eight-story, 855-space garage planned for the Park South neighborhood. The garage is controversial, with some city residents saying it's far too big for the area south of Washington ... more Image 1 of / 3 Caption Close Huge garage won't build a neighborhood 1 / 3 Back to Gallery Albany You want parking? Oh, this neighborhood will have parking. Right there on Myrtle Avenue in Albany will be the grandest parking garage the region has ever seen. It'll be eight towering stories of parking glory, enough space for 855 cars. We'll have an entirely new reason to call the neighborhood Park South. There's just one thing: Such an insanely large garage was never part of the plan. As you probably know, Park South has been undergoing a transformation. Under the guidelines of a 2006 redevelopment plan, the rundown section of the city has been remade by shiny buildings lining New Scotland Avenue near Albany Medical Center. As part of the next wave of change, Columbia Development wants to clear two city blocks for 268 apartments, along with offices and stores. The latest version of the proposal calls for nine new buildings — including the controversial parking garage. How big is it? It's about double the garage approved by city lawmakers back in 2006, and the Common Council is now being asked to OK the change. More Information Have a story? Contact Churchill 518-454-5700 or cchurchill@timesunion.com. How big is it? Renderings show it dwarfing nearby buildings. They look like Chihuahuas next to a Great Dane. Columbia, which is partnering on the project with Tri-City Rentals and Albany Med, says it needs the garage to serve the customers, residents and workers who would use the new buildings. The assumption seems to be that the apartments, businesses and offices would all be at maximum capacity at exactly the same time. Now, it's fair to wonder who, exactly, would use an eight-story garage to visit a store, or what version of hell it would be to lug groceries from the garage to an apartment on the next block. There's also the question of urban design. The goal of redevelopment in Park South has always been to create a vital, lively, interesting neighborhood, with desirable residential side streets. Massive parking garages don't make for such places. They don't make neighborhoods feel safer and friendlier. Believe me, I get the need for some parking. But cities in the automobile age face a difficult paradox. If an urban neighborhood has too much parking, especially surface-level lots, it's a concrete dead zone. Nobody wants to spend time there. People instead choose tighter-knit neighborhoods in which they can easily walk from place to place — and complain that there's not enough parking. There are examples of each kind of neighborhood within blocks of the proposed mega-garage site. To the south, between Holland Avenue and Academy Road, is a depressing landscape of surface-level lots. People park, then scurry away.To the northeast is Center Square, along Lark Street. This, I'd argue, is the city's most successful inner district — yet there are no parking garages. Imagine that. It's miraculous. The Columbia plan would make Park South more like Holland Avenue and less like Center Square. It's just too much parking for a city. It's too much like a suburban office park. Want a better model? Look to Saratoga Springs, where smaller parking garages are mixed among other uses. Here's a question: Since the expectation seems to be that nobody in Park South will be walking or taking the bus, won't the traffic caused by the new construction overwhelm the neighborhood's narrow streets? Columbia Development declined comment. But Joe Nicolla, its president, has publicly said the garage is key to the plan, and that none of the buildings will go forward without it. It's an all-or-nothing threat. Columbia is also suggesting lenders won't finance the construction without the expanded garage. That claim is curious, since Columbia didn't include a parking garage as part of the eleven-story complex it has proposed building along Wellington Row on State Street. Albany's planning department, by the way, has raised concerns about the mega-garage. In a recent memo, it suggested the structure shouldn't be taller than nearby buildings and called for "a more objective analysis of the suggested parking needs," among other recommendations. That's a nice way of saying that Columbia is exaggerating the need for spaces. That's a nice way of saying that eight stories of concrete are absurd for what has always been a residential side street. cchurchill@timesunion.com • 518-454-5700 • @chris_churchill |
Much has changed since the first Winter Olympics were held in Chamonix, France, in 1924. The “International Winter Sports Week” featured about 250 athletes participating in 16 events across six sports, including the usual suspects like figure skating, bobsled, and ice hockey, as well as a military patrol competition. (The military event was won, strangely, by the Swiss.) Competitors’ attire was less slick and aerodynamic than we see today, with the look perhaps best described as Great Gatsby on Ice. Check out the best winter sportsmen of the 1920s in our collection of images from Chamonix. Speedskaters at the starting line. Photos via Chamonix 1924 Official Olympic Report The Swedish and British curling teams. Photos via Chamonix 1924 Official Olympic Report Three members of the Swedish curling team taking a break to have a drink. Photos via Chamonix 1924 Official Olympic Report Clearing snow at the Olympic stadium. Photos via Chamonix 1924 Official Olympic Report An ice hockey team. Photos via Chamonix 1924 Official Olympic Report Jacob Tullin Thams of Norway, gold medalist in ski jumping. Photo via Chamonix 1924 Official Olympic Report Norway’s Sonja Henie finished eighth (out of eight) in figure skating in Chamonix. She was just 11 years old. Henie would go on to win gold in 1928, 1932, and 1936. Chamonix 1924 Official Olympic Report Andrée Joly and Pierre Brunet won bronze in pairs figure skating in Chamonix before taking gold in 1928 and 1932. The French couple got married in 1929. Photos via Chamonix 1924 Official Olympic Report Julius Skutnabb and Clas Thunberg of Finland won a combined eight speedskating medals in Chamonix. Photo via Chamonix 1924 Official Olympic Report Competitors in the bobsled. Photo via Chamonix 1924 Official Olympic Report The silver-medal-winning British bobsled team. Chamonix 1924 Official Olympic Report |
In a recent Ask Reddit subreddit, one user posed the question: “what is the laziest thing you’ve ever done?” Not surprisingly, some of the responses were pathetically lazy. But one user telling the story of his days sailing on a U.S. military ship by far takes the cake. Here’s his story: I was once on a US military ship, having breakfast in the wardroom (officers lounge) when the Operations Officer (OPS) walks in. This guy was the definition of NOT a morning person; he’s still half asleep, bleary eyed… basically a zombie with a bagel. He sits down across from me to eat his bagel and is just barely conscious. My back is to the outboard side of the ship, and the morning sun is blazing in one of the portholes putting a big bright-ass circle of light right on his barely conscious face. He’s squinting and chewing and basically just remembering how to be alive for today. It’s painful to watch. But then zombie-OPS stops chewing, slowly picks up the phone, and dials the bridge. In his well-known I’m-still-totally-asleep voice, he says “heeeey. It’s OPS. Could you… shift our barpat… yeah, one six five. Thanks.” And puts the phone down. And then he just sits there. Squinting. Waiting. And then, ever so slowly, I realize that that big blazing spot of sun has begun to slide off the zombie’s face and onto the wall behind him. After a moment it clears his face and he blinks slowly a few times and the brilliant beauty of what I’ve just witnessed begins to overwhelm me. By ordering the bridge to adjust the ship’s back-and-forth patrol by about 15 degrees, he’s changed our course just enough to reposition the sun off of his face. He’s literally just redirected thousands of tons of steel and hundreds of people so that he could get the sun out of his eyes while he eats his bagel. I am in awe. He slowly picks up his bagel and for a moment I’m terrified at the thought that his own genius may escape him, that he may never appreciate the epic brilliance of his laziness (since he’s not going to wake up for another hour). But between his next bites he pauses, looks at me, and gives me the faintest, sly grin, before returning to gnaw slowly on his zombie bagel. |
Newly published transcripts of January phone calls between President Trump and the leaders of Mexico and Australia didn’t just give people an opportunity to see how Trump discussed matters with international leaders at the time. One conversational snippet has given the internet a primo meme opportunity. Published Thursday by the Washington Post, the transcripts showed that Trump had a combative conversation Prime Minister Malcolm Turnbull about a plan to accept hundreds of refugees from offshore detention centers near to Australia. “I guarantee you they are bad. That is why they are in prison right now. They are not going to be wonderful people who go on to work for the local milk people,” Trump said, seemingly a reference to the massive U.S. dairy industry. The Brief Newsletter Sign up to receive the top stories you need to know right now. View Sample Sign Up Now That milk snippet was all the internet needed to turn it into a meme full of all the dairy product-themed jokes. The topic of cookies, another business Trump gave airtime to during the presidential debates of 2016 popped up too. A band name was born. Those iconic collectible milk print ads made an appearance. Write to Ashley Hoffman at Ashley.Hoffman@time.com. |
Hi everyone! If you want up to date stats on the decks doing well in Magic, you have come to the right place. In this article, I am going to break down the stats from Magic Online and have a look at what decks are doing the best, and what you should prepare for. An important note - this article is aimed at people playing in Magic Online Leagues (or Dailies for Vintage) and does not take into account results from Grand Prix and other paper events. The statistics presented her are based on the decks that Wizards of the Coast publishes, and only includes the previous week's results. It includes decks that went 5-0 in Leagues (or 3-1 or better in Dailies). Also, if you want to compare the current stats to those of last time, click here. STANDARD Do you like Humans, and/or white decks? If so, Standard is the format for you! Standard is absolutely dominated by these two things at the moment. Take a look: Mono White Aggro (25.37%) Bant Humans (14.93%) Green/White Tokens (8.96%) White/Black Control (7.46%) As you can see, the Human based decks make up a massive chunk of the metagame (41.79%; there was a single red/white humans deck that went 5-0), and the top 4 decks all include white (and none of them including red). In fact, I decided to run the numbers on how dominant white is: it shows up in 73.13% of this weeks decks, with the next closest being green which shows up in just under half the decks. Red is the worst; it was only represented in 17.91% of the decks. Moral of the story seems to be to play white and ignore red in this format. The other thing happening with the format at the moment is the diversity is being slowly eroded as people work it out - out of 67 published decks, there were only 20 unique ones, which is down a little from previous weeks. We had a look at the white aggro deck last week, so this week let's look at Bant Humans: MODERN Modern is, by far, the most diverse Magic format right now. Every time I take a snap shot of the meta for these articles, the top decks have changed. In fact, there were 34 unique decks out of the 68, 5-0 decks that Wizards of the Coast published this week. This is a fantastic state of affairs. Last time it was Jund, Elves, and Affinity that were the top decks. This week: Suicide Zoo (11.76%) Infect (10.29%) Burn (7.35%) Jund, Bant Eldrazi, Affinity, Abzan, Zoo, and Dredge (4.41%) For most of the week Infect was the top deck, but Suicide Zoo overtook it at the last minute to take the number one spot. It's hard to come prepared for any one particular deck in Modern at the moment, but on the flip side there are many strategies that have the potential of winning, so playing what you want has never been truer. PAUPER Well here's a bit of a surprise: Delver has been knocked off the number 1 spot! Stompy (26.79%) Delver (14.29%) Murasa Tron (10.71%) Mono Black Control (8.93%) Kuldotha Jeskai (5.36%) It's probably really no surprise that Stompy has stolen first position and become the dominant deck, as it has a good match up against Delver. Things will change as the meta adjusts to fight Stompy, then Delver will likely make its return to the top - although, it should be said, the pending release of Eternal Masters could shake up the format a bit. The Murasa Tron deck is a blue/red control deck that uses Pulse of Murasa for added value. One interesting stat that I want to bring up is that Pauper is actually slightly more diverse than Standard right now, with 18 unique decks out of the 56 decks Wizards published this week. LEGACY Not much changed in Legacy this week, with the top 3 decks still being the same as last time. And although Delver of Secrets saw a decline in Pauper, it made up a bit of ground here: Miracles (24.56%) Eldrazi Stompy (15.79%) Shardless BUG (8.77%) UR Delver and Grixis Delver (7.02%) BUG Delver (5.26%) There was also a RUG Delver deck that was published twice during the week. But the story of Legacy is still the dominance of the Miracles deck, and it actually was up 3.5% on last time, bouncing back a bit as I predicted. VINTAGE As it was before, so it was again: Jeskai Mentor is still the best deck in the format. However, we did have a new deck enter the top decks this week: Jeskai Mentor (25%) White Eldrazi (16.67%) Dredge (10.42%) Grixis Therapy (8.33%) I featured the White Eldrazi deck in my Sweet Brews column last week, but it seems like it is definitely the new hot deck in Vintage. It had 8 appearances in the 3-1 or better decks (out of 48 decks) and seems like it is the real deal. Whether it is being highly played at the moment due to it being new, or whether it will remain powerful, is still to be seen. I want to finish with a stat that I found quite interesting and which I have alluded to already. I like diversity in formats; to me, it is the sign of a healthy game. Let's take a look at which formats are the most diverse: Standard - 20 unique decks out of 67 published Modern - 34 unique decks out of 68 published Pauper - 18 unique decks out of 56 published Legacy - 19 unique decks out of 57 published Vintage - 17 unique decks out of 48 published If we break this down into the average number of appearances per deck, we can get a look at which format is the most diverse. The less amount of appearances per deck, the more diverse the format: Standard - 3.35 Modern - 2.00 Pauper - 3.11 Legacy - 3.00 Vintange - 2.83 This actually means that Standard is the least diverse format right now, based on the number of 'good' decks in the format. It indicates that unless you are playing one of the top decks, you don't stand much of a chance. It is probably the reason I am not in love with the format right now and have gravitated towards Modern. That's it for this week. Join me again in two weeks when we re-examine what is happening on MTGO! Until then, leave any comments below or follow me on Twitter: @The_Wolf_MTG |
Rajnish Rai is no stranger to the consequences of investigating cases of staged encounter killings. Rai, a 1992 batch officer from the Indian Police Service, first courted controversy in 2007, during his tenure as the deputy inspector general (DIG) of the Crime Investigation Department of Gujarat. In April that year, he arrested three senior IPS officers—DG Vanzara, Rajkumar Pandiyan and MN Dinesh—for the fake encounters of a gangster, Sohrabuddin Sheikh, and his wife, Kausar Bi, in November 2005. By May 2007, Rai was taken off the investigation, so that—according to a report in The Hindu—he could be prevented from “putting the arrested senior IPS officers to more embarrassment.” He was instead posted as the DIG of the State Crime Records Bureau, a non-executive post, which was followed by a transfer to another non-executive posting as the principal, Police Training (Chowky) in Junagadh. His superiors, PC Pande, then the director general of police in Gujarat and OP Mathur, who was the CID (Crime) chief, downgraded the review of his performance in his annual confidential report for the period between 1 April 2007 and 22 August 2007 from “very good” to “average.” In April 2008, the officials of Gujarat University claimed that Rai had cheated in the LLB examinations that he had appeared for and declared him failed in all subjects. (He challenged the university in the Gujarat High Court, which ruled in his favour.) A decade after he made the arrests that have since hounded his career, Rai is in the limelight once again. In a letter dated 17 April 2017, which was first reported by the Indian Express, Rai—who is now the Inspector General of Police with the Central Reserve Police Force (North Eastern Sector)—alleged that a killing of two suspected insurgents in March was not an encounter, as the security forces involved in the operation had claimed, but “pre-planned murders.” Lucas Narzary, alias N Langfa, and David Islary, alias Dayud, believed to be from the militant organisation National Democratic Front of Bodoland (Songbijit), or NDFB (S), were killed on the intervening night between 29 and 30 March. Two units of the CRPF—the 156 Battalion and the 210 Batallion of the Commando Battalion for Resolute Action (CoBRA), a specialised division of the CRPF—filed special situation reports regarding the deaths. According to these, a joint operation conducted by these units, along with the Assam police, the Sashastra Seema Bal (SSB), and the Sikh Light Infantry of the Indian army, in Simlaguri, in the district of Chirang, resulted in the death of the two men. The reports stated that the team conducted this operation in the early hours of 30 March based on the information that members of the NDFB(S) would be present in the area that night. At around 4.30 am, the reports claimed, a police party stationed at Simlaguri road noticed a group of four of five people who were approaching the road from Mandarguri, and resorted to “indiscriminate firing” when the troops challenged them. The forces retaliated in self-defence. In the exchange of fire that ensued, two from this group were killed and subsequently identified as Narzary and Islary. The reports also stated that the team recovered arms and ammunition from the bodies of these two men, which included a rifle, several live rounds and empty cases of ammunition and a Chinese hand grenade. According to Rai's letter, soon after he was appraised of the operation, the Commandant (operations) of the North Eastern Sector informed him that there appeared to be discrepancies between the version that had been narrated in the CRPF reports and the events that had transpired. A senior officer from the CRPF—whose name has not been disclosed in Rai's letter—confirmed the same to him. Rai informed his superiors at the CRPF about the inconsistencies and asked the senior officer to prepare a confidential report on the incident. The report offered a startling conclusion regarding the encounter: that there had been none. Rai then asked another officer from the CRPF to conduct a discreet enquiry to verify the facts that had been brought to light by the confidential report. The officer conducting this enquiry interviewed nine witnesses and accessed nine documents—these included the reports that the two units of the CRPF had submitted and the first information report that had been filed at the police station in Amguri, which falls under Chirang district. The enquiry, Rai's letter states, essentially revealed that a team from the CRPF and the Assam police had first reached Digoldong village, also known as D-Kalling—where they had been told that the suspected militants were stationed—and identified the house in which Narzary and Islary were staying. Upon entering, the team found the two men and young boy asleep in the house. (The letter stated that a woman from the adjacent house said that the boy was her son, and that the team “allowed her to take the young boy away.”) |
2017 Off-road Events in November Are you an off-road enthusiast? Are you looking for something to do this November? Just in case you did not know, there are quite a few very popular off-road events going on all over the nation this month. Just to name a few… How about the 2017 SEMA Show, AAPEX auto accessories show, the 50th BAJA 1000, Best in the Desert PAHRUMP NUGGET “250”, etc. Please read on below to find popular 4×4 off-road events, off-road races, Jeep only events, rock crawler and rock bouncing events, a wide range of mud bog events, Mega truck events, Monster truck events, etc. ++++++++++++++++++++++++++++++++++ Oct. 31st- Nov. 3rd, 2017 SEMA Show 2017 https://www.semashow.com ++++++++++++++++++++++++++++++++++ Nov. 1-3, 2017 – Sands Expo Las Vegas, NV The premier global event for the aftermarket auto parts industry. http://www.aapexshow.com https://www.facebook.com/AAPEXShow/ ++++++++++++++++++++++++++++++++++ Wed, Nov 1— Sun, Nov 5 Mud Bash with ECMR Racing Moccasin Creek Off Road Park, 7055 Wilton Rd, Blackshear, GA https://moccasincreekorp.com/event/1968819/432005316/mud-bash-with-ecmr-racing ++++++++++++++++++++++++++++++++++ Nov. 5th, 2017 Black Bear Run 10345 Coombs Rd, Manton, MI http://cadillacjeepers.com/cadillac-jeepers-events/ ++++++++++++++++++++++++++++++++++ Nov. 14-18th 50th Baja 1000 http://score-international.com/raceinfo/2017-schedule/ ++++++++++++++++++++++++++++++++++ Nov. 18th-26th 7000 acre off-road park in Rush, KY aka- Rush Off-road Park Trip is currently in the works and is scheduled for November 18-26 2017. http://cadillacjeepers.com/cadillac-jeepers-events/ ++++++++++++++++++++++++++++++++++ Turkey Run November 24, 2017 – Turkey Run Rush Off-road Park http://www.rushoffroad.com/events/ ++++++++++++++++++++++++++++++++++ Nov. 22nd-26th, 2017 Turkey Bog Event Hogwaller Off-road Park and Mud Bog http://www.hogwallermudbog.com/mud-bog-dates.html ++++++++++++++++++++++++++++++++++ NOVEMBER 30, DECEMBER 1, 2, 3, 2017 – (Race in Pahrump, NV – Time Trials November 30, 2017) PAHRUMP NUGGET “250” presented by Supercross.com “RACE FOR THE GOLD” CAR/TRUCK & UTV POINTS ONLY – 1-DAY PRE-FUN RUN ON SATURDAY, NOV 25, 2017 http://www.bitd.com ++++++++++++++++++++++++++++++++++ If you happen to know of any other off-road events, off-road races, mud bog events… going on this November, please leave a comment below and we will be sure to add it as soon as possible! About Nox Lux- State of the Art off-road LED light systems by Nox Lux! Premium off-road LED light bars ranging from 2 inch to 50 inch LED bars in single and dual row, Off-road spot and fog lights, LED rock lights, LED cube lights, LED grille kits, skid plates, black out kits, running boards, skid plates, etc. www.Nox-Lux.com Advertisements |
TUSCALOOSA, Ala. -- A pair of Alabama men’s basketball players will miss the remainder of the 2016-17 season because of injuries, head coach Avery Johnson announced Friday. Redshirt junior forward Nick King (lung infection) and sophomore guard Brandon Austin (back) will not return to the floor for the Crimson Tide (15-10, 8-5 SEC) as it prepares for the final five games of its regular season, as well as the SEC Tournament. “Nick King is out for the season due to some recent testing on a previous illness and lung situation that he had been dealing with all year,” Johnson said. “Based on those tests and meeting with Nick and his family, he’s done for the rest of the year. “Secondly, Brandon Austin is also out for the year due a non-surgical procedure involving his back, so he’s done for the year. He’s been having some back issues, and he just had a procedure that’s going to involve him missing the next 3-4 weeks and rehab.” (Make sure you're in the know by signing up for FREE Alabama newsletter!) Austin has suited up in five games as a true sophomore, averaging 0.6 points per game. His second season spent in Tuscaloosa has been hampered by a myriad of injuries, including a bone bruise that sidelined him for the first two games of the year. King started feeling “horrible” when the team played two games in Las Vegas and “was really out of it” when the Alabama basketball team returned. Then, in a seven-day stretch, the forward dropped 15 pounds, lost his appetite and ability to sleep before undergoing tests under doctor supervision. An ex-starter at small forward, King averaged 3.3 points and 2.9 rebounds per game in the Crimson Tide’s first seven games of the season. The Memphis transfer scored a season-high nine points against Saint Louis when Alabama played in Las Vegas. “Based on communicating with the doctors, the long-term prognosis, he’ll be just fine,” Johnson said of King. “But just in the short term of where we are in the season and even if the season goes through April 5, the point is he’s not going to be able to return this year.” Johnson said applying for a medical hardship waiver for King will be something he and the Tide determine once the season has ended. The second-year coach also said of Austin’s situation, “I don’t know if he would even qualify for anything like that.” Alabama will host LSU on Saturday, Feb. 18, for a 2:30 p.m. CT tipoff on the SEC Network. *** Subscribe to BamaOnLine: 7-day FREE TRIAL with subscription *** |
EC chairman Supachai Somcharoen said the atmosphere in the meeting was good and the caretaker government agreed with all the EC proposals. The meeting with the caretaker premier took place in the afternoon at the Royal Thai Air Force Academy. Before the meeting, Supachai said the EC proposed three election dates – July 20, August 17 and September 14 – to the government. It also presented the results of its earlier meetings with security agencies and political parties as well as Democrat Party leader Abhisit Vejjajiva. The EC felt July 20 was an appropriate date but if the government disagreed, then it must give its reasons, he said before the meeting. The EC would listen but remained true to its stance is that the election must not be held in an atmosphere of conflict and that there must be no violence. Meanwhile, EC member Somchai Srisutthiyakorn said the government must ensure a free and fair election, it must stay neutral as the caretaker government and must not abuse the power for its advantage and the security agencies must provide support in maintaining peace and order during the election process,. He also said the EC might postpone the election in problematic places where balloting cannot properly take place properly. Meanwhile, the government must accept the situation, as it was possible that the election could take place but the House of Representatives could not convene within 30 days of the election date. On Yingluck’s Facebook page, she said that in the morning she had attended a meeting to follow up the work of government agencies. She hoped that the election, delayed for more than three months, would take place thus allowing the people to get the government they wanted soon. |
Published on August 27th, 2013 By John Longley, 1983 America’s Cup winner After spending a week in San Francisco and having the opportunity to talk to a number of people who have actually sailed the extraordinary AC72s, I have gathered a bit of AC72 trivia to share… * If you had an engine to power the hydraulics rather than grinders, you could sail the AC72s with 4 people rather than the crew of 11 they now sail with. * There is really only one trimmer on board and he controls the wing. The helmsman controls the cant and rake of the board with buttons on a control pad in front of him but only has 3 seconds of stored power before he has to “throw bananas” into the grinding pit i.e. ask for more hydraulic power. * They have seen 47 knots as the top speed so far but expect to see the 50 knot barrier broken in the Cup match. * The boats go directly downwind 1.8 times faster than the wind. So if you let a balloon go as you went around the top mark you would easily beat it to the bottom mark. * There is only 4 degrees difference to the apparent wind from going on the wind to running as deep as you can. * If you lost the hydraulics while the boats were foiling they would be completely uncontrollable and would most likely capsize. * It is faster to find the strongest adverse current going downwind because the stronger apparent that is then generated translates into more speed than if you were sailing in slack water. (Warning – this takes a bit to get your head around) * When sailing downwind you look for the puffs in front of you not behind you. * It is actually quite dry on the boats, unless you make a mistake and come off the foils, as you are flying a couple of metres above the water. Waves have almost no impact on the boat when foiling. * In strong wind you carry negative camber at the top of the wing to “reef” or de-power the wing. * All crew carry personal tackle so they can effectively rappel down the netting if the boat capsizes. * Gennakers are only used below about 8 knots; the jibs only provide about 3% of the lift up wind. * The foil on the rudder generates about 800 kg of lift with the rest coming from the center board foil to lift the 7 ton yachts clear of the water. * The centre board foil’s tip comes out of the water so it effectively works like a governor on an engine i.e. as the board generates too much vertical lift it comes out of the water, the area is thus reduced so it goes back down etc until it finds equilibrium. |
Posted by Doomeru Woebashi at on Thursday, November 8, 2007 I'm currently playing Manhunt 2 on my my cracked psp, modded so I can see all the delicious torture sequences uncensored. And though I've been generally enthused about getting the chance to act out my innermost violent urges I'm really more pleased to just be playing it before Sir Cucumber. To be sure, the executions have gotten all the attention prior to Manhunt 2's release and I agree that they are chillingly violent, but on the psp and ps2 the graphics are so muddy and the characters so sparsely rendered (seriously, you can count the polygons) that you can barely make anything out. What modding does do is remove the jarring, blinding, mind-searing colorform crapfest that flashes on the screen any time you kill someone. You are already squinting at the psp, hunched close to make anything out even with the brightness cranked up, and then suddenly it feels like you've been hit with a hot poker in the brain via entry through the left nostril. I'm of a mind that this is the ultimate victory for ESRB: In order to satisfy their demands Rockstar didn't just obscure the death sequences but did so in a way that conditions you to NOT want to perform them. Also, your avatar will occasionally vomit on his victim's corpse afterward, as if to press the point further home. Why do they always wear masks in Manhunt games? |
Microsoft Xbox head Phil Spencer Getty Images/Kevork Djansezian When Microsoft launched Windows 10 in the summer of 2015, it came alongside a brand-spanking-new app strategy for the company. Microsoft promised that with its new Windows Universal Platform (UWP), developers could write their apps once and they would run on any device running Windows 10 — including PCs, tablets, smartphones, and, eventually, the Xbox One and HoloLens holographic goggles. From Microsoft's perspective, it's a grand idea for getting developers to take their Windows software and make it available everywhere, including the severely lacking Windows phone platform. With competition from Apple and Google only intensifying, it's critical to attract as many apps as possible. Apart from a few big names like Uber, Hulu, Twitter, and Facebook, however, developers across all industries have been slow to sign on with UWP. Meanwhile, former Microsoft CEO Steve Ballmer says it won't work, and one of the biggest names in gaming slammed it as "the most aggressive move Microsoft has ever made." Overall, developers are concerned that rebuilding their existing apps for UWP is too much work, while simultaneously giving Microsoft too much control over the PC software market. But at a session at the Game Developers Conference, Microsoft Xbox Advanced Technology Group boss Jason Ronald explains why Microsoft's "journey to one platform" is good for game developers — and thus for all developers everywhere. The ultimate answer: By smashing together platforms like the Xbox One and Windows phone together with Windows 10, Microsoft says that it's opening up all kinds of doors to help developers make a lot more cash and win more fans. Smashing the Xbox It's not news that Microsoft is bringing Windows 10 and the Xbox One video game console closer, including the fact that many former Xbox-exclusive titles will debut on Windows 10 with a cross-saving feature, and the extension of the Xbox Live network to Windows 10. At his session, Ronald provided some more details on the future of that trend. First off, the Xbox One is going to get the ability to run those Windows 10 UWP apps later this summer, with the Xbox Store and the Windows Store getting merged into one. Furthermore, UWP apps are gradually going to open up over the course of this year to run the more advanced graphics settings that PC gamers demand. Plus, Microsoft also announced the "Xbox Live Tournaments Platform," a tool to let developers making Windows 10 and the Xbox One games organize their own competitive eSports leagues. Earlier this week, too, Microsoft dropped the huge bomb that it's opening the door for cross-platform play between Windows 10, Xbox One, and the PlayStation 4. A slide from Microsoft's GDC 2016 talk. Matt Weinberger/Business Insider All of those things have a common thread: They encourage players to play more games for longer, across all of their Windows 10 devices, Ronald says. On phones, tablets, or the living room, Microsoft wants customers to never have to leave their games behind. "We want all your players to stay in your game," Ronald says. "With Xbox Live, we want people to play games longer." It's an important concept in modern gaming. In the early days, developers would release their game and leave it at that; modern gaming involves supporting a game for months or years after launch with additional paid content or subscriptions. All of which means that if a developer can keep players playing, they can make a lot of money without having to reinvest resources in creating a new title. Indeed, Ronald boasts that Microsoft made 4.5 times the amount of revenue per Xbox Live-connected device in 2015 than 2014, with twice the number of paid transactions. All about choice In a broader context, Ronald says that the whole push towards UWP is about letting developers choose where they sell their app, and to whom. "It shouldn't be easier to hit one platform versus another," Ronald says. With regards to gaming specifically, Ronald says that there's no reason a developer can't use Universal Windows Platform to make a game that's just for the Xbox One. Microsoft is working hard to make a range of tools and features available to make building games on Windows attractive, regardless of whether or not you're actually investing in the PC market, he says, with the goal of simply making UWP the best place to build games. And with the merger of the Windows and Xbox stores, it makes it easy to start selling your UWP to the 200 million-plus Windows 10 devices and 18 million-ish Xbox One consoles out there, too. Better, it makes it easier to move your apps to new Windows 10 devices like the HoloLens, even as they're released. "There's stuff we haven't invented yet," Ronald says. Microsoft HoloLens. TED And with Xbox Live as "the connective tissue between devices in our ecosystem," Ronald says, it's going to be easier to keep stuff like saved games and purchased goods consistent between platforms. It's absolutely worth noting that all of this is just the gaming-centric version of Microsoft's strategy with its Office 365 suite — keep things consistent across devices, everywhere, with services on the backend. And while Microsoft is going after game developers hard, it's only because gamers have proven themselves time and again to be the earliest, most bleeding-edge of adopters. If Microsoft can get game developers on board, it's going to pave a nice path to future success. And that means unifying the platform to make life as easy for developers as it possibly can. |
--------------------------------- En enero CTXT deja el saloncito. Necesitamos ayuda para convertir un local en una redacción. Si nos echas una mano grabamos tu nombre en la primera piedra. Del vídeo se encarga Esperanza. Donación libre: --------------------------------- La segunda revisión del rescate ha finalizado “con éxito”. Es decir, el Gobierno griego ha demostrado ante los acreedores que ha llevado a cabo todas las privatizaciones, recortes de pensiones, medidas de ajuste y demás exigencias “con éxito” para los intereses de los demandantes con independencia de que los electores griegos votaran otro programa económico. Como premio a la obediencia griega, los acreedores hicieron una concesión. La primera desde junio de 2015. El Eurogrupo acordó medidas a corto plazo para reducir la deuda en un 20% del PIB hasta 2060. En concreto, el paquete consta de tres tipos de medidas de alivio a corto plazo: una extensión de los vencimientos de los bonos desde los 28 años actuales a 32,5 años; reducir el riesgo de los tipos de interés sin incurrir en costes adicionales para otros países que han sido rescatados y, la tercera, ampliar el plazo para la devolución de los intereses de parte del segundo rescate en 30 años. El gobierno Tsipras considera una victoria política abordar la reestructuración de la deuda, mientras los análisis más críticos, por el contrario, señalan que estas medidas suponen, de facto, alargar la deudocracia 30 años más, desde 2030, fecha hasta la que está contratada la deuda en estos momentos, hasta 2060. En todo caso, las medidas de calado, a medio y largo plazo, no se abordarán hasta pasado el verano de 2018, cuando finalice el rescate actual. Aún no se ha decidido si el FMI formará parte del rescate. Hace meses que su papel está en juego, lo que le permite actuar como el poli malo de la negociación Inmediatamente después de dar oficialmente por concluida la revisión, la tensión entre el Gobierno griego y los acreedores ha vuelto a dispararse. Los puntos calientes son cinco: el papel del FMI en el rescate, la reforma laboral, la congelación del IVA en las islas, la subida de las pensiones y el aumento de las becas escolares. El papel del FMI Aún no se ha decidido si el FMI formará parte del rescate. Hace meses que su papel está en juego, lo que le permite actuar como el poli malo de la negociación. El FMI no está de acuerdo con los objetivos fijados entre Grecia y sus acreedores europeos para el superávit primario a partir de 2018. En principio Grecia deberá alcanzar no solo en 2018 sino en los años posteriores --finalizado el rescate-- un superávit primario del 3,5 % del producto interior bruto (PIB). El FMI considera que con los recortes actuales Grecia sólo obtendrá un 1,5% de superávit, por lo que exige medidas adicionales de austeridad que permitan ‘ahorrar’ 4.500 millones antes de 2018. El responsable del FMI para Europa, Poul Thomsen, y el economista jefe, Maurice Obstfeld, publicaron un artículo en la web del Fondo en el que afirman que el objetivo del 3,5% es algo ya firmado entre Grecia y los acreedores europeos, por lo que el FMI no es responsable. “Si Grecia acuerda con sus socios europeos objetivos fiscales ambiciosos no critiquéis al FMI por ser quien insiste en la austeridad cuando pedimos las medidas necesarias para que estos objetivos sean alcanzables”, afirman Thomsen y Obstfeld. El artículo de Thomsen y Obstfeld fue la gota que colmó el vaso para el Gobierno Tsipras. El ministro de Finanzas griego, Euclides Tsakalotos, y varios economistas afines cuestionaron los datos de dicho artículo y, según fuentes del gobierno, el primer ministro tomó la decisión de proponer a François Hollande y Angela Merkel que el FMI quede definitivamente fuera del rescate con el argumento de que las proyecciones económicas del FMI en los últimos años siempre estuvieron equivocadas. La reforma laboral El salario mínimo en Grecia está en 683,8 euros al mes (8.206 al año), es decir, 193,7 euros menos que en 2012. Para los menores de veinticinco años existe un tipo de contrato sin salario mínimo. El desempleo sigue siendo el más alto de la Unión Europea, a pesar de que durante 2016 ha bajado hasta el 24,3%. Las pensiones se han reducido una media del 45% desde 2010. El 40% de los funcionarios han sido despedidos desde 2011. Syriza prometió restablecer la negociación colectiva, que fue eliminada del ordenamiento jurídico griego en 2012. Cómo no, por exigencia de los acreedores Los acreedores pretenden que Grecia reforme su mercado laboral porque es “demasiado proteccionista”. Aquí es donde se encalla uno de los conflictos actuales, que ha costado cuatro huelgas generales. Syriza prometió restablecer la negociación colectiva, que fue eliminada del ordenamiento jurídico griego en 2012. Cómo no, por exigencia de los acreedores. La Troika dijo entonces, meses antes de alcanzar el récord de paro, que, sin negociación colectiva, Grecia comenzaría a crear empleo. Cuando los acreedores le ordenaron acometer una reforma laboral al Gobierno griego, éste contestó que estaba de acuerdo y propuso volver a un modelo basado en la negociación colectiva. Los acreedores entonces aclararon la orden: lo que pretenden es abaratar el despido y flexibilizar sus causas. La incógnita, si es que la hay, se resolverá en 2017. Tímidas políticas redistributivas El 8 de diciembre Tsipras anunció, en una comparecencia por sorpresa en la televisión pública, que 617 millones de euros del superávit de este año se emplearán para devolver la paga extra al 1,6 millones de pensionistas que percibe menos de 850 euros al mes. La devolución será inversamente proporcional a la pensión. Es decir, quien menos cobra recibirá más, hasta completar una paga extra de 850 euros. Además, en su comparecencia televisiva, el primer ministro anunció la congelación del aumento del IVA previsto para 2017 en las islas del Egeo a las que han llegado, y llegan, más refugiados. Tsipras afirmó que la llegada de refugiados tiene un impacto económico en las islas y que es injusto gravar más a quien ya está demostrando una gran solidaridad. La subida del IVA es una medida impuesta en el rescate. Se trata, por lo tanto, de la primera medida del rescate que desobedece oficialmente el Gobierno griego. 617 millones de euros del superávit de este año se emplearán para devolver la paga extra al 1,6 millones de pensionistas que percibe menos de 850 euros al mes Igualmente, Tsipras anunció la creación de 5.000 puestos de trabajo --de personal médico-- para la maltrecha sanidad pública griega. El dinero para todo ello procede del superávit de 2016. Las previsiones eran de 919 millones estimados, pero los últimos cálculos sostienen que será de 1.907 millones. Las medidas nuevas salen de los casi mil millones adicionales. “El compromiso de este gobierno ha sido redistribuir cada euro de superávit disponible entre los ciudadanos más débiles, y hoy cumplimos este compromiso”, aseguró un exultante Tsipras. “Con los sacrificios del pueblo griego, Grecia está aguantando el peso de las crisis económica y de refugiados por Europa. Ha llegado el momento de que Europa lo reconozca” dijo el primer ministro. Tsipras hace este anuncio en el momento en el que su popularidad es más baja. El propio diario de su partido --el AVGI-- publicó en octubre una encuesta que muestra que el 90% de los griegos no está satisfecho con la labor del gobierno. El 80% tampoco lo está con el trabajo de la oposición. Las acciones anunciadas por el gobierno enojaron a los acreedores. La represalia más inmediata vino del Mecanismo Europeo de Estabilidad, uno de los acreedores del país, que congeló unilateralmente las medidas a corto plazo para aliviar la deuda, decididas en una reunión del Eurogrupo a principios de diciembre. El director del Mecanismo Europeo de Estabilidad, Klaus Regling, manifestó que “los anuncios hechos por el primer ministro griego sin consultar con la instituciones abren una serie de dudas”. Dicho de otra forma, Regling recordó que Grecia no puede decidir medidas económicas como si fuera un Estado soberano. El Gobierno griego considera que el consenso en torno a la austeridad se ha roto en Europa, luego de que Hollande y Moscovici no se alinearan con Alemania contra Grecia El propio Eurogrupo tampoco se quedó atrás: la secretaría del grupo de trabajo del Eurogrupo informó por escrito a todos los miembros de que se habían detenido los trámites del alivio de la deuda porque “uno de los miembros había expresado su oposición por escrito y ya no había unanimidad". El presidente francés aclaró entonces que ese miembro que se oponía a la deuda es Alemania. Una vez más, el ministro de Finanzas germano, Wolfgang Schäuble, no está dispuesto a ceder ni un milímetro ante Tsipras. Cualquier decisión soberana de Grecia es considerada “un desafío” porque el memorándum establece que Grecia debe “consultar” cualquier medida económica. “Apoyo las decisiones adoptadas durante las reuniones del Eurogrupo. El Eurogrupo ha decidido aliviar la deuda de Grecia, todavía no lo suficiente. Apoyo la posición del Eurogrupo. No podemos pedirle a Grecia más esfuerzos o evitar que tome algunas decisiones soberanas”, dijo Hollande. El comisario europeo para Asuntos Económicos y Financieros, Pierre Moscovici, también mostró su rechazo a la suspensión temporal de las medidas a corto plazo para aliviar la deuda pública. Ante este nuevo conflicto, y tal vez esto es lo único sorprendente, el Gobierno griego no se ha echado atrás. Al contrario, convocó un pleno extraordinario para que todos los parlamentarios, nominalmente, tuvieran que manifestarse a favor o en contra de las medidas propuestas. Syriza, ANEL, KKE, PASOK, AD y KE votaron a favor. Potami se abstuvo y Nueva Democracia se ausentó del hemiciclo durante la votación. El Gobierno griego considera que el consenso en torno a la austeridad se ha roto en Europa, luego de que Hollande y Moscovici no se alinearan con Alemania contra Grecia. Los analistas griegos están divididos en este punto. Algunos creen que hay dos factores que señalan que estamos ante un nuevo conflicto: la ausencia de consenso en Europa y los buenos datos macroeconómicos de Grecia: el paro continúa reduciéndose, del 26% en 2014 al 23,4% actual; la producción industrial ha remontado en 2016 el 1,8% y el Producto Interior Bruto ha crecido casi el 1%. La izquierda a la izquierda de Syriza, sin embargo, considera que sólo ha sido una gesticulación de un Tsipras necesitado de hacer guiños a su electorado, pero que, como hasta ahora, obedecerá los dictados de la Troika. El año que empieza tiene la respuesta. Mientras tanto, la amenaza nunca cesa. El comisario Moscovici declaró el 28 de noviembre que “no descarta” que Grecia “tenga que firmar un cuarto paquete de rescate”. Traducido: si Grecia se empeña en ejercer su soberanía están dispuestos a ahogarla como en 2015. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.